咨询与建议

限定检索结果

文献类型

  • 1,838 篇 会议
  • 1,534 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 3,410 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,247 篇 工学
    • 1,726 篇 计算机科学与技术...
    • 1,419 篇 软件工程
    • 516 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 245 篇 生物工程
    • 221 篇 电气工程
    • 172 篇 光学工程
    • 160 篇 机械工程
    • 160 篇 生物医学工程(可授...
    • 145 篇 电子科学与技术(可...
    • 94 篇 化学工程与技术
    • 86 篇 安全科学与工程
    • 80 篇 动力工程及工程热...
    • 79 篇 仪器科学与技术
    • 77 篇 网络空间安全
    • 71 篇 交通运输工程
    • 68 篇 建筑学
  • 1,024 篇 理学
    • 582 篇 数学
    • 274 篇 生物学
    • 252 篇 物理学
    • 181 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 95 篇 化学
  • 678 篇 管理学
    • 436 篇 管理科学与工程(可...
    • 288 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 142 篇 医学
    • 129 篇 临床医学
    • 102 篇 基础医学(可授医学...
    • 58 篇 药学(可授医学、理...
  • 94 篇 法学
    • 63 篇 社会学
  • 59 篇 教育学
  • 55 篇 经济学
  • 32 篇 农学
  • 12 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 2 篇 哲学

主题

  • 103 篇 feature extracti...
  • 89 篇 deep learning
  • 89 篇 training
  • 75 篇 computational mo...
  • 74 篇 semantics
  • 69 篇 software enginee...
  • 62 篇 computer science
  • 60 篇 machine learning
  • 59 篇 accuracy
  • 58 篇 data mining
  • 48 篇 software
  • 47 篇 predictive model...
  • 43 篇 data models
  • 43 篇 convolutional ne...
  • 42 篇 image segmentati...
  • 42 篇 educational inst...
  • 42 篇 convolution
  • 41 篇 internet of thin...
  • 41 篇 optimization
  • 41 篇 cloud computing

机构

  • 82 篇 college of compu...
  • 65 篇 school of comput...
  • 55 篇 state key labora...
  • 44 篇 school of comput...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 41 篇 school of comput...
  • 41 篇 university of ch...
  • 40 篇 faculty of compu...
  • 39 篇 software enginee...
  • 37 篇 state key labora...
  • 31 篇 school of comput...
  • 30 篇 institute of com...
  • 29 篇 school of softwa...
  • 29 篇 national enginee...
  • 28 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 institute of sof...
  • 26 篇 school of softwa...

作者

  • 27 篇 quanyin zhu
  • 26 篇 shen linlin
  • 23 篇 shi yinghuan
  • 21 篇 gao yang
  • 19 篇 wang wei
  • 18 篇 liu wei
  • 17 篇 du bo
  • 16 篇 gao shangbing
  • 16 篇 tao dacheng
  • 16 篇 zhang jian
  • 15 篇 wang zheng
  • 14 篇 wei sun
  • 14 篇 xiaorui zhang
  • 13 篇 xiang-yang li
  • 13 篇 chen bin
  • 13 篇 tian chunwei
  • 13 篇 qi lei
  • 12 篇 wang hui
  • 12 篇 hu ruimin
  • 12 篇 yunhao liu

