咨询与建议

限定检索结果

文献类型

  • 1,698 篇 会议
  • 1,332 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,098 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,005 篇 工学
    • 1,524 篇 计算机科学与技术...
    • 1,255 篇 软件工程
    • 443 篇 信息与通信工程
    • 255 篇 生物工程
    • 232 篇 控制科学与工程
    • 204 篇 电气工程
    • 158 篇 光学工程
    • 147 篇 电子科学与技术(可...
    • 145 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 66 篇 网络空间安全
  • 1,021 篇 理学
    • 562 篇 数学
    • 284 篇 生物学
    • 272 篇 物理学
    • 172 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 591 篇 管理学
    • 368 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 147 篇 医学
    • 131 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 107 篇 法学
    • 83 篇 社会学
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 54 篇 教育学
  • 32 篇 农学
  • 17 篇 军事学
  • 11 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 78 篇 machine learning
  • 72 篇 software enginee...
  • 71 篇 deep learning
  • 62 篇 training
  • 61 篇 feature extracti...
  • 54 篇 computational mo...
  • 53 篇 data mining
  • 53 篇 artificial intel...
  • 47 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 semantics
  • 40 篇 internet of thin...
  • 38 篇 predictive model...
  • 36 篇 authentication
  • 36 篇 software
  • 35 篇 data models
  • 34 篇 optimization
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 73 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 school of inform...
  • 46 篇 sri lanka instit...
  • 45 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 29 篇 shenzhen institu...
  • 29 篇 department of co...
  • 27 篇 national enginee...
  • 26 篇 guangdong key la...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 22 篇 institute of sof...
  • 21 篇 software enginee...

作者

  • 52 篇 shen linlin
  • 31 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 22 篇 obaidat mohammad...
  • 22 篇 chen liqiong
  • 18 篇 ashok kumar das
  • 18 篇 mahmood khalid
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 14 篇 xie weicheng
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 yu zitong
  • 13 篇 wang wei
  • 13 篇 xiaorui zhang
  • 13 篇 zhang liangpei

