咨询与建议

限定检索结果

文献类型

  • 1,705 篇 会议
  • 1,355 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,541 篇 计算机科学与技术...
    • 1,262 篇 软件工程
    • 453 篇 信息与通信工程
    • 256 篇 生物工程
    • 240 篇 控制科学与工程
    • 221 篇 电气工程
    • 162 篇 光学工程
    • 155 篇 电子科学与技术(可...
    • 147 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 73 篇 安全科学与工程
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 71 篇 仪器科学与技术
    • 71 篇 网络空间安全
  • 1,027 篇 理学
    • 560 篇 数学
    • 285 篇 生物学
    • 275 篇 物理学
    • 169 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 89 篇 化学
  • 599 篇 管理学
    • 376 篇 管理科学与工程(可...
    • 250 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 149 篇 医学
    • 132 篇 临床医学
    • 110 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 109 篇 法学
    • 84 篇 社会学
  • 58 篇 经济学
    • 56 篇 应用经济学
  • 54 篇 教育学
  • 33 篇 农学
  • 17 篇 军事学
  • 12 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 79 篇 machine learning
  • 74 篇 deep learning
  • 73 篇 software enginee...
  • 63 篇 feature extracti...
  • 62 篇 training
  • 55 篇 data mining
  • 55 篇 computational mo...
  • 54 篇 artificial intel...
  • 49 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 semantics
  • 40 篇 internet of thin...
  • 38 篇 predictive model...
  • 37 篇 software
  • 36 篇 authentication
  • 35 篇 data models
  • 34 篇 optimization
  • 33 篇 neural networks
  • 31 篇 support vector m...

机构

  • 75 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 school of inform...
  • 46 篇 sri lanka instit...
  • 44 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 30 篇 department of co...
  • 29 篇 shenzhen institu...
  • 28 篇 national enginee...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 25 篇 guangdong key la...
  • 24 篇 school of comput...
  • 23 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 22 篇 institute of sof...
  • 21 篇 software enginee...

作者

  • 52 篇 shen linlin
  • 32 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 24 篇 fan guisheng
  • 24 篇 du bo
  • 23 篇 chen liqiong
  • 22 篇 obaidat mohammad...
  • 18 篇 ashok kumar das
  • 18 篇 mahmood khalid
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 16 篇 xie weicheng
  • 15 篇 dharshana kasthu...
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 15 篇 linlin shen
  • 13 篇 wei sun
  • 13 篇 yu zitong
  • 13 篇 wang wei
  • 13 篇 xiaorui zhang

