咨询与建议

限定检索结果

文献类型

  • 1,859 篇 会议
  • 1,555 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 3,452 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,274 篇 工学
    • 1,744 篇 计算机科学与技术...
    • 1,425 篇 软件工程
    • 524 篇 信息与通信工程
    • 287 篇 控制科学与工程
    • 242 篇 生物工程
    • 240 篇 电气工程
    • 173 篇 光学工程
    • 163 篇 机械工程
    • 157 篇 生物医学工程(可授...
    • 152 篇 电子科学与技术(可...
    • 95 篇 化学工程与技术
    • 94 篇 安全科学与工程
    • 84 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 80 篇 仪器科学与技术
    • 78 篇 交通运输工程
    • 72 篇 建筑学
  • 1,035 篇 理学
    • 583 篇 数学
    • 272 篇 生物学
    • 258 篇 物理学
    • 182 篇 统计学(可授理学、...
    • 103 篇 系统科学
    • 97 篇 化学
  • 690 篇 管理学
    • 444 篇 管理科学与工程(可...
    • 297 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 145 篇 医学
    • 132 篇 临床医学
    • 101 篇 基础医学(可授医学...
    • 59 篇 药学(可授医学、理...
  • 94 篇 法学
    • 65 篇 社会学
  • 59 篇 教育学
  • 58 篇 经济学
  • 32 篇 农学
  • 12 篇 文学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学

主题

  • 103 篇 feature extracti...
  • 94 篇 deep learning
  • 87 篇 training
  • 77 篇 computational mo...
  • 74 篇 semantics
  • 71 篇 software enginee...
  • 63 篇 machine learning
  • 62 篇 computer science
  • 60 篇 accuracy
  • 58 篇 data mining
  • 49 篇 software
  • 48 篇 predictive model...
  • 44 篇 data models
  • 43 篇 cloud computing
  • 42 篇 internet of thin...
  • 42 篇 image segmentati...
  • 42 篇 educational inst...
  • 42 篇 convolution
  • 42 篇 optimization
  • 42 篇 convolutional ne...

机构

  • 83 篇 college of compu...
  • 64 篇 school of comput...
  • 56 篇 state key labora...
  • 46 篇 school of comput...
  • 46 篇 school of inform...
  • 44 篇 school of comput...
  • 42 篇 school of comput...
  • 42 篇 faculty of compu...
  • 41 篇 university of ch...
  • 38 篇 software enginee...
  • 37 篇 state key labora...
  • 31 篇 school of comput...
  • 30 篇 institute of com...
  • 29 篇 school of softwa...
  • 29 篇 school of comput...
  • 29 篇 national enginee...
  • 27 篇 school of comput...
  • 27 篇 institute of sof...
  • 26 篇 school of softwa...
  • 26 篇 school of comput...

作者

  • 27 篇 shen linlin
  • 27 篇 quanyin zhu
  • 24 篇 shi yinghuan
  • 23 篇 gao yang
  • 18 篇 wang wei
  • 18 篇 liu wei
  • 16 篇 gao shangbing
  • 16 篇 tao dacheng
  • 16 篇 du bo
  • 16 篇 zhang jian
  • 15 篇 wang zheng
  • 14 篇 wei sun
  • 14 篇 xiaorui zhang
  • 14 篇 qi lei
  • 13 篇 xiang-yang li
  • 13 篇 chen bin
  • 13 篇 tian chunwei
  • 12 篇 wang hui
  • 12 篇 hu ruimin
  • 12 篇 yu zitong

