咨询与建议

限定检索结果

文献类型

  • 1,698 篇 会议
  • 1,332 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,098 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,005 篇 工学
    • 1,524 篇 计算机科学与技术...
    • 1,255 篇 软件工程
    • 443 篇 信息与通信工程
    • 255 篇 生物工程
    • 232 篇 控制科学与工程
    • 204 篇 电气工程
    • 158 篇 光学工程
    • 147 篇 电子科学与技术(可...
    • 145 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 66 篇 网络空间安全
  • 1,021 篇 理学
    • 562 篇 数学
    • 284 篇 生物学
    • 272 篇 物理学
    • 172 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 591 篇 管理学
    • 368 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 147 篇 医学
    • 131 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 107 篇 法学
    • 83 篇 社会学
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 54 篇 教育学
  • 32 篇 农学
  • 17 篇 军事学
  • 11 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 78 篇 machine learning
  • 72 篇 software enginee...
  • 71 篇 deep learning
  • 62 篇 training
  • 61 篇 feature extracti...
  • 54 篇 computational mo...
  • 53 篇 data mining
  • 53 篇 artificial intel...
  • 47 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 semantics
  • 40 篇 internet of thin...
  • 38 篇 predictive model...
  • 36 篇 authentication
  • 36 篇 software
  • 35 篇 data models
  • 34 篇 optimization
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 73 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 school of inform...
  • 46 篇 sri lanka instit...
  • 45 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 29 篇 shenzhen institu...
  • 29 篇 department of co...
  • 27 篇 national enginee...
  • 26 篇 guangdong key la...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 22 篇 institute of sof...
  • 21 篇 software enginee...

作者

  • 52 篇 shen linlin
  • 31 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 22 篇 obaidat mohammad...
  • 22 篇 chen liqiong
  • 18 篇 ashok kumar das
  • 18 篇 mahmood khalid
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 14 篇 xie weicheng
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 yu zitong
  • 13 篇 wang wei
  • 13 篇 xiaorui zhang
  • 13 篇 zhang liangpei