语言

  • 3,079 篇 英文
  • 267 篇 其他
  • 68 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Software Engineering Huaiyin Institute of Technology"
3410 条 记 录,以下是3211-3220 订阅
排序:
A New Information Measurement Scheme Based on TPM for Trusted Network Access
A New Information Measurement Scheme Based on TPM for Truste...
收藏 引用
International Conference on Computational Intelligence and Security Workshops (CISW)
作者: Lu Chen Huanguo Zhang Liqiang Zhang Liang Cai School of Computer State Key Lab of Software Engineering Wuhan University of China Wuhan China Institute of Electronic Technology People''s Liberation Army Information and Engineering University Zhengzhou China
The information measurement of the NAR (network access requester) is the key element for trusted network access. The only issues TNC (trusted network connection) proposed the conception of integrity measurement and po... 详细信息
来源: 评论
An Ant Colony Optimization Algorithm for Solving the Multidimensional Knapsack Problems  07
An Ant Colony Optimization Algorithm for Solving the Multidi...
收藏 引用
IEEE/WIC/ACM International Conference on Intelligent Agent technology (IAT)
作者: Junzhong Ji Zhen Huang Chunnian Liu Xuejing Liu Ning Zhong College of Computer Science and Technology Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing University of Technology Beijing China School of Information Engineering Shijiazhuang University of Economics Shijiazhuang China Department of Information Engineering Maebashi Institute of Technology Maebashi Japan
Ant colony optimization (ACO) algorithm is a metaheuristic and stochastic search technology, which has been one of the effective tools for solving discrete optimization problems. However, there are two bottlenecks for... 详细信息
来源: 评论
Discovering Protein Complexes from Protein-Protein Interaction Data by Local Cluster Detecting Algorithm
Discovering Protein Complexes from Protein-Protein Interacti...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Juan Liu Bin Liu Deyi Li School of Computer Wuhan University of China Wuhan China Wuhan University Wuhan Hubei CN State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Institute of Computing Technology Chinese Academy and Sciences Beijing China
Proteins are usually grouped into complexes to perform functional tasks in organisms. So discovery of protein complexes is critical to understand principles of cellular organization and function. Recently high-through... 详细信息
来源: 评论
Presentation and Visualization of Redundant Code: Working Session Summary
Presentation and Visualization of Redundant Code: Working Se...
收藏 引用
Duplication, Redundancy, and Similarity in software 2006
作者: Walenstein, Andrew Cordy, Jim Evans, Will Hassan, Ahmed Kamiya, Toshihiro Kapser, Cory Merlo, Ettore University of Louisiana at Lafayette Center for Advanced Computer Studies P.O. Box 44330 LafayetteLA70504-4330 United States Queen's University School of Computing KingstonONK7L 3N6 Canada University of British Columbia Department of Computer Science 201-2366 Main Mall VancouverBCV6T 1Z4 Canada University of Victoria Electrical and Computer Engineering Engineering Office Wing 315 P.O. Box 3055 VictoriaBCV8W 3P6 Canada Information Technology Research Institute Ubiquitous Software Group University of Waterloo David R. Cheriton School of Computer Science WaterlooONN2L 3G1 Canada C.P. 6079 Succ. Centre Ville MontréalQCH3C 3A7 Canada
This report summarizes the proceedings of a workshop discussion session presentation and visualization of aspects relating to duplicated, copied, or cloned code. The main outcomes of the working session were: (a) a re... 详细信息
来源: 评论
Support Vector Regression with Feature Selection for the Multivariate Calibration of Spectrofluorimetric Determination of Aromatic Amino Acids
Support Vector Regression with Feature Selection for the Mul...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Guo-Zheng Li Hao-Hua Meng Mary Qu Yang Jack Y. Yang School of Computer Science & Engineering Shanghai University Shanghai China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China National Human Genome Research Institute U.S. Department of Health and Human Services National Institutes of Health DHHS Bethesda MD USA Harvard Medical School Harvard University Cambridge MA USA
Several artificial intelligent methods, including support vector regression (SVR), artificial neural networks (ANNs), and partial least square (PLS) are used for the multivariate calibration in the determination of th... 详细信息
来源: 评论
Developing a computer science-specific learning taxonomy  07
Developing a computer science-specific learning taxonomy
收藏 引用
2007 Working Group Reports on ITiCSE on Innovation and technology in computer Science Education, ITiCSE-WGR 2007
作者: Fuller, Ursula Johnson, Colin G. Ahoniemi, Tuukka Cukierman, Diana Hernán-Losada, Isidoro Jackova, Jana Lahtinen, Essi Lewis, Tracy L. Thompson, Donna McGee Riedesel, Charles Thompson, Errol Computing Laboratory University of Kent CanterburyCT2 7NF United Kingdom Institute of Software Systems Tampere University of Technology Tampere Finland School of Computing Science Simon Fraser University BurnabyBC Canada Department of Lenguajes Y Sistemas Informáticos Universidad Rey Juan Carlos Madrid Spain Faculty of Management Science and Informatics University of Zilina Zilina Slovakia Department of Information Technology Radford University RadfordVA24142 United States Department of Learning Commons Simon Fraser University BurnabyBC Canada Department of Computer Science and Engineering University of Nebraska Lincoln 259 Avery Hall LincolnNE68588-0115 United States Massey University Wellington New Zealand
Bloom's taxonomy of the cognitive domain and the SOLO taxonomy are being increasingly widely used in the design and assessment of courses, but there are some drawbacks to their use in computer science. This paper ... 详细信息
来源: 评论
Authenticated Key Agreement in Group Settings
收藏 引用
Journal of Beijing institute of technology 2006年 第2期15卷 186-189页
作者: 李明 王勇 谷大武 白英彩 Department of Computer Science and Engineering Shanghai Jiao Tong University School of Software Beijing Institute of Technology
An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-e... 详细信息
来源: 评论
An application-semantics-based relaxed transaction model for internetware
收藏 引用
Science in China(Series F) 2006年 第6期49卷 774-791页
作者: HUANG Tao DING Xiaoning WEI Jun Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100080 China Key laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing100080 China Graduate School of Chinese Academy of Sciences Beijing 100080 China
An internetware application is composed by existing individual services, while transaction processing is a key mechanism to make the composition reliable. The existing research of transactional composite service (TCS... 详细信息
来源: 评论
On the quality of service of failure detectors based on control theory
On the quality of service of failure detectors based on cont...
收藏 引用
20th International Conference on Advanced Information Networking and Applications
作者: Xiong, Naixue Yang, Yan Chen, Jianxun He, Yanxiang School of Information Science Japan Advanced Institute of Science and Technology Japan Computer Science and Technology School Wuhan University of Science and Technology China State Key Lab of Software Engineering Computer School Wuhan University China
The detection of failures is a fundamental issue for fault tolerance in distributed systems. Recently, many people have come to realize that failure detection ought to be provided as some form of generic service, simi... 详细信息
来源: 评论
MEMS: A method for evaluating middleware architectures
收藏 引用
2nd International Conference on Quality of software Architectures
作者: Liu, Yan Gorton, Ian Bass, Len Hoang, Cuong Abanmi, Suhail National ICT Australia (NICTA) School of Computer Science and Engineering University of New South Wales Australia Software Engineering Institute United States Engineering Faculty University of Technology Sydney Australia
Middleware architectures play a crucial role in determining the overall quality of many distributed applications. Systematic evaluation methods for middleware architectures are therefore important to thoroughly assess... 详细信息
来源: 评论