咨询与建议

限定检索结果

文献类型

  • 1,330 篇 会议
  • 959 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,291 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,275 篇 工学
    • 685 篇 计算机科学与技术...
    • 548 篇 软件工程
    • 293 篇 核科学与技术
    • 245 篇 信息与通信工程
    • 169 篇 控制科学与工程
    • 152 篇 电气工程
    • 134 篇 电子科学与技术(可...
    • 116 篇 生物工程
    • 107 篇 生物医学工程(可授...
    • 93 篇 光学工程
    • 82 篇 动力工程及工程热...
    • 70 篇 化学工程与技术
    • 67 篇 仪器科学与技术
    • 64 篇 机械工程
    • 64 篇 网络空间安全
    • 62 篇 安全科学与工程
    • 49 篇 土木工程
  • 1,087 篇 理学
    • 690 篇 物理学
    • 230 篇 数学
    • 136 篇 生物学
    • 84 篇 统计学(可授理学、...
    • 74 篇 化学
    • 54 篇 地球物理学
    • 51 篇 天文学
  • 249 篇 管理学
    • 174 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 91 篇 工商管理
  • 117 篇 医学
    • 101 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 58 篇 药学(可授医学、理...
  • 39 篇 法学
  • 38 篇 农学
  • 36 篇 经济学
  • 16 篇 教育学
  • 4 篇 文学
  • 3 篇 军事学

主题

  • 165 篇 hadron colliders
  • 87 篇 accuracy
  • 66 篇 deep learning
  • 66 篇 higgs bosons
  • 59 篇 machine learning
  • 57 篇 feature extracti...
  • 55 篇 convolutional ne...
  • 51 篇 real-time system...
  • 49 篇 w & z bosons
  • 46 篇 training
  • 45 篇 cloud computing
  • 44 篇 computational mo...
  • 42 篇 internet of thin...
  • 39 篇 relativistic hea...
  • 38 篇 support vector m...
  • 38 篇 top quark
  • 35 篇 security
  • 35 篇 technological in...
  • 34 篇 wireless sensor ...
  • 33 篇 supersymmetric m...

机构

  • 338 篇 faculty of scien...
  • 338 篇 department for p...
  • 332 篇 kirchhoff-instit...
  • 322 篇 department of ph...
  • 320 篇 department of ph...
  • 309 篇 department of ph...
  • 309 篇 department of ph...
  • 304 篇 yerevan physics ...
  • 300 篇 graduate school ...
  • 298 篇 fakultät für phy...
  • 293 篇 institute of phy...
  • 292 篇 institute of phy...
  • 282 篇 instituto de fís...
  • 278 篇 department of ph...
  • 272 篇 dipartimento di ...
  • 236 篇 nikhef national ...
  • 230 篇 department of ph...
  • 222 篇 irfu cea univers...
  • 216 篇 marian smoluchow...
  • 215 篇 department of ph...

作者

  • 275 篇 c. alexa
  • 272 篇 j. m. izen
  • 270 篇 g. bella
  • 267 篇 j. strandberg
  • 266 篇 d. calvet
  • 265 篇 c. amelung
  • 241 篇 n. orlando
  • 240 篇 g. spigo
  • 235 篇 y. tayalati
  • 233 篇 f. siegert
  • 231 篇 s. veneziano
  • 229 篇 r. ströhmer
  • 227 篇 v. chiarella
  • 227 篇 m. rijssenbeek
  • 225 篇 s. jin
  • 225 篇 g. gaudio
  • 225 篇 s. mohapatra
  • 220 篇 s. guindon
  • 219 篇 a. kaczmarska
  • 217 篇 j. schaarschmidt

