咨询与建议

限定检索结果

文献类型

  • 1,336 篇 会议
  • 895 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,404 篇 工学
    • 873 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 331 篇 信息与通信工程
    • 254 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 150 篇 电气工程
    • 133 篇 机械工程
    • 111 篇 生物工程
    • 107 篇 光学工程
    • 98 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 70 篇 土木工程
    • 58 篇 动力工程及工程热...
    • 58 篇 交通运输工程
    • 55 篇 材料科学与工程(可...
    • 55 篇 化学工程与技术
    • 50 篇 建筑学
    • 49 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 745 篇 理学
    • 351 篇 数学
    • 221 篇 物理学
    • 128 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 64 篇 化学
  • 352 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 105 篇 医学
    • 88 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 59 篇 法学
  • 39 篇 经济学
  • 28 篇 农学
  • 27 篇 教育学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学

主题

  • 53 篇 deep learning
  • 41 篇 computational mo...
  • 41 篇 feature extracti...
  • 39 篇 machine learning
  • 37 篇 optimization
  • 36 篇 computer science
  • 34 篇 accuracy
  • 31 篇 data mining
  • 31 篇 training
  • 28 篇 quality of servi...
  • 28 篇 semantics
  • 25 篇 predictive model...
  • 25 篇 hardware
  • 25 篇 convolutional ne...
  • 24 篇 internet of thin...
  • 24 篇 real-time system...
  • 23 篇 security
  • 23 篇 protocols
  • 22 篇 routing
  • 22 篇 genetic algorith...

机构

  • 34 篇 hubei province k...
  • 32 篇 department of co...
  • 28 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 university of ch...
  • 18 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 big data science...
  • 14 篇 advanced institu...
  • 13 篇 institute of sys...
  • 12 篇 college of compu...
  • 12 篇 department of me...
  • 12 篇 graduate school ...
  • 12 篇 ieee
  • 12 篇 guangdong provin...
  • 11 篇 shenzhen huazhon...
  • 11 篇 science & techno...
  • 11 篇 department of co...
  • 11 篇 national compute...
  • 11 篇 college of infor...

作者

  • 21 篇 gaol ford lumban
  • 21 篇 shen linlin
  • 16 篇 matsuo tokuro
  • 14 篇 zheng changwen
  • 12 篇 hayashi eiji
  • 11 篇 qiang wenwen
  • 11 篇 jun tao
  • 10 篇 robbi rahim
  • 10 篇 darmawan napitup...
  • 10 篇 srinivas m.b.
  • 10 篇 thapliyal himans...
  • 10 篇 xiong hui
  • 10 篇 gao guohong
  • 10 篇 paramartha dutta
  • 9 篇 ye chen
  • 9 篇 kuang xiaohui
  • 9 篇 zhi zhang
  • 9 篇 arabnia hamid r.
  • 9 篇 zhao junqiao
  • 8 篇 liu zhe

