咨询与建议

限定检索结果

文献类型

  • 27,617 篇 会议
  • 17,274 篇 期刊文献
  • 395 册 图书

馆藏范围

  • 45,286 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,546 篇 工学
    • 19,300 篇 计算机科学与技术...
    • 15,832 篇 软件工程
    • 5,975 篇 信息与通信工程
    • 4,030 篇 控制科学与工程
    • 3,212 篇 生物工程
    • 3,201 篇 电气工程
    • 2,656 篇 电子科学与技术(可...
    • 2,290 篇 生物医学工程(可授...
    • 2,020 篇 光学工程
    • 1,985 篇 机械工程
    • 1,543 篇 化学工程与技术
    • 1,353 篇 动力工程及工程热...
    • 1,347 篇 仪器科学与技术
    • 1,099 篇 材料科学与工程(可...
    • 980 篇 安全科学与工程
    • 957 篇 网络空间安全
  • 15,922 篇 理学
    • 7,937 篇 数学
    • 5,168 篇 物理学
    • 3,601 篇 生物学
    • 2,579 篇 统计学(可授理学、...
    • 1,676 篇 化学
    • 1,668 篇 系统科学
  • 7,586 篇 管理学
    • 4,546 篇 管理科学与工程(可...
    • 3,387 篇 图书情报与档案管...
    • 2,207 篇 工商管理
  • 2,229 篇 医学
    • 1,880 篇 临床医学
    • 1,674 篇 基础医学(可授医学...
    • 981 篇 药学(可授医学、理...
    • 977 篇 公共卫生与预防医...
  • 1,399 篇 法学
    • 1,158 篇 社会学
  • 914 篇 经济学
  • 648 篇 教育学
  • 637 篇 农学
  • 141 篇 文学
  • 105 篇 艺术学
  • 82 篇 军事学
  • 20 篇 哲学
  • 12 篇 历史学

主题

  • 1,009 篇 accuracy
  • 939 篇 feature extracti...
  • 928 篇 deep learning
  • 888 篇 training
  • 843 篇 computational mo...
  • 802 篇 machine learning
  • 551 篇 predictive model...
  • 523 篇 internet of thin...
  • 500 篇 semantics
  • 496 篇 data models
  • 472 篇 computer science
  • 464 篇 support vector m...
  • 413 篇 artificial intel...
  • 406 篇 real-time system...
  • 359 篇 data mining
  • 352 篇 optimization
  • 343 篇 convolutional ne...
  • 332 篇 neural networks
  • 322 篇 cloud computing
  • 300 篇 security

机构

  • 771 篇 institute of com...
  • 465 篇 school of comput...
  • 416 篇 university of ch...
  • 206 篇 college of intel...
  • 171 篇 key laboratory o...
  • 145 篇 university of sc...
  • 132 篇 school of comput...
  • 122 篇 faculty of compu...
  • 114 篇 department of co...
  • 108 篇 school of comput...
  • 103 篇 department of co...
  • 93 篇 department of ph...
  • 91 篇 school of mathem...
  • 91 篇 national enginee...
  • 86 篇 north-west unive...
  • 86 篇 tianfu cosmic ra...
  • 84 篇 graduate school ...
  • 84 篇 peng cheng labor...
  • 84 篇 institute of com...
  • 82 篇 school of comput...

作者

  • 145 篇 hai jin
  • 135 篇 jin hai
  • 127 篇 niyato dusit
  • 106 篇 bastieri d.
  • 89 篇 ferrara g.
  • 89 篇 ardid m.
  • 88 篇 calvo d.
  • 87 篇 chen a.
  • 83 篇 zhang lei
  • 81 篇 li xin
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 74 篇 li cheng
  • 73 篇 wang lei
  • 71 篇 gal t.
  • 69 篇 bozza c.
  • 68 篇 jiang k.
  • 67 篇 kuleshov d.
  • 61 篇 cheng xueqi
  • 60 篇 liu d.

