咨询与建议

限定检索结果

文献类型

  • 1,437 篇 会议
  • 1,295 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 2,768 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,786 篇 工学
    • 1,155 篇 计算机科学与技术...
    • 938 篇 软件工程
    • 337 篇 信息与通信工程
    • 207 篇 电气工程
    • 186 篇 控制科学与工程
    • 175 篇 生物工程
    • 171 篇 电子科学与技术(可...
    • 149 篇 仪器科学与技术
    • 131 篇 光学工程
    • 119 篇 生物医学工程(可授...
    • 110 篇 机械工程
    • 92 篇 化学工程与技术
    • 84 篇 核科学与技术
    • 78 篇 土木工程
    • 76 篇 动力工程及工程热...
    • 70 篇 安全科学与工程
    • 65 篇 建筑学
    • 59 篇 航空宇航科学与技...
  • 1,026 篇 理学
    • 407 篇 数学
    • 397 篇 物理学
    • 202 篇 生物学
    • 124 篇 化学
    • 121 篇 统计学(可授理学、...
    • 103 篇 地球物理学
    • 72 篇 系统科学
  • 426 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 113 篇 工商管理
  • 126 篇 医学
    • 115 篇 临床医学
    • 86 篇 基础医学(可授医学...
  • 64 篇 法学
  • 29 篇 经济学
  • 29 篇 教育学
  • 27 篇 农学
  • 11 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 106 篇 hadron colliders
  • 55 篇 software
  • 54 篇 computer science
  • 53 篇 computer archite...
  • 52 篇 training
  • 49 篇 deep learning
  • 49 篇 semantics
  • 47 篇 computational mo...
  • 43 篇 machine learning
  • 40 篇 software enginee...
  • 40 篇 feature extracti...
  • 34 篇 accuracy
  • 33 篇 laboratories
  • 32 篇 wireless sensor ...
  • 32 篇 hardware
  • 31 篇 optimization
  • 29 篇 neutrons
  • 28 篇 w & z bosons
  • 28 篇 application soft...
  • 27 篇 monitoring

机构

  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 149 篇 yerevan physics ...
  • 148 篇 university of sp...
  • 147 篇 universidad iber...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 144 篇 academy of scien...
  • 140 篇 university of de...
  • 138 篇 università di to...
  • 138 篇 imperial college...
  • 138 篇 zhejiang univers...
  • 138 篇 rwth aachen univ...
  • 135 篇 infn sezione di ...
  • 130 篇 department of ph...
  • 130 篇 department of ph...
  • 123 篇 infn sezione di ...
  • 122 篇 università di ca...

作者

  • 129 篇 ardid m.
  • 128 篇 ferrara g.
  • 111 篇 g. tonelli
  • 111 篇 d. barney
  • 111 篇 l. valencia palo...
  • 111 篇 t. liu
  • 111 篇 c. hensel
  • 111 篇 a. garcia-bellid...
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 111 篇 n. colino
  • 111 篇 f. moortgat
  • 111 篇 b. clerbaux
  • 111 篇 g. sultanov
  • 111 篇 m. a. ciocci
  • 111 篇 k. lamichhane
  • 111 篇 s. maselli
  • 111 篇 e. migliore
  • 110 篇 a. babaev
  • 110 篇 v. karjavine

