咨询与建议

限定检索结果

文献类型

  • 1,495 篇 会议
  • 733 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,275 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,361 篇 工学
    • 1,065 篇 计算机科学与技术...
    • 891 篇 软件工程
    • 244 篇 信息与通信工程
    • 224 篇 控制科学与工程
    • 136 篇 生物工程
    • 98 篇 电气工程
    • 93 篇 机械工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 57 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 46 篇 土木工程
    • 45 篇 建筑学
    • 44 篇 网络空间安全
  • 604 篇 理学
    • 313 篇 数学
    • 158 篇 生物学
    • 118 篇 系统科学
    • 116 篇 物理学
    • 96 篇 统计学(可授理学、...
  • 395 篇 管理学
    • 278 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 109 篇 医学
    • 100 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 45 篇 公共卫生与预防医...
  • 62 篇 法学
    • 46 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 45 篇 教育学
    • 43 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 138 篇 computer science
  • 63 篇 deep learning
  • 61 篇 machine learning
  • 58 篇 laboratories
  • 54 篇 computational mo...
  • 52 篇 software systems
  • 51 篇 application soft...
  • 51 篇 accuracy
  • 50 篇 artificial intel...
  • 46 篇 cloud computing
  • 44 篇 training
  • 43 篇 software
  • 42 篇 computer archite...
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 35 篇 security
  • 34 篇 support vector m...
  • 34 篇 systems engineer...

