咨询与建议

限定检索结果

文献类型

  • 1,841 篇 会议
  • 1,541 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,255 篇 工学
    • 1,736 篇 计算机科学与技术...
    • 1,412 篇 软件工程
    • 520 篇 信息与通信工程
    • 284 篇 控制科学与工程
    • 244 篇 生物工程
    • 222 篇 电气工程
    • 172 篇 光学工程
    • 159 篇 机械工程
    • 159 篇 生物医学工程(可授...
    • 145 篇 电子科学与技术(可...
    • 94 篇 化学工程与技术
    • 88 篇 安全科学与工程
    • 80 篇 动力工程及工程热...
    • 78 篇 仪器科学与技术
    • 78 篇 网络空间安全
    • 73 篇 交通运输工程
    • 67 篇 建筑学
  • 1,024 篇 理学
    • 581 篇 数学
    • 275 篇 生物学
    • 252 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 95 篇 化学
  • 678 篇 管理学
    • 437 篇 管理科学与工程(可...
    • 287 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 143 篇 医学
    • 130 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 58 篇 药学(可授医学、理...
  • 94 篇 法学
    • 63 篇 社会学
  • 59 篇 教育学
  • 54 篇 经济学
  • 33 篇 农学
  • 12 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 2 篇 哲学

主题

  • 104 篇 feature extracti...
  • 93 篇 deep learning
  • 92 篇 training
  • 75 篇 computational mo...
  • 74 篇 semantics
  • 69 篇 software enginee...
  • 62 篇 computer science
  • 61 篇 machine learning
  • 60 篇 accuracy
  • 58 篇 data mining
  • 48 篇 software
  • 47 篇 predictive model...
  • 43 篇 convolution
  • 43 篇 data models
  • 43 篇 convolutional ne...
  • 42 篇 educational inst...
  • 42 篇 optimization
  • 41 篇 internet of thin...
  • 41 篇 image segmentati...
  • 41 篇 cloud computing

机构

  • 81 篇 college of compu...
  • 64 篇 school of comput...
  • 55 篇 state key labora...
  • 44 篇 school of comput...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 41 篇 school of comput...
  • 41 篇 university of ch...
  • 39 篇 software enginee...
  • 39 篇 faculty of compu...
  • 37 篇 state key labora...
  • 31 篇 school of comput...
  • 30 篇 institute of com...
  • 29 篇 school of softwa...
  • 29 篇 national enginee...
  • 28 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 school of softwa...
  • 27 篇 school of comput...
  • 27 篇 institute of sof...

作者

  • 27 篇 quanyin zhu
  • 26 篇 shen linlin
  • 23 篇 shi yinghuan
  • 21 篇 gao yang
  • 20 篇 wang wei
  • 18 篇 liu wei
  • 16 篇 gao shangbing
  • 16 篇 tao dacheng
  • 16 篇 du bo
  • 15 篇 wang zheng
  • 15 篇 zhang jian
  • 14 篇 wei sun
  • 14 篇 xiaorui zhang
  • 13 篇 xiang-yang li
  • 13 篇 chen bin
  • 13 篇 tian chunwei
  • 13 篇 qi lei
  • 12 篇 wang hui
  • 12 篇 hu ruimin
  • 12 篇 yunhao liu

