咨询与建议

限定检索结果

文献类型

  • 1,033 篇 会议
  • 860 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 1,920 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,243 篇 工学
    • 844 篇 计算机科学与技术...
    • 706 篇 软件工程
    • 270 篇 信息与通信工程
    • 233 篇 控制科学与工程
    • 144 篇 电气工程
    • 128 篇 生物工程
    • 114 篇 生物医学工程(可授...
    • 108 篇 机械工程
    • 93 篇 光学工程
    • 86 篇 电子科学与技术(可...
    • 50 篇 动力工程及工程热...
    • 45 篇 安全科学与工程
    • 41 篇 仪器科学与技术
    • 35 篇 交通运输工程
    • 34 篇 化学工程与技术
    • 32 篇 土木工程
  • 674 篇 理学
    • 387 篇 数学
    • 152 篇 生物学
    • 132 篇 物理学
    • 117 篇 统计学(可授理学、...
    • 109 篇 系统科学
    • 43 篇 化学
  • 330 篇 管理学
    • 214 篇 管理科学与工程(可...
    • 131 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 95 篇 医学
    • 86 篇 临床医学
    • 71 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 45 篇 法学
    • 34 篇 社会学
  • 29 篇 经济学
    • 29 篇 应用经济学
  • 20 篇 农学
  • 19 篇 教育学
  • 5 篇 军事学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 89 篇 computer science
  • 84 篇 laboratories
  • 53 篇 software enginee...
  • 45 篇 artificial intel...
  • 38 篇 deep learning
  • 37 篇 feature extracti...
  • 36 篇 grid computing
  • 36 篇 computational mo...
  • 35 篇 application soft...
  • 33 篇 data mining
  • 31 篇 neural networks
  • 31 篇 machine learning
  • 31 篇 training
  • 30 篇 intelligent syst...
  • 29 篇 computer archite...
  • 29 篇 resource managem...
  • 28 篇 costs
  • 28 篇 semantics
  • 27 篇 software systems
  • 27 篇 quality of servi...

机构

  • 33 篇 beijing key labo...
  • 31 篇 state key labora...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 26 篇 grid computing a...
  • 23 篇 school of electr...
  • 23 篇 research institu...
  • 21 篇 software enginee...
  • 20 篇 seventh research...
  • 20 篇 shenzhen key lab...
  • 18 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 software enginee...
  • 15 篇 school of intell...
  • 15 篇 school of inform...
  • 14 篇 ieee
  • 14 篇 moe-microsoft ke...
  • 14 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 department of el...

作者

  • 47 篇 rajkumar buyya
  • 44 篇 junping du
  • 31 篇 yingmin jia
  • 23 篇 fashan yu
  • 21 篇 xu hua
  • 19 篇 ismail leila
  • 18 篇 lu bao-liang
  • 18 篇 yang guanghua
  • 18 篇 ma shaodan
  • 16 篇 zhao hai
  • 16 篇 runyao duan
  • 16 篇 gong chen
  • 15 篇 liu jiang
  • 15 篇 buyya rajkumar
  • 15 篇 ishibuchi hisao
  • 14 篇 ganesh k. venaya...
  • 13 篇 shen linlin
  • 12 篇 nengkun yu
  • 12 篇 fuchun sun
  • 12 篇 fan rui

