咨询与建议

限定检索结果

文献类型

  • 4,786 篇 会议
  • 3,493 篇 期刊文献
  • 90 册 图书

馆藏范围

  • 8,369 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 3,766 篇 计算机科学与技术...
    • 3,117 篇 软件工程
    • 1,223 篇 信息与通信工程
    • 755 篇 控制科学与工程
    • 631 篇 电气工程
    • 500 篇 生物工程
    • 497 篇 电子科学与技术(可...
    • 386 篇 机械工程
    • 327 篇 光学工程
    • 310 篇 生物医学工程(可授...
    • 218 篇 动力工程及工程热...
    • 193 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 142 篇 网络空间安全
    • 137 篇 交通运输工程
    • 134 篇 建筑学
    • 134 篇 安全科学与工程
  • 2,658 篇 理学
    • 1,453 篇 数学
    • 653 篇 物理学
    • 570 篇 生物学
    • 462 篇 统计学(可授理学、...
    • 362 篇 系统科学
    • 208 篇 化学
  • 1,481 篇 管理学
    • 933 篇 管理科学与工程(可...
    • 622 篇 图书情报与档案管...
    • 438 篇 工商管理
  • 296 篇 医学
    • 263 篇 临床医学
    • 217 篇 基础医学(可授医学...
  • 242 篇 法学
    • 189 篇 社会学
  • 134 篇 经济学
    • 134 篇 应用经济学
  • 118 篇 教育学
  • 87 篇 农学
  • 33 篇 文学
  • 27 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 281 篇 laboratories
  • 192 篇 computer science
  • 174 篇 software enginee...
  • 151 篇 computational mo...
  • 146 篇 feature extracti...
  • 134 篇 information syst...
  • 134 篇 data mining
  • 132 篇 semantics
  • 122 篇 deep learning
  • 122 篇 quality of servi...
  • 113 篇 machine learning
  • 98 篇 application soft...
  • 97 篇 wireless sensor ...
  • 91 篇 training
  • 90 篇 software
  • 88 篇 computer archite...
  • 87 篇 resource managem...
  • 87 篇 cloud computing
  • 83 篇 protocols
  • 82 篇 artificial intel...

机构

  • 150 篇 state key labora...
  • 113 篇 college of compu...
  • 84 篇 school of inform...
  • 52 篇 shandong provinc...
  • 50 篇 state key labora...
  • 47 篇 school of comput...
  • 44 篇 university of ch...
  • 42 篇 state key labora...
  • 42 篇 state key labora...
  • 41 篇 shandong provinc...
  • 39 篇 department of co...
  • 39 篇 school of comput...
  • 36 篇 school of comput...
  • 36 篇 school of comput...
  • 35 篇 department of co...
  • 34 篇 school of comput...
  • 32 篇 department of el...
  • 32 篇 guangdong key la...
  • 31 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 84 篇 xi zhang
  • 57 篇 rajkumar buyya
  • 42 篇 shen linlin
  • 39 篇 guo hong
  • 38 篇 junping du
  • 32 篇 niyato dusit
  • 29 篇 tao dacheng
  • 22 篇 xiong zehui
  • 21 篇 wang lei
  • 21 篇 zhang zhao
  • 21 篇 ismail leila
  • 20 篇 lu dianjie
  • 19 篇 choo kim-kwang r...
  • 19 篇 fan guisheng
  • 18 篇 li yang
  • 18 篇 wei li
  • 18 篇 qi lianyong
  • 18 篇 wang wei
  • 18 篇 buyya rajkumar
  • 17 篇 zhang lei

