咨询与建议

限定检索结果

文献类型

  • 1,698 篇 会议
  • 1,332 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,098 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,005 篇 工学
    • 1,524 篇 计算机科学与技术...
    • 1,255 篇 软件工程
    • 443 篇 信息与通信工程
    • 255 篇 生物工程
    • 232 篇 控制科学与工程
    • 204 篇 电气工程
    • 158 篇 光学工程
    • 147 篇 电子科学与技术(可...
    • 145 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 66 篇 网络空间安全
  • 1,021 篇 理学
    • 562 篇 数学
    • 284 篇 生物学
    • 272 篇 物理学
    • 172 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 591 篇 管理学
    • 368 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 147 篇 医学
    • 131 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 107 篇 法学
    • 83 篇 社会学
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 54 篇 教育学
  • 32 篇 农学
  • 17 篇 军事学
  • 11 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 78 篇 machine learning
  • 72 篇 software enginee...
  • 71 篇 deep learning
  • 62 篇 training
  • 61 篇 feature extracti...
  • 54 篇 computational mo...
  • 53 篇 data mining
  • 53 篇 artificial intel...
  • 47 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 semantics
  • 40 篇 internet of thin...
  • 38 篇 predictive model...
  • 36 篇 authentication
  • 36 篇 software
  • 35 篇 data models
  • 34 篇 optimization
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 73 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 school of inform...
  • 46 篇 sri lanka instit...
  • 45 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 29 篇 shenzhen institu...
  • 29 篇 department of co...
  • 27 篇 national enginee...
  • 26 篇 guangdong key la...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 22 篇 institute of sof...
  • 21 篇 software enginee...

作者

  • 52 篇 shen linlin
  • 31 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 22 篇 obaidat mohammad...
  • 22 篇 chen liqiong
  • 18 篇 ashok kumar das
  • 18 篇 mahmood khalid
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 14 篇 xie weicheng
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 yu zitong
  • 13 篇 wang wei
  • 13 篇 xiaorui zhang
  • 13 篇 zhang liangpei

