咨询与建议

限定检索结果

文献类型

  • 1,698 篇 会议
  • 1,341 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,004 篇 工学
    • 1,524 篇 计算机科学与技术...
    • 1,255 篇 软件工程
    • 443 篇 信息与通信工程
    • 255 篇 生物工程
    • 232 篇 控制科学与工程
    • 204 篇 电气工程
    • 158 篇 光学工程
    • 147 篇 电子科学与技术(可...
    • 145 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 66 篇 网络空间安全
  • 1,021 篇 理学
    • 560 篇 数学
    • 284 篇 生物学
    • 272 篇 物理学
    • 170 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 592 篇 管理学
    • 369 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 148 篇 医学
    • 132 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 107 篇 法学
    • 83 篇 社会学
  • 58 篇 经济学
    • 56 篇 应用经济学
  • 54 篇 教育学
  • 32 篇 农学
  • 17 篇 军事学
  • 11 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 78 篇 machine learning
  • 73 篇 software enginee...
  • 71 篇 deep learning
  • 62 篇 training
  • 61 篇 feature extracti...
  • 54 篇 computational mo...
  • 53 篇 data mining
  • 53 篇 artificial intel...
  • 47 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 semantics
  • 40 篇 internet of thin...
  • 38 篇 predictive model...
  • 36 篇 authentication
  • 36 篇 software
  • 35 篇 data models
  • 34 篇 optimization
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 73 篇 college of compu...
  • 65 篇 state key labora...
  • 46 篇 school of inform...
  • 46 篇 sri lanka instit...
  • 44 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 30 篇 department of co...
  • 29 篇 shenzhen institu...
  • 28 篇 national enginee...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 25 篇 guangdong key la...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 22 篇 institute of sof...
  • 21 篇 software enginee...

作者

  • 52 篇 shen linlin
  • 32 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 23 篇 chen liqiong
  • 22 篇 obaidat mohammad...
  • 18 篇 ashok kumar das
  • 18 篇 mahmood khalid
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 16 篇 xie weicheng
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 15 篇 linlin shen
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 yu zitong
  • 13 篇 wang wei
  • 13 篇 xiaorui zhang

