咨询与建议

限定检索结果

文献类型

  • 616 篇 会议
  • 350 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 985 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 441 篇 计算机科学与技术...
    • 365 篇 软件工程
    • 140 篇 信息与通信工程
    • 79 篇 控制科学与工程
    • 64 篇 电气工程
    • 63 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 机械工程
    • 37 篇 化学工程与技术
    • 34 篇 仪器科学与技术
    • 25 篇 交通运输工程
    • 24 篇 航空宇航科学与技...
    • 22 篇 动力工程及工程热...
    • 20 篇 土木工程
  • 311 篇 理学
    • 147 篇 数学
    • 99 篇 物理学
    • 75 篇 生物学
    • 41 篇 统计学(可授理学、...
    • 40 篇 化学
    • 28 篇 系统科学
  • 186 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 59 篇 医学
    • 52 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 20 篇 药学(可授医学、理...
    • 19 篇 公共卫生与预防医...
  • 33 篇 法学
    • 31 篇 社会学
  • 19 篇 教育学
  • 12 篇 经济学
  • 7 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 software enginee...
  • 20 篇 semantics
  • 20 篇 training
  • 17 篇 feature extracti...
  • 17 篇 software
  • 16 篇 web services
  • 13 篇 deep learning
  • 13 篇 information tech...
  • 13 篇 machine learning
  • 12 篇 informatics
  • 12 篇 data mining
  • 12 篇 testing
  • 12 篇 accuracy
  • 11 篇 computational mo...
  • 10 篇 educational inst...
  • 10 篇 quality of servi...
  • 10 篇 optimization
  • 10 篇 predictive model...
  • 10 篇 analytical model...
  • 10 篇 convolutional ne...

机构

  • 27 篇 national enginee...
  • 23 篇 university of ch...
  • 19 篇 key laboratory o...
  • 19 篇 institute of inf...
  • 13 篇 college of compu...
  • 12 篇 school of electr...
  • 12 篇 guangdong provin...
  • 12 篇 institute of sof...
  • 10 篇 shenzhen institu...
  • 9 篇 cas center for e...
  • 9 篇 health managemen...
  • 9 篇 health systems a...
  • 9 篇 science & techno...
  • 9 篇 julius centre fo...
  • 9 篇 national key lab...
  • 9 篇 department of co...
  • 9 篇 guangdong key la...
  • 9 篇 laboratory for i...
  • 9 篇 science and tech...
  • 8 篇 centre for heart...

作者

  • 29 篇 bieliková mária
  • 21 篇 shen linlin
  • 13 篇 valentino vranić
  • 12 篇 vranic valentino
  • 10 篇 zheng changwen
  • 10 篇 vranić valentino
  • 9 篇 wang qing
  • 9 篇 qiang wenwen
  • 9 篇 linlin shen
  • 7 篇 barla michal
  • 7 篇 wang jinbao
  • 7 篇 tao dacheng
  • 7 篇 yunhao liu
  • 7 篇 gao can
  • 7 篇 si lingyu
  • 6 篇 chen zhong
  • 6 篇 bin hu
  • 6 篇 li jiangmeng
  • 6 篇 dakić pavle
  • 6 篇 shi lin