语言

  • 2,664 篇 英文
  • 388 篇 其他
  • 53 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3098 条 记 录,以下是2691-2700 订阅
排序:
Increasing reliability of intelligent manufacturing systems by adaptive optimization and safety supervision
Increasing reliability of intelligent manufacturing systems ...
收藏 引用
作者: Ding, Hao Kain, Sebastian Schiller, Frank Stursberg, Olaf Institute of Control and System Theory Department of Electrical Engineering and Computer Science University of Kassel D-34109 Kassel Germany Institute of Information Technology in Mechanical Engineering Technische Universität München D-85748 Garching near Munich Germany
For concurrent consideration of reliability and safety of manufacturing systems on the one hand, and flexibility and performance on the other, a specialized control architecture was proposed recently. It consists of a... 详细信息
来源: 评论
X-ray image denoising with directional support value transform
X-ray image denoising with directional support value transfo...
收藏 引用
MIPPR 2009 - Medical Imaging, Parallel Processing of Images, and Optimization Techniques: 6th International Symposium on Multispectral Image Processing and Pattern Recognition
作者: Zheng, Sheng Hendriks, Emile A. Lei, Bangjun Hao, Wei Institute of Intelligent Vision and Image Information China Three Gorges University Yichang 443002 China Information and Communication Theory Group Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology 2628CD Delft Netherlands
Under the support vector machine framework, the support value analysis-based image fusion has been studied, where the salient features of the original images are represented by their support values. The support value ... 详细信息
来源: 评论
Privacy protection for RFID data  09
Privacy protection for RFID data
收藏 引用
24th Annual ACM Symposium on Applied Computing, SAC 2009
作者: Fung, Benjamin C. M. Cao, Ming Desai, Bipin C. Xu, Heng Concordia Institute for Information Systems Engineering Concordia University Montreal QC Canada Department of Computer Science and Software Engineering Concordia University Montreal QC Canada College of Information Sciences and Technology Penn State University University Park PA 16802 United States
Radio Frequency IDentification (RFID) is a technology of automatic object identification. Retailers and manufacturers have created compelling business cases for deploying RFID in their supply chains. Yet, the uniquely... 详细信息
来源: 评论
A portable and efficient User Dispatching Mechanism for multicore systems
A portable and efficient User Dispatching Mechanism for mult...
收藏 引用
15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2009
作者: Tu, Tang-Hsun Hsueh, Chih-Wen Chang, Rong-Guey Embedded System and Wireless Network Laboratory Graduate Institute of Networking and Multimedia National Taiwan University Taipei 106 Taiwan System Software Laboratory Graduate Institute of Computer Science and Information Engineering National Chung Cheng University Chia-Yi 621 Taiwan
In multicore environment, using multiple threads is a common useful approach to improve application performance. Nevertheless, even in many simple applications, the performance might degrade when the number of threads... 详细信息
来源: 评论
A service-oriented analysis and modeling using use case approach
A service-oriented analysis and modeling using use case appr...
收藏 引用
2009 International Conference on Computational Intelligence and software engineering, CiSE 2009
作者: Si, Huayou Ni, Yulin Yu, Lian Chen, Zhong Software Institute School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Department of Information Engineering Zhejiang Forest University Lin'an 311300 China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing 100871 China School of Software and Microelectronics Peking University Beijing 102600 China
In the paper, we analyze the shortages of Service-Oriented Analysis and Design (SOAD) methodologies, and propose a SOAD method based on Use Case approach. Therefore, a service model is designed to facilitate service i... 详细信息
来源: 评论
Test-Data Generation for Web Services Based on Contract Mutation
Test-Data Generation for Web Services Based on Contract Muta...
收藏 引用
2009 Third IEEE International Conference on Secure Integration and Reliability Improvement SSIRI 2009(第三届IEEE安全软件集成及可信性改进国际会议)
作者: Ying-Na Li Ying Jiang Shan-Shan Hou Lu Zhang Faculty of Information Engineering and Automation Kunming University of Science and Technology Kun Institute of Software School of Electronics Engineering and Computer Science Peking University Be Institute of Software School of Electronics Engineering and Computer Science Peking University Be
software testing is one of the most important techniques used to assure the quality of Web Services at present. Test-data generation is an important topic in Web Services testing. The quality of test data will influen... 详细信息
来源: 评论
A service-oriented analysis and design approach based on data flow diagram
A service-oriented analysis and design approach based on dat...
收藏 引用
2009 International Conference on Computational Intelligence and software engineering, CiSE 2009
作者: Zhao, Yun Si, Huayou Ni, Yulin Qi, Hengnian Department of Information Engineering Zhejiang Forest University Lin'an 311300 China Software Institute School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing 100871 China School of Software and Microelectronics Peking University Beijing 102600 China
In the paper, we analyze the shortages of Service-Oriented Analysis and Design (SOAD) methodologies, and then review the features of data flow diagram as a kind of requirement analysis technology. Finally, we propose ... 详细信息
来源: 评论
Sequential estimation of the steady-state variance in discrete event simulation
Sequential estimation of the steady-state variance in discre...
收藏 引用
23rd European Conference on Modelling and Simulation, ECMS 2009
作者: Schmidt, Adriaan Pawlikowski, Krzysztof Mcnickle, Don Institute for Theoretical Information Technology RWTH Aachen University D-52056 Aachen Germany University of Canterbury Computer Science and Software Engineering Christchurch New Zealand Department of Management University of Canterbury Christchurch New Zealand
For sequential output data analysis in non-terminating discrete-event simulation, we consider three methods of point and interval estimation of the steady-state variance. We assess their performance in the analysis of... 详细信息
来源: 评论
A hierarchical alarm processing model for intrusion detection system
A hierarchical alarm processing model for intrusion detectio...
收藏 引用
2009 International Conference on information engineering and computer science, ICIECS 2009
作者: Xiao, Lizhong Liu, Yunxiang Wu, Zhongdai Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai China Postdoctor Mobile Station of Control Science and Engineering East China University of Science and Technology Shanghai China Postdoctor Work Station of Kunshan Software Park Kunshan Jiangsu China China Shipping Information Systems Co. Ltd. Shanghai China
For the alarm flooding problem, a hierarchical alarm processing model is studied to filter, reduce and correlate alarms. In filtering, false alarms are eliminated with repository. In reduction, a reduction algorithm i... 详细信息
来源: 评论
A New Method for People-Counting Based on Support Vector Machine
A New Method for People-Counting Based on Support Vector Mac...
收藏 引用
International Workshop on Intelligent Networks and Intelligent Systems (ICINIS)
作者: Fang Zhu Xinwei Yang Junhua Gu Ruixia Yang Information engineering Institute Hebei University of Technology Tianjin China Computer science and software Institute Hebei University of Technology Tianjin China
This paper proposed a new method for infrared people-counting. According to the characteristics of the time continuous data collected by infrared sensors, the pattern recognition idea is introduced in the data process... 详细信息
来源: 评论