咨询与建议

限定检索结果

文献类型

  • 629 篇 会议
  • 356 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 1,004 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 655 篇 工学
    • 452 篇 计算机科学与技术...
    • 366 篇 软件工程
    • 140 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 65 篇 电气工程
    • 63 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 机械工程
    • 37 篇 化学工程与技术
    • 34 篇 仪器科学与技术
    • 25 篇 交通运输工程
    • 25 篇 航空宇航科学与技...
    • 22 篇 动力工程及工程热...
    • 20 篇 土木工程
  • 313 篇 理学
    • 147 篇 数学
    • 100 篇 物理学
    • 76 篇 生物学
    • 41 篇 统计学(可授理学、...
    • 40 篇 化学
    • 28 篇 系统科学
  • 187 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 62 篇 医学
    • 54 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 33 篇 法学
    • 31 篇 社会学
  • 19 篇 教育学
  • 13 篇 经济学
  • 9 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 software enginee...
  • 21 篇 training
  • 20 篇 semantics
  • 19 篇 feature extracti...
  • 18 篇 software
  • 16 篇 web services
  • 14 篇 deep learning
  • 14 篇 accuracy
  • 13 篇 information tech...
  • 13 篇 machine learning
  • 12 篇 informatics
  • 12 篇 data mining
  • 12 篇 testing
  • 11 篇 optimization
  • 11 篇 computational mo...
  • 11 篇 predictive model...
  • 11 篇 convolutional ne...
  • 10 篇 educational inst...
  • 10 篇 quality of servi...
  • 10 篇 analytical model...

机构

  • 31 篇 national enginee...
  • 23 篇 university of ch...
  • 21 篇 key laboratory o...
  • 18 篇 institute of inf...
  • 16 篇 guangdong provin...
  • 14 篇 college of compu...
  • 12 篇 school of electr...
  • 12 篇 institute of sof...
  • 10 篇 health managemen...
  • 10 篇 computer vision ...
  • 10 篇 shenzhen institu...
  • 9 篇 cas center for e...
  • 9 篇 health systems a...
  • 9 篇 science & techno...
  • 9 篇 julius centre fo...
  • 9 篇 national key lab...
  • 9 篇 department of co...
  • 9 篇 guangdong key la...
  • 9 篇 laboratory for i...
  • 9 篇 science and tech...

作者

  • 29 篇 bieliková mária
  • 24 篇 shen linlin
  • 13 篇 valentino vranić
  • 12 篇 vranic valentino
  • 10 篇 zheng changwen
  • 10 篇 vranić valentino
  • 9 篇 wang qing
  • 9 篇 qiang wenwen
  • 9 篇 linlin shen
  • 8 篇 wang jinbao
  • 8 篇 gao can
  • 7 篇 barla michal
  • 7 篇 tao dacheng
  • 7 篇 yu zitong
  • 7 篇 yunhao liu
  • 7 篇 si lingyu
  • 6 篇 chen zhong
  • 6 篇 bin hu
  • 6 篇 si thu thant sin
  • 6 篇 li jiangmeng