语言

  • 929 篇 英文
  • 34 篇 其他
  • 23 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of System and Software Engineering and Information Technologies"
985 条 记 录,以下是921-930 订阅
排序:
Goal-based operations: An overview
Goal-based operations: An overview
收藏 引用
2007 AIAA InfoTech at Aerospace Conference
作者: Dvorak, Daniel D. Ingham, Michel D. Morris, J. Richard Gersh, John NASA Jet Propulsion Laboratory California Institute of Technology Pasadena CA 91109 United States Applied Physics Laboratory Johns Hopkins University Laurel MD 20723 United States Planning and Execution Systems Section M/S 301-270 United States AIAA United States Flight Software Systems Engineering and Architectures Group M/S 301-225 Planning and Sequencing Systems Group M/S 301-250D System and Information Sciences Group M/S 2-236 United States
Operating robotic space missions via time-based command sequences has become a limiting factor in the exploration, defense, and commercial sectors. Command sequencing was originally designed for comparatively simple a... 详细信息
来源: 评论
Multi-path routing scheme integrated with network coding in low earth orbit satellite networks
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology) 2007年 第5期38卷 950-955页
作者: Yang, Lin Zheng, Gang School of Electronic Science and Engineering National University of Defense Technology Changsha 410073 China National Key Laboratory of Integrated Information System Technology Institute of Software Chinese Academy of Sciences Beijing 100080 China
Inter-satellite links have characters of time-varying, unreliability and intermittent-connecting, so that applying the multi-path routing in the low earth orbit (LEO) satellite networks can make message disorder and m... 详细信息
来源: 评论
Collaborative filtering recommendation algorithm based on cloud model
收藏 引用
Ruan Jian Xue Bao/Journal of software 2007年 第10期18卷 2403-2411页
作者: Zhang, Guang-Wei Li, De-Yi Li, Peng Kang, Jian-Chu Chen, Gui-Sheng State Key Laboratory of Software Development Environment Beihang University Beijing 100083 China Institute of Electronic System Engineering Beijing 100840 China Information Security Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen 518055 China School of Computer Science and Technology Shandong Jianzhu University Ji'nan 250101 China
Recommendation system is one of the most important technologies applied in e-commerce. Similarity measuring method is fundamental to collaborative filtering algorithm, and traditional methods are inefficient especiall... 详细信息
来源: 评论
Towards an anti-inference (K, )-anonymity model with value association rules
Towards an anti-inference (K, )-anonymity model with value a...
收藏 引用
17th International Conference on Database and Expert systems Applications, DEXA 2006
作者: Li, Zude Zhan, Guoqiang Ye, Xiaojun Institute of Information System and Engineering School of Software Tsinghua University Beijing 100084 China
As a privacy-preserving microdata publication model, K-Anonymity has some application limits, such as (1) it cannot satisfy the individual-defined k mechanism requirement, and (2) it is attached with a certain extent ... 详细信息
来源: 评论
Organizational programming: Hierarchy software construction
Organizational programming: Hierarchy software construction
收藏 引用
18th International Conference on software engineering and Knowledge engineering, SEKE 2006
作者: Yin, Zhuo Wang, Jian Min Institute of Information System and Engineering Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China
software's complexity refers to the difficulty to control the consistency between its implementation and design goal The unrestricted interrelationships of software components are the essential reason, which cause... 详细信息
来源: 评论
Adaptive call admission control based on enhanced genetic algorithm in wireless/mobile network
Adaptive call admission control based on enhanced genetic al...
收藏 引用
18th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2006
作者: Wang, Sheng-Ling Hou, Yi-Bin Huang, Jian-Hui Huang, Zhang-Qin School of Electronics and Information Engineering Xi'an Jiaotong University Xi'an 710049 Embedded Software and System Institute Beijing University of Technology Beijing 100022
An adaptive threshold-based Call Admission Control (CAC) scheme used in -wireless/mobile network for multi-class services is proposed. In the scheme, each class's CAC thresholds are solved through establishing a r... 详细信息
来源: 评论
An approach to detection ontology changes  06
An approach to detection ontology changes
收藏 引用
Sixth International Conference on Web engineering, ICWE 2006
作者: Tury, Michal Bieliková, Mária Institute of Informatics and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology Ilkovičova 3 842 16 Bratislava Slovakia
Ontologies change and evolve both on the level of schema and individuals in order to meet requirements of changing world. Changes involve adding, deleting and modifying elements in the ontology both on structural (sch... 详细信息
来源: 评论
Novel BCD adders and their reversible logic implementation for IEEE 754r format
Novel BCD adders and their reversible logic implementation f...
收藏 引用
19th International Conference on VLSI Design held jointly with 5th International Conference on Embedded systems Design
作者: Thapliyal, Himanshu Kotiyal, Saurabh Srinivas, M.B. Center for VLSI and Embedded System Technologies International Institute of Information Technology Hyderabad-500019 India Department of Computer Engineering SIT Kukas Jaipur India
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and a major enhancement to the standard is the addition of decimal format. This paper proposes two novel BCD adders called carry skip and carry... 详细信息
来源: 评论
Modified montgomery modular multiplication using 4:2 Compressor and CSA adder
Modified montgomery modular multiplication using 4:2 Compres...
收藏 引用
Third IEEE International Workshop on Electronic Design, Test and Applications, DELTA 2006
作者: Thapliyal, Himanshu Ramasahayam, Anvesh Kotha, Vivek Reddy Gottimukkula, Kunul Srinivas, M.B. Centre for VLSI and Embedded System Technologies International Institute of Information Technology Hyderabad 500019 India Department of Electronics and Communication Engineering S.R. Engineering College Warangal India
The efficiency of the Public Key encryption systems like RSA and ECC can be improved with the adoption of a faster multiplication scheme. In this paper, Modified Montgomery multiplications and circuit architectures ar... 详细信息
来源: 评论
Towards the Diversity of Sensitive Attributes in k-Anonymity
Towards the Diversity of Sensitive Attributes in k-Anonymity
收藏 引用
Web Intelligence and Intelligent Agent Technology Workshops (WI-IAT)
作者: Min Wu Xiaojun Ye Institute of Information System and Engineering School of Software Tsinghua University Beijing China
Privacy preservation is an important and challenging problem in microdata release. As a de-identification model, k-anonymity has gained much attention recently. While focusing on identity disclosures, k-anonymity does... 详细信息
来源: 评论