咨询与建议

限定检索结果

文献类型

  • 807 篇 会议
  • 499 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,307 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 517 篇 计算机科学与技术...
    • 427 篇 软件工程
    • 147 篇 信息与通信工程
    • 100 篇 生物工程
    • 88 篇 控制科学与工程
    • 78 篇 电气工程
    • 75 篇 生物医学工程(可授...
    • 60 篇 电子科学与技术(可...
    • 55 篇 光学工程
    • 36 篇 化学工程与技术
    • 35 篇 机械工程
    • 32 篇 安全科学与工程
    • 26 篇 材料科学与工程(可...
    • 25 篇 仪器科学与技术
  • 450 篇 理学
    • 183 篇 物理学
    • 182 篇 数学
    • 124 篇 生物学
    • 68 篇 统计学(可授理学、...
    • 40 篇 化学
    • 31 篇 系统科学
  • 230 篇 管理学
    • 124 篇 图书情报与档案管...
    • 116 篇 管理科学与工程(可...
    • 67 篇 工商管理
  • 111 篇 医学
    • 92 篇 临床医学
    • 81 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 34 篇 药学(可授医学、理...
  • 47 篇 教育学
    • 44 篇 教育学
  • 41 篇 法学
    • 37 篇 社会学
  • 31 篇 农学
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 4 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 30 篇 machine learning
  • 25 篇 feature extracti...
  • 24 篇 internet of thin...
  • 22 篇 data mining
  • 22 篇 training
  • 21 篇 accuracy
  • 21 篇 technological in...
  • 19 篇 covid-19
  • 17 篇 deep learning
  • 17 篇 students
  • 16 篇 computational mo...
  • 15 篇 computer science
  • 14 篇 education
  • 14 篇 predictive model...
  • 14 篇 visualization
  • 13 篇 neural networks
  • 13 篇 information tech...
  • 13 篇 real-time system...
  • 13 篇 semantics
  • 12 篇 computer archite...

机构

  • 16 篇 advanced institu...
  • 15 篇 faculty of commu...
  • 14 篇 applied computer...
  • 13 篇 faculty of infor...
  • 12 篇 king mongkut's u...
  • 12 篇 media technology...
  • 11 篇 advanced institu...
  • 11 篇 graduate program...
  • 11 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 king mongkut's u...
  • 9 篇 graduate program...
  • 9 篇 faculty of compu...
  • 9 篇 department of in...
  • 8 篇 health managemen...
  • 8 篇 tércio pacitti i...
  • 8 篇 information syst...
  • 8 篇 doctoral program...
  • 8 篇 bina nusantara u...
  • 8 篇 department of ma...

作者

  • 28 篇 gaol ford lumban
  • 26 篇 muhammad zarlis
  • 21 篇 zarlis muhammad
  • 15 篇 ganokratanaa thi...
  • 14 篇 herman mawengkan...
  • 14 篇 thittaporn ganok...
  • 14 篇 matsuo tokuro
  • 14 篇 oktavia tanty
  • 13 篇 efendi syahril
  • 13 篇 syahril efendi
  • 12 篇 ketcham mahasak
  • 12 篇 poltak sihombing
  • 12 篇 patiyuth pramkea...
  • 11 篇 niyato dusit
  • 11 篇 mawengkang herma...
  • 11 篇 hosoda takaaki
  • 11 篇 mahasak ketcham
  • 11 篇 pramkeaw patiyut...
  • 11 篇 du hongyang
  • 10 篇 kurniasih nuning

