咨询与建议

限定检索结果

文献类型

  • 278 篇 会议
  • 107 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 289 篇 工学
    • 219 篇 计算机科学与技术...
    • 178 篇 软件工程
    • 83 篇 信息与通信工程
    • 40 篇 控制科学与工程
    • 26 篇 电气工程
    • 22 篇 电子科学与技术(可...
    • 22 篇 生物工程
    • 17 篇 光学工程
    • 15 篇 化学工程与技术
    • 15 篇 生物医学工程(可授...
    • 14 篇 机械工程
    • 11 篇 动力工程及工程热...
    • 9 篇 建筑学
    • 8 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 网络空间安全
  • 151 篇 理学
    • 109 篇 数学
    • 35 篇 统计学(可授理学、...
    • 34 篇 物理学
    • 22 篇 生物学
    • 15 篇 化学
    • 12 篇 系统科学
  • 100 篇 管理学
    • 66 篇 图书情报与档案管...
    • 43 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 7 篇 药学(可授医学、理...
  • 9 篇 法学
    • 7 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 11 篇 semantics
  • 9 篇 optimization
  • 9 篇 machine learning
  • 8 篇 feature extracti...
  • 7 篇 accuracy
  • 7 篇 training
  • 6 篇 neural networks
  • 6 篇 web services
  • 5 篇 deep neural netw...
  • 5 篇 electroencephalo...
  • 5 篇 face recognition
  • 5 篇 convolution
  • 5 篇 wireless sensor ...
  • 5 篇 service computin...
  • 5 篇 forecasting
  • 5 篇 data models
  • 5 篇 mashups
  • 4 篇 collaborative fi...
  • 4 篇 deep learning
  • 4 篇 computational mo...

机构

  • 20 篇 tianjin key lab....
  • 19 篇 school of comput...
  • 12 篇 key laboratory o...
  • 12 篇 school of comput...
  • 12 篇 school of cyber ...
  • 12 篇 key lab. of inte...
  • 12 篇 state key lab. f...
  • 12 篇 school of cyber ...
  • 11 篇 state key lab. o...
  • 11 篇 department of ph...
  • 10 篇 key lab. of inte...
  • 10 篇 alibaba group
  • 10 篇 hunan provincial...
  • 9 篇 key lab. of inte...
  • 8 篇 key lab. of shan...
  • 8 篇 peng cheng labor...
  • 8 篇 department of au...
  • 6 篇 key lab. of inte...
  • 6 篇 institute of inf...
  • 6 篇 bdkm university ...

作者

  • 13 篇 huang qingming
  • 13 篇 cao xiaochun
  • 12 篇 guosheng kang
  • 12 篇 xu qianqian
  • 11 篇 zhang degan
  • 10 篇 wu xian-liang
  • 10 篇 lu bao-liang
  • 10 篇 yang zhiyong
  • 9 篇 wang zitai
  • 9 篇 leila ismail
  • 8 篇 xiaochun cao
  • 8 篇 kang guosheng
  • 8 篇 zhao hai
  • 8 篇 park dong-chul
  • 8 篇 qingming huang
  • 8 篇 qianqian xu
  • 8 篇 jianxun liu
  • 7 篇 zhiyong yang
  • 7 篇 cao jiannong
  • 7 篇 shi yuanming

