咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 38 篇 期刊文献

馆藏范围

  • 82 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 55 篇 工学
    • 35 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 12 篇 信息与通信工程
    • 10 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 3 篇 动力工程及工程热...
    • 3 篇 土木工程
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
  • 33 篇 理学
    • 16 篇 数学
    • 9 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 物理学
    • 3 篇 化学
    • 2 篇 海洋科学
    • 2 篇 系统科学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 1 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 3 篇 information syst...
  • 3 篇 security of data
  • 3 篇 databases
  • 3 篇 remote sensing
  • 3 篇 machine learning
  • 2 篇 surveys
  • 2 篇 data warehouses
  • 2 篇 object detection
  • 2 篇 markov processes
  • 2 篇 face recognition
  • 2 篇 scattering
  • 2 篇 computational mo...
  • 2 篇 information secu...
  • 2 篇 artificial intel...
  • 2 篇 testing
  • 2 篇 bayesian network...
  • 1 篇 computer simulat...
  • 1 篇 sensor systems
  • 1 篇 charge coupled d...
  • 1 篇 thermodynamics

机构

  • 4 篇 electrical and c...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 3 篇 university of mi...
  • 3 篇 the department o...
  • 3 篇 early child educ...
  • 3 篇 beijing key labo...
  • 3 篇 information tech...
  • 3 篇 electrical and c...
  • 3 篇 university of so...
  • 3 篇 department of co...
  • 3 篇 computer and inf...
  • 2 篇 college of osteo...
  • 2 篇 tennessee techno...
  • 2 篇 the school of in...
  • 2 篇 decision systems...
  • 2 篇 school of inform...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 school of accoun...

作者

  • 9 篇 du qian
  • 8 篇 li wei
  • 5 篇 tao ran
  • 4 篇 kasem khalil
  • 4 篇 ahmed sherif
  • 4 篇 sherif ahmed
  • 4 篇 druzdzel marek j...
  • 4 篇 elsersy mohamed
  • 4 篇 mohamed elsersy
  • 4 篇 yuan changhe
  • 3 篇 chen-chi shing
  • 3 篇 marn-ling shing
  • 3 篇 huei lee
  • 3 篇 mohammad m. r. k...
  • 3 篇 kuo lane chen
  • 3 篇 khalil kasem
  • 2 篇 wang hanzheng
  • 2 篇 bhargava bharat ...
  • 2 篇 williams r. stan...
  • 2 篇 imam ahmad abdel...