语言

  • 1,269 篇 英文
  • 24 篇 其他
  • 9 篇 中文
  • 5 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 土耳其文
检索条件"机构=Program in Computer and Information Technology"
1307 条 记 录,以下是1241-1250 订阅
排序:
Individual profile graphs for location management in PCS networks
Individual profile graphs for location management in PCS net...
收藏 引用
2005 International Conference on Wireless Networks, Communications and Mobile Computing
作者: Chuon, Chansophea Guha, Sumanta Mahtab Hossain, A.K.M. Computer Science and Information Management Program Asian Institute of Technology P.O. Box 4 Klong Luang Pathumthani 12120 Thailand
A user's profile, for the purpose of location management in a PCS network, is formalized as a subgraph of the network graph. This subgraph, the so-called individual profile graph (IPG), is determined after a perio... 详细信息
来源: 评论
Preprocessing convex polygons using range trees for recognition with few finger probes
收藏 引用
11th International Conference on computer Analysis of Images and Patterns, CAIP 2005
作者: Guha, Sumanta Khánh, Kiêu Trong Computer Science and Information Management Program Asian Institute of Technology P.O. Box 4 Klong Luang Pathumthani 12120 Thailand
The problem considered is that of recognizing if a given convex polygon comes from a known collection by applying probes. Existing approaches use a number of probes that is linear in the number of sides of the polygon... 详细信息
来源: 评论
MDAbench: A Tool for Customized Benchmark Generation Using MDA
MDAbench: A Tool for Customized Benchmark Generation Using M...
收藏 引用
OOPSLA'05 - 20th Annual ACM Conference on Object-Oriented programming, Systems, Languages, and Applications
作者: Zhu, Liming Liu, Yan Gorton, Ian Bui, Ngoc Bao School of Computer Science and Engineering University of Nsw Australia Empirical Software Engineering Program National Ict Australia Australia Faculty of Information Technology University of Technology Sydney Australia
Designing component-based application that meets performance requirements remains a challenging problem, and usually requires a prototype to be constructed to benchmark performance. Building a custom benchmark suite i... 详细信息
来源: 评论
Providing supplemental teaching materials in order based on the rough set theory
Providing supplemental teaching materials in order based on ...
收藏 引用
5th IEEE International Conference on Advanced Learning Technologies, ICALT 2005
作者: Cheng, Kun-Fa Chang, Alex Chang, Maiga Heh, Jia-Sheng Dept. of Information and Computer Engineering Chung-Yuan Christian Univ. Office of National Science and Technology Program for E-learning Taiwan Taiwan
Nowadays, Problem-Based Learning (PBL for short) is a popular teaching strategy for teachers. In the PBL environment students can learn how to solve the real life problems by discussing with their teammates and develo... 详细信息
来源: 评论
AGQ: A model of student question generation supported by one-on-one educational computing
AGQ: A model of student question generation supported by one...
收藏 引用
International Conference on computer Supported Collaborative Learning
作者: Chang, Sung-Bin Tung, Kuan-Jung Huang, Hsien-Ming Chan, Tak-Wai Department of Computer Science and Information Engineering National Central University Taiwan Degree Program of E-Learning National Chiao Tung University Taiwan Graduate Institute of Network Learning Technology National Central University Taiwan
One-on-one educational computing refers to I student I computing device, which means every student in a group uses a digital learning device. In this paper, we present a model of student question generation called AGQ... 详细信息
来源: 评论
Fast schemes for computing similarities between Gaussian HMMs and their applications in texture image classification
Fast schemes for computing similarities between Gaussian HMM...
收藏 引用
作者: Chen, Ling Man, Hong Department of Electrical and Computer Engineering Stevens Institute of Technology Castle Point on Hudson Hoboken NJ 07030 United States Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken NJ Department of Electrical and Computer Engineering Computer Engineering Undergraduate Program ECE Department NSA Center of Academic Excellence in Information Assurance School of Engineering IEEE SPS TC for Education
An appropriate definition and efficient computation of similarity (or distance) measures between two stochastic models are of theoretical and practical interest. In this work, a similarity measure, that is, a modified... 详细信息
来源: 评论
Relevancy based access control of versioned XML documents  05
Relevancy based access control of versioned XML documents
收藏 引用
SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
作者: Iwaihara, Mizuho Chatvichienchai, Somchai Anutariya, Chutiporn Wuwongse, Vilas Dept. Social Informatics Kyoto University Kyoto 606-8501 Japan Dept. Info.-Media Siebold University of Nagasaki Nagasaki 851-2195 Japan Computer Science Program Shinawatra University Pathumthani 12160 Thailand Computer Science and Information Management Program Asian Institute of Technology Pathumthani 12120 Thailand
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependenci... 详细信息
来源: 评论
Modeling resource management by agents interaction
收藏 引用
WSEAS Transactions on information Science and Applications 2005年 第1期2卷 48-54页
作者: Suesaowaluk, Poonphon Sadananda, Ramakoti Computer Science and Information Management Program School of Advanced Technologies Asian Institute of Technology Patumthani 12120 Thailand
A scenario is envisaged in which agents have tasks to perform and are in a position to exchange tasks to improve their performance, and thus perhaps affect the overall performance of the system. Our model uses two com... 详细信息
来源: 评论
An agent interaction model for performance enhancement of network system
收藏 引用
WSEAS Transactions on computers 2005年 第5期4卷 440-448页
作者: Suesaowaluk, Poonphon Sadananda, Ramakoti Computer Science and Information Management Program School of Advanced Technologies Asian Institute of Technology Patumthani 12120 Thailand
We envisage a scenario where a system of network computer initially with random loads, exchange jobs to balance load among themselves to enhance their individual performance and to provide augmented quality of service... 详细信息
来源: 评论
Improvement of detection ability according to optimum selection of measures based on statistical approach
收藏 引用
1st SKLOIS Conference on information Security and Cryptology, CISC 2005
作者: Mun, Gil-Jong Kim, Yong-Min Kim, DongKook Noh, Bong-Nam Interdisciplinary Program of Information Security Chonnam National University 500-757 Gwangju Korea Republic of Div. of Information Technology Yeosu National Unviersity 550-749 Yeosu Korea Republic of Div. of Electronics Computer and Information Engineering Chonnam National University 500-757 Gwangju Korea Republic of
A selection of useful measures and a generation of rules for detecting attacks from network data are very difficult. Expert's experiences are commonly required to generate the detection rules. If the rules are gen... 详细信息
来源: 评论