语言

  • 43,008 篇 英文
  • 1,811 篇 其他
  • 488 篇 中文
  • 25 篇 日文
  • 17 篇 德文
  • 15 篇 法文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Technology"
45286 条 记 录,以下是4991-5000 订阅
排序:
Context workflow: A monadic DSL for compensable and interruptible executions  32
Context workflow: A monadic DSL for compensable and interrup...
收藏 引用
32nd European Conference on Object-Oriented Programming, ECOOP 2018
作者: Inoue, Hiroaki Aotani, Tomoyuki Igarashi, Atsushi Graduate School of Informatics Kyoto University Kyoto Japan School of Computing Tokyo Institute of Technology Tokyo Japan
Context-aware applications, whose behavior reactively depends on the time-varying status of the surrounding environment – such as network connection, battery level, and sensors – are getting more and more pervasive ... 详细信息
来源: 评论
An efficient algorithm for learning event-recording automata
An efficient algorithm for learning event-recording automata
收藏 引用
9th International Symposium on Automated technology for Verification and Analysis, ATVA 2011
作者: Lin, Shang-Wei André, Étienne Dong, Jin Song Sun, Jun Liu, Yang School of Computing National University of Singapore Singapore Singapore University of Technology and Design Singapore
In inference of untimed regular languages, given an unknown language to be inferred, an automaton is constructed to accept the unknown language from answers to a set of membership queries each of which asks whether a ... 详细信息
来源: 评论
Early Detection of Autism Spectrum Disorder Using AI and Machine Learning Models: A Systematic Review for Effective Intervention  7
Early Detection of Autism Spectrum Disorder Using AI and Mac...
收藏 引用
7th IEEE Pune Section International Conference, PuneCon 2024
作者: Nawghare, Pushpmala Prasad, Jayashree Rajesh Mit Art Design and Technology University School of Computing Maharashtra Pune412201 India
Autism is a brain developmental condition that may impact the everyday life of affected individuals. Toddlers suffering from ASD are labeled by difficulties in social interaction, connecting, lack of eye contact, igno... 详细信息
来源: 评论
A framework of business intelligence solution for real estates analysis  2
A framework of business intelligence solution for real estat...
收藏 引用
2nd International Conference on Data Science, E-Learning and Information Systems, DATA 2019
作者: Abutahoun, Bushra Alasasfeh, Maisa Fraihat, Salam King Hussein School for Computing Sciences Princess Sumaya University for Technology Amman Jordan
Real estate is one of the essential and challenging fields in the market which reflects the economy, and it needs constant improvement. Business intelligence nowadays plays a significant role in enhancing the process ... 详细信息
来源: 评论
Fault Tolerance and Recovery for Group Communication Services in Distributed Networks
收藏 引用
Journal of Computer Science & technology 2012年 第2期27卷 298-312页
作者: 王跃华 周忠 Ling Liu 吴威 State Key Laboratory of Virtual Reality Technology and Systems Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China College of Computing Georgia Institute of TechnologyAtlanta 30332U.S.A.
Group communication services (GCSs) are becoming increasingly important as a wide field of promising applications has emerged to serve millions of users distributed across the ***,it is challenging to make the servi... 详细信息
来源: 评论
Refining learning outcomes in multicultural ICT classrooms: The development of a structured framework
Refining learning outcomes in multicultural ICT classrooms: ...
收藏 引用
2015 AIS SIGED: IAIM International Conference
作者: Freeman, Mark Bruce School of Computing and Information Technology University of Wollongong Faculty of Engineering and Information Sciences Australia
A change in the dynamics of a classroom environment, created from internationalisation of student cohorts, has caused educators to reconsider their learning methods that they use. This paper presents a structured fram... 详细信息
来源: 评论
Implementing explicit congestion notification in ns-3  14
Implementing explicit congestion notification in ns-3
收藏 引用
2014 Workshop on ns-3, WNS3 2014
作者: Swenson, Brian Paul Riley, George F. School of Electrical and Computing Engineering Georgia Institute of Technology Atlanta GA United States
To detect network congestion, TCP typically relies on detecting packet loss. While this is an effective approach for maintaining high throughput for bulk data transfers, a better approach for interactive, time-sensiti... 详细信息
来源: 评论
A peer based model for 2D multiplayer gaming
A peer based model for 2D multiplayer gaming
收藏 引用
1st International Conference on Internet Technologies and Applications, ITA 05
作者: Stenneth, Leon O. Pyne, Richard School of Computing and Information Technology University of Technology Jamaica 237 Old Hope Road Kingston 6 Jamaica
Most multiplayer games available today are of a client-server nature. This paper looks at a different approach to multiplayer gaming. A multiplayer game example was also developed to test the approach discussed in thi... 详细信息
来源: 评论
Disease Identification and Detection using Machine Learning  5
Disease Identification and Detection using Machine Learning
收藏 引用
5th International Conference on Trends in Electronics and Informatics, ICOEI 2021
作者: Samhitha, B. Keerthi Subhashini, R. Sathyabama Institute of Science and Technology Chennai India School of Computing Sathyabama Institute of Science and Technology Chennai India
In the past few years the most researched and discussed topic is Machine Learning. Machine learning is used to uncover correlations from medical datasets and provide outstanding predictive capability for diseases. Whe... 详细信息
来源: 评论
AUTHENTICATION OF MULTI USERS IN A DISTRIBUTED ENVIRONMENT  14
AUTHENTICATION OF MULTI USERS IN A DISTRIBUTED ENVIRONMENT
收藏 引用
14th International Conference on Computers and Their Applications, CATA 1999
作者: Rauniar, Deepak Rahman, Syed M. Bignall, Robert J. Gippsland School of Computing and Information Technology Monash University ChurchillVIC3842 Australia
Authenticating the identity of a remote process in the face of malicious active intruders has been an active area of computer communication security. The complexity of the authentication increases when a number of pro... 详细信息
来源: 评论