咨询与建议

限定检索结果

文献类型

  • 2,503 篇 会议
  • 1,888 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 4,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,751 篇 工学
    • 1,656 篇 计算机科学与技术...
    • 1,331 篇 软件工程
    • 543 篇 信息与通信工程
    • 422 篇 控制科学与工程
    • 389 篇 电子科学与技术(可...
    • 373 篇 电气工程
    • 303 篇 生物工程
    • 289 篇 光学工程
    • 242 篇 机械工程
    • 207 篇 生物医学工程(可授...
    • 193 篇 仪器科学与技术
    • 147 篇 化学工程与技术
    • 142 篇 动力工程及工程热...
    • 123 篇 交通运输工程
    • 104 篇 材料科学与工程(可...
    • 95 篇 土木工程
    • 89 篇 建筑学
  • 1,487 篇 理学
    • 691 篇 数学
    • 457 篇 物理学
    • 352 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 159 篇 化学
    • 151 篇 系统科学
  • 701 篇 管理学
    • 462 篇 管理科学与工程(可...
    • 248 篇 图书情报与档案管...
    • 189 篇 工商管理
  • 222 篇 医学
    • 187 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 99 篇 法学
    • 82 篇 社会学
  • 78 篇 经济学
  • 52 篇 农学
  • 41 篇 教育学
  • 14 篇 文学
  • 13 篇 军事学
  • 5 篇 艺术学

主题

  • 88 篇 feature extracti...
  • 82 篇 deep learning
  • 71 篇 computer science
  • 71 篇 training
  • 69 篇 data mining
  • 67 篇 computational mo...
  • 64 篇 optimization
  • 64 篇 semantics
  • 63 篇 accuracy
  • 62 篇 machine learning
  • 43 篇 object detection
  • 43 篇 protocols
  • 41 篇 mathematical mod...
  • 40 篇 reliability
  • 39 篇 wireless sensor ...
  • 39 篇 analytical model...
  • 38 篇 neural networks
  • 38 篇 predictive model...
  • 38 篇 data models
  • 36 篇 computer archite...

机构

  • 102 篇 national enginee...
  • 79 篇 school of comput...
  • 47 篇 national enginee...
  • 46 篇 school of comput...
  • 44 篇 school of comput...
  • 44 篇 school of cyber ...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 29 篇 school of comput...
  • 27 篇 huazhong univers...
  • 27 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 24 篇 state key labora...
  • 23 篇 college of compu...
  • 23 篇 department of co...

作者

  • 110 篇 hai jin
  • 96 篇 jin hai
  • 31 篇 xiaofei liao
  • 28 篇 shen linlin
  • 27 篇 yang yang
  • 24 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 hu shengshan
  • 21 篇 chen shu-ching
  • 21 篇 liao xiaofei
  • 18 篇 zhigang zhang
  • 17 篇 wang xingjun
  • 17 篇 deqing zou
  • 17 篇 zhang zhigang
  • 16 篇 zhang leo yu
  • 16 篇 ai bo
  • 16 篇 shyu mei-ling
  • 16 篇 xin xin
  • 15 篇 li peng
  • 15 篇 long zheng