语言

  • 2,673 篇 英文
  • 388 篇 其他
  • 53 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3107 条 记 录,以下是2521-2530 订阅
排序:
Performance evaluation of backoff algorithms for medium access in wireless networks
Performance evaluation of backoff algorithms for medium acce...
收藏 引用
International Conference on Selected Topics in Mobile and Wireless Networking (iCOST)
作者: Antoniy Ganchev Lata Narayanan Chadi Assi Department of Computer Science and Software Engineering Concordia University Montreal Canada Concordia Institute of Information Systems Engineering Concordia University Montreal Canada
Consider a backoff algorithm for medium access in wireless networks where a node chooses with probability 1-q to transmit right away and with probability q to transmit after CW slots, where CW is the maximum value of ... 详细信息
来源: 评论
On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY
On the need for data flow graph visualization of Forensic Lu...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Serguei A. Mokhov Joey Paquet Mourad Debbabi Department of Computer Science and Software Engineering Concordia University Montreal Canada Concordia Institute for Information Systems Engineering Concordia University Montreal Canada
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases. I... 详细信息
来源: 评论
Development of remote controlled lab scale bioreactor using virtual instrument technology
Development of remote controlled lab scale bioreactor using ...
收藏 引用
2011 IEEE International Symposium on IT in Medicine and Education, ITME 2011
作者: Gao, Ling Ren, Yilin Lin, Jianqiang Institute of Information Science and Engineering ShanDong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan 250014 China School of Life Science Shandong Normal University Jinan 250014 China State Key Lab of Microbial Technology Shandong University Jinan 250014 China
By using virtual instrument technology, a direct digital control bioreactor is developed, which is able to be remote controlled through internet. Mathematical model of the bioreaction system is developed, which is use... 详细信息
来源: 评论
An approach to analyzing time constrained service composition
收藏 引用
Journal of computers 2011年 第8期6卷 1723-1731页
作者: Fan, Guisheng Yu, Huiqun Chen, Liqiong Tong, Ruan Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 200237 China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China
Service composition is widely applied in different applications. One key issue is how to model and analyze time-related properties for service composition. A model called service composition time-constrained Petri Net... 详细信息
来源: 评论
2D systems based iterative learning control revisited
2D systems based iterative learning control revisited
收藏 引用
2011 International Conference on Advanced Mechatronic Systems, ICAMechS 2011
作者: Hladowski, Lukasz Galkowski, Krzysztof Rogers, Eric Kummert, Anton Institute of Control and Computation Engineering University of Zielona Gora Podgorna 50 Zielona Gora Poland University of Wuppertal Germany School of Electronics and Computer Science University of Southampton Southampton SO17 1BJ United Kingdom Faculty of Electrical Information and Media Engineering Communication Theory University of Wuppertal Germany
Iterative learning control can be applied to systems that repeat the same task over a finite duration with resetting to the starting point once each one is complete. The idea of iterative learning control is to make u... 详细信息
来源: 评论
APPLICATION OF ANT COLONY OPTIMIZATION TO DEVELOP ENERGY EFFICIENT PROTOCOL IN MOBILE AD-HOC NETWORKS
APPLICATION OF ANT COLONY OPTIMIZATION TO DEVELOP ENERGY EFF...
收藏 引用
International Conference on Wireless information Networks and Systems
作者: Sanjay K. Dhurandher Mohammad S. Obaidat Mayank Gupta CAITFS Division of Information Technology Netaji Subhas Institute of Technology University of Delhi Department of Computer Science & Software Engineering Monmouth University Division of Computer Engineering Netaji Subhas Institute of Technology University of Delhi
Foraging Behavior in Ant Swarms can be very helpful when applied to the protocols in Mobile Ad hoc NETworks (MANETs). When the Ant Colony Optimization Scheme (ACO) is applied to a protocol, larger number of paths are ... 详细信息
来源: 评论
Value-transformation for monotone prediction by approximating fuzzy membership functions
Value-transformation for monotone prediction by approximatin...
收藏 引用
International Symposium on Computational Intelligence and Informatics
作者: Tomáš Horváth Alan Eckhardt Krisztián Buza Peter Vojtáš Lars Schmidt-Thieme Institute of Computer Science Pavol Jozef Safarik University in Kosice Slovakia Information Systems and Machine Learning Lab University of Hildesheim Germany Department of Software Engineering Charles University in Prague Czech Republic Department of Computer Science and Information Theory Budapest University of Technology and Economics Hungary
Monotone prediction problems, in which the target variable is non-decreasing given an increase of the explanatory variables, have became more popular nowadays in many problem settings which fulfill the so-called monot... 详细信息
来源: 评论
Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks
Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networ...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Jing-Wei Huang Isaac Woungang Han-Chieh Chao Mohammad S. Obaidat Ting-Yun Chi Sanjay K. Dhurandher Institute of Computer Science and Information Engineering National I-lan University Taiwan Department of Computer Science Ryerson University Toronto ONT Canada Department of Computer Science and Software Engineering Monmouth University NJ USA Netaji Subhas Institute of Technology University of Delhi India
Mobile Ad Hoc Networks (MANETs) offer a dynamic environment in which data exchange can occur without the need of a centralized server or human authority, providing that nodes cooperate among each other for routing. In... 详细信息
来源: 评论
RFID protocol based on random number and encryption hash
RFID protocol based on random number and encryption hash
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011)
作者: Qian Quan Guo Xiang Zhang Rui School of Computer Engineering & Science State Key Laboratory of Information Security (Institute of Software Chinese Academy of Sciences) Shanghai University Shanghai China
The features of the RFID system and the constraints of RFID devices may bring about various privacy problems. After analyzing some existing RFID protocols, this paper proposes a new protocol based on random number and...
来源: 评论
A skew angle detection algorithm based on maximum gradient difference
A skew angle detection algorithm based on maximum gradient d...
收藏 引用
International Conference on Transportation, Mechanical, and Electrical engineering (TMEE)
作者: Dan Wang Xichang Wang Jiang Liu Institute of Information Science & Engineering Computer Software Novel Technology Shandong China Shandong Oumasoft Co. Ltd Research Institute of Digital Image Processing Shandong China
In order to resolve the problem of skew phenomenon in the handwritten document image during the scanning process, a new skew angle detection algorithm based on maximum gradient difference as well as Hough transform wa... 详细信息
来源: 评论