咨询与建议

限定检索结果

文献类型

  • 1,502 篇 会议
  • 733 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,282 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,362 篇 工学
    • 1,066 篇 计算机科学与技术...
    • 885 篇 软件工程
    • 244 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 135 篇 生物工程
    • 98 篇 电气工程
    • 93 篇 生物医学工程(可授...
    • 92 篇 机械工程
    • 71 篇 电子科学与技术(可...
    • 61 篇 安全科学与工程
    • 56 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 45 篇 土木工程
    • 44 篇 建筑学
    • 43 篇 网络空间安全
  • 608 篇 理学
    • 316 篇 数学
    • 158 篇 生物学
    • 118 篇 系统科学
    • 117 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 44 篇 化学
  • 393 篇 管理学
    • 275 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 111 篇 医学
    • 100 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 46 篇 公共卫生与预防医...
  • 63 篇 法学
    • 47 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 44 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 137 篇 computer science
  • 66 篇 deep learning
  • 62 篇 machine learning
  • 58 篇 laboratories
  • 53 篇 computational mo...
  • 52 篇 software systems
  • 52 篇 artificial intel...
  • 51 篇 application soft...
  • 50 篇 accuracy
  • 47 篇 cloud computing
  • 45 篇 training
  • 43 篇 computer archite...
  • 43 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 37 篇 security
  • 36 篇 resource managem...
  • 35 篇 data mining
  • 34 篇 internet of thin...

