咨询与建议

限定检索结果

文献类型

  • 2,327 篇 会议
  • 1,964 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 4,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,724 篇 工学
    • 1,946 篇 计算机科学与技术...
    • 1,571 篇 软件工程
    • 512 篇 信息与通信工程
    • 434 篇 生物工程
    • 407 篇 控制科学与工程
    • 342 篇 生物医学工程(可授...
    • 257 篇 电气工程
    • 241 篇 光学工程
    • 211 篇 电子科学与技术(可...
    • 190 篇 机械工程
    • 111 篇 化学工程与技术
    • 111 篇 安全科学与工程
    • 108 篇 交通运输工程
    • 106 篇 动力工程及工程热...
    • 99 篇 材料科学与工程(可...
    • 98 篇 仪器科学与技术
  • 1,574 篇 理学
    • 831 篇 数学
    • 482 篇 生物学
    • 435 篇 物理学
    • 311 篇 统计学(可授理学、...
    • 177 篇 系统科学
    • 111 篇 化学
  • 744 篇 管理学
    • 433 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 240 篇 工商管理
  • 328 篇 医学
    • 288 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 124 篇 公共卫生与预防医...
  • 156 篇 法学
    • 140 篇 社会学
  • 88 篇 经济学
  • 75 篇 教育学
  • 63 篇 农学
  • 12 篇 军事学
  • 5 篇 文学
  • 5 篇 艺术学

主题

  • 102 篇 machine learning
  • 91 篇 computational mo...
  • 83 篇 semantics
  • 73 篇 deep learning
  • 67 篇 feature extracti...
  • 65 篇 artificial intel...
  • 65 篇 training
  • 60 篇 data models
  • 58 篇 visualization
  • 58 篇 accuracy
  • 57 篇 computer archite...
  • 53 篇 cloud computing
  • 47 篇 informatics
  • 47 篇 predictive model...
  • 47 篇 forecasting
  • 45 篇 internet of thin...
  • 44 篇 software
  • 43 篇 educational inst...
  • 42 篇 optimization
  • 42 篇 real-time system...

机构

  • 104 篇 school of comput...
  • 93 篇 school of comput...
  • 50 篇 school of comput...
  • 48 篇 school of comput...
  • 44 篇 school of comput...
  • 41 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 luddy school of ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 fakultät für phy...