语言

  • 2,110 篇 英文
  • 79 篇 其他
  • 56 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of Information System and Engineer-Computer Technology"
2246 条 记 录,以下是2071-2080 订阅
排序:
A new approach for early detection of internet worms based on connection degree
A new approach for early detection of internet worms based o...
收藏 引用
International Conference on Machine Learning and Cybernetics, ICMLC 2005
作者: Bo, Chen Bin-Xingfang Yun, Xiao-Chun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin 150001 China National Computer Network and Information System Security Administration Center Beijing 100031 China
In recent years, internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the internet. So people began to find methods to detect worms as quickly ... 详细信息
来源: 评论
Extracting features and simplifying surfaces using shape operator
Extracting features and simplifying surfaces using shape ope...
收藏 引用
2005 Fifth International Conference on information, Communications and Signal Processing
作者: Jong, Bin-Shyan Tseng, Juin-Ling Yang, Wen-Hao Lin, Tsong-Wuu Department of Information and Computer Engineering Chung Yuan Christian University Department of Electronic Engineering Chung Yuan Christian University Department of Management Information System Chin Min Institute of Technology Department of Electronic Engineering Chin Min Institute of Technology Department of Computer and Information Science Soochow University
The goal of surface simplification is to reduce the number of triangles in 3D models, while maintaining quality. However, surface simplification can easily destroy the contour features of the original surface. The pro... 详细信息
来源: 评论
Enhancing connectivity based on the thresholds in mobile ad-hoc networks
收藏 引用
1st International Conference on High Performance Computing and Communcations, HPCC 2005
作者: Park, Wongil Park, Sangjoon Jang, Yoonchul Kim, Kwanjoong Kim, Byunggi Department of Computer Soongsil University Korea Republic of Information and Media Technology Institute Soongsil University Korea Republic of System Operation and Management Consulting Sysgate Korea Republic of Department of Computer and Information Hanseo University Korea Republic of
In general mobile nodes in mobile Ad-hoc networks have a limited power capacity. Therefore power management is an important issue. Some protocols are proposed considering node power consumption, such as MTPR, MBCR, MM... 详细信息
来源: 评论
Adaptive bandwidth sharing to support QoS in infrastructure wireless networks
Adaptive bandwidth sharing to support QoS in infrastructure ...
收藏 引用
11th International Conference on Parallel and Distributed systems Workshops, ICPADS 2005
作者: Lai, Wei Kuang Lin, Yuh-Chung Department of Computer Science and Engineering National Sun Yen Sen University Kaohsiung Taiwan Department of Management Information System Tajen Institute of Technology Pingtung Taiwan
In infrastructure wireless networks, the wireless hop can be considered as another hop of the transmission path. With the rapid growth of wireless traffics, the future wireless network is expected to provide services ... 详细信息
来源: 评论
Enterprise wide centralized logging mechanism for application level intrusion detection
Enterprise wide centralized logging mechanism for applicatio...
收藏 引用
2005 International Conference on Security and Management, SAM'05
作者: Shaikh, Riaz A. Rajput, Saeed Zaidi, S.M.H. Sharif, Kashif Communication System Eng. Department NUST Institute of Information Technology Pakistan Computer Science and Eng. Department Florida Atlantic University United States
Due to increase in occurrences of intrusion events, organizations are now moving towards implementation of various types of monitoring systems to detect and prevent IT security breaches. For that purpose, different te... 详细信息
来源: 评论
Comparison of Attribute Reduction Methods for Coronary Heart Disease Data by Decision Tree Classification
收藏 引用
Transactions of Tianjin University 2005年 第6期11卷 463-468页
作者: 郑刚 黄亚楼 王鹏涛 舒光复 Department of Computer Science Tianjin University of TechnologyTianjin 300191China College of Information Technical ScienceNankai UniversityTianjin 300071China College of Software Nankai UniversityTianjin 300071China Department of Computer Science Tianjin University of TechnologyTianjin 300191China System Institute Chinese Academy of SciencesBeijing 100864China
Attribute reduction is necessary in decision making system. Selecting right attribute reduction method is more important. This paper studies the reduction effects of principal components analysis (PCA) and system reco... 详细信息
来源: 评论
An ON-hand 3D acquisition technique based on tri-aperture lens configuration
An ON-hand 3D acquisition technique based on tri-aperture le...
收藏 引用
24th IASTED International Conference on Modeling, Identification, and Control, MIC 2005
作者: Chang, I.-Cheng Chen, Bor-Tow Huang, Ching-Long Department of Computer Science and Information Engineering National Dong Hwa University Hualein Taiwan Electro-Optics and System Laboratories Industrial Technology Research Institute Hsinchu Taiwan
The paper presents a portable 3D acquisition system to get the depth information from a single snap shot. Traditionally, a stereo system needs two cameras to reconstruct the 3D shape. We propose a technique which can ... 详细信息
来源: 评论
Backward inference in Bayesian networks for distributed systems management
收藏 引用
Journal of Network and systems Management 2005年 第4期13卷 409-427页
作者: Ding, Jianguo Krämer, Bernd Bai, Yingcai Chen, Hansheng Software Engineering Institute East China Normal University Shanghai 200062 China Department of Electrical Engineering and Information Engineering FernUniversität Hagen Germany Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China East-china Institute of Computer Technology Shanghai China IEEE FernUniversität Hagen Germany International Society for Process and Design Sciences Shanghai Jiao Tong University China Shanghai Engineering Center of GOLDEN Network Shanghai Computer Open System Association East-China Institute of Computer Technology
The growing complexity of distributed systems in terms of hardware components, operating system, communication and application software and the huge amount of dependencies among them have caused an increase in demand ... 详细信息
来源: 评论
A kind of improved method of fuzzy clustering
A kind of improved method of fuzzy clustering
收藏 引用
International Conference on Machine Learning and Cybernetics, ICMLC 2005
作者: Liu, Wen-Yuan Chen, Zhi-Wang Bai, Peng Fang, Shu-Fen Shi, Van Department of Information YanShan University Qinhuangdao 066004 Hebei China Institute of Electric Engineer Yanshan University Qinhuangdao 066004 Hebei China Department of Managemen Harbin Institute of Technology Harbin 150001 Heilongjiang China Department of Information System Eng. School of Engineering Kyushu Tokai University Japan
In this paper the improvement of fuzzy c-means clustering method is discussed. In the improvement of fuzzy c-means clustering method, the distance definition in Euclidean space is replaced by fuzzy weighting distance,... 详细信息
来源: 评论
Generalized quadrature bandpass sampling with FIR filtering
Generalized quadrature bandpass sampling with FIR filtering
收藏 引用
IEEE International Symposium on Circuits and systems (ISCAS)
作者: Yi-Ran Sun S. Signell Laboratory of Electronics and Computer System LECS Institute of Microelectronics and Information Technology IMIT Royal Institute of Technology Stockholm Sweden
In this paper, generalized quadrature bandpass sampling (BPS) in voltage-mode with inherent FIR filtering is presented. By using the theory of sampling equivalence, this sampling strategy is comparable to another stra... 详细信息
来源: 评论