咨询与建议

限定检索结果

文献类型

  • 1,387 篇 会议
  • 1,230 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 2,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,610 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 347 篇 信息与通信工程
    • 234 篇 生物工程
    • 233 篇 控制科学与工程
    • 175 篇 生物医学工程(可授...
    • 143 篇 电气工程
    • 139 篇 光学工程
    • 116 篇 电子科学与技术(可...
    • 87 篇 机械工程
    • 67 篇 化学工程与技术
    • 64 篇 材料科学与工程(可...
    • 60 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 53 篇 建筑学
  • 951 篇 理学
    • 440 篇 数学
    • 315 篇 物理学
    • 269 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 76 篇 化学
  • 453 篇 管理学
    • 246 篇 管理科学与工程(可...
    • 215 篇 图书情报与档案管...
    • 130 篇 工商管理
  • 206 篇 医学
    • 180 篇 临床医学
    • 162 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 105 篇 法学
    • 89 篇 社会学
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 54 篇 教育学
  • 40 篇 农学
  • 8 篇 文学
  • 8 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 63 篇 machine learning
  • 55 篇 training
  • 52 篇 accuracy
  • 48 篇 deep learning
  • 45 篇 computational mo...
  • 44 篇 artificial intel...
  • 36 篇 feature extracti...
  • 35 篇 security
  • 35 篇 data models
  • 34 篇 analytical model...
  • 33 篇 internet of thin...
  • 33 篇 predictive model...
  • 31 篇 educational inst...
  • 31 篇 cloud computing
  • 29 篇 computer archite...
  • 29 篇 real-time system...
  • 28 篇 convolutional ne...
  • 26 篇 visualization
  • 25 篇 covid-19
  • 25 篇 informatics