作者

  • 35 篇 liu lantao
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 3,871 篇 英文
  • 475 篇 其他
  • 42 篇 中文
  • 4 篇 德文
  • 2 篇 日文
检索条件"机构=School of Engineering in Computing and Informatics"
4387 条 记 录,以下是4001-4010 订阅
排序:
Motivated engineering Transfers - STEM Talent Expansion Program (METSTEP)
Motivated Engineering Transfers - STEM Talent Expansion Prog...
收藏 引用
2010 ASEE Annual Conference and Exposition
作者: Anderson-Rowland, Mary Rodriguez, Armando Grierson, Anita Department in Computing Informatics and Systems Design Engineering Arizona State University United States Department of Electrical Engineering Ira A. Fulton School of Engineering Arizona State University United States METS Center Ira A. Fulton School of Engineering Arizona State University United States
The Motivated engineering Transfers - STEM Talent Expansion Program (METSTEP) is a partnership between Arizona State University's (ASU's) Ira A. Fulton schools of engineering (lead institution) and non-metropo... 详细信息
来源: 评论
A framework for shrink-wrapping security services
A framework for shrink-wrapping security services
收藏 引用
2010 IEEE 7th International Conference on Services computing, SCC 2010
作者: Johnson, Gleneesha Agrawala, Ashok Billionniere, Elodie Computer Science Department University of Maryland College Park MD United States School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ United States
To achieve effective security in the increasingly dynamic computing environment of the mobile workforce our perspectives on security have to change, requiring the development of new approaches. We discuss a new securi... 详细信息
来源: 评论
An adaptive medium access control scheme for mobile ad hoc networks under self-similar traffic
An adaptive medium access control scheme for mobile ad hoc n...
收藏 引用
作者: Abu-Tair, Mamun Min, Geyong Ni, Qiang Liu, Hong Institute of Electronics Communications and Information Technology Queens University Belfast Belfast United Kingdom Department of Computing School of Computing Informatics and Media University of Bradford Bradford United Kingdom Electronic and Computer Engineering Division School of Engineering and Design Brunel University West London United Kingdom School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
An important function of wireless networks is to support mobile computing. Mobile Ad hoc NETworks (MANETs) consist of a collection of mobile stations communicating with each other without the use of any pre-existent i... 详细信息
来源: 评论
Design by physical composition for complex tangible user interfaces
Design by physical composition for complex tangible user int...
收藏 引用
28th Annual CHI Conference on Human Factors in computing Systems, CHI 2010
作者: Döring, Tanja Pfleging, Bastian Kray, Christian Schmidt, Albrecht Pervasive Computing and User Interface Engineering Group University of Duisburg-Essen 45117 Essen Germany School of Computing Science Informatics Research Institute Newcastle University Newcastle Upon Tyne NE1 7RU United Kingdom
In this paper, we present a novel approach to create devices with tangible user interfaces by physical com-position. While the separation of the user interface from the application logic has a long tradition in softwa... 详细信息
来源: 评论
A fastest multi-hop routing scheme for information dissemination in Vehicular Communication systems
A fastest multi-hop routing scheme for information dissemina...
收藏 引用
International Conference on Software, Telecommunications and Computer Networks (SoftCOM)
作者: M. Bilal P.M.L. Chan P. Pillai School of Computing Informatics & Media School of Engineering Design & Technology University of Bradford UK
The ability to realize an Intelligent Transportation System (ITS) to improve driver safety has attracted huge interests from researchers this decade. Vehicular Communication covering vehicle-to-vehicle (V2V), vehicle-... 详细信息
来源: 评论
Watershed from propagated markers improved by the combination of spatio-temporal gradient and binding of markers heuristics
Watershed from propagated markers improved by the combinatio...
收藏 引用
5th International Conference on Computer Vision Theory and Applications, VISAPP 2010
作者: Flores, Franklin César De Alencar Lotufo, Roberto Department Od Informatics State University of Maringá Av. Colombo 5790 - Zona 7 Maringá Brazil School of Electrical and Computing Engineering University of Campinas POBox 6101 Campinas Brazil
This paper presents the improvement of the watershed from propagated markers, a generic method to interactive segmentation of objects in image sequences, by the inclusion of a temporal gradient to the segmentation fra... 详细信息
来源: 评论
Web log data clustering for a multi-agent recommendation system
Web log data clustering for a multi-agent recommendation sys...
收藏 引用
2010 International Conference on Machine Learning and Cybernetics, ICMLC 2010
作者: Xavier-Junior, João C. Freitas, Alex A. Canuto, Anne M.P. Gonçalves, Luiz M.G. Computing and Automation Engineering Department Federal University of Rio Grande do Norte Natal Brazil School of Computing University of Kent Canterbury Kent United Kingdom Informatics and Applied Mathematics Department Federal University of Rio Grande do Norte Natal Brazil
In this paper, we propose an automatic way of recommending information to be visualized by users. The list of information to be recommended is generated based on the web logs of the users stored by the system in a mul... 详细信息
来源: 评论
Border Security: Supplementing Human Intelligence in a Sensor Network Using Sequential Pattern Mining
Border Security: Supplementing Human Intelligence in a Senso...
收藏 引用
International Conference on Human-Centric computing (HumanCom)
作者: Anirudh Kondaveeti George Runger Jeremy Rowe Huan Liu School of Computing Informatics and Decision Systems Engineering Arizona State University USA
Sensors are being deployed to improve border security generating enormous collections of data and databases. Unfortunately these sensors can respond to a variety of stimuli, sometimes reacting to meaningful events and... 详细信息
来源: 评论
Ant colonies for Temporal Logic falsification of hybrid systems
Ant colonies for Temporal Logic falsification of hybrid syst...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Yashwanth Singh Rahul Annapureddy Georgios E. Fainekos School of Computing Informatics and Decision Systems Engineering Arizona State University USA
The Extended Ant Colony Optimization (EACO) metaheuristic is applied to the problem of Metric Temporal Logic (MTL) falsification of nonautonomous hybrid systems. The goal of the MTL falsification problem is to detect ... 详细信息
来源: 评论
A Cooperative Dual Access Multi-Channel MAC Protocol for Ad Hoc Networks
A Cooperative Dual Access Multi-Channel MAC Protocol for Ad ...
收藏 引用
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
作者: Yuhan Moon Violet R. Syrotiuk School of Computing Informatics and Decision Systems Engineering Arizona State University USA
We present a multi-channel MAC protocol for ad hoc networks, for nodes equipped with a single half-duplex transceiver, combining the use of OFDMA and CDMA. To ease OFDMA channel management the network is clustered. Ch... 详细信息
来源: 评论