咨询与建议

限定检索结果

文献类型

  • 2,340 篇 会议
  • 1,979 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 4,415 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,717 篇 工学
    • 1,959 篇 计算机科学与技术...
    • 1,578 篇 软件工程
    • 518 篇 信息与通信工程
    • 436 篇 生物工程
    • 412 篇 控制科学与工程
    • 346 篇 生物医学工程(可授...
    • 267 篇 电气工程
    • 244 篇 光学工程
    • 215 篇 电子科学与技术(可...
    • 194 篇 机械工程
    • 112 篇 化学工程与技术
    • 111 篇 安全科学与工程
    • 108 篇 交通运输工程
    • 107 篇 动力工程及工程热...
    • 98 篇 仪器科学与技术
  • 1,587 篇 理学
    • 819 篇 数学
    • 486 篇 生物学
    • 440 篇 物理学
    • 296 篇 统计学(可授理学、...
    • 177 篇 系统科学
    • 111 篇 化学
  • 747 篇 管理学
    • 434 篇 管理科学与工程(可...
    • 337 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 330 篇 医学
    • 288 篇 临床医学
    • 277 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 125 篇 公共卫生与预防医...
  • 156 篇 法学
    • 140 篇 社会学
  • 93 篇 经济学
    • 93 篇 应用经济学
  • 76 篇 教育学
  • 64 篇 农学
  • 12 篇 军事学
  • 5 篇 文学
  • 5 篇 艺术学

主题

  • 104 篇 machine learning
  • 92 篇 computational mo...
  • 83 篇 semantics
  • 75 篇 deep learning
  • 69 篇 feature extracti...
  • 66 篇 artificial intel...
  • 65 篇 training
  • 62 篇 accuracy
  • 60 篇 data models
  • 58 篇 visualization
  • 57 篇 computer archite...
  • 54 篇 cloud computing
  • 48 篇 predictive model...
  • 48 篇 forecasting
  • 47 篇 informatics
  • 45 篇 internet of thin...
  • 45 篇 software
  • 44 篇 real-time system...
  • 43 篇 educational inst...
  • 43 篇 optimization

