咨询与建议

限定检索结果

文献类型

  • 1,688 篇 会议
  • 1,063 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 2,761 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,770 篇 工学
    • 1,282 篇 计算机科学与技术...
    • 1,068 篇 软件工程
    • 443 篇 信息与通信工程
    • 260 篇 控制科学与工程
    • 255 篇 生物工程
    • 179 篇 生物医学工程(可授...
    • 178 篇 电气工程
    • 161 篇 光学工程
    • 142 篇 电子科学与技术(可...
    • 129 篇 机械工程
    • 106 篇 网络空间安全
    • 89 篇 化学工程与技术
    • 78 篇 交通运输工程
    • 70 篇 仪器科学与技术
    • 65 篇 动力工程及工程热...
    • 65 篇 安全科学与工程
  • 936 篇 理学
    • 462 篇 数学
    • 292 篇 物理学
    • 276 篇 生物学
    • 170 篇 统计学(可授理学、...
    • 93 篇 化学
    • 69 篇 系统科学
  • 507 篇 管理学
    • 306 篇 管理科学与工程(可...
    • 228 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 144 篇 医学
    • 107 篇 临床医学
    • 104 篇 基础医学(可授医学...
    • 62 篇 公共卫生与预防医...
    • 62 篇 药学(可授医学、理...
  • 104 篇 法学
    • 91 篇 社会学
  • 45 篇 经济学
  • 39 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 8 篇 军事学
  • 7 篇 艺术学

主题

  • 97 篇 deep learning
  • 88 篇 accuracy
  • 74 篇 feature extracti...
  • 69 篇 training
  • 61 篇 machine learning
  • 58 篇 computational mo...
  • 54 篇 semantics
  • 51 篇 convolutional ne...
  • 48 篇 predictive model...
  • 47 篇 real-time system...
  • 47 篇 data models
  • 42 篇 artificial intel...
  • 41 篇 optimization
  • 35 篇 data mining
  • 30 篇 internet of thin...
  • 30 篇 forecasting
  • 29 篇 support vector m...
  • 29 篇 security
  • 27 篇 education
  • 27 篇 robustness

机构

  • 73 篇 school of comput...
  • 60 篇 tianjin key labo...
  • 50 篇 department of co...
  • 48 篇 vivekananda glob...
  • 44 篇 west university ...
  • 44 篇 maharishi school...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 39 篇 ochanomizu unive...
  • 39 篇 graduate school ...

作者

  • 44 篇 zhang yanning
  • 40 篇 xia yong
  • 37 篇 m. lu
  • 37 篇 liu qi
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 34 篇 chen enhong
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo

语言

  • 2,305 篇 英文
  • 420 篇 其他
  • 46 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Application and Technology"
2761 条 记 录,以下是2491-2500 订阅
排序:
Methods of Ranking usability attributes — A comparative study
Methods of Ranking usability attributes — A comparative stu...
收藏 引用
CSI International Conference on Software Engineering (CONSEG)
作者: K. Paithankar M. Ingle Department of MCA Indore Institute of Computer Application Indore India School of Computer Science and Information Technology DAVV Indore India
The impact/role of each usability attribute may vary during the usability evaluation process and has to be quantitatively evaluated to decide relative importance of each attribute in development process. Thus, to rank... 详细信息
来源: 评论
A dynamically scalable model for Cloud Computing based on graph structure
收藏 引用
International Journal of Advancements in Computing technology 2012年 第17期4卷 125-134页
作者: Liang, Kai-jian Liang, Quan School of Application Technology Hunan Institute of Engineering Xiangtan 411104 China Department of Computer and Information Science Fujian University of Technology Fuzhou 350108 China
To make full use of the technological superiority of Cloud Computing, develop and push forward the application of cloud computing technology, the framework and feature of cloud computing environments should be intensi... 详细信息
来源: 评论
An effective wireless MAC protocol based on improved binary exponential backoff algorithm
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its applications 2012年 第11期6卷 223-229页
作者: Yin, Kai School of Computer and Information Engineering Changzhou Institute of Technology Key Laboratory of Changzhou Software Technology Research and Application Chang Zhou Jiang Su China
In Wireless Sensor Network (WSN), the ability to avoid collision directly impacts on node energy consumption and network performance. Based on introduction of CSMA/CA protocol, the paper laid emphasis on shortcoming o... 详细信息
来源: 评论
A dynamic method of model constructing for Cloud Computing
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第17期4卷 174-182页
作者: Liang, Kai-jian Liang, Quan School of Application Technology Hunan Institute of Engineering Xiangtan 411104 China Department of Computer and Information Science Fujian University of Technology Fuzhou 350108 China
To make full use of the technological superiority of Cloud Computing, and develop and push forward the application of cloud computing technology, the paper put forward a method to construct a model called CCM (Cloud C... 详细信息
来源: 评论
A process distance metric based on alignment of process structure trees
A process distance metric based on alignment of process stru...
收藏 引用
SenDe, IDP, IEKB, MBC, International Workshops, APWeb 2012
作者: Fu, Xiaodong Yue, Kun Zou, Ping Wang, Feng Ji, Kaifan Yunnan Provincial Key Lab. of Computer Technology Application Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming 650500 China School of Information Science and Engineering Yunnan University Kunming 650091 China Faculty of Management and Economics Kunming University of Science and Technology Kunming 650093 China
For various applications in today's service-oriented enterprise computing systems, such as process-oriented service discovering or clustering, it is necessary to measure the distance between two process models. In... 详细信息
来源: 评论
3D model reconstruction from video recorded with a compact camera
3D model reconstruction from video recorded with a compact c...
收藏 引用
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012
作者: Gao, Pengqi Xiaozhong Guo Datao Yang Ming Shen Zhao, You Xu, Zunyi Zhongwei Fan Jin Yu Yunfeng Ma Center for Research and Application of Space Debris National Astronomical Observatories Chinese Academy of Sciences Beijing China School of Computer Science and Technology Shandong Jianzhu University Qingdao China Academy of Opto-electronics Chinese Academy of Sciences Beijing China
3d model plays an important role in modern visualization applications. Image or video based 3d model reconstruction is being more and more widely used. In this paper, the way to reconstruct a 3d model from video colle... 详细信息
来源: 评论
Research on intrusion detection for the internet of things based on clone selection principle
Research on intrusion detection for the internet of things b...
收藏 引用
2012 International Conference on Materials Engineering and Automatic Control, ICMEAC 2012
作者: Liu, Caiming Zhang, Yan Chen, Run Xiao, Luxin Zhang, Jiandong Laboratory of Intelligent Information Processing and Application Leshan Normal University Leshan China School of Information Science and Technology Southwest Jiaotong University Chengdu China School of Computer Science Leshan Normal University Leshan China Teaching Affairs Office Leshan Normal University Leshan China
The fast development of the Internet of Things (IoT) makes its security problems appear gradually. It is urgent to study the intrusion detection technology for IoT security threats. An intrusion detection method based... 详细信息
来源: 评论
Deciding query entailment for fuzzy description logic knowledge bases: The f-SH family
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2012年 第4期35卷 767-785页
作者: Cheng, Jing-Wei Ma, Zong-Min Yan, Li Zhang, Fu Institute of Computer Application Technology College of Information Science and Engineering Northeastern University Shenyang 110819 China Institute of Software Engineering School of Software Northeastern University Shenyang 110819 China
Recently, the rapid evolution of large-scale domain ontologies brought about higher requirements for data access in the Semantic Web community. The basic reasoning services for ontologies, however, cannot meet the nee... 详细信息
来源: 评论
Short-length rateless codes based on random matrices and its application in storage systems
收藏 引用
Journal of Convergence Information technology 2012年 第23期7卷 256-263页
作者: Yilong, Xiao Mingyu, Fan Xiaojing, Wang Haibo, Jiang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Chengdu Institute of Computer Application Chinese Academy of Sciences Chengdu 610041 China
Classic rateless codes, such as Raptor codes and LT codes are long codes. But special applications such as data storage systems usually require short-length codes (a few hundred in size). In response to this demand, w... 详细信息
来源: 评论
Research of school-Enterprise Research Evaluation Information Mining technology Based on Analytical Hierarchy Process (AHP) and Genetic Algorithm (GA)
Research of School-Enterprise Research Evaluation Informatio...
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Ben Song Junle Yu School of Computer Scientific and Software Tianjin Polytechnic University Tianjin China School of Application Technology Tianjin Polytechnic University Tianjin China
This paper describes the research development levels of home and abroad, and makes a mining research about Chinese school-enterprise research evaluation information. In consideration of the evaluation index system of ... 详细信息
来源: 评论