语言

  • 79 篇 英文
  • 3 篇 其他
检索条件"机构=MS in Computer Information Systems"
82 条 记 录,以下是1-10 订阅
排序:
Multimodal Data Integration for Sustainable Indoor Gardening: Tracking Anyplant with Time Series Foundation Model
arXiv
收藏 引用
arXiv 2025年
作者: Nabaei, Seyed Hamidreza Zheng, Zeyang Chen, Dong Heydarian, Arsalan Department of Systems and Information Engineering Link Lab University of Virginia CharlottesvilleVA22903 United States Department of Computer Engineering Link Lab University of Virginia CharlottesvilleVA22903 United States Agricultural and Biological Engineering Mississippi State University StarkvilleMS39762 United States Department of Civil and Environmental Engineering Link Lab University of Virginia CharlottesvilleVA22903 United States
Indoor gardening within sustainable buildings offers a transformative solution to urban food security and environmental sustainability. By 2030, urban farming, including Controlled Environment Agriculture (CEA) and ve... 详细信息
来源: 评论
Hyperspectral Target Detection Using Diffusion Model and Convolutional Gated Linear Unit
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: Li, Zhaokui Mo, Fan Zhao, Xiaobin Liu, Cuiwei Gong, Xuewei Li, Wei Du, Qian Yuan, Bo Shenyang Aerospace University School of Computer Science Shenyang110136 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Institute of Applied Ecology Chinese Academy of Sciences CAS Key Laboratory of Forest Ecology and Silviculture Shenyang110016 China Beijing Institute of Technology School of Information and Electronics Beijing Key Laboratory of Fractional Signals and Systems Beijing100081 China Mississippi State University Department of Electrical and Computer Engineering StarkvilleMS39762 United States
Deep learning can effectively extract latent information from data to enhance target-background separation in hyperspectral target detection (HTD). However, these models typically require extensive labeled samples, wh... 详细信息
来源: 评论
Keeping secrets within a family: Rediscovering Parnas
Keeping secrets within a family: Rediscovering Parnas
收藏 引用
Proceedings of the International Conference on Software Engineering Research and Practice, SERP'04
作者: Cunningham, H. Conrad Zhang, Cuihua Liu, Yi Computer Science University of Mississippi University MS 38677 Computer and Information Systems Northwest Vista College San Antonio TX 78251
David Parnas wrote several papers in the 1970's and 1980's that are now considered classics. The concepts he advocated such as information hiding and use of abstract interfaces are generally accepted as the ap... 详细信息
来源: 评论
Social engineering: The "dark art"  04
Social engineering: The "dark art"
收藏 引用
1st Annual information Security Curriculum Development Conference, InfoSecCD 2004
作者: Thornburgh, Tim Kennesaw State University Department of Computer Science and Information Systems MS 1101 1000 Chastain Road KennesawGA30144 United States
The key to maintaining the confidentiality, integrity, and availability of an organizations information and information systems is controlling who accesses what information. This is accomplished by being able to ident... 详细信息
来源: 评论
Taxonomy of Proactive Detection Methods of Drunk Driving for Enhancing Traffic Safety  17
Taxonomy of Proactive Detection Methods of Drunk Driving for...
收藏 引用
17th IEEE International Symposium on Embedded Multicore/Many-core systems-on-Chip, MCSoC 2024
作者: Swiley, Richard Preston Alsulieman, Razan Sherif, Ahmed Elsersy, Mohamed Khalil, Kasem University of Southern Mississippi School of Computing Sciences and Computer Engineering MS United States Higher Colleges of Technology Computer and Information Systems Dept. AlAin Abu Dhabi United Arab Emirates University of Mississippi Electrical and Computer Engineering Department MS United States
Drunk driving continues to be a substantial public health issue, leading to a multitude of accidents and deaths on a global scale. Conventional techniques for identifying drunk driving, such as breathalyzers and field... 详细信息
来源: 评论
On the role of structural holes in requirements identification: An exploratory study on open-source software development
收藏 引用
ACM Transactions on Management information systems 2015年 第3期6卷 1–30页
作者: Bhowmik, Tanmay Niu, Nan Singhania, Prachi Wang, Wentao Department of Mathematics Computer Science and Information Systems Northwest Missouri State University Colden Hall 2305 800 University Drive MaryvilleMO64468 United States Department of Electrical Engineering and Computing Systems University of Cincinnati CincinnatiOH45220 United States Department of Computer Science and Engineering Mississippi State University Mississippi StateMS39762 United States
Requirements identification is a human-centric activity that involves interaction among multiple stakeholders. Traditional requirements engineering (RE) techniques addressing stakeholders' social interaction are m... 详细信息
来源: 评论
An adverbial lexicon for natural language processing systems
收藏 引用
International Journal of Lexicography 1994年 第3期7卷 197-221页
作者: Conlon, Sumali Pin-Ngern Evens, Martha Division of Management Information Systems Department of Management and Marketing University of Mississippi University MS 38677 United States Department of Computer Science Illinois Institute of Technology Chicago IL 60616 United States
The complexities of adverbs present an interesting challenge to computational linguistics. This paper describes our work in building an adverbial lexicon, which draws on the theoretical work of several linguists to he...
来源: 评论
Generalized evidence pre-propagated importance sampling for hybrid bayesian networks
Generalized evidence pre-propagated importance sampling for ...
收藏 引用
AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
作者: Yuan, Changhe Druzdzel, Marek J. Department of Computer Science and Engineering Mississippi State University Mississippi State MS 39762 Intelligent Systems Program School of Information Sciences University of Pittsburgh Pittsburgh PA 15260
In this paper, we first provide a new theoretical understanding of the Evidence Pre-propagated Importance Sampling algorithm (EPIS-BN) (Yuan & Druzdzel 2003;2006b) and show that its importance function minimizes t... 详细信息
来源: 评论
Assessing code decay: A data-driven approach  24
Assessing code decay: A data-driven approach
收藏 引用
24th International Conference on Software Engineering and Data Engineering, SEDE 2015
作者: Bandi, Ajay Allen, Edward B. Williams, Byron J. Math. Computer Science and Information Systems Northwest Missouri State University MaryvilleMO64468 United States Computer Science and Engineering Mississippi State University Mississippi StateMS39762 United States
Code decay is a gradual process that negatively impacts the quality of a software system. Developers need trusted measurement techniques to evaluate whether their systems have decayed. This paper aims to assess code d... 详细信息
来源: 评论
Remark on some π variants  3rd
Remark on some π variants
收藏 引用
3rd International Symposium on Dependable Software Engineering: Theories, Tools and Applications, SETTA 2017
作者: Xue, Jianxin Long, Huan Fu, Yuxi College of Computer and Information Engineering Shanghai Polytechnic University Shanghai China BASICS MOE-MS Key Laboratory for Intelligent Computing and Intelligent Systems Department of Computer Science Shanghai Jiao Tong University Shanghai China
Two π variants that restrict the use of received names are studied. For either variant the external characterization of the absolute equality is given using a family of bisimulations;the expressive completeness of th... 详细信息
来源: 评论