语言

  • 361 篇 英文
  • 16 篇 其他
  • 10 篇 中文
检索条件"机构=Lab. of Intelligent Computing and Software Engineering"
386 条 记 录,以下是331-340 订阅
排序:
CED: A community-based event delivery protocol in publish/subscribe systems for Delay Tolerant Sensor Network (DTSN)
CED: A community-based event delivery protocol in publish/su...
收藏 引用
38th International Conference on Parallel Processing, ICPP-2009
作者: Zhu, Jinqi Liu, Ming Cao, Jiannong Chen, Guihai Gong, Haigang Xu, Fulong Dept. of Computer Science and Engineering University of Electronic Science and Technology of China Cheng du China Internet and Mobile Computing Lab. Department of Computing Hong Kong Polytechnic University Hong Kong State Key Laboratory for Novel Software Technology Nanjing University China
The basic operation of Delay Tolerant Sensor Network (DTSN) is to finish pervasive data gathering in networks with intermittent connectivity, while the publish/subscribe (Pub/Sub for short) paradigm is used to deliver... 详细信息
来源: 评论
Exposure-path prevention in directional sensor networks using sector model based percolation
Exposure-path prevention in directional sensor networks usin...
收藏 引用
2009 IEEE International Conference on Communications, ICC 2009
作者: Liang, Liu Xi, Zhang Huadong, Ma Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX 77843 United States Beijing Key Lab. of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing 100876 China
In wireless sensor networks, most existing works on region coverage mainly concentrate on the omnidirectional sensor based full coverage, which ensures that all points in the sensor-deployed region are covered. In con... 详细信息
来源: 评论
Minimal exposure path algorithms for directional sensor networks
Minimal exposure path algorithms for directional sensor netw...
收藏 引用
2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
作者: Liu, Liang Zhang, Xi Ma, Huadong Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX 77843 United States Beijing Key Lab. of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing 100876 China
As a fundamental problem of wireless sensor networks, the minimal exposure path problem corresponding to the sensor network's worst-case coverage plays an important role in the applications for detecting intrusion... 详细信息
来源: 评论
A compression algorithm for multi-streams based on GEP
A compression algorithm for multi-streams based on GEP
收藏 引用
3rd International Conference on Genetic and Evolutionary computing, WGEC 2009
作者: Ding, Chao Yuan, Chang-An Qin, Xiao Peng, Yu-Zhong Computer and Information Engineering College Guangxi Teachers Education University Nanning 530001 China First Middle School of Mengcheng Anhui Mengcheng233500 China Key Lab. of Scientific Computing and Intelligent Information Processing in Universities of Guangxi Guangxi Teachers Education University Nanning China
This paper applied the Methods which based on GEP in compress multi-streams. The contributions of this paper include: 1) giving an introduction to data function finding based on GEP(DFF-GEP), defining the main concept... 详细信息
来源: 评论
Model analysis of talents' abilities and qualities for information-based entrepreneurship
Model analysis of talents' abilities and qualities for infor...
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Sun, Delin Xue, Jinyun Tan, Xin Liu, Peipei Sun, Zhiyuan Yao, Juying Provincial Key Lab. for High-Performance Computing Jiangxi Normal University Nanchang 330022 China School of Business Jiangxi Normal University Nanchang 330022 China Software Engineering Institute East China Normal University Shanghai 200062 China JiangXi Institute of Education Nanchang 330029 China
In such an age of information, the talents competent for information-based entrepreneurship not only constitute the core competitiveness of newly-established enterprises, but also are of crucial importance to the succ... 详细信息
来源: 评论
Reports of the AAAI 2010 conference workshops
Reports of the AAAI 2010 conference workshops
收藏 引用
作者: Aha, David W. Boddy, Mark Bulitko, Vadim D'Avila Garcez, Artur S. Doshi, Prashant Edelkamp, Stefan Geib, Christopher Gmytrasiewicz, Piotr Goldman, Robert P. Halevy, Alon Hitzler, Pascal Isbell, Charles Josyula, Darsana Kaelbling, Leslie Pack Kersting, Kristian Kunda, Maithilee Lamb, Luis C. Marthi, Bhaskara McGreggor, Keith Mihalkova, Lilyana Nastase, Vivi Natarajan, Sriraam Provan, Gregory Raja, Anita Ram, Ashwin Riedl, Mark Russell, Stuart Sabharwal, Ashish Smaus, Jan-Georg Sukthankar, Gita Tuyls, Karl Van Der Meyden, Ron Adaptive Systems Section Naval Research Laboratory Washington DC United States Adventium Labs. Minneapolis MN United States Department of Computer Science University of Alberta Canada City University London United Kingdom University of Georgia United States University of Bremen Germany School of Informatics University of Edinburgh United Kingdom University of Illinois Chicago United States Smart Information Flow Technologies LLC Minneapolis MN United States Structured Data Group Google Research United States Department of Computer Science Wright State University Dayton OH United States School of Interactive Computing Georgia Institute of Technology Atlanta GA United States Department of Computer Science Bowie State University United States Department of Computer Science and Engineering Massachusetts Institute of Technology United States Statistical Relational Mining Group Fraunhofer IAIS Germany Department of Computer Science Federal University of Rio Grande Do sul Brazil Willow Garage Inc. CA United States Computer Science Department University of Maryland College Park United States Heidelberg Institute for Theoretical Studies Heidelberg Germany Department of Computer Science University of Wisconsin Madison United States University College Cork Ireland Cork Complex Systems Lab. Ireland Department of Software and Information Systems University of North Carolina Charlotte United States Department of Computer Science and Engineering University of California Berkeley United States Department of Computer Science Cornell University United States Institute for Computational Sustainability United States University of Freiburg Germany School of Electrical Engineering and Computer Science University of Central Florida United States Maastricht University Netherlands University of New South Wales NICTA Australia
The AAAI-10 workshop program was held on July 11-12, 2010, at the Westin Peachtree Plaza in Atlanta, Georgia. The workshop program included 13 workshops covering a wide range of topics in artificial intelligence. Ther... 详细信息
来源: 评论
Asymmetric group key agreement
Asymmetric group key agreement
收藏 引用
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
作者: Qianhong, Wu Yi, Mu Susilo, Willy Bo, Qin Domingo-Ferrer, Josep Universitat Rovira i Virgili Dept. of Comp. Eng. and Maths UNESCO Department of Data Privacy Tarragona Catalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Dept. of Maths School of Science Xi'an University of Technology China
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m... 详细信息
来源: 评论
Building domain independent ontology for web 2.0
Building domain independent ontology for web 2.0
收藏 引用
8th IEEE International Conference on Computer and Information Technology Workshops, CIT Workshops 2008
作者: Enkhbold, Nyamsuren Choi, Ho-Jin Intelligent Software Engineering and Robotics Lab. Information and Communications University Daejeon Korea Republic of
In this paper we are proposing an information integration approach based on minimalist-upper ontology that can be applied among Web 2.0 applications. Instead of following conventional ontology engineering principles w... 详细信息
来源: 评论
Context-aware computing approach with uncertainty for active application
收藏 引用
Journal of Information and Computational Science 2008年 第1期5卷 179-186页
作者: Zhang, Degan Zhang, Hua Wang, Fayu Xue, Yabing School of Computer Science and Technology Tianjin University of Technology Tianjin 300191 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin 300191 China Key Lab. of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
For active application of many cases, context-aware computing with uncertainty includes forming model, fusing of aware context, managing context information and so on. Approach research on computing of aware context w... 详细信息
来源: 评论
A kind of new decision fusion method based on sensor evidence for active application
收藏 引用
Journal of Information and Computational Science 2008年 第1期5卷 171-178页
作者: Zhang, Degan Zhang, Hua Ning, Hongyun Li, Wenjie School of Computer Science and Technology Tianjin University of Technology Tianjin 300191 China Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin 300191 China Key Lab. of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
During decision making procedure of active application, the primary signals with noise, which got from each sensor, were sent to a decision making center, the fusion center, through the distributed or centralized comp... 详细信息
来源: 评论