咨询与建议

限定检索结果

文献类型

  • 1,359 篇 会议
  • 1,216 篇 期刊文献

馆藏范围

  • 2,575 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,578 篇 工学
    • 1,176 篇 计算机科学与技术...
    • 963 篇 软件工程
    • 342 篇 信息与通信工程
    • 233 篇 生物工程
    • 212 篇 控制科学与工程
    • 174 篇 生物医学工程(可授...
    • 143 篇 电气工程
    • 138 篇 光学工程
    • 115 篇 电子科学与技术(可...
    • 86 篇 机械工程
    • 67 篇 化学工程与技术
    • 63 篇 材料科学与工程(可...
    • 60 篇 动力工程及工程热...
    • 59 篇 仪器科学与技术
    • 53 篇 建筑学
  • 945 篇 理学
    • 437 篇 数学
    • 314 篇 物理学
    • 266 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 87 篇 系统科学
    • 74 篇 化学
  • 448 篇 管理学
    • 243 篇 管理科学与工程(可...
    • 213 篇 图书情报与档案管...
    • 130 篇 工商管理
  • 206 篇 医学
    • 180 篇 临床医学
    • 162 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 106 篇 法学
    • 89 篇 社会学
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 55 篇 教育学
  • 40 篇 农学
  • 8 篇 文学
  • 8 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 62 篇 machine learning
  • 55 篇 training
  • 49 篇 accuracy
  • 45 篇 deep learning
  • 44 篇 computational mo...
  • 35 篇 feature extracti...
  • 35 篇 security
  • 35 篇 data models
  • 34 篇 analytical model...
  • 33 篇 internet of thin...
  • 33 篇 predictive model...
  • 31 篇 educational inst...
  • 31 篇 cloud computing
  • 29 篇 computer archite...
  • 28 篇 real-time system...
  • 27 篇 convolutional ne...
  • 25 篇 informatics
  • 25 篇 monitoring
  • 24 篇 covid-19
  • 24 篇 scalability

