咨询与建议

限定检索结果

文献类型

  • 1,698 篇 会议
  • 1,332 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,098 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,005 篇 工学
    • 1,524 篇 计算机科学与技术...
    • 1,255 篇 软件工程
    • 443 篇 信息与通信工程
    • 255 篇 生物工程
    • 232 篇 控制科学与工程
    • 204 篇 电气工程
    • 158 篇 光学工程
    • 147 篇 电子科学与技术(可...
    • 145 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 66 篇 网络空间安全
  • 1,021 篇 理学
    • 562 篇 数学
    • 284 篇 生物学
    • 272 篇 物理学
    • 172 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 591 篇 管理学
    • 368 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 147 篇 医学
    • 131 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 107 篇 法学
    • 83 篇 社会学
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 54 篇 教育学
  • 32 篇 农学
  • 17 篇 军事学
  • 11 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 78 篇 machine learning
  • 72 篇 software enginee...
  • 71 篇 deep learning
  • 62 篇 training
  • 61 篇 feature extracti...
  • 54 篇 computational mo...
  • 53 篇 data mining
  • 53 篇 artificial intel...
  • 47 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 semantics
  • 40 篇 internet of thin...
  • 38 篇 predictive model...
  • 36 篇 authentication
  • 36 篇 software
  • 35 篇 data models
  • 34 篇 optimization
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 73 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 school of inform...
  • 46 篇 sri lanka instit...
  • 45 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 29 篇 shenzhen institu...
  • 29 篇 department of co...
  • 27 篇 national enginee...
  • 26 篇 guangdong key la...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 22 篇 institute of sof...
  • 21 篇 software enginee...

作者

  • 52 篇 shen linlin
  • 31 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 22 篇 obaidat mohammad...
  • 22 篇 chen liqiong
  • 18 篇 ashok kumar das
  • 18 篇 mahmood khalid
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 14 篇 xie weicheng
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 yu zitong
  • 13 篇 wang wei
  • 13 篇 xiaorui zhang
  • 13 篇 zhang liangpei