语言

  • 3,069 篇 英文
  • 286 篇 其他
  • 68 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Software Engineering Huaiyin Institute of Technology"
3419 条 记 录,以下是3241-3250 订阅
排序:
Method of drifting user's interests based on hybrid model
收藏 引用
Jisuanji Gongcheng/computer engineering 2006年 第1期32卷 4-6+89页
作者: Song, Lizhe Niu, Zhendong Yu, Zhengtao Song, Hantao Dong, Xiangjun Department of Computer Science and Engineering Beijing Institute of Technology Beijing 100081 China School of Software Engineering Beijing Institute of Technology Beijing 100081 China National Library Digital Technology Corp. Ltd. Beijing 100083 China
This paper aims at the problem of combination of user's interests and previous interests. It proposes a hybrid model based on concept correlations. In this hybrid model, user's interests consist of long-term m... 详细信息
来源: 评论
Classification of brain glioma by using SVMs bagging with feature selection
收藏 引用
PAKDD 2006 Workshop on Data Mining for Biomedical Applications, BioDM 2006
作者: Li, Guo-Zheng Liu, Tian-Yu Cheng, Victor S. State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China School of Computer Engineering and Science Shanghai University Shanghai 200072 China Institute of Biomedical Instrument Shanghai Jiao Tong University Shanghai 200030 China
The degree of malignancy in brain glioma needs to be assessed by MRI findings and clinical data before operations. There have been previous attempts to solve this problem by using fuzzy max-min neural networks and sup... 详细信息
来源: 评论
An Efficient Secure Real-Time Concurrency Control Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1899-1902页
作者: XIAO Yingyuan LIU Yunsheng CHEN Xiangyang Department of Computer Science and Engineering Tianjin University of Technology Tianjin 300191 China School of Software Huazhong University of Science and Technology Wuhan 430074 Hubei China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan 430073 Hubei China
Secure real-time databases must simultaneously satisfy two requirements in guaranteeing data security and minimizing the missing deadlines ratio of transactions. However, these two requirements can conflict with each ... 详细信息
来源: 评论
Eliciting better quality architecture evaluation scenarios: A controlled experiment on top-down vs. bottom-up
Eliciting better quality architecture evaluation scenarios: ...
收藏 引用
ISCE'06 - 5th ACM-IEEE International Symposium on Empirical software engineering
作者: Babar, Muhammed Ali Biffl, Stefan National ICT Australia Ltd. Sydney NSW 1466 Australia School of Computer Science and Engineering University of New South Wales Sydney NSW 2052 Australia Institute for Software Technology and Interactive Systems Vienna Technical University Austria
Scenarios are extensively used in software architecture evaluation. These scenarios are elicited from stakeholders using either a topdown or bottom-up approach. The former approach uses categorization schemes to focus... 详细信息
来源: 评论
Evaluation Models for the Effect of Sample Imbalance on Gene Selection
Evaluation Models for the Effect of Sample Imbalance on Gene...
收藏 引用
International Multi-Symposiums on computer and Computational Sciences (IMSCCS)
作者: Kun Yang Jianzhong Li Chaokun Wang Hong Gao Department of Computer Science and Engineering Harbin Institute of Technology Harbin China School of Software Tsinghua University Beijing China
In this paper, we considered the problem of sample imbalance in the context of gene selection. Based on simple random sampling, two evaluation models were proposed to investigate the effect of sample imbalance on gene... 详细信息
来源: 评论
New approach to complexity reduction of intra prediction in advanced multimedia compression
New approach to complexity reduction of intra prediction in ...
收藏 引用
ICCSA 2006: International Conference on Computational Science and Its Applications
作者: Yu, Mei Jiang, Gangyi Li, Shiping Li, Fucui Choi, Tae-Young Faculty of Information Science and Engineering Ningbo University Ningbo 315211 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Institute of Computer Technology Graduate School Chinese Academy of Sciences Beijing 100871 China Division of Electronics Engineering Ajou University Suwon 442-749 Korea Republic of
H.264 is the new multimedia compression standard developed by VCEG and MPEG. In order to maximize the compression performance, H.264 adopts RDO mode decision techniques at the cost of very remarkable computational com... 详细信息
来源: 评论
On Control Gain Selection in PI-RED
On Control Gain Selection in PI-RED
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Naixue Xiong X. Defago Yan Yang Yanxiang He Jing He Key Laboratory of Software Engineering Computer School of Wuhan University China School of Information Science Institute of Science and Technology Japan School of Computer Science and Technology Wuhan University of Science and Technology Hubei China State Key Laboratory of Software Engineering Computer School Wuhan University of China Hubei China Department of Computer Science Utah State University Logan UT USA
Active queue management (AQM) is an effective method used in Internet routers to enhance congestion control, and to achieve a trade off between link utilization and delay. The de facto standard, the random early detec... 详细信息
来源: 评论
On the quality of service of failure detectors based on control theory
On the quality of service of failure detectors based on cont...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: N. Xiong Yan Yang Jianxun Chen Yanxiang He The State Key Lab of Software Engineering Computer School of Wuhan University China Japan Advanced Institute of Science and Technology School of Information Science Japan Computer Science and Technology School Wuhan University of Science and Technology China
The detection of failures is a fundamental issue for fault tolerance in distributed systems. Recently, many people have come to realize that failure detection ought to be provided as some form of generic service, simi... 详细信息
来源: 评论
Hybrid context modeling: a location-based scheme using ontologies
Hybrid context modeling: a location-based scheme using ontol...
收藏 引用
IEEE Annual Conference on Pervasive Computing and Communications Workshops (PerCom)
作者: I. Roussaki M. Strimpakou N. Kalatzis M. Anagnostou C. Pils School of Electrical & Computer Engineering National and Technical University of Athens Greece Telecommunications Software & Systems Group Waterford Institute of Technology Ireland
Context awareness is an inherent feature of pervasive computing. It enhances the proactiveness of the system thus requiring less user attention and fewer human-machine interactions, it supports intelligent personaliza... 详细信息
来源: 评论
Privacy-Aware Modelling and Distribution of Context Information in Pervasive Service Provision
Privacy-Aware Modelling and Distribution of Context Informat...
收藏 引用
IEEE/ACS International Conference on Pervasive Services (ICPS)
作者: Roussaki Strimpakou Pils Kalatzis Neubauer Hauser Anagnostou School of Electrical and Computer Engineering National and Technical University of Athens Greece Telecommunications Software & Systems Group Waterford Institute of Technology Ireland Institute of Communication Networks and Computer Engineering (IKR) University of Stuttgart Germany
Context awareness is an essential cornerstone in future pervasive computing systems. It has the potential to greatly reduce the user attention and interaction bottlenecks, to give humans the impression that services f... 详细信息
来源: 评论