机构

  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 school of comput...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 2,439 篇 英文
  • 120 篇 其他
  • 16 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Informatics Technology"
2575 条 记 录,以下是2491-2500 订阅
排序:
A low-cost pedestrian-detection system with a single optical camera
A low-cost pedestrian-detection system with a single optical...
收藏 引用
作者: Cao, Xian-Bin Qiao, Hong Keane, John IEEE Department of Computer Science and Technology University of Science and Technology of China Hefei 230026 China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China Laboratory of Complex Systems and Intelligent Science Institute of Automation Chinese Academy of Sciences Beijing 100080 China School of Informatics University of Manchester M60 1QD Manchester United Kingdom University of Manchester M13 9PL Manchester United Kingdom
The ultimate purpose of a pedestrian-detection system (PDS) is to reduce pedestrian-vehicle-related injury. Most such systems tend to adopt expensive sensors, such as infrared devices, in expectation of better perform... 详细信息
来源: 评论
Integrating fingerprint with cryptosystem for internet-based live pay-TV system
Integrating fingerprint with cryptosystem for internet-based...
收藏 引用
International Conference on Communications and Networking in China (CHINACOM)
作者: Shuhui Hou Tetsutaro Uehara Takashi Satoh Yoshitaka Morimura Michihiko Minoh Department of Intelligence Science and Technology Graduate School of Informatics Kyoto University Japan Acdemic Center for Computing and Media Studies Kyoto University Japan Department of Information and Media Engineering Faculty of Enviromental Engineering University of Kitakyushu Japan
In the last few years, live pay-TV system via Internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content protection is required. In this paper, a n... 详细信息
来源: 评论
Emotion in HCI - Designing for people  22
Emotion in HCI - Designing for people
收藏 引用
22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, BCS HCI 2008
作者: Peter, Christian Crane, Elizabeth Fabri, Marc Agius, Harry Axelrod, Lesley Fraunhofer Institute for Computer Graphics Human-Centered Interaction Technologies Germany University of Michigan Division of Kinesiology Ann ArborMI48108 United States Leeds Met University Faculty of Information and Technology LeedsLS6 3QS United Kingdom Brunel University School of Information Systems Computing and Mathematics St John's Middlesex United Kingdom Interact Lab Dept Informatics University of Sussex BrightonBN1 9QH United Kingdom
As computing is changing and becoming increasingly social in nature, the role of emotions in computing has become ever more relevant and commercial. Emotions are central to culture, creativity, and interaction. The to... 详细信息
来源: 评论
802.11 disassociation DoS attack simulation using verilog
收藏 引用
WSEAS Transactions on Communications 2008年 第3期7卷 198-206页
作者: Aslam, Baber Akhlaq, Monis Khan, Shoab A. Computer Science Department School of Electrical Engineering and Computer Science University of Central Florida Orlando FL 32816 United States Mobile Computing Networks and Security Research Group School of Informatics University of Bradford Bradford BD7 1DP United Kingdom Computer Engineering Department College of E and M Engineering National University of Science and Technology Tamizuddin Road Rawalpindi Pakistan
A number of Denial of Service (DoS) attacks in IEEE 802.11 are due to unauthenticated/unencrypted management and control frames. Current IEEE 802.11 simulators deal with Physical and MAC layers and do not include the ... 详细信息
来源: 评论
Performance evaluation of IEEE 802.1x authentication methods and recommended usage
收藏 引用
WSEAS Transactions on Communications 2008年 第3期7卷 133-143页
作者: Akhlaq, Monis Aslam, Baber Khan, Muzammil A. Mellor, John Jafri, M. Noman Awan, Irfan Mobile Computing Networks and Security Research Group School of Informatics University of Bradford Bradford BD7 1DP United Kingdom Computer Science Department School of Electrical Engg. and Computer Science University of Central Florida Orlando FL 32816 United States Information Security Department College of Signals National University of Science and Technology Tamizuddin Road Rawalpindi Pakistan Electrical Engineering Department College of Signals National University of Science and Technology Tamizuddin Road Rawalpindi Pakistan
The wide spread acceptance of IEEE WLANs is a result of industrial standardization to ensure product compatibility and reliability among various manufacturers. Several WLANs solutions are available with varying charac... 详细信息
来源: 评论
The Importance of Biometric Sensor Continuous Secure Monitoring
The Importance of Biometric Sensor Continuous Secure Monitor...
收藏 引用
International Conference on Digital Information Management (ICDIM)
作者: Alexandras Papanicolaou Christos Ilioudis Christos K. Georgiadis Elias Pimenidis Dept. of Computer & Communication Engineering University of Thessaly Volos Greece Dept. of Information Technology Technical Educational Institute of Thessaloniki Greece Dept. of Applied Informatics University of Macedonia Thessaloniki Greece School of Computing and Technology University of East London United Kingdom
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring tha... 详细信息
来源: 评论
Bootstrapping morphological analysis of Gĩkũyũ using unsupervised maximum entropy learning
Bootstrapping morphological analysis of Gĩkũyũ using unsu...
收藏 引用
8th Annual Conference of the International Speech Communication Association, Interspeech 2007
作者: De Pauw, Guy Wagacha, Peter Waiganjo CNTS - Language Technology Group University of Antwerp Belgium School of Computing and Informatics University of Nairobi Kenya
This paper describes a proof-of-the-principle experiment in which maximum entropy learning is used for the automatic induction of shallow morphological features for the resource-scarce Bantu language of Gĩkũyũ. This n... 详细信息
来源: 评论
Secure Tropos: A security-oriented extension of the Tropos methodology
Secure Tropos: A security-oriented extension of the Tropos m...
收藏 引用
作者: Mouratidis, Haralambos Giorgini, Paolo Innovative Informatics School of Computing and Technology University of East London United Kingdom Department of Information and Communication Technology University of Trento Italy
Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually considered after ... 详细信息
来源: 评论
Development phases of a generic data mining life cycle (DMLC)
Development phases of a generic data mining life cycle (DMLC...
收藏 引用
2007 International Conference on Software Engineering Theory and Practice, SETP 2007
作者: Hofmann, Markus Tierney, Brendan Department of Informatics Institute of Technology Blanchardstown Dublin 15 Ireland School of Computing Dublin Institute of Technology Kevin Street Dublin 8 Ireland
Data mining projects are complex and have a high failure rate. In order to improve project management and success rates of such projects a life cycle is vital to the overall success of the project. This paper reports ... 详细信息
来源: 评论
Multiple-valued logic circuits design using negative differential resistance devices
Multiple-valued logic circuits design using negative differe...
收藏 引用
作者: Berezowski, Krzysztof S. Vrudhula, Sarma B. K. Wroclaw University of Technology Wroclaw Poland School of Computing and Informatics Ira A. Fulton School of Engineering Arizona State University 85281 Tempe AZ United States
In this paper, we present a novel multiple-valued logic circuits design style based on negative differential resistance (NDR) devices and the monostable-to-multistable transition logic (MML) operating principle. We in... 详细信息
来源: 评论