语言

  • 4,050 篇 英文
  • 229 篇 其他
  • 115 篇 中文
  • 10 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=School of Computer Science and System Engineering"
4408 条 记 录,以下是3961-3970 订阅
排序:
An ontological conceptualization approach for awareness in domain-independent design groupware
An ontological conceptualization approach for awareness in d...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jesus Gallardo Ana I. Molina Crescencio Bravo Miguel A. Redondo Cesar A. Collazos School of Computer Science and Engineering Universidad de Castilla La Mancha Spain System Department Universidad del Cauca Colombia
One of the most important aspects of groupware systems is the concept of awareness, which refers to the perception and knowledge of the group and its activities. This paper extends a previously developed ontology-base... 详细信息
来源: 评论
A task-deployment model for the simulation of computer network attack and defense exercises
A task-deployment model for the simulation of computer netwo...
收藏 引用
1st International Conference on Information science and engineering, ICISE2009
作者: Yang, Yi Jiao, Jian Wang, Haiquan Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Software Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
The task-deployment models of simulation, is mainly used to solve the problem of the unreasonable tasks partition in the simulation of distributed computer network attack and defense exercises. This paper gives a task... 详细信息
来源: 评论
Skill rating by Bayesian inference
Skill rating by Bayesian inference
收藏 引用
IEEE Symposium on Computational Intelligence and Data Mining (CIDM)
作者: Giuseppe Di Fatta Guy McC. Haworth Kenneth W. Regan School of System Engineering University of Reading Reading Berkshire UK Department of Computer Science and Engineering State University of New York Buffalo NY USA
systems engineering often involves computer modelling the behaviour of proposed systems and their components. Where a component is human, fallibility must be modelled by a stochastic agent. The identification of a mod... 详细信息
来源: 评论
Using GPU to Accelerate Cache Simulation
Using GPU to Accelerate Cache Simulation
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Wan Han Gao Xiaopeng Wang Zhiqiang Li Yi State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beijing Aeronautics and Astronautics University Beijing China
Caches play a major role in the performance of high speed computer systems. Trace driven simulator is the most widely used method to evaluate cache architectures. However, as the cache design moves to more complicated... 详细信息
来源: 评论
Automatic Aurora Images Classification Algorithm Based on Separated Texture
Automatic Aurora Images Classification Algorithm Based on Se...
收藏 引用
2009 IEEE International Conference on Robotics and Biomimetics(2009 IEEE 机器人与仿生技术国际会议 ROBIO 2009)
作者: Rong Fu Yongjun Jian Jie Li Xinbo Gao School of Electronic Engineering Xidian University School of Computer ScienceXi'an Polytechnic Univ School of Electronic Engineering Xidian UniversityXi'an China Video & Image Processing System (VIPS) Lab School of Electronic Engineering Xidian University
In order to resolve the problem incurred by low efficient manual classification of tremendous aurora images, an automatic aurora images classification system for huge dataset application is proposed. First, static aur... 详细信息
来源: 评论
A Model for Web Services Composition Based on QoS and Providers' Benefit
A Model for Web Services Composition Based on QoS and Provid...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Zhenpeng Liu Junbao Liu Jimin Li Aiguo An Jianmin Xu School of mathematics & Computer Science Hebei University Baoding China Institute of System Engineering Tianjin University Tianjin China Hebei University Baoding Hebei CN School of Computer Science and Technology Tianjin University Tianjin China
To deal with the problems such as Web Services selection algorithm, availability of Web Services composition and QoS (Quality of Service) guarantee, presents a model for Web Services composition based on QoS and provi... 详细信息
来源: 评论
On the mobile wireless access via MIMO relays
On the mobile wireless access via MIMO relays
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Tae Hyun Kim Nitin H. Vaidya Young-Bae Ko Department of Electrical and Computer Engineering Coordinated Science Laboratory University of Illinois Urbana-Champaign IL USA Ubiquitous Networked System Laboratory School of Information and Computer Engineering Ajou University Suwon South Korea
While a network with stationary nodes can provide large capacity in many current wireless systems, a network with mobile users suffers from severe performance degradation. This happens due to quick channel variation a... 详细信息
来源: 评论
Model Checking Needham-Schroeder Security Protocol Based on Temporal Logic of Knowledge
Model Checking Needham-Schroeder Security Protocol Based on ...
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Xiangyu Luo Yan Chen Ming Gu Lijun Wu School of Software Key Laboratory of Security for Information System of Ministry of Education Tsinghua University Beijing China Department of Computer Science Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the... 详细信息
来源: 评论
Oscillation monitoring system using synchrophasors
Oscillation monitoring system using synchrophasors
收藏 引用
IEEE General Meeting Power& Energy Society
作者: Guoping Liu Vaithianathan Mani Venkatasubramanian James Ritchie Carroll School of Electrical Engineering and Computer Science (EECS) WSU Pullman WA USA Power System Operations Tennessee Valley Authority Chattanooga TN USA
With the growing implementation of synchrophasors or PMUs across the power grid, it is now possible to observe and analyze system-wide dynamic phenomena in real-time. At Washington State University (WSU), we have been... 详细信息
来源: 评论
Modelling and simulation of modified unipolar PWM scheme on a single phase DC-AC converter using PSIM
Modelling and simulation of modified unipolar PWM scheme on ...
收藏 引用
Student Conference on Research and Development (SCOReD)
作者: M. F. N. Tajuddin N. H. Ghazali T. C. Siong N. Ghazali School of Electrical System Engineering Universiti Malaysia Pedis Perlis Malaysia Faculty of Computer Science and Information Technology Universiti Teknologi Malaysia Johor Malaysia
Pulse-width modulation (PWM) of a signal or power source involves the modulation of its duty cycle, to either convey information over a communications channel or control the amount of power sent to a load. This paper ... 详细信息
来源: 评论