语言

  • 2,593 篇 英文
  • 487 篇 其他
  • 55 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3128 条 记 录,以下是2461-2470 订阅
排序:
A flexible software framework for transportation maintenance scheduling
Journal of Software
收藏 引用
Journal of software 2012年 第9期7卷 2158-2161页
作者: Huang, Yongjian Su, Ruidan Yan, Weiwei Zhang, Kunlin Liu, Yang Xu, Huaiyu Software College Northeastern University Shenyang China College of Information Science and Engineering Northeastern University Shenyang China School of Computer Engineering and Science Shanghai University Shanghai China Service Science Research Center Shanghai Advanced Research Institute Chinese Academy of Sciences China
This paper presents a general-purpose software framework dedicated to the evolutionary transportation scheduling, which is one of the most challenging areas in transportation engineering. Against evolution, the most p... 详细信息
来源: 评论
Stabilization of Interactive Differential Evolution for Generating Natural Facial Images
Stabilization of Interactive Differential Evolution for Gene...
收藏 引用
International Conference on Awareness science and Technology
作者: Dylan Kessler Qiangfu Zhao Dept. of Computer Science and Software Engineering Rose-Hulman Institute of Technology Terre Haute Indiana United States Dept. of Computer and Information Systems The University of Aizu Aizuwakamatsu Fukushima Japan
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primar... 详细信息
来源: 评论
Repetitive process based iterative learning control for a two motors system
Repetitive process based iterative learning control for a tw...
收藏 引用
IEEE Conference on Control Technology and Applications (CCTA)
作者: Lukasz Hladowski Krzysztof Galkowski Eric Rogers Lan Zhou Yong He Anton Kummert Institute of Control and Computation Engineering University of Zielona Gora Poland Electronics and Computer Science University of Southampton Southampton UK School of Information and Electrical Engineering Hunan University of Science and Technology Xiangtan China School of Information Science and Engineering Central South University Changsha China Electrical Information and Media Engineering Communication Theory University of Wuppertal Germany
This paper uses a 2D systems setting, based on the control theory for repetitive processes, to design an iterative learning control law with particular emphasis on the commonly encountered problem of maintaining a spe... 详细信息
来源: 评论
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model
收藏 引用
IEEE Transactions on computers 2012年 第5期61卷 713-725页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Yuan He Xufei Mao Yunhao Liu Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering Building of Electronics and Information Engineering University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology (TNLIST) Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Tsinghua National Laboratory for Information Science and Technology (TNLIST) School of Software Tsinghua University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm... 详细信息
来源: 评论
Mechanism design for finding experts using locally constructed social referral web
Mechanism design for finding experts using locally construct...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Lan Zhang Xiang-Yang Li Yunhao Liu QiuYuan Huang Shaojie Tang MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China Department of Computer Science Illinois Institute of Technology USA Department of Computer Science and Engineering HKUST Hong Kong China Department of Electrical Engineering University of Florida USA
In this work, we address the problem of finding experts using chains of social referrals and profile matching with only local information in online social networks. By assuming that users are selfish, rational, and ha... 详细信息
来源: 评论
Optimal multi-path energy-aware routing protocol for wireless sensor networks
Optimal multi-path energy-aware routing protocol for wireles...
收藏 引用
International Conference on Electrical engineering/Electronics, computer, Telecommunications and information Technology, ECTI-CON
作者: Sarayoot Tanessakulwattana Chotipat Pornavalai Goutam Chakraborty Sagar Naik Faculty of Information Technology King Mongkut's Institute of Technology Ladkmbang Bangkok Thailand Department of Software and Information Science Iwate Prefectural University Japan Department of Electrical and Computer Engineering University of Waterloo Canada
A large portion of energy-aware routing protocol for wireless sensor networks are cluster-based. In cluster based approaches, power of the cluster head (CH) nodes are drained more rapidly compared to other member node... 详细信息
来源: 评论
Three-dimensional scenes reconstruction based on 3DS data file and OPENGL+MFC
收藏 引用
ICIC Express Letters 2012年 第7期6卷 1897-1902页
作者: Liu, Shuang Chen, Peng Liu, Yongkui School of Computer Science and Engineering Dalian Nationalities University No. 18 Liaohe West Road Dalian Development Zone Dalian 116600 China Department of Computer Science and Technology Dalian Neusoft Institute of Information No. 8 Software Park Road Dalian 116023 China
With detailed analysis of 3DS inner data structure, an effective parsing and accessing process is adopted to get necessary data set for 3D scenes reconstruction. Then this data set is stored in self-defined reasonable... 详细信息
来源: 评论
Multiple Alignment Stage for the Automatic Precision Alignment System
Multiple Alignment Stage for the Automatic Precision Alignme...
收藏 引用
International Symposium on computer, Consumer and Control (IS3C)
作者: S.K. Tsau D.Y. Hong H.W. Le C.M. Ming Chang C.H. Lin Department of Computer Science and Information Engineering National Taichung Institute of Technology Taichung Taiwan Department of Software and Advance Technology and Research Chiuan Yan Technology Company Limited Taichung Taiwan
In this paper, we focus on electronics industry by now, in the manufacturing process, the servo system of the position of the alignment platen to do a study on methods of improving the software, which aims for the mea... 详细信息
来源: 评论
Societally connected multimedia across cultures
收藏 引用
Frontiers of information Technology & Electronic engineering 2012年 第12期13卷 875-880页
作者: Zhongfei ZHANG Tao MEI Nicu SEBE Yonghong TIAN Vincent S.TSENG Qing WANG Changsheng XU Huimin YU Shiwen YU Zhengyou ZHANG Ramesh JAIN Yueting ZHUANG Noshir CONTRACTOR Alexander G.HAUPTMANN Alejandro (Alex)JAIMES Wanqing LI Alexander C.LOUI Department of Information Science & Electronic Engineering Zhejiang University Hangzhou 310027 China Microsoft Research Asia China Department of Information Engineering and Computer Science University of Trento Italy Institute of Computational Linguistics Peking UniversityBeijing 100871 China Institute of Computer Science and Information National Cheng Kung University Taiwan 701 Tainan School of Computer Science Northwestern Polytechnical University Xi'an 710129 China Institute of Automation Chinese Academy of Sciences Beijing 100080 China Institute of Computational Linguistics Peking University Beijing 100871 China Microsoft Research Redmond WA USA Department of Computer Science University of California IrvineCA USA College of Computer Science and Technology Zhejiang UniversityHangzhou 310027 China School of Communication Northwestern University Evanston ILUSA Informedia Group CMU Pittsburgh PA Yahoo! Research Spain School of Computer Science and Software Engineering University of Wollongong NSW Australia Kodak Research Labs USA
The advance of the Internet in the past decade has radically changed the way people communicate and collaborate with each other. Physical distance is no more a barrier in online social networks, but cultural differenc... 详细信息
来源: 评论
Fault detection on the software implementation of CLEFIA lightweight cipher
收藏 引用
Journal of Networks 2012年 第8期7卷 1288-1294页
作者: Li, Wei Gu, Dawu Xia, Xiaoling Liu, Ya Liu, Zhiqiang School of Computer Science and Technology Donghua University Shanghai China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
CLEFIA is an efficient lightweight cipher that delivers advanced copyright protection and authentication in computer networks. It is also applied in the secure protocol for transmission including SSL and TLS. Since it... 详细信息
来源: 评论