语言

  • 2,664 篇 英文
  • 388 篇 其他
  • 53 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3098 条 记 录,以下是2671-2680 订阅
排序:
Spatial information based support vector machine for hyperspectral image classification
Spatial information based support vector machine for hypersp...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Bor-Chen Kuo Chih-Sheng Huang Chih-Cheng Hung Yu-Lung Liu I-Ling Chen Graduate Institute of Educational Measurement and Statistics National Taichung University Taichung Taiwan School of Computing and Software Engineering Southern Polytechnic State University GA USA Department of Computer Science and Information Engineering Asia University Taichung Taiwan
In this study, a novel spatial information based support vector machine for hyperspectral image classification, named spatial-contextual semi-supervised support vector machine (SC 3 SVM), is proposed. This approach mo... 详细信息
来源: 评论
Robustify a job-shop schedule according to the payload of the machine
Robustify a job-shop schedule according to the payload of th...
收藏 引用
International Conference on Services Systems and Services Management, ICSSSM
作者: Zhiyang You Zhigang Sun Xibin Zhao Daxin Zang Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Key Laboratory of Information System Security Ministry of Education School of Software Tsinghua University Beijing China Software Engineering Institute Beijing Aeronautics and Astronautics University Beijing China
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza... 详细信息
来源: 评论
A New Forward-Secure Proxy Signature Scheme
A New Forward-Secure Proxy Signature Scheme
收藏 引用
International Forum on information Technology and Applications, IFITA
作者: Jun He Ximei Li Lijuan Li Chunming Tang Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan China School of Computer and Communication Hunan University Changsha Hunan China State Key Laboratory of Information Security CAS State Key Laboratory of Information Security Hunan China CAS Institute of Software Science Beijing China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong China
Based on the shortcomings of WCF scheme, this paper proposed an improved forward-secure proxy signature scheme. The new scheme does not evolve the authorized keys, but the proxy signer's private key, making it hav... 详细信息
来源: 评论
Friend-based secure routing through challenges in mobile ad hoc networks
Friend-based secure routing through challenges in mobile ad ...
收藏 引用
International Symposium on Performance Evaluation of computer & Telecommunication Systems SPECTS
作者: Sanjay K. Dhurandher Mohammad S. Obaidat Karan Verma Pushkar Gupta Pravina Dhurandher Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science & Software Engineering Monmouth University NJ USA Karnataka State Open University Mysore Karnataka India
This paper proposes a Friend-based security scheme for efficient routing in mobile ad hoc networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in... 详细信息
来源: 评论
The influence of AJAX on Web usability
The influence of AJAX on Web usability
收藏 引用
International Conference on e-Business
作者: Andreas Holzinger Stefan Mayr Wolfgang Slany Matjaz Debevc Institute of Medical Informatics Statistics and Documentation (IMI) Research Unit HCI4MED MedUni Graz & Institute of Information Systems and Computer Media (IICM) Technical University of Graz Graz Austria Institute of Software Technology (IST) Technische Universität Graz Graz Austria Faculty of Electrical Engineering and Computer Science University of Maribor Maribor Slovenia
In this paper we discusses some pros and cons of using AJAX for increasing the usability of Web applications. As AJAX allows Web applications look like desktop applications, it can increase the learnability of a Web a... 详细信息
来源: 评论
Leukemia cancer classification based on Support Vector Machine
Leukemia cancer classification based on Support Vector Machi...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Sung-Huai Hsieh Zhenyu Wang Po-Hsun Cheng I-Shun Lee Sheau-Ling Hsieh Feipei Lai Department of Computer Science and Information Engineering Providence University Taiwan Computing Laboratory Oxford University Oxford UK Department of Software Engineering National Kaohsiung Normal University Taiwan Network and Computer Centre National Chiao Tung University Hsinchu Taiwan Graduate Institute of Biomedical Electronics and Bioinformatics National Taiwan University Taiwan
In the paper, we classify cancer with the Leukemia cancer of medical diagnostic data. information gain has been adapted for feature selections. A Leukemia cancer model that utilizes information Gain based on Support V... 详细信息
来源: 评论
Assessment of NER solutions against the first and second CALBC Silver Standard Corpus
Assessment of NER solutions against the first and second CAL...
收藏 引用
4th International Symposium on Semantic Mining in Biomedicine, SMBM 2010
作者: Rebholz-Schuhmann, Dietrich Yepes, Antonio Jimeno Li, Chen Kafkas, Senay Lewin, Ian Kang, Ning Corbett, Peter Milward, David Buyko, Ekaterina Beisswanger, Elena Hornbostel, Kerstin Kouznetsov, Alexandre Witte, René Laurila, Jonas B. Baker, Christopher J.O. Kuo, Cheng-Ju Clematide, Simone Rinaldi, Fabio Farkas, Richárd Móra, György Hara, Kazuo Furlong, Laura Rautschka, Michael Neves, Mariana Lara Pascual-Montano, Alberto Wei, Qi Collier, Nigel Chowdhury, Md. Faisal Mahbub Lavelli, Alberto Berlanga, Rafael Morante, Roser Van Asch, Vincent Daelemans, Walter Marina, José Luís Van Mulligen, Erik Kors, Jan Hahn, Udo EMBL Outstation European Bioinformatics Institute Hinxton Cambridge CB10 1SD United Kingdom Dept. of Medical Informatics Erasmus University Medical Center Rotterdam NL Netherlands Linguamatics Ltd. St. John's Innovation Centre Cambridge United Kingdom Lab. Friedrich-Schiller-Universität Jena Germany Dept. of Computer Science and Applied Statistics University of New Brunswick Canada Dept. of Computer Science and Software Engineering Concordia University Montreal Canada Institute of Information Science Academia Sinica Taipei 115 Taiwan University of Zürich Switzerland Research Group on Artificial Intelligence Hungarian Academy of Sciences Hungary Institute of Science and Technology Nara Japan IMIM DCEX Universitat Pompeu Fabra Barcelona Spain Madrid Spain National Institute of Informatics Tokyo Japan Fondazione Bruno Kessler Trento Italy Universitat Jaume I Spain CLiPS University of Antwerp Belgium Complutense University of Madrid Spain
Background: Text mining challenges have been organised to measure the performance of automatic text mining solutions against a manually annotated gold standard corpus (GSC). The preparation of the GSC is timeconsuming... 详细信息
来源: 评论
Passive decoy-state quantum key distribution with practical light sources
收藏 引用
Physical Review A 2010年 第2期81卷 022310-022310页
作者: Marcos Curty Xiongfeng Ma Bing Qi Tobias Moroder ETSI Telecomunicación Department of Signal Theory and Communications University of Vigo Campus Universitario E-36310 Vigo (Pontevedra) Spain Institute for Quantum Computing & Department of Physics and Astronomy University of Waterloo N2L 3G1 Waterloo Ontario Canada Center for Quantum Information and Quantum Control Department of Physics and Department of Electrical & Computer Engineering University of Toronto M5S 3G4 Toronto Ontario Canada Quantum Information Theory Group Institute of Theoretical Physics I University of Erlangen-Nürnberg D-91058 Erlangen Germany Max Planck Institute for the Science of Light D-91058 Erlangen Germany
Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the... 详细信息
来源: 评论
Multi-error-correcting amplitude damping codes
Multi-error-correcting amplitude damping codes
收藏 引用
IEEE International Symposium on information theory
作者: Runyao Duan Markus Grassl Zhengfeng Ji Bei Zeng State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney NSW Australia Centre for Quantum Technologies National University of Singapore Singapore Perimeter Institute of Theoretical Physics Waterloo ONT Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China Institute for Quantum Computing and the Department of Combinatorics and Optimization University of Waterloo Waterloo ONT Canada
We construct new families of multi-error-correcting quantum codes for the amplitude damping channel. Our key observation is that, with proper encoding, two uses of the amplitude damping channel simulate a quantum eras... 详细信息
来源: 评论
A new method for people-counting based on support vector machine
A new method for people-counting based on support vector mac...
收藏 引用
2nd International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2009
作者: Zhu, Fang Gu, Junhua Yang, Xinwei Yang, Ruixia Information Engineering Institute Hebei University of Technology Tianjin China Computer Science and Software Institute Hebei University of Technology Tianjin China
This paper proposed a new method for infrared people-counting. According to the characteristics of the time continuous data collected by infrared sensors, the pattern recognition idea is introduced in the data process... 详细信息
来源: 评论