语言

  • 2,664 篇 英文
  • 388 篇 其他
  • 53 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3098 条 记 录,以下是2641-2650 订阅
排序:
On the Privacy Protection in Publish/Subscribe Systems
On the Privacy Protection in Publish/Subscribe Systems
收藏 引用
2010 IEEE International Conference Conferenhce on Wireless Communications,Networking and information Security(2010 IEEE 无线通信、网络技术与信息安全国际会议 WCNIS)
作者: Nancy Skocik Weifeng Chen Jianchun Jiang Department of Math Computer Science & Information Systems California University of Pennsylvania Ca National Engineering Research Center of Fundamental Software Institute of Software Chinese Academy o
In a publish/subscribe (pub/sub) system, information (referred to as events) published by publishers and interests submitted by subscribers are sent to the network, which conducts matching between events and interests... 详细信息
来源: 评论
Finding near-optimal strategies for negotiation with incomplete information using a diversity controlling EDA
Finding near-optimal strategies for negotiation with incompl...
收藏 引用
International Conference on Supply Chain Management and information Systems (SCMIS)
作者: Jeonghwan Gwak Kwang Mong Sim Minjie Zhang School of Information and Communications Gwangju Institute of Science and Technology Gwangju South Korea School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia
Negotiation activities are carried out among stakeholders in a supply chain for resolving the differences in their objectives and preferences. The objective of this work is to find near-optimal negotiation strategies ... 详细信息
来源: 评论
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2010年 6083 LNCS卷 V-VI页
作者: Malyshkin, Victor Hsu, Ching-Hsien Abramov, Sergey M. Yang, Chu-Sing Chung Hua University Department of Computer Science and Information Engineering Hsinchu 300 Taiwan Supercomputer Software Department Institute of Computational Mathematics and Mathematical Geophysics 630090 Novosibirsk Russia
来源: 评论
Research and Design of the APC and ATC Circuits in LD Controller
Research and Design of the APC and ATC Circuits in LD Contro...
收藏 引用
2010 International Conference on computer,Mechatronics,Control and Electronic engineering(2010计算机、机电、控制与电子工程国际会议 CMCE 2010)
作者: Guoying meng Baishun Su Zhengduo Pang Nianfeng Shi Xingjun Li Institute of Mechanical Electronic & Information Engineering University of Mining & Technology Beiji Department of Computer and Information Engineering Luoyang Institute of Science and Technology Luoya Beijing Shenzhou Aerospace Software Technology Co.Ltd Beijing China
The key issues that the LD used in the field of sensing and monitoring as light source is to ensure its safety and stable output power. This paper presents a new method to ensure the stable output power and design... 详细信息
来源: 评论
Realtime Simulation of Burning Solids on GPU with CUDA
Realtime Simulation of Burning Solids on GPU with CUDA
收藏 引用
International Conference on computer and information Technology (CIT)
作者: Jian Zhu Youquan Liu Kai Bao Yuanzhang Chang Enhua Wu Department of Computer and Information Science University of Macau Macao China School of Information Engineering Chang'an University Xi'an China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China
In this paper, we implement a hybrid combustion model which incorporates the fire simulation and solid burning together. To achieve real-time performance, GPU is used to solve the Navier-Stokes equations with CUDA pro... 详细信息
来源: 评论
An Investigation onTacit Knowledge Transfer Among Aircraft Engineer: Malaysia Experience
An Investigation onTacit Knowledge Transfer Among Aircraft E...
收藏 引用
The 2nd International Conference on software engineering and Data Mining(IEEE 第二届国际软件工程和数据挖掘学术大会 SEDM 2010)
作者: R.Ahmad N. Khamis N. Jamain M.H.N.M.Nasir Z.M.Kasirun B.Abd Latif Dept. of Software Engineering Faculty of Computer Science and Information Technology University of M Malaysian Institute of Aviation Technology Universiti Kuala Lumpur MALAYSIA
Transfer of gained experience, skills and know-how in aircraft maintenance from experts to trainees assures the organizational learning in providing quality of service. Taking survey method, this paper presents an ear... 详细信息
来源: 评论
Reports on the AAAI 2009 fall symposia
Reports on the AAAI 2009 fall symposia
收藏 引用
作者: Azevedo, Roger Bench-Capon, Trevor Biswas, Gautam Carmichael, Ted Green, Nancy Hadzikadic, Mirsad Koyejo, Oluwasanmi Kurup, Unmesh Parsons, Simon Pirrone, Roberto Prakken, Henry Samsonovich, Alexei Scott, Donia Souvenir, Richard Department of Psychology Institute for Intelligent Systems University of Memphis United States Department of Computer Science University of Liverpool United Kingdom Center for Intelligent Systems Vanderbilt University United States Department of Computer Science University of North Carolina Charlotte United States Department of Computer Science University of North Carolina Greensboro United States Department of Software and Information Systems University of North Carolina Charlotte United States Complex Systems Institute United States Department of Electrical and Computer Engineering University of Texas Austin United States Department of Cognitive Science Rensselaer Polytechnic Institute Troy NY United States Department of Computer and Information Science Brooklyn College City University New York United States University of Palermo Italy Computer Science Department Utrecht University Netherlands Department of Law and IT Law Faculty University of Groningen Netherlands Krasnow Institute for Advanced Study George Mason University United States Computational Linguistics Department Informatics at the University of Sussex United Kingdom
The Association for the Advancement of Artificial Intelligence was pleased to present the 2009 Fall Symposium Series, held Thursday through Saturday, November 5-7, at the Westin Arlington Gateway in Arlington, Virgini... 详细信息
来源: 评论
An evolutionary multi-objective approach for dynamic mission planning
An evolutionary multi-objective approach for dynamic mission...
收藏 引用
Congress on Evolutionary Computation
作者: Lam Thu Bui Zbignew Michalewicz Department of Software Engineering Faculty of IT Quy Don University Vietnam Polish Japanese Institute of Information Technology Warsaw Poland School of Computer Science University of Adelaide Adelaide SA Australia Institute of Computer Science Polish Academy of Sciences Warsaw Poland
In this paper, we propose a computational approach for adaptation in mission planning, an important process in the chain of command and control. In this area, it has been highly regarded that military missions are oft... 详细信息
来源: 评论
Modeling BPEL and BPEL4People with a Timed Interruptable pi-Calculus
Modeling BPEL and BPEL4People with a Timed Interruptable pi-...
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Wei Jin Hanpin Wang Yongzhi Cao Zizhen Wang Xiaojuan Ban Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Ministry of Education Key laboratory of High Confidence Software Technologies Beijing China Information Engineering School University of Science and Technology Beijing Beijing China
Business Processing Execution Language (BPEL) and BPEL for People (BPEL4People) are two web services orchestration languages for composing web services. To describe formally their semantics, we introduce the π it -ca... 详细信息
来源: 评论
MMIR: Mining Multi-scale Intervention Rules in Sub-Complex System
MMIR: Mining Multi-scale Intervention Rules in Sub-Complex S...
收藏 引用
International Asia-Pacific Web Conference (APWEB)
作者: Zheng Jiaoling Tang Changjie Qiao Shaojie Yang Ning Wang Yue Chen Yu Zhu Jun Department of Software Engineering Chengdu University of Information and Technology Chengdu China Institute of Database and Knowledge Engineering School of Computer Science Sichuan University Chengdu China School of Information Science and Technology Southwest Jiaotong University Chengdu China
Intervention analysis is the common method to reveal relationships between objects in human as well as biological society. Data mining research community is just starting to pay attention to intervention analysis. As ... 详细信息
来源: 评论