语言

  • 7,930 篇 英文
  • 317 篇 其他
  • 122 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Laboratory of Computer-Information Systems and Software Engineering"
8369 条 记 录,以下是4921-4930 订阅
排序:
Applying Probabilistic Model Checking to Service Discovery Framework
Applying Probabilistic Model Checking to Service Discovery F...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Honghao Gao Huaikou Miao Yucong Duan Jinyu Kai School of Computer Engineering and Science Shanghai University Shanghai P.R. China Shanghai Key Laboratory of Computer Software Evaluating&Testing Shanghai P.R. China College of Information Science and Technology Hainan University Haikou P.R. China
The complex requirements of E-commerce application call for selecting a set of Web services to reuse theirs business logics, where Service Oriented Architecture (SOA) provides a promising solution to the problem of cr... 详细信息
来源: 评论
Anonymous yoking-group proofs  15
Anonymous yoking-group proofs
收藏 引用
10th ACM Symposium on information, computer and Communications Security, ASIACCS 2015
作者: Li, Nan Mu, Yi Susilo, Willy Varadharajan, Vijay Centre for Computer and Information Security School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Information and Networked Systems Security Research Department of Computing Faculty of Science Macquarie University Sydney Australia
Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags... 详细信息
来源: 评论
Comparison of adaptive input-output linearization & fuzzy sliding-mode control for induction motor  16
Comparison of adaptive input-output linearization & fuzzy sl...
收藏 引用
16th International Conference on Sciences and Techniques of Automatic Control and computer engineering, STA 2015
作者: Boubzizi, Said Abid, Hafedh Kharrat, Maher Hajjaji, Ahmed El Chaabane, Mohamed Laboratory of Sciences and Techniques of Automatic and Computer Engineering University of Sfax Tunisia Laboratory of Modeling Information and Systems University of Picardie Jules Verne France
This paper presents a comparison between adaptive input-output linearization and adaptive fuzzy sliding mode control (FSMC) for induction motor. At first, we describe the adaptive linearization control method, which c... 详细信息
来源: 评论
Quantum majorization and a complete set of entropic conditions for quantum thermodynamics
arXiv
收藏 引用
arXiv 2017年
作者: Gour, Gilad Jennings, David Buscemi, Francesco Duan, Runyao Marvian, Iman Department of Mathematics and Statistics University of Calgary ABT2N 1N4 Canada Institute for Quantum Science and Technology University of Calgary ABT2N 1N4 Canada Department of Physics University of Oxford OxfordOX1 3PU United Kingdom Department of Physics Imperial College London LondonSW7 2AZ United Kingdom Department of Computer Science and Mathematical Informatics Nagoya University Chikusa-ku Nagoya464-8601 Japan Centre for Quantum Software and Information Faculty of Engineering and Information Technology University of Technology Sydney NSW2007 Australia MIT Research Laboratory of Electronics United States
What does it mean for one quantum process to be more disordered than another? Here we provide a precise answer to this question in terms of a quantum-mechanical generalization of majorization. The framework admits a c... 详细信息
来源: 评论
Semantic validation of affinity constrained service function chain requests
Semantic validation of affinity constrained service function...
收藏 引用
IEEE Conference on Network Softwarization (NetSoft)
作者: Niels Bouten Maxim Claeys Rashid Mijumbi Jeroen Famaey Steven Latré Joan Serrat Department of Mathematics and Computer Science University of Antwerp Antwerp Belgium Department of Information Technology iMinds Ghent Belgium Telecommunications Software and Systems Group Waterford Institute of Technology Ireland Network Engineering Department Universitat Politècnica de Catalunya Barcelona Spain
Network Function Virtualization (NFV) has been proposed as a paradigm to increase the cost-efficiency, flexibility and innovation in network service provisioning. By leveraging IT virtualization techniques in combinat... 详细信息
来源: 评论
Corrigendum to “Road detection algorithm for Autonomous Navigation systems based on dark channel prior and vanishing point in complex road scenes” [Robot. Auton. Syst. 85 (2016) 1–11]
收藏 引用
Robotics and Autonomous systems 2017年 88卷 202-202页
作者: Yong Li Weili Ding Xuguang Zhang Zhaojie Ju Laboratory of Pattern Recognition and Intelligent Systems Key Laboratory of Industrial Computer Control Engineering of Hebei Province Department of Automation Institute of Electrical Engineering Yanshan University Qinghuangdao Hebei 066004 China College of Information Science and Engineering Northeastern University Shenyang Liaoning 110004 China School of Computing University of Portsmouth PO1 3HE UK
来源: 评论
An analysis of personal information privacy concerns using Q-methodology  26
An analysis of personal information privacy concerns using Q...
收藏 引用
26th Australasian Conference on information systems, ACIS 2015
作者: Martin, Gregg Gupta, Hritik Wingreen, Stephen C. Mills, Annette M. Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand Department of Accounting and Information Systems University of Canterbury Christchurch New Zealand
information privacy has gained increased attention in recent years. This paper focuses on a particular aspect of privacy, i.e., personal information privacy. In this paper a conceptual framework is developed based Wes... 详细信息
来源: 评论
Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”
收藏 引用
Security and Communication Networks 2017年 第1期2017卷