语言

  • 2,664 篇 英文
  • 388 篇 其他
  • 53 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3098 条 记 录,以下是2711-2720 订阅
排序:
Modeling and design for dynamic workflows based on flexible activities
收藏 引用
information Technology Journal 2009年 第5期8卷 750-756页
作者: Li, Peng Du, Yuyue College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
A rapidly changing environment forces the workflow management systems to change their workflow processes ever more frequently. In order to improve the flexibility of workflow management systems, a dynamic workflow mod... 详细信息
来源: 评论
An Efficient Certificateless Encryption Scheme in the Standard Model
An Efficient Certificateless Encryption Scheme in the Standa...
收藏 引用
International Conference on Network and System Security, NSS
作者: Hua Guo Xiyong Zhang Yi Mu Zhoujun Li School of Computer Science & Engineering Beihang University Beijing China Zhengzhou Information Science and Technology Institute Zhengzhou China CCISR School of Computer Science Software Engineering University of Wollongong NSW Australia
We propose an efficient certificateless public key encryption (CL-PKE) scheme which is provably secure against chosen ciphertext attacks without random oracles. Our scheme is more computationally efficient than the ex... 详细信息
来源: 评论
A process generation approach of dynamic workflows based description logics
收藏 引用
information Technology Journal 2009年 第7期8卷 998-1005页
作者: Zhang, Fu Xin Du, Yu Yue College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
To make workflow processes more flexible, a dynamic generation approach tor workflow processes corresponding to an instance is presented in this study. An activity, a part of a workflow, is defined as an action based ... 详细信息
来源: 评论
Enhancing cooperative behavior for online reputation systems by group selection
Enhancing cooperative behavior for online reputation systems...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing in Conjunction with the UIC'09 and ATC'09 Conferences, UIC-ATC 2009
作者: Ren, Yizhi Li, Mingchu Cui, Yongrui Guo, Cheng Sakurai, Kouichi School of Software Dalian University of Technology Dalian 116621 China Dept. of Computer Science and Communication Engineering Kyushu University Hakozaki Fukuoka 812-81 Japan Institute of Systems Information Technologies KYUSHU 2-1-22 Momochihama Sawara-ku Fukuoka 814-0001 Japan
Reputation systems are very useful in large online communities in which users may frequently have the opportunity to interact with users with whom they have no prior experience. Recently, how to enhance the cooperativ... 详细信息
来源: 评论
Analyzing Reliability of Time Constrained Service Composition
Analyzing Reliability of Time Constrained Service Compositio...
收藏 引用
International Conference on computer and information science (ACIS)
作者: Guisheng Fan Huiqun Yu Liqiong Chen Dongmei Liu Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai China Computer Software Evaluating and Testing Shanghai Key Laboratory Shanghai China
As a way to compose independent services together to fulfill a function, service composition is an important means for flexible and rapid information integration of complex distribution application in open and heterog... 详细信息
来源: 评论
Liveness Analysis of Parallel Program's Petri Net Models
Liveness Analysis of Parallel Program's Petri Net Models
收藏 引用
International Conference on information engineering and computer science (ICIECS)
作者: Wei Liu YuYue Du HuanQing Cui Chun Yan College of Information Science and Engineering Shandong University of Science and Technology Qingdao China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China
The liveness of Petri net models of parallel programs is a very important property. The existing analysis techniques take Petri net models as a whole to study properties, which is subject to the state explosion proble... 详细信息
来源: 评论
A Concrete Certificateless Signature Scheme without Pairings
A Concrete Certificateless Signature Scheme without Pairings
收藏 引用
International Conference on Multimedia information Networking and Security (MINES)
作者: Aijun Ge Shaozhen Chen Xinyi Huang Department of Applied Mathematics Zhengzhou Information Science and Technology Institute Zhengzhou Henan China School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in c... 详细信息
来源: 评论
Achieving Close-Capacity Performance with Simple Concatenation Scheme on Multiple-Antenna Channels
Achieving Close-Capacity Performance with Simple Concatenati...
收藏 引用
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
作者: Nghi H. Tran Tho Le-Ngoc Tad Matsumoto Ha H. Nguyen Department of Electrical & Computer Engineering McGill University Montreal QUE Canada Information Theory and Signal Processing Laboratory School of Information Science Japan Advanced Institute of Science and Technology Japan Department of Electrical & Computer Engineering University of Saskatchewan Saskatoon SAS Canada
This paper proposes a simple yet capacity-approaching concatenation of a mixture of short memory length convolutional codes and simple rate-1 block code followed by either complex 1-dimensional (1-D) anti-Gray or Gray... 详细信息
来源: 评论
Newborn screening system based on adaptive feature selection and support vector machines
Newborn screening system based on adaptive feature selection...
收藏 引用
2009 9th IEEE International Conference on Bioinformatics and Bioengineering, BIBE 2009
作者: Hsieh, Sung-Huai Chien, Yin-Hsiu Shen, Chia-Ping Chen, Wei-Hsin Chen, Po-Hao Hsieh, Sheau-Ling Cheng, Po-Hsun Lai, Feipei Information Systems Office National Taiwan University Hospital Taipei Taiwan Department of Computer Science and Information Engineering National Taiwan University Taiwan Department of Electrical Engineering National Taiwan University Taipei Taiwan Network and Computer Centre National Chiao Tung University Hsin Chu Taiwan Graduate Institute of Biomedical Electronics and Bioinformatics National Taiwan University Taiwan Department of Software Engineering National Kaohsiung Normal University Taiwan Department of Medical Genetics National Taiwan University Hospital Taiwan
The clinical symptoms of metabolic disorders during neonatal period are often not apparent, if not treated early irreversible damages such as mental retardation may occur, even death. Therefore, practicing newborn scr... 详细信息
来源: 评论
A Heuristic Approach for Capacity Control in Clouds
A Heuristic Approach for Capacity Control in Clouds
收藏 引用
IEEE International Conference on E-Commerce Technology Workshops
作者: Arun Anandasivam Stefan Buschek Rajkumar Buyya Institute for Information Systems and Management University of Karlsruhe Germany Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne Australia
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud reso... 详细信息
来源: 评论