机构

  • 31 篇 beijing key labo...
  • 25 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 17 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 10 篇 computing and so...
  • 10 篇 sri lanka instit...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of intell...
  • 9 篇 max planck insti...
  • 8 篇 department of co...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 34 篇 yingmin jia
  • 24 篇 buyya rajkumar
  • 23 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 leung victor c.m...
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 1,996 篇 英文
  • 279 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2282 条 记 录,以下是1181-1190 订阅
Towards a general framework for optimal role mining: A constraint satisfaction approach  15
Towards a general framework for optimal role mining: A const...
收藏 引用
20th ACM Symposium on Access Control Models and Technologies, SACMAT 2015
作者: Jafarian, Jafar Haadi Takabi, Hassan Touati, Hakim Hesamifard, Ehsan Shehab, Mohamed Department of Software and Information Systems University of North Carolina at Charlotte CharlotteNC United States Department of Computer Science and Engineering University of North Texas DentonTX United States
Role Based Access Control (RBAC) is the most widely used advanced access control model deployed in a variety of organizations. To deploy an RBAC system, one needs to first identify a complete set of roles, including p... 详细信息
来源: 评论
Towards using coherence analysis to scaffold students in open-ended learning environments  17
Towards using coherence analysis to scaffold students in ope...
收藏 引用
Workshops at the 17th International Conference on Artificial Intelligence in Education, AIED-WS 2015
作者: Segedy, James R. Biswas, Gautam Institute of Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University 1025 16th Avenue South NashvilleTN37212 United States
Scaffolding students in open-ended learning environments (OELEs) is a difficult challenge. The open-ended nature of OELEs allows students to simultaneously pursue, modify, and abandon any of a large number of both sho... 详细信息
来源: 评论
A formulation of rod based nonlinear model predictive control of nuclear reaction with temperature effects and Xenon poisoning  23
A formulation of rod based nonlinear model predictive contro...
收藏 引用
23rd International Conference on Nuclear engineering: Nuclear Power - Reliable Global Energy, ICONE 2015
作者: Teatro, Timothy A.V. McNelles, Phillip Eklund, J. Mikael Department of Electrical Computer and Software Engineering University of Ontario Institute of Technology OshawaON Canada Faculty of Energy Systems and Nuclear Science University of Ontario Institute of Technology OshawaON Canada
This paper presents a formulation of a nonlinear model predictive controller for steering of a nuclear reaction in a pressurized water reactor via control rod displacement. The predictive model, based on point kinetic... 详细信息
来源: 评论
Demonstration: Using GIFT to support students' understanding of the UrbanSim counter insurgency simulation  17
Demonstration: Using GIFT to support students' understanding...
收藏 引用
Workshops at the 17th International Conference on Artificial Intelligence in Education, AIED-WS 2015
作者: Segedy, JameS. R. Kinnebrew, John S. Biswas, Gautam Institute of Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University 1025 16th Avenue South NashvilleTN37212 United States
This paper presents our recent work with the Generalized Intelligent Framework for Tutoring (GIFT) for authoring tutors and training systems in concert with already developed external applications that provide a wide ... 详细信息
来源: 评论
Denoising Auto-Encoders toward Robust Unsupervised Feature Representation
Denoising Auto-Encoders toward Robust Unsupervised Feature R...
收藏 引用
International Joint Conference on Neural Networks
作者: Wei Xiong Bo Du Lefei Zhang Liangpei Zhang Dacheng Tao State Key Laboratory of Software Engineering School of Computer Science Wuhan University China Department of Computing The Hong Kong Polytechnic University Kowloon Hong Kong State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University China Centre for Quantum Computation & Intelligent Systems University of Technology Sydney NSW 2007 Australia
Deep networks like the convolutional neural network and its variants usually learn hierarchical features from labeled images, which is very expensive to obtain. How can we find an unsupervised way to effectively extra... 详细信息
来源: 评论
Toward rapid prototyping of miniature Capsule Robots
Toward rapid prototyping of miniature Capsule Robots
收藏 引用
2015 IEEE International Conference on Robotics and Automation, ICRA 2015
作者: Taddese, Addisu Beccani, Marco Susilo, Ekawahyu Völgyesi, Péter Lédeczi, Ákos Valdastri, Pietro Institute for Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University NashvilleTN37212 United States STORM Lab Department of Mechanical Engineering Vanderbilt University NashvilleTN37235 United States
Minimally invasive robotic surgery techniques are becoming popular thanks to their enhanced patient benefits, including shorter recovery time, better cosmetic results and reduced discomforts. Less invasive procedures ... 详细信息
来源: 评论
Real-Time Eye Detection and Tracking
Real-Time Eye Detection and Tracking
收藏 引用
2015 SSR International Conference on Social sciences and Information(SSR-SSI 2015)
作者: Brandon Resheske Baozhong Tian Wausau Financial Systems Department of Computer Science and Software Engineering University of Wisconsin – Platteville
The purpose of this paper was to expand upon an existing eye detection algorithm and to innovate an acceptable and practical solution aimed for hands-free computer *** overall goal was to create a cost-efficient real-... 详细信息
来源: 评论
Secure deduplication storage systems supporting keyword search
Secure deduplication storage systems supporting keyword sear...
收藏 引用
作者: Li, Jin Chen, Xiaofeng Xhafa, Fatos Barolli, Leonard School of Computer Science and Educational Software Guangzhou University Guangzhou510006 China Xidian University Xi'an710071 China Department of Languages and Informatics Systems Technical University of Catalonia Spain Department of Information and Communication Engineering Fukuoka Institute of Technology Japan
Data deduplication is an attractive technology to reduce storage space for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be e... 详细信息
来源: 评论
Foreword
Proceedings of the 2016 International Conference on Image Pr...
收藏 引用
Proceedings of the 2016 International Conference on Image Processing, computer Vision, and Pattern Recognition, IPCV 2016 2016年
作者: Abd-Wahab, Mohd Helmy Al-Bakry, Abbas Al-Holou, Nizar Arabnia, Hamid R. Bhattacharya, Mahua Martinez Castillo, Juan Jose Daimi, Kevin Deligiannidis, Leonidas Djoudi, Lamia Atma Duong, Trung Eshaghian-Wilner, Mary Mehrnoosh Gravvanis, George A. Huang, Ruizhu Jandieri, George Kim, Byung-Gyu Kim, Tai-hoon Korovin, Iakov Lai, Guoming Lee, Hyo Jong Bin Mansor, Muhammad Naufal Marsh, Andrew Mostafaeipour, Ali Park, James J. Patil, Shashikant Ponalagusamy, R. Schaefer, Gerald Singh, Akash Solo, Ashu M.G. Swee, Sim Kok Thomas, Jaya Tinetti, Fernando G. Vladimir, Hahanov Wang, Shiuh-Jeng Yang, Mary Yoe, Hyun You, Jane Zhao, Wenbing Department of Computer Engineering University Tun Hussein Onn Malaysia Malaysia University of IT and Communications Baghdad Iraq Electrical and Computer Engineering Department IEEE/SEM-Computer Chapter University of Detroit Mercy DetroitMI United States University of Georgia United States ABV Indian Institute of Information Technology and Management MHRD Government of India India Acantelys Alan Turing Nikola Tesla Research Group and GIPEB Universidad Nacional Abierta Venezuela Computer Science and Software Engineering Programs Department of Mathematics Computer Science and Software Engineering University of Detroit Mercy DetroitMI United States Department of Computer Information Systems Wentworth Institute of Technology BostonMA United States Synchrone Technologies France Rutgers University State University of New Jersey New Jersey United States University of Southern California California United States Electrical Engineering University of California Los Angeles Los Angeles [UCLA CA United States Advanced Scientific Computing Applied Math and Applications Research Group Applied Mathematics and Numerical Computing and Department of ECE School of Engineering Democritus University of Thrace Xanthi Greece Texas Advanced Computing Center University of Texas AustinTX United States Georgian Technical University Tbilisi Georgia Institute of Cybernetics Georgian Academy of Science Georgia Multimedia Processing CommunicationsLab.[MPCL Department of Computer Science and Engineering College of Engineering SunMoon University Korea Republic of School of Information and Computing Science University of Tasmania Australia Southern Federal University Russia Computer Science and Technology Sun Yat-Sen University Guangzhou China Center for Advanced Image and Information Technology Division of Computer Science and Engineering Chonbuk National University Korea Republic of Faculty of Engineering Technology Kampus Uniciti Alam Universiti Malaysia Perlis UniMAP Malaysi
来源: 评论
4Y model: A novel approach for finger identification using KINECT
4Y model: A novel approach for finger identification using K...
收藏 引用
International Conference on Recent Trends in Information systems (ReTIS)
作者: Ahmed Al Marouf Shaumic Shondipon Md. Kamrul Hasan Hasan Mahmud Department of Computer Science and Engineering Systems and Software Lab (SSL) Islamic University of Technology Gazipur Bangladesh
In Human computer Interaction (HCI), one of the recent research areas is Hand Gesture Recognition (HGR). In hand gesture recognition, finger identification and fingertip detection is a challenging work. Because of the... 详细信息
来源: 评论