机构

  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 school of comput...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 2,454 篇 英文
  • 185 篇 其他
  • 17 篇 中文
  • 3 篇 德文
  • 2 篇 日文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Informatics Technology"
2657 条 记 录,以下是2061-2070 订阅
排序:
Combining activity-evaluation information with NMF for trust-link prediction in social media
Combining activity-evaluation information with NMF for trust...
收藏 引用
IEEE International Conference on Big Data
作者: Kanji Matsutani Masahito Kumano Masahiro Kimura Kazumi Saito Kouzou Ohara Hiroshi Motoda Department of Electronics and Informatics Ryukoku University Japan School of Administration and Informatics University of Shizuoka Japan Department of Integrated Information Technology Aoyama Gakuin University Japan Institute of Scientific and Industrial Research Osaka University Japan School of Computing and Information Systems University of Tasmania Australia
Acquiring a network of trust relations among users in social media sites, e.g., item-review sites, is important for analyzing users' behavior and efficiently finding reliable information on the Web. We address the... 详细信息
来源: 评论
Cognitive radio ad-hoc networks: Attacks and its impact
Cognitive radio ad-hoc networks: Attacks and its impact
收藏 引用
International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
作者: B Ramesh Babu Meenakshi Tripathi Manoj Singh Gaur Dinesh Gopalani Dharm Singh Jat Department of Computer Science and Engineering Malaviya National Institute of Technology Jaipur Rajasthan INDIA Department of Computer Science and Engineering Malaviya National Institute of Technology Jaipur Rajasthan India School of Computing and Informatics Polytechnic of Namibia
In the current scenario Cognitive Radio (CR) is the best available solution to overcome spectrum shortage problem. Cognitive Radio Ad Hoc Networks (CRAHNs) is the use of CR technology in the wireless ad-hoc network sc... 详细信息
来源: 评论
Training of an Artificial Neural Network with Backpropagation algorithm using notification oriented paradigm
Training of an Artificial Neural Network with Backpropagatio...
收藏 引用
Latin America Congress on Computational Intelligence (LA-CCI)
作者: Fenando Schütz João A. Fabro Carlos R. E. Lima Adriano F. Ronszcka Paulo C. Stadzisz Jean M. Simão Graduate School in Electrical Engineering and Industrial Informatics (CPGEI) Federal University of Technology - Paraná (UTFPR) - Av. Sete de Setembro 3165. Curitiba-PR Brazil. 80-230-901 Graduate School of Applied Computing (PPGCA) Federal University of Technology - Parana (UTFPR) Curitiba PR Brazil Graduate School in Electrical Engineering and Industrial Informatics (CPGEI)
When implementing Artificial Neural Networks with imperative programing languages, the resulting programs are usually highly coupled. This problem usually hampers distribution over multiple processors, especially when... 详细信息
来源: 评论
Android malware detection based on permission combinations
收藏 引用
International Journal of Simulation and Process Modelling 2015年 第4期10卷 315-326页
作者: Liu, Zenghui Lai, Yingxu Chen, Yinong Automation Engineering Institute Beijing Polytechnic Beijing100176 China College of Computer Science Beijing University of Technology Beijing100124 China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe85287 United States
Considering the resource limitations of mobile terminals, such as memory capacity and battery power, it will take a large portion of resources if the complex malicious detection system is implemented in mobile termina... 详细信息
来源: 评论
Enhancing flexibility in clinical trials using workflow management systems  8
Enhancing flexibility in clinical trials using workflow mana...
收藏 引用
8th Workshop on Transformation and Engineering of Enterprises, TEE 2014 and the 1st International Workshop on Capability-Oriented Business informatics, CoBI 2014 - Co-located with the 16th IEEE International Conference on Business informatics, CBI 2014
作者: Murungi, Albert Nabukenya, Josephine Information Systems Department School of Computing and Informatics Technology Makerere University Kampala Kampala Uganda
In the medical environment, clinical research has been predomi-nantly paper-based. The Case Report Form (CRF) is an example of paper-based tools used in documenting clinical trials. A clinical trial can be understood ... 详细信息
来源: 评论
A new software paradigm for Internet computing
收藏 引用
National Science Review 2014年 第2期1卷 168-169页
作者: Gang Huang Xiaoxing Ma Wei-Tek Tsai School of Electronics Engineering and Computer Science Peking University School of Computing Informatics and Decision Systems Engineering Arizona State University Department of Computer Science and Technology Nanjing University
The Internet,once a network of networks,has become not only the platform of choice for delivering services to increasingly mobile users,but also the connective tissue between people,information and *** all new and pop... 详细信息
来源: 评论
Dynamics of software systems projects during the requirements process improvement
收藏 引用
International Journal of Simulation and Process Modelling 2014年 第4期9卷 206-221页
作者: Zawedde, Aminah Williams, Ddembe School of Computing and Informatics Technology Makerere University P.O. Box 7062 Kampala Uganda Faculty of Computing and Information Management KCA University P.O. Box 56808 00200 Nairobi Kenya
Requirements process improvement (RPI) in software systems is aimed at systematically controlling changes of the requirements specification and making improvements that result in high quality specifications at reduced... 详细信息
来源: 评论
An Efficient Centralized Algorithm for Connected Dominating Set on Wireless Networks
收藏 引用
Procedia Computer Science 2015年 56卷 162-167页
作者: Deqian Fu Lihua Han Li Liu Qian Gao Zhiquan Feng School of Informatics Linyi University Linyi 276005 P.R. China Provincial Key Laboratory for Network Based Intelligent Computing University of Jinan Jinan 250022 P.R. China School of Information Qilu University of Technology Jinan Shandong 250353 China School of Information Science and Engineering Universityof Jinan Jinan Shandong 250022 China
In wireless network, backbone network plays an important role on forwarding data. Further, in order to reduce the delay and save energy, the minimum connected dominating set (MCDS) is an effective way to construct a b... 详细信息
来源: 评论
Jetstream: A self-provisioned, scalable science and engineering cloud environment  15
Jetstream: A self-provisioned, scalable science and engineer...
收藏 引用
4th Annual Conference on Extreme Science and Engineering Discovery Environment, XSEDE 2015
作者: Stewart, Craig A. Hancock, David Stanzioneb, Daniel Turnerd, George Cockerill, Timothy M. Merchant, Nirav Taylor, James Vaughn, Matthew Foster, Ian Skidmore, Edwin Tuecke, Steven Gaffney, Niall I. IU Pervasive Technology Institute and IU School of Informatics and Computing United States Texas Advanced Computing Center University of Texas Austin Road A AustinTX78758 United States Computation Institute University of Chicago 5735 S. Ellis Ave ChicagoIL60637 United States IU Pervasive Technology Institute 2709 E. Tenth Street BloomingtonIN47408-2671 United States University of Arizona 1401 East University Boulevard TucsonAZ85721 United States Department of Biology Johns Hopkins University 3400 N Charles St. BaltimoreMD21218 United States
Jetstream will be the first production cloud resource supporting general science and engineering research within the XD ecosystem. In this report we describe the motivation for proposing Jetstream, the configuration o... 详细信息
来源: 评论
On Constructing Minimum 2-Connected 2-Domiating Set with Maximum Spectrums in Cognitive Radio Networks
收藏 引用
Procedia Computer Science 2015年 56卷 156-161页
作者: Lihua Han Deqian Fu Zifen Yang Qian Gao Zhiquan Feng School of Informatics Linyi University Linyi Shandong 276005 P.R. China Provincial Key Laboratory for Network Based Intelligent Computing University of Jinan Jinan 250022 P.R. China School of Information Qilu University of Technology Jinan Shandong 250353 China School of Information Science and Engineering Universityof Jinan Jinan Shandong 250022 China
Connected dominating set (CDS) is a representative technique for constructing virtual backbones of wireless networks to improve the efficiency of communication. Most of existing works on CDS aim to construct the minim... 详细信息
来源: 评论