语言

  • 2,310 篇 英文
  • 411 篇 其他
  • 44 篇 中文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Research Institute for Computer Architecture and Software Technology"
2768 条 记 录,以下是2421-2430 订阅
排序:
Design of quality ensuing, real-time WLAN tele-monitoring healthcare system
Design of quality ensuing, real-time WLAN tele-monitoring he...
收藏 引用
8th World Wireless Congress, WWC 2007
作者: Khan, Noman Rajput, A.Q. Khan Chowdhry, B.S. Arain, Adnan A. Bio-Medical Engineering Research Laboratory Department of Electronics Telecommunication and Bio-Medical Engineering Department of Computer Systems and Software Engineering Institute of Information and Technology Mehran University of Engineering and Technology Pakistan
The explosive and unprecedented growth with new innovation in wireless technology has opened up a new window for life-saving telemedicine services. After every couple of weeks a competitive solution is provided with t... 详细信息
来源: 评论
An LSB data hiding technique using prime numbers
An LSB data hiding technique using prime numbers
收藏 引用
3rd Internationl Symposium on Information Assurance and Security, IAS 2007
作者: Dey, Sandipan Abraham, Ajith Sanyal, Sugata Anshin Software Private Limited Kolkata - 700091 India Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology Norway School of Technology and Computer Science Tata Institute of Fundamental Research India
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically model and generalize our approach. Then... 详细信息
来源: 评论
Construction of the Corpus of Spontaneous Japanese and annotation techniques
收藏 引用
Journal of the National institute of Information and Communications technology 2007年 第3期54卷 5-14页
作者: Uchimoto, Kiyotaka Isahara, Hitoshi Takanashi, Katsuya Takeuchi, Kazuhiro Nobata, Chikashi Morimoto, Ikuyo Yamada, Atsushi Computational Linguistic Group Knowledge Creating Communication Research Center Academic Center for Computing and Media Studies Kyoto University School of Computer Science University of Manchester Advanced Software Technology and Mechatronics Research Institute of Kyoto Dept. of Engineering Informatics Osaka Elmectro-Communication University School of Low and Politics Kwansei Gakuin University
This paper describes annotations for the Corpus of Spontaneous Japanese. The information we annotated to the corpus includes morphemes, clause units, dependency structures, summaries, and discourse structures. They ar... 详细信息
来源: 评论
Common substructure extraction of proteins by geometric invariants
Common substructure extraction of proteins by geometric inva...
收藏 引用
10th International Conference on computer-Aided Design and computer Graphics
作者: Xu, Dong Li, Hua Gu, Tongjun Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Academy of Sciences Center for Systems Biology Institute of Biophysics Chinese Academy of Sciences Graduate University Chinese Academy of Sciences
Structure alignment could help to find shape similarities between proteins and guide structure classification and fold recognition. Common substructure detection and extraction are especially important, for which coul... 详细信息
来源: 评论
3-D projective moment invariants
收藏 引用
Journal of Information and Computational Science 2007年 第2期4卷 821-828页
作者: Xu, Dong Li, Hua Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Acad. of Sci. Beijing 100080 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Acad. of Sci. Beijing 100080 China National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Acad. of Sci. Beijing 100080 China Graduate University Chinese Acad. of Sci. Beijing 100080 China
2-D projective moment invariants were firstly proposed by Suk and Flusser in [12]. We point out here that there is a useless projective moment invariant which is equivalent to zero in their paper. 3-D projective momen... 详细信息
来源: 评论
Project management maturity models: towards best practices for virtual teams
Project management maturity models: towards best practices f...
收藏 引用
IEEE International Conference on Engineering Management (EMC)
作者: Martin Pazderka Thomas Grechenig Institute of Computer Aided Automation Research Group for Industrial Software University of Technology Vienna Austria
Within the project management community, the concept of project management maturity models has recently been receiving a lot of business and research attention. Although the structure of most models has now been well ... 详细信息
来源: 评论
BEESAT: A Pico Satellite for the On Orbit Verification of Micro Wheels
BEESAT: A Pico Satellite for the On Orbit Verification of Mi...
收藏 引用
International Conference on Recent Advances in Space Technologies (RAST)
作者: Hakan Kayal Frank Baumann Klaus Briess Sergio Montenegro Institute of Aeronautics and Astronautics Department of Astronautics Technical University Berlin Berlin Germany Frauenhofer Institute Computer Architecture and Software Technology Berlin Germany
The Technical University of Berlin has the objective to develop such components, which are not available yet. The first device under development is the so called "micro wheel", which is designed to be used i... 详细信息
来源: 评论
Biometrie certificate based biometrie digital key generation with protection mechanism
Biometrie certificate based biometrie digital key generation...
收藏 引用
Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007
作者: Chung, Yunsu Moon, Kiyoung Lee, Hyung-Woo Biometrics Technology Research Team Electronics and Telecommunications Research Institute 161 Gajeong-dong Yuseong-gu Daejeon 305-700 Korea Republic of Div. Computer Information of Software Hanshin University 411 Yangsan-dong Osan Gyunggi 447-791 Korea Republic of
The binding of the user's identity and biometric feature data to an entity is provided by an authority through a digitally signed data structure called a Biometrie Certificate. Therefore, the main goal (or contrib... 详细信息
来源: 评论
An architecture to Support Multi-node Downloading of Distributed Virtual Environment on Grid
An Architecture to Support Multi-node Downloading of Distrib...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Yuying Wang Guanghua Lu Jinyuan Jia Hongji Yang Software Research Institute and the Department of Computer Science and Technology Zhuhai College Jilin University China Department of Software Engineering De Montfort University UK Software Research Institute Zhuhai College Jilin University China
We propose a three-layer framework and a Globus-based architecture of grid-enabled multi-node downloading mechanism to facilitate a flexible and scalable downloading large scale distributed virtual environments. In ou... 详细信息
来源: 评论
Server Virtualization in Intelligent Traffic Control System
Server Virtualization in Intelligent Traffic Control System
收藏 引用
International Symposium on Logistics and Industrial Informatics, LINDI
作者: Jozsef Tick Tamas Tiszai Budapest Technology Institute of Software Engineering Budapest Hungary Network Security Department Computer and Automation Research Institute Budapest Hungary
This paper gives an insight into the technological development of the virtual machine, briefly presents the virtualisation solutions and highlights some possible application fields of virtual machines focusing on inte... 详细信息
来源: 评论