咨询与建议

限定检索结果

文献类型

  • 1,682 篇 会议
  • 1,064 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 2,756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,773 篇 工学
    • 1,289 篇 计算机科学与技术...
    • 1,076 篇 软件工程
    • 446 篇 信息与通信工程
    • 263 篇 控制科学与工程
    • 255 篇 生物工程
    • 180 篇 电气工程
    • 179 篇 生物医学工程(可授...
    • 168 篇 光学工程
    • 142 篇 电子科学与技术(可...
    • 131 篇 机械工程
    • 106 篇 网络空间安全
    • 92 篇 化学工程与技术
    • 78 篇 交通运输工程
    • 73 篇 仪器科学与技术
    • 65 篇 安全科学与工程
    • 63 篇 动力工程及工程热...
  • 946 篇 理学
    • 466 篇 数学
    • 297 篇 物理学
    • 276 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 95 篇 化学
    • 69 篇 系统科学
  • 511 篇 管理学
    • 308 篇 管理科学与工程(可...
    • 230 篇 图书情报与档案管...
    • 106 篇 工商管理
  • 144 篇 医学
    • 107 篇 临床医学
    • 104 篇 基础医学(可授医学...
    • 62 篇 公共卫生与预防医...
    • 62 篇 药学(可授医学、理...
  • 105 篇 法学
    • 92 篇 社会学
  • 45 篇 经济学
  • 39 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 8 篇 军事学
  • 7 篇 艺术学

主题

  • 97 篇 deep learning
  • 85 篇 accuracy
  • 72 篇 feature extracti...
  • 69 篇 training
  • 61 篇 machine learning
  • 57 篇 computational mo...
  • 54 篇 semantics
  • 51 篇 convolutional ne...
  • 48 篇 predictive model...
  • 47 篇 data models
  • 44 篇 real-time system...
  • 42 篇 artificial intel...
  • 40 篇 optimization
  • 35 篇 data mining
  • 30 篇 internet of thin...
  • 30 篇 forecasting
  • 29 篇 support vector m...
  • 29 篇 security
  • 28 篇 graph neural net...
  • 27 篇 education

机构

  • 70 篇 school of comput...
  • 58 篇 tianjin key labo...
  • 50 篇 department of co...
  • 48 篇 vivekananda glob...
  • 44 篇 west university ...
  • 44 篇 maharishi school...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 institute of phy...
  • 39 篇 ochanomizu unive...

作者

  • 43 篇 zhang yanning
  • 41 篇 xia yong
  • 37 篇 m. lu
  • 37 篇 liu qi
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 34 篇 chen enhong
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo

语言

  • 2,504 篇 英文
  • 215 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Application and Technology"
2756 条 记 录,以下是2581-2590 订阅
排序:
Research of education evaluation information mining technology based on analytical hierarchy process (AHP) and Genetic Algorithm (GA)
Research of education evaluation information mining technolo...
收藏 引用
2010 3rd International Conference on Advanced computer Theory and Engineering, ICACTE 2010
作者: Yu, Junle Sun, Baoshan College of Application Technology Tianjin Polytechnic University Tianjin China School of Computer Science and Software Engineering Tianjin Polytechnic University Tianjin China
This paper has surveyed the education evaluation method and technology both at home and abroad, and studied on the question of education evaluation information's mining. In view of the evaluation index system of h... 详细信息
来源: 评论
A user model based on mobile environment
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2011年 第SUPPL. 2期22卷 120-128页
作者: Du, Yi Tian, Feng Dai, Guo-Zhong Wang, Feng Wang, Hong-An Intelligence Engineering Laboratory Institute of Software Chinese Academy of Sciences Beijing 100190 China School of Information Science and Engineering Graduate University Chinese Academy of Sciences Beijing 100190 China Yunnan Provincial Key Laboratory of Computer Application Kunming University of Science and Technology Kunming 650500 China
It's very important to help developers design user interface for application in an intelligent user interface. Nowadays, the number of mobile based applications increases greatly, but there are no proper user mode... 详细信息
来源: 评论
A new Electromagnetism-like algorithm with Chaos optimization
A new Electromagnetism-like algorithm with Chaos optimizatio...
收藏 引用
International Conference on Computational Aspects of Social Networks, CASoN'10
作者: Wang, Qing Hua Zeng, Jian Chao School of Electronic and Information Engineering Taiyuan University of Science and Technology Taiyuan China Division of System Simulation and Computer Application WeiPing Song School of Electronic and Information Engineering Taiyuan University of Science and Technology Taiyuan China
The Electromagnetism-like (EM) algorithmis a population-based stochastic global optimization algorithm that uses an attraction- repulsion mechanism to move particles toward optimality. A local search is an important f... 详细信息
来源: 评论
Discussion on the method of basic computer education in characteristic university
Discussion on the method of basic computer education in char...
收藏 引用
2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies, EDT 2010
作者: Wei, Fang School of Computer and Software Nanjing University of Information Science and Technology Nanjing China JiangSu Province Support Software Engineering RandD Center for Information Technology Application in Enterprise Suzhou China
The situation and questions of basic computer education in characteristics university are discussed firstly. Then the reform and construction of university computer-Based teaching are proposed. The paper has analyzed ... 详细信息
来源: 评论
Parameter learning for multi-factors of entity answer extracting
Parameter learning for multi-factors of entity answer extrac...
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Zong, Huanyun Yu, Zhengtao Mao, Cunli Zou, Junjie Guo, Jianyi School of Information Engineering and Automation Kunming University of Science and Technology Kunming China Institute of Intelligent Information Processing Computer Technology Application Key Laboratory of Yunnan Province Kunming China
Entity extraction involves multi-factors, and the different factor has an impact on the answer in varying degrees, this paper presents a machine learning approach to parameter learning for entity answer. Firstly, in v... 详细信息
来源: 评论
An approach to the interpretation of aerial image
An approach to the interpretation of aerial image
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Li, Ling-Ling Jin, Tai-Song Shi, Hua Li, Cui-Hua Department of Computer Science and Application Zhengzhou Institute of Aeronautical Industry Management Zhengzhou 450015 China School of Information Science and Technology Xiamen University Fujian 361005 China
This paper presents an aerial image parsing approach. Firstly, scene categories of aerial image is extracted based on global feature-Spatial Envelope in the top-down step;secondly, the candidate proposals of object ca... 详细信息
来源: 评论
New approach to path explosion problem of symbolic execution
New approach to path explosion problem of symbolic execution
收藏 引用
International Conference on Pervasive Computing, Signal Processing and applications
作者: Xu, Xiao Zhang, Xiao-Song Li, Xiong-Da School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Chengdu Informationization Technique Application Development Center Chengdu 610017 China
This paper is dedicated to the study of Symbolic Execution and improves the core algorithm of it using Heuristic learning, search and Function Abstraction to effectively address the path explosion problem, which will ... 详细信息
来源: 评论
Entity answer extraction of web table
Entity answer extraction of web table
收藏 引用
2010 7th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2010
作者: Xu, Yangbo Yu, Zhengtao Mao, Cunli Wang, Yasheng Guo, Jianyi School of Information Engineering and Automation Kunming University of Science and Technology Kunming 650051 China Institute of Intelligent Information Processing Computer Technology Application Key Laboratory of Yunnan Province Kunming 650051 China
This paper presents an entity answer extraction method based on list web table. Firstly, extract table from page using the features of web page table and label, segment the table that includes the potential entity ans... 详细信息
来源: 评论
Self-adapting semantic sensitivities for Semantic Similarity based Crossover
Self-adapting semantic sensitivities for Semantic Similarity...
收藏 引用
2010 6th IEEE World Congress on Computational Intelligence, WCCI 2010 - 2010 IEEE Congress on Evolutionary Computation, CEC 2010
作者: Uy, Nguyen Quang McKay, Bob O'Neill, Michael Hoai, Nguyen Xuan Natural Computing Research and Application Group University College Dublin Ireland School of Computer Science and Engineering Seoul National University Korea Republic of School of Information Technology Hanoi University Viet Nam
This paper presents two methods for self-adapting the semantic sensitivities in a recently proposed semantics-based crossover: Semantic Similarity based Crossover (SSC) [1]. The first self-adaptation method is inspire... 详细信息
来源: 评论
Provably secure certificateless authenticated key agreement protocol in the standard model
Provably secure certificateless authenticated key agreement ...
收藏 引用
International Conference on Pervasive Computing, Signal Processing and applications
作者: Wang, Xiaofen Li, Xiongda School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China National Teaching Center of Computer Experiment University of Electronic Science and Technology of China Chengdu 611731 China Chengdu Information Technology Application Development Center Chengdu 610072 China
Inspired by the certificateless public key encryption scheme proposed by Jong et al, we present a new certificateless authenticated key agreement protocol (CLAK). It is provably secure in the standard model. CLAK prot... 详细信息
来源: 评论