作者: Guomin Zhou Peng Zeng Xiaohui Yuan Siyuan Chen Kim-Kwang Raymond Choo Department of Computer and Information Technology Zhejiang Police College Hangzhou Zhejiang Province *** Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai *** Department of Computer Science and Engineering University of North Texas Denton TX 76203 USAunt.edu College of Information Engineering China University of Geosciences Wuhan *** Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249 USAutsa.edu
来源: 评论
A cloud workflow modeling framework using extended proclets  3rd
A cloud workflow modeling framework using extended proclets
收藏 引用
3rd Asia Pacific Conference on Business Process Management, AP-BPM 2015
作者: Huang, Hua Peng, Rong Feng, Zaiwen Zhang, Min State Key Laboratory of Software Engineering School of Computer Wuhan University Wuhan430072 China School of Information Engineering Jingdezhen Ceramic Institute Jingdezhen333001 China
Most existing cloud workflow modeling approaches focus on how to support business process customization for multiple tenants. But there are many factors to be considered in actual cloud workflow modeling, such as how ... 详细信息
来源: 评论
Identifying the best machine learning algorithms for brain tumor segmentation, progression assessment, and overall survival prediction in the BRATS challenge
arXiv
收藏 引用
arXiv 2018年
作者: Bakas, Spyridon Reyes, Mauricio Jakab, Andras Bauer, Stefan Rempfler, Markus Crimi, Alessandro Shinohara, Russell Takeshi Berger, Christoph Ha, Sung Min Rozycki, Martin Prastawa, Marcel Alberts, Esther Lipkova, Jana Freymann, John Kirby, Justin Bilello, Michel Fathallah-Shaykh, Hassan M. Wiest, Roland Kirschke, Jan Wiestler, Benedikt Colen, Rivka Kotrotsou, Aikaterini Lamontagne, Pamela Marcus, Daniel Milchenko, Mikhail Nazeri, Arash Weber, Marc-Andr Mahajan, Abhishek Baid, Ujjwal Gerstner, Elizabeth Kwon, Dongjin Acharya, Gagan Agarwal, Manu Alam, Mahbubul Albiol, Alberto Albiol, Antonio Albiol, Francisco J. Alex, Varghese Allinson, Nigel Amorim, Pedro H.A. Amrutkar, Abhijit Anand, Ganesh Andermatt, Simon Arbel, Tal Arbelaez, Pablo Avery, Aaron Azmat, Muneeza Pranjal, B. Bai, Wenjia Banerjee, Subhashis Barth, Bill Batchelder, Thomas Batmanghelich, Kayhan Battistella, Enzo Beers, Andrew Belyaev, Mikhail Bendszus, Martin Benson, Eze Bernal, Jose Bharath, Halandur Nagaraja Biros, George Bisdas, Sotirios Brown, James Cabezas, Mariano Cao, Shilei Cardoso, Jorge M. Carver, Eric N. Casamitjana, Adri Castillo, Laura Silvana Cat, Marcel Cattin, Philippe Cérigues, Albert Chagas, Vinicius S. Chandra, Siddhartha Chang, Yi-Ju Chang, Shiyu Chang, Ken Chazalon, Joseph Chen, Shengcong Chen, Wei Chen, Jefferson W. Chen, Zhaolin Cheng, Kun Choudhury, Ahana Roy Chylla, Roger Clrigues, Albert Colleman, Steven Colmeiro, Ramiro German Rodriguez Combalia, Marc Costa, Anthony Cui, Xiaomeng Dai, Zhenzhen Dai, Lutao Daza, Laura Alexandra Deutsch, Eric Ding, Changxing Dong, Chao Dong, Shidu Dudzik, Wojciech Eaton-Rosen, Zach Egan, Gary Escudero, Guilherme Estienne, Tho Everson, Richard Fabrizio, Jonathan Fan, Yong Fang, Longwei Feng, Xue Ferrante, Enzo Fidon, Lucas Fischer, Martin French, Andrew P. Fridman, Naomi Fu, Huan Fuentes, David Gao, Yaozong Gates, Evan Gering, David Gholami, Amir Gierke, Willi Glocker, Ben Gong, Mingming Gonzlez-Vill, Sandra Grosges, T. Guan, Yuanfang Guo, Sheng Gupta, Sudeep Han, Woo-Sup Han, Il Song Harmuth, Ko Center for Biomedical Image Computing and Analytics University of Pennsylvania PhiladelphiaPA United States Department of Radiology Perelman School of Medicine University of Pennsylvania PhiladelphiaPA United States Department of Pathology and Laboratory Medicine Perelman School of Medicine University of Pennsylvania PhiladelphiaPA United States Institute for Surgical Technology and Biomechanics University of Bern Bern Switzerland Center for MR-Research University Children's Hospital Zurich Zurich Switzerland Support Centre for Advanced Neuroimaging Inselspital Institute for Diagnostic and Interventional Neuroradiology Bern University Hospital Bern Switzerland University Hospital of Zurich Zurich Switzerland Center for Clinical Epidemiology and Biostatistics University of Pennsylvania Philadelphia United States Image-Based Biomedical Modeling Group Technical University of Munich Munich Germany Icahn School of Medicine Mount Sinai Health System New YorkNY United States Leidos Biomedical Research Inc. Frederick National Laboratory for Cancer Research FrederickMD21701 United States Cancer Imaging Program National Cancer Institute National Institutes of Health BethesdaMD20814 United States Department of Neurology University of Alabama at Birmingham BirminghamAL United States Department of Diagnostic Radiology University of Texas MD Anderson Cancer Center HoustonTX United States Department of Psychology Washington University St. LouisMO United States Neuroimaging Informatics and Analysis Center Washington University St. LouisMO United States Department of Radiology Washington University St. LouisMO United States Institute of Diagnostic and Interventional Radiology Pediatric Radiology and Neuroradiology University Medical Center Rostock Ernst-Heydemann-Str. 6 Rostock18057 Germany Tata Memorial Centre Homi Bhabha National Institute Mumbai India Shri Guru Gobind Singhji Institute of Engineering and Technology Nanded India NVIDIA Santa Clara
Gliomas are the most common primary brain malignancies, with different degrees of aggressiveness, variable prognosis and various heterogeneous histologic sub-regions, i.e., peritumoral edematous/invaded tissue, necrot... 详细信息
来源: 评论