语言

  • 1,940 篇 英文
  • 343 篇 其他
  • 9 篇 中文
检索条件"机构=M. Tech Computer Science and Engineering"
2291 条 记 录,以下是1971-1980 订阅
排序:
Efficient design and im.lem.ntation of DFA based pattern m.tching on hardware
收藏 引用
International Journal of computer science Issues 2012年 第2期9卷 286-290页
作者: Pandey, Aakanksha Khare, Nilay Rasool, Akhtar M Tech Information Security Maulana Azad National Institute of Technology Bhopal Madhya Pradesh 462003 India Faculty of Computer Science Engineering Maulana Azad National Institute of Technology Bhopal Madhya Pradesh 462003 India
Pattern m.tching is a crucial task in several critical network services such as intrusion detection. In this paper we present an efficient im.lem.ntation of the DFA with optim.zed area and optim.zed m.m.ry by the intr... 详细信息
来源: 评论
Second and Third Harm.nic Generation at ε-Near-Zero Crossing Point in Arrays of Plasm.nic Nanoshells
Second and Third Harmonic Generation at ε-Near-Zero Crossin...
收藏 引用
Conference on Lasers and Electro-Optics
作者: m. A. Vincenti S. Cam.ione D. de Ceglia m. Scalora F. Capolino AEgis Technologies Inc Department of Electrical Engineering and Computer Science University of California Charles M. Bowden Research Center RDECOM
We theoretically investigate harm.nic generation at ε=0 crossing points where losses are com.ensated through the inclusion of active photonic m.terials in m.tallic nanoshells. This singularity-driven process lowers t... 详细信息
来源: 评论
m.gRisk - A decisional fram.work to m.asure m.nagerial dim.nsions of legacy application for rejuvenation through reengineering
MngRisk - A decisional framework to measure managerial dimen...
收藏 引用
International Conference on Electronic computer technology
作者: Rajavat, Er. Anand Tokekar, Vrinda Computer Science and Engineering Shri Vaishnav Institute of Technology and Science Indore M. P. India Indore M. P. India
Nowadays legacy system.reengineering has em.rged as a well-known system.evolution technique. The goal of reengineering is to increase productivity and quality of legacy system.through fundam.ntal rethinking and radica... 详细信息
来源: 评论
Snap! (build your own blocks): tutorial presentation
Journal of Computing Sciences in Colleges
收藏 引用
Journal of Com.uting sciences in Colleges 2012年 第4期27卷
作者: Dan Garcia Luke Segars Josh Paley Electrical Engineering and Computer Science UC Berkeley Computer Science Teacher Henry M. Gunn High School in Palo Alto
This workshop is for high school and college teachers of general-interest ("CS 0") computer science courses. It presents the program.ing environm.nt used in two of the five initial AP CS Principles pilot ***...
来源: 评论
Com.arative study of classification algorithm. with m.dified m.ltivariate local binary pattern texture m.del on rem.tely sensed im.ges
Comparative study of classification algorithms with modified...
收藏 引用
International Conference on Recent Trends in Inform.tion technology
作者: Jenicka, S. Suruliandi, A. M. S. University Tirunelveli India Department of Computer Science and Engineering M. S. University Tirunelveli India
Texture analysis plays a vital role in rem.tely sensed im.ge classification as every pixel is going to be classified based on the collective pixel values of neighborhood. The result thus obtained gives increased class... 详细信息
来源: 评论
Face recognition based on discrim.native fractional discrete cosine transform
Face recognition based on discriminative fractional discrete...
收藏 引用
5th Indian International Conference on Artificial Intelligence, IICAI 2011
作者: Thippeswam., G. Shekar, B.H. Department of Computer Science and Engineering Sir M. Visvesvaraya Institute-of Technology Bangalore India Department of Computer Science Mangalore University Mangalore India
In this paper, we propose a robust and an accurate face recognition m.del which uses the feature extraction capabilities of fractional discrete cosine transform.(FDCT) followed by Linear Discrim.nant analysis (LDA) fo... 详细信息
来源: 评论
Self-tim.d m.lti-operand addition
收藏 引用
International Journal of Circuits, System. and Signal Processing 2012年 第1期6卷 1-11页
作者: Balasubram.nian, P. Edwards, D.A. Tom., W.B. The University of Manchester United Kingdom Department of Electronics and Communication Engineering Vel Tech Dr. RR and Dr. SR Technical University Avadi Chennai 600 062 Tamil Nadu India The School of Computer Science University of Manchester Oxford Road Manchester M13 9PL United Kingdom
Self-tim.d addition of m.ltiple data operands is discussed in this paper. Though there are various works in the existing literature targeting dual-operand addition, m.ltiple operand addition has not been exclusively d... 详细信息
来源: 评论
An efficient cryptographic approach for secure policy based routing: (TACIT Encryption technique)
An efficient cryptographic approach for secure policy based ...
收藏 引用
International Conference on Electronic computer technology
作者: Crope, Frosanta Sharm., Ashwani Singh, Ajit Pahwa, Nikhil IACSIT M. Tech. in Computer Science and Engineering National Institute of Technology Durgapur West Bengal 713209 India TIT and S Bhiwani Haryana 127021 India
In today's world, m.st of the m.ans of secure data, code storage and distribution rely on suitable cryptographic schem.s such as certificates or encryption keys. Thus cryptographic m.chanism.form. a foundation upo... 详细信息
来源: 评论
m.ghaOS: Cloud based operating system.and a fram.work for m.bile application developm.nt
MeghaOS: Cloud based operating system and a framework for mo...
收藏 引用
2011 World Congress on Inform.tion and Com.unication technologies, WICT 2011
作者: Srinivasa, K.G. Harish Raddi, C.S. m.han Krishna, S.H. Venkatesh, Nidhi Data Mining Laboratory Department of Computer Science and Engineering M. S. Ramaiah Institute of Technology Bangalore - 560054 India
With the advent in high-speed Internet technologies, the concept of cloud com.uting has becom. m.re popular. In the proposed system. users work with Cloud-based fram.work accessible via browser on any device, which is... 详细信息
来源: 评论
Resource m.nagem.nt In Peer‐To‐Peer Networks: A Nadse Approach
收藏 引用
AIP Conference Proceedings 2011年 第1期1414卷 159-164页
作者: R. B. Patel Vishal Garg Department of Computer Science and Engineering Deenbandhu Chhotu Ram University of Science & Technology Murthal (Sonepat)‐131039 India Dept of Computer Engineering M. M. Engineering College Mullana‐133203 Haryana India
This article presents a com.on solution to Peer‐to‐Peer (P2P) network problem. and distributed com.uting with the help of “Neighbor Assisted Distributed and Scalable Environm.nt” (NADSE). NADSE supports both devic...
来源: 评论