语言

  • 1,781 篇 英文
  • 116 篇 其他
  • 22 篇 中文
  • 1 篇 日文
检索条件"机构=Intelligent Systems Laboratory Department of Computer Science and Software Engineering"
1920 条 记 录,以下是1731-1740 订阅
排序:
Generation of self-optimizing wireless network applications
Generation of self-optimizing wireless network applications
收藏 引用
International Conference on Autonomic Computing (ICAC)
作者: S.M. Sadjadi P.K. McKinley R.E.K. Stirewalt B.H.C. Cheng Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Adaptable applications are difficult to develop and maintain especially if adaptive code, which implements the adaptive behavior, is tangled into functional code, which implements the imperative behavior. Our work inv... 详细信息
来源: 评论
Relational peculiarity oriented data mining
Relational peculiarity oriented data mining
收藏 引用
Proceedings - Fourth IEEE International Conference on Data Mining, ICDM 2004
作者: Zhong, Ning Liu, Chunnian Yao, Y.Y. Ohshima, Muneaki Huang, Mingxin Huang, Jiajin Department of Information Engineering Maebashi Institute of Technology 460-1 Kamisadori-Cho Maebashi 371-0816 Japan Computer Science College Beijing University of Technology Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing 100022 China Department of Computer Science University of Regina Regina Sask. S4S 0A2 Canada
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m... 详细信息
来源: 评论
Approximate caches for packet classification
Approximate caches for packet classification
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: F. Chang Wu-chang Feng Kang Li Systems Software Laboratory OGI School of Science and Engineering at OHSU Beaverton OR USA Department of Computer Science University of Georgia Athens GA USA
Many network devices such as routers and firewalls employ caches to take advantage of temporal locality of packet headers in order to speed up packet processing decisions. Traditionally, cache designs trade off time a... 详细信息
来源: 评论
An authorization model for multimedia digital libraries
收藏 引用
International Journal on Digital Libraries 2004年 第3期4卷 139-155页
作者: Kodali, Naren Farkas, Csilla Wijesekera, Duminda Department of Information and Software Engineering George Mason University Fairfax VA 22030-4444 United States Center for Secure Information Systems George Mason University Fairfax VA 22030-4444 United States Information Security Laboratory University of South Carolina Columbia SC 29208 United States Department of Computer Science and Engineering University of South Carolina Columbia SC 29208 United States
In this paper we present a generalized authorization model for multimedia digital libraries. Our aim is to support the enforcement of access control requirements of the original data sources without the need to create... 详细信息
来源: 评论
Relational peculiarity oriented data mining
Relational peculiarity oriented data mining
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Ning Zhong Chunnian Liu Y.Y. Yao M. Ohshima Mingxin Huang Jiajin Huang Department of Information Engineering Maebashi Institute of Technology Maebashi Japan The Computer Science College Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Computer Science University of Regina Regina SAS Canada
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m... 详细信息
来源: 评论
TMS: Targeted Marketing System Based on Market Value Functions  04
TMS: Targeted Marketing System Based on Market Value Functio...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Jiajin Huang Ning Zhong Chunnian Liu Y.Y. Yao Dejun Qiu Chuangxin Ou College of Computer Science and Technology Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi Japan Department of Computer Science University of Regina Regina SAS Canada
TMS (Targeted Marketing System) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine,... 详细信息
来源: 评论
Application of fuzzy neural network in the system of concrete undamaged inspection
Application of fuzzy neural network in the system of concret...
收藏 引用
World Congress on intelligent Control and Automation (WCICA)
作者: Jing Xu Qingchun Meng Songsen Yang Wen Zhang Changhong Song Department of Civil Engineering Qingdao Institute of Architecture and Engineering Qingdao China Department of Computer Science Ocean University of China Qingdao China State Key Laboratory of Intelligent Technology and Systems Tsinghua University Beijing China
The accuracy of concrete strength inspection has a great influence on the safety evaluation of the building. In order to increase the accuracy, Fuzzy Neural Network (FNN) was built up to evaluate concrete stmngth: It ... 详细信息
来源: 评论
Modular hybrid Petri nets for studying multi-operational production systems where parts follow multiple alternative processes
Modular hybrid Petri nets for studying multi-operational pro...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: G.J. Tsinarakis K.P. Valavanis Intelligent Systems and Robotics Laboratory Department of Production Engineering and Management Technical University of Crete Chania Greece Department of Computer Science and Engineering University of South Florida Center for Robot-Assisted Search and Rescue Tampa FL USA
This work presents a modular hybrid timed Petri net (MHTPN) methodology used to study multi-operational production systems in which parts are used for the production of different product types. This research generaliz... 详细信息
来源: 评论
Image attachment using fuzzy-genetic algorithms
Image attachment using fuzzy-genetic algorithms
收藏 引用
IEEE International Conference on Fuzzy systems (FUZZ-IEEE)
作者: B. Resko P. Korondi Z. Petres J.F. Bourges H. Hashimoto Japanese-Hungarian Laboratory Budapest University슠of슠Technology슠and슠Economics Hungary Computer Science and Software Engineering Department Laval University Sainte Foy QUE Canada Institute of Industrial Sciences Integrated Intelligent Systems Japanese-Hungarian Laboratory University of Tokyo Tokyo Japan
This paper gives contribution to the construction of an image mosaic by pasting together a sequence of photographs taken by a regular digital camera from the same position but in different directions. In order to find... 详细信息
来源: 评论
SELF-POWERED WIRELESS TEMPERATURE SENSING USING MEMS-BASED AA-SIZE ENERGY TRANSDUCER
收藏 引用
International Journal of Information Acquisition 2004年 第2期1卷 121-128页
作者: JOHNNY M. H. LEE STEVE C. L. YUEN MIMI H. M. LUK GORDON M. H. CHAN KING FONG LEI WEN J. LI PHILIP H. W. LEONG YEUNG YAM Centre for Micro and Nano Systems The Chinese University of Hong Kong Hong Kong SAR China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong SAR China Intelligent Control Systems Laboratory The Chinese University of Hong Kong Hong Kong SAR China
This paper presents the design and experimental results of a Micro Power Generator (MPG) which harvests mechanical energy from its environment and converts this energy into useful electrical power. The energy transduc... 详细信息
来源: 评论