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 10 篇 computing and so...
  • 10 篇 department of so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of intell...
  • 8 篇 department of co...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,173 篇 英文
  • 95 篇 其他
  • 7 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2275 条 记 录,以下是1171-1180 订阅
排序:
Anonymous yoking-group proofs  15
Anonymous yoking-group proofs
收藏 引用
10th ACM Symposium on Information, computer and Communications Security, ASIACCS 2015
作者: Li, Nan Mu, Yi Susilo, Willy Varadharajan, Vijay Centre for Computer and Information Security School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Information and Networked Systems Security Research Department of Computing Faculty of Science Macquarie University Sydney Australia
Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags... 详细信息
来源: 评论
POSTER: A hybrid approach for mobile security threat analysis  8
POSTER: A hybrid approach for mobile security threat analysi...
收藏 引用
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
作者: You, Wanqing Qian, Kai Guo, Minzhe Bhattacharya, Prabir Qian, Ying Tao, Lixin Department of Computer Science and Software Engineering Southern Polytechnic State University MariettaGA United States Department of Electrical Engineering and Computing Systems University of Cincinnati United States Department of Computer Science East China Normal University Shanghai China Dept. of Computer Science Pace University New York United States
Research on effective and efficient mobile threat analysis becomes an emerging and important topic in cybersecurity research area. Static analysis and dynamic analysis constitute two of the most popular types of techn... 详细信息
来源: 评论
Omnidirectional chargability with directional antennas
Omnidirectional chargability with directional antennas
收藏 引用
International Conference on Network Protocols
作者: Haipeng Dai Xiaoyu Wang Alex X. Liu Fengmin Zhang Yang Zhao Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu CHINA Department of Computer Science and Engineering Michigan State University East Lansing MI USA Shanghai key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai CHINA
Wireless Power Transfer (WPT) has received more and more attentions because of its convenience and reliability. In this paper, we first propose the notion of omnidirectional charging by which an area is omnidirectiona... 详细信息
来源: 评论
Towards a general framework for optimal role mining: A constraint satisfaction approach  15
Towards a general framework for optimal role mining: A const...
收藏 引用
20th ACM Symposium on Access Control Models and Technologies, SACMAT 2015
作者: Jafarian, Jafar Haadi Takabi, Hassan Touati, Hakim Hesamifard, Ehsan Shehab, Mohamed Department of Software and Information Systems University of North Carolina at Charlotte CharlotteNC United States Department of Computer Science and Engineering University of North Texas DentonTX United States
Role Based Access Control (RBAC) is the most widely used advanced access control model deployed in a variety of organizations. To deploy an RBAC system, one needs to first identify a complete set of roles, including p... 详细信息
来源: 评论
Towards using coherence analysis to scaffold students in open-ended learning environments  17
Towards using coherence analysis to scaffold students in ope...
收藏 引用
Workshops at the 17th International Conference on Artificial Intelligence in Education, AIED-WS 2015
作者: Segedy, James R. Biswas, Gautam Institute of Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University 1025 16th Avenue South NashvilleTN37212 United States
Scaffolding students in open-ended learning environments (OELEs) is a difficult challenge. The open-ended nature of OELEs allows students to simultaneously pursue, modify, and abandon any of a large number of both sho... 详细信息
来源: 评论
A formulation of rod based nonlinear model predictive control of nuclear reaction with temperature effects and Xenon poisoning  23
A formulation of rod based nonlinear model predictive contro...
收藏 引用
23rd International Conference on Nuclear engineering: Nuclear Power - Reliable Global Energy, ICONE 2015
作者: Teatro, Timothy A.V. McNelles, Phillip Eklund, J. Mikael Department of Electrical Computer and Software Engineering University of Ontario Institute of Technology OshawaON Canada Faculty of Energy Systems and Nuclear Science University of Ontario Institute of Technology OshawaON Canada
This paper presents a formulation of a nonlinear model predictive controller for steering of a nuclear reaction in a pressurized water reactor via control rod displacement. The predictive model, based on point kinetic... 详细信息
来源: 评论
Demonstration: Using GIFT to support students' understanding of the UrbanSim counter insurgency simulation  17
Demonstration: Using GIFT to support students' understanding...
收藏 引用
Workshops at the 17th International Conference on Artificial Intelligence in Education, AIED-WS 2015
作者: Segedy, JameS. R. Kinnebrew, John S. Biswas, Gautam Institute of Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University 1025 16th Avenue South NashvilleTN37212 United States
This paper presents our recent work with the Generalized Intelligent Framework for Tutoring (GIFT) for authoring tutors and training systems in concert with already developed external applications that provide a wide ... 详细信息
来源: 评论
Denoising Auto-Encoders toward Robust Unsupervised Feature Representation
Denoising Auto-Encoders toward Robust Unsupervised Feature R...
收藏 引用
International Joint Conference on Neural Networks
作者: Wei Xiong Bo Du Lefei Zhang Liangpei Zhang Dacheng Tao State Key Laboratory of Software Engineering School of Computer Science Wuhan University China Department of Computing The Hong Kong Polytechnic University Kowloon Hong Kong State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University China Centre for Quantum Computation & Intelligent Systems University of Technology Sydney NSW 2007 Australia
Deep networks like the convolutional neural network and its variants usually learn hierarchical features from labeled images, which is very expensive to obtain. How can we find an unsupervised way to effectively extra... 详细信息
来源: 评论
Toward rapid prototyping of miniature Capsule Robots
Toward rapid prototyping of miniature Capsule Robots
收藏 引用
2015 IEEE International Conference on Robotics and Automation, ICRA 2015
作者: Taddese, Addisu Beccani, Marco Susilo, Ekawahyu Völgyesi, Péter Lédeczi, Ákos Valdastri, Pietro Institute for Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University NashvilleTN37212 United States STORM Lab Department of Mechanical Engineering Vanderbilt University NashvilleTN37235 United States
Minimally invasive robotic surgery techniques are becoming popular thanks to their enhanced patient benefits, including shorter recovery time, better cosmetic results and reduced discomforts. Less invasive procedures ... 详细信息
来源: 评论
Real-Time Eye Detection and Tracking
Real-Time Eye Detection and Tracking
收藏 引用
2015 SSR International Conference on Social sciences and Information(SSR-SSI 2015)
作者: Brandon Resheske Baozhong Tian Wausau Financial Systems Department of Computer Science and Software Engineering University of Wisconsin – Platteville
The purpose of this paper was to expand upon an existing eye detection algorithm and to innovate an acceptable and practical solution aimed for hands-free computer *** overall goal was to create a cost-efficient real-... 详细信息
来源: 评论