语言

  • 2,808 篇 英文
  • 581 篇 其他
  • 72 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 2 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Software Engineering Huaiyin Institute of Technology"
3452 条 记 录,以下是3031-3040 订阅
排序:
PBTrust: A Priority-Based Trust model for service selection in general service-oriented environments
PBTrust: A Priority-Based Trust model for service selection ...
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Su, Xing Zhang, Minjie Mu, Yi Sim, Kwang Mong School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia Gwanju Institute of Science and Technology Korea Republic of
How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-... 详细信息
来源: 评论
Reliability demonstration testing method for embedded operating systems
Reliability demonstration testing method for embedded operat...
收藏 引用
2nd International Conference on software engineering and Data Mining, SEDM 2010
作者: Chen, Hui Qin, Zhidong Software Engineering Institute East China Normal University Shanghai China School of Computer Science and Technology Donghua University Shanghai China
The reliability target is becoming higher and higher for modern embedded operating systems with their being extensively used in safety-critical situations. In order to solve the problem that the fixed duration testing... 详细信息
来源: 评论
Formal definition method of denotational semantics and functions for PLC program language
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and technology) 2011年 第SUPPL. 1期42卷 1107-1113页
作者: Xiao, Li-Tian Gu, Ming Sun, Jia-Guang National Laboratory for Information Science and Technology School of Software Tsinghua University Beijing 100084 China Key Laboratory for Information System Security of Ministry of Education Department of Computer Science and Technology Tsinghua University Beijing 100084 China Beijing Special Engineering Design and Research Institute Beijing 100028 China
In order to verify the correctness of PLC programs by formal methods, the definition of denotational semantics on PLC program language was studied to achieve PLC programs modeling and model checking. Based on the exte... 详细信息
来源: 评论
A secure group key agreement scheme for mobile ad hoc networks based on identity tree
A secure group key agreement scheme for mobile ad hoc networ...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Li-qing Chen Shan-yue Bu School of Computer Engineering Huaiyin Institute of Technology Huai'an Jiangsu China
Designing efficient and secure group key agreement scheme is one of the key issues in mobile ad hoc networks. In this paper, a novel and feasible group key agreement scheme based on identity is proposed. With this sch... 详细信息
来源: 评论
Practice and Research on Bilingual Teaching in the Course Operating Systems
Practice and Research on Bilingual Teaching in the Course Op...
收藏 引用
The 5th International Conference on computer Science & Education(第五届国际计算机新技术与教育学术研讨会 ICCSE'10)
作者: CHEN Li-qing YAN Yun-yang School of Computer Engineering Huaiyin Institute of Technology Huai’an of Jiangsu China
Taking the Chinese-Singapore cooperation project as example, combine the feedback from questionnaires and interviews of students about the bilingual teaching using teaching material in English in the course Operating ... 详细信息
来源: 评论
Attribute-based signature and its applications  10
Attribute-based signature and its applications
收藏 引用
5th ACM Symposium on Information, computer and Communication Security, ASIACCS 2010
作者: Li, Jin Au, Man Ho Susilo, Willy Xie, Dongqing Ren, Kui Department of Electrical and Computer Engineering Illinois Institute of Technology IL United States School of Computer Science and Software Engineering University of Wollongong Australia Department of Computer Science Guangzhou University China Guangzhou University China
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to the identity of the individual who si... 详细信息
来源: 评论
Medical image retrieval with query-dependent feature fusion based on one-class SVM
Medical image retrieval with query-dependent feature fusion ...
收藏 引用
International Conference on Computational Science and engineering
作者: Huang, Yonggang Zhang, Jun Zhao, Yongwang Ma, Dianfu Institute of Advanced Computing Technology BeiHang University China National Lab. of Software Development Environment BeiHang University China School of Computer Science and Software Engineering University of Wollongong Australia
Due to the huge growth of the World Wide Web, medical images are now available in large numbers in online repositories, and there exists the need to retrieval the images through automatically extracting visual informa... 详细信息
来源: 评论
Modeling BPEL and BPEL4People with a timed interruptable π-calculus
Modeling BPEL and BPEL4People with a timed interruptable π-...
收藏 引用
34th Annual IEEE International computer software and Applications Conference, COMPSAC 2010
作者: Jin, Wei Wang, Hanpin Cao, Yongzhi Wang, Zizhen Ban, Xiaojuan Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Ministry of Education University of Science and Technology Beijing Beijing China Information Engineering School University of Science and Technology Beijing Beijing China
Business Processing Execution Language (BPEL) and BPEL for People (BPEL4People) are two web services orchestration languages for composing web services. To describe formally their semantics, we introduce the πit-calc... 详细信息
来源: 评论
Coding gabor features for multi-modal biometrics
Coding gabor features for multi-modal biometrics
收藏 引用
Chinese Conference on Pattern Recognition
作者: Shen, Linlin Ji, Zhen Li, Yuwen Bai, Li Shenzhen Key Laboratory of Embedded System Design School of Computer Science and Software Engineering Shenzhen University China Shenzhen Institute of Information Technology Shenzhen China School of Computer Science University of Nottingham United Kingdom
Although biometrics technology has progressed substantially, its performance is still to be improved for real applications. This paper aims to improve the accuracy of personal identification, when only single sample i... 详细信息
来源: 评论
Access control mechanism based on trust quantification
Access control mechanism based on trust quantification
收藏 引用
IEEE International Conference on Social Computing
作者: Ma, Shunan He, Jingsha Shuai, Xunbo Wang, Zhao College of Computer Science and Technology Beijing University of Technology Beijing China School of Software Engineering Beijing University of Technology Beijing China Research Institute of Petroleum Exploration and Development PetroChina Beijing China
In an open distributed environment, protection of sensitive files and data becomes more difficult. Traditional access control mechanisms are not suitable for such dynamic environment. Trust can be an effective approac... 详细信息
来源: 评论