语言

  • 925 篇 英文
  • 56 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of System and Software Engineering and Information Technologies"
1004 条 记 录,以下是771-780 订阅
排序:
Vision guided shortest path estimation using floodfill algorithm for mobile robot applications
Vision guided shortest path estimation using floodfill algor...
收藏 引用
International Conference on Power, Control and Embedded systems (ICPCES)
作者: Atul Patel Anupam Dubey Ajitesh Pandey Siddharth Dutt Choubey Electronics and Communication Engineering Gyan Ganga Institute of Technology and Sciences Jabalpur India Information Technology IPM Kanpur India Electronics and Communication Engineering Oriental Engineering College Jabalpur India System Software SRIT Jabalpur India
In a number of applications, the problem of determining the optimum path occurs, to be specific we shall look at the case of finding the optimum path for mobile robots. This paper presents a shortest path estimation s...
来源: 评论
Exploiting constructive interference for scalable flooding in wireless networks
Exploiting constructive interference for scalable flooding i...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Yin Wang Yuan He Xufei Mao Yunhao Liu Zhiyu Huang Xiangyang Li MOE Key Laboratory for Information System Security School of Software TNLIST Tsinghua University China Department of Computer Science and Engineering HKUST Hong Kong China Institute of Software Chinese Academy of Sciences China Department of Computer Science Illinois Institute of Technology USA
Exploiting constructive interference in wireless networks is an emerging trend for it allows multiple senders transmit an identical packet simultaneously. Constructive interference based flooding can realize milliseco... 详细信息
来源: 评论
Multi-criteria optimization of steel alloys for crankshafts production
Multi-criteria optimization of steel alloys for crankshafts ...
收藏 引用
IEEE International Symposium on Innovations in Intelligent systems and Applications (INISTA)
作者: Petia Koprinkova-Hristova Nikolay Tontchev Silviya Popova Institute of Information and Communication Technologies Bulgarian Academy of Sciences Sofia Bulgaria Department of Transport Management University of Transport Sofia Bulgaria Institute of System Engineering and Robotics Bulgarian Academy of Sciences Sofia Bulgaria
The paper presents application of multi-criteria optimization to steel alloy composition determination aimed at obtaining improved properties material for crankshafts production. Neural network model of steel mechanic... 详细信息
来源: 评论
P2PAV: Anti-virus through P2P
P2PAV: Anti-virus through P2P
收藏 引用
IEEE Symposium on Robotics and Applications (ISRA)
作者: Li Zhang Zhao Wang Zhong Chen China Information Technology Security Evaluation Center Beijing China Institute of Software School of Electronics Engineering and Computer Science Peking University Key laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China
Antivirus software is one of the most widely installed software for protecting computer from malicious attacks. However, traditional host-based antivirus needs to store all viruses' pattern or sample, which not on... 详细信息
来源: 评论
Nine Years Challenge of In-process Measurement Platform for software Development Project: Distribution of a New Generation Platform and a Collaborative Research Proposal
Nine Years Challenge of In-process Measurement Platform for ...
收藏 引用
Joint Conference of the Int'l Workshop on and International Conference on software Process and Product Measurement software Measurement
作者: Yoshiki Mitani Yutaka Ohwada Go Maeda Kenichi Matsumoto Graduate School of Information Science Nara Institute of Science and Technology Tokyo Japan Software Engineering Center (SEC/IPA) Information-technology Promotion Agency Japan Tokyo Japan FAR END Technologies Corporation Matsue Japan Graduate School of Information Science Nara Institute of Science and Technology Nara Japan
There are two "barriers" in the research of software engineering. One is "the barrier of individuality" and other one is "the barrier of secret". These have obstructed prosperity of the s... 详细信息
来源: 评论
CitySee: Urban CO2 monitoring with sensors
CitySee: Urban CO2 monitoring with sensors
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Xufei Mao Xin Miao Yuan He Xiang-Yang Li Yunhao Liu Department of Computer Science and Engineering HKUST Hong Kong China MOE Key Laboratory for Information System Security School of Software TNLIST Tsinghua University China Computer Science Department Illinois Institute of Technology USA
Motivated by the needs of precise carbon emission measurement and real-time surveillance for CO 2 management in cities, we present CitySee, a real-time CO 2 -monitoring system using sensor networks for an urban area ... 详细信息
来源: 评论
Mechanism design for finding experts using locally constructed social referral web
Mechanism design for finding experts using locally construct...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Lan Zhang Xiang-Yang Li Yunhao Liu QiuYuan Huang Shaojie Tang MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China Department of Computer Science Illinois Institute of Technology USA Department of Computer Science and Engineering HKUST Hong Kong China Department of Electrical Engineering University of Florida USA
In this work, we address the problem of finding experts using chains of social referrals and profile matching with only local information in online social networks. By assuming that users are selfish, rational, and ha... 详细信息
来源: 评论
Fault detection on the software implementation of CLEFIA lightweight cipher
收藏 引用
Journal of Networks 2012年 第8期7卷 1288-1294页
作者: Li, Wei Gu, Dawu Xia, Xiaoling Liu, Ya Liu, Zhiqiang School of Computer Science and Technology Donghua University Shanghai China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
CLEFIA is an efficient lightweight cipher that delivers advanced copyright protection and authentication in computer networks. It is also applied in the secure protocol for transmission including SSL and TLS. Since it... 详细信息
来源: 评论
SENEKA - sensor network with mobile robots for disaster management
SENEKA - sensor network with mobile robots for disaster mana...
收藏 引用
IEEE Conference on technologies for Homeland Security
作者: Helge-Björn Kuntze Christian W. Frey Igor Tchouchenkov Barbara Staehle Erich Rome Kai Pfeiffer Andreas Wenzel Jürgen Wöllenstein Fraunhofer Institute for Optronics System Technologies and Image Exploitation (IOSB) Karlsruhe Germany Fraunhofer Institute for Integrated Circuits Nuernberg Germany Fraunhofer Institute for Intelligent Analysis and Information Systems Sankt Augustin Germany Fraunhofer Institute for Manufacturing Engineering and Automation Stuttgart Germany Fraunhofer-Anwendungszentrum Systemtechnik (AST) Ilmenau Germany Fraunhofer Institute for Physical Measurement Techniques Freiburg Germany
Developed societies have a high level of preparedness for natural or man-made disasters. But such incidents cannot be completely prevented, and when an incident like an earthquake or an accident in a chemical or nucle... 详细信息
来源: 评论
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model
收藏 引用
IEEE Transactions on Computers 2012年 第5期61卷 713-725页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Yuan He Xufei Mao Yunhao Liu Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering Building of Electronics and Information Engineering University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology (TNLIST) Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Tsinghua National Laboratory for Information Science and Technology (TNLIST) School of Software Tsinghua University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm... 详细信息
来源: 评论