机构

  • 104 篇 school of comput...
  • 94 篇 school of comput...
  • 50 篇 school of comput...
  • 48 篇 school of comput...
  • 44 篇 school of comput...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 40 篇 luddy school of ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 35 篇 liu lantao
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 3,736 篇 英文
  • 638 篇 其他
  • 43 篇 中文
  • 4 篇 德文
  • 2 篇 日文
检索条件"机构=School of Engineering in Computing and Informatics"
4415 条 记 录,以下是4011-4020 订阅
排序:
Gradual identity exposure using attribute-based encryption
Gradual identity exposure using attribute-based encryption
收藏 引用
IEEE International Conference on Social computing
作者: Huang, Dijiang Zhou, Zhibin Yan, Zhu School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ United States Computer Science Peking University Beijing China
Many Attribute-Based Encryption (ABE) schemes do not protect receivers' privacy, such that all the attributes to describe the eligible receivers are transmitted in plaintexts. Hidden policy-based ABE schemes have ... 详细信息
来源: 评论
Prospects of solar energy in Australia
Prospects of solar energy in Australia
收藏 引用
6th International Conference on Electrical and Computer engineering, ICECE 2010
作者: Shafiullah, G.M. Oo, Amanullah M. T. Jarvis, Dennis Shawkat Ali, A.B.M. Wolfs, Peter Faculty of Sciences Engineering and Health CQUniversity Australia School of Computing Sciences Faculty of Arts Business Informatics and Education CQUniversity Australia Faculty of Science and Engineering Curtin University of Technology Australia
Today, more than 80% of energy is produced from fossil fuels that pollute the air and surrounding environments each and every day, creating global warming. Therefore it is time to think about alternative sources of en... 详细信息
来源: 评论
Dynamic highway congestion detection and prediction based on shock waves
Dynamic highway congestion detection and prediction based on...
收藏 引用
7th ACM International Workshop on VehiculAr InterNETworking, VANET '10
作者: Huang, Dijiang Shere, Swaroop Ahn, Soyoung School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85281 United States School of Civil Environmental and Sustainable Engineering Arizona State University Tempe AZ 85281 United States
Existing highway traffic monitoring system requires to deploy a large number of sensors and video cameras to detect traffic congestions, which is costly and prone to errors and failures [1]. In this paper, we present ... 详细信息
来源: 评论
Frameproof codes and compressive sensing
Frameproof codes and compressive sensing
收藏 引用
48th Annual Allerton Conference on Communication, Control, and computing, Allerton 2010
作者: Colbourn, Charles J. Horsley, Daniel Syrotiuk, Violet R. School of Computing Informatics and Decision Systems Engineering Arizona State University P.O. Box 878809 Tempe AZ 85287-8809 United States
Fingerprinting of digital content is often employed to prevent a small coalition of legitimate users from constructing a copy whose fingerprint is registered to a user not in the coalition. Sets of fingerprints that p... 详细信息
来源: 评论
How multiple concurrent users react to a quiz agent attentive to the dynamics of their game participation
How multiple concurrent users react to a quiz agent attentiv...
收藏 引用
9th International Joint Conference on Autonomous Agents and Multiagent Systems 2010, AAMAS 2010
作者: Huang, Hung-Hsuan Furukawa, Takuya Ohashi, Hiroki Nishida, Toyoaki Cerekovic, Aleksandra Pandzic, Igor S. Nakano, Yukiko Graduate School of Informatics Kyoto University Japan Faculty of Electrical Engineering and Computing University of Zagreb Croatia Department of Computer and Information Science Seikei University Japan
This paper presents a quiz game agent who is attentive to the dynamics of multiple concurrent participants. The attentiveness of this agent is meant to be achieved by an utterance policy that determines the nature of ... 详细信息
来源: 评论
A toolkit to explore lived experience of motivation: When words are not enough
A toolkit to explore lived experience of motivation: When wo...
收藏 引用
2011 5th International Conference on Pervasive computing Technologies for Healthcare and Workshops, PervasiveHealth 2011
作者: Axelrod, Lesley Balaam, Madeline Burridge, Jane Smith, Penny Probert Fitzpatrick, Geraldine Mawson, Sue Ricketts, Ian Rodden, Tom User Centred Technology Lab Interactive Systems Informatics University of Sussex Falmer Brighton BN1 9QH United Kingdom Culture Lab Newcastle University Newcastle upon Tyne NE1 7RU United Kingdom School of Health Sciences University of Southampton Southampton S017 1BJ United Kingdom Dept Engineering Science University of Oxford Oxford 0X1 3PJ United Kingdom Human Computer Interaction Group Technical University of Vienna Favoritenstrase 9-11 A-1040 Vienna Austria Centre for Health and Social Care Research Sheffield Hallam University Sheffield S10 2BP United Kingdom School of Computing University of Dundee Dundee DD1 4HN United Kingdom Dept. Computer Science University of Nottingham NG8 IBB United Kingdom
Designing to support motivation is an increasingly important issue, especially as pervasive technologies are used to facilitate various healthy behaviour changes. There are many motivation theories but these do not ma... 详细信息
来源: 评论
Multi-objective optimisation for multi-drug chemotherapy scheduling
Multi-objective optimisation for multi-drug chemotherapy sch...
收藏 引用
International Conference on Computer and Information Technology
作者: Algoul, S. Alam, M.S. Hossain, M.A. Majumder, M.A.A. Department of Computing School of Computing Informatics and Media University of Bradford Bradford United Kingdom Department of Applied Physics Electronics and Communication Engineering University of Dhaka Bangladesh Department of Clinical Sciences School of Life Sciences University of Bradford Bradford United Kingdom
This paper presents a multi-drug chemotherapy scheduling method for cancer treatment using multi-objective optimisation technique. Cancer cells, very often, grows resistance to a drug if it is administered alone for a... 详细信息
来源: 评论
ReDS: Reputation for directory services in P2P systems  10
ReDS: Reputation for directory services in P2P systems
收藏 引用
2010 ACM Workshop on Insider Threats, Insider Threats '10, Co-located with CCS'10
作者: Akavipat, Ruj Dhadphale, Apurv Kapadia, Apu Wright, Matthew School of Informatics and Computing Indiana University Bloomington Bloomington IN United States Dept. of Computer Science and Engineering University of Texas at Arlington Arlington TX United States
P2P systems rely on directory services for locating peers with the desired content and services. Directory services are themselves decentralized, such as with distributed hash tables (DHTs) that allow for efficient lo... 详细信息
来源: 评论
Towards a scalable and robust multi-tenancy SaaS  10
Towards a scalable and robust multi-tenancy SaaS
收藏 引用
Proceedings of the Second Asia-Pacific Symposium on Internetware
作者: Tsai, Wei-Tek Shao, Qihong Huang, Yu Bai, Xiaoying School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ United States Department of Computer Science and Technology Tsinghua University Beijing China
Software-as-as-Service (SaaS) is a new approach for developing software, and it is characterized by its multi-tenancy architecture and its ability to provide flexible customization to individual tenant. However, the m... 详细信息
来源: 评论
OIC: Ontology-based intelligent customization framework for SaaS
OIC: Ontology-based intelligent customization framework for ...
收藏 引用
2010 IEEE International Conference on Service-Oriented computing and Applications, SOCA 2010
作者: Tsai, Wei-Tek Shao, Qihong Li, Wu School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ United States Department of Computer Science and Technology Tsinghua University Beijing China
Software as a Service (SaaS) with multi-tenancy architecture is a popular approach. To support a significant number of tenants, SaaS applications need be customizable to fulfill the various functional and quality requ... 详细信息
来源: 评论