咨询与建议

限定检索结果

文献类型

  • 238 篇 期刊文献
  • 170 篇 会议
  • 2 册 图书

馆藏范围

  • 410 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 259 篇 理学
    • 157 篇 数学
    • 72 篇 物理学
    • 54 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 32 篇 系统科学
    • 26 篇 化学
    • 16 篇 地球物理学
  • 234 篇 工学
    • 159 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 43 篇 生物工程
    • 39 篇 生物医学工程(可授...
    • 36 篇 信息与通信工程
    • 35 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 26 篇 电气工程
    • 18 篇 光学工程
    • 17 篇 化学工程与技术
    • 16 篇 力学(可授工学、理...
    • 12 篇 机械工程
    • 9 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
    • 7 篇 仪器科学与技术
  • 49 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 31 篇 医学
    • 26 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 8 篇 农学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 7 篇 法学
    • 7 篇 社会学
  • 7 篇 教育学
  • 5 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 11 篇 computational mo...
  • 10 篇 feature extracti...
  • 7 篇 image segmentati...
  • 6 篇 deep learning
  • 6 篇 computer archite...
  • 6 篇 neural networks
  • 6 篇 data visualizati...
  • 5 篇 pulsars
  • 5 篇 data mining
  • 5 篇 visualization
  • 5 篇 computers
  • 5 篇 three dimensiona...
  • 5 篇 machine learning
  • 5 篇 scientific compu...
  • 5 篇 training
  • 5 篇 principal compon...
  • 4 篇 parallel process...
  • 4 篇 message passing
  • 4 篇 data privacy
  • 4 篇 approximation al...

机构

  • 24 篇 scientific compu...
  • 7 篇 university of ch...
  • 7 篇 international ce...
  • 6 篇 center of scient...
  • 6 篇 computer science...
  • 6 篇 hourani center f...
  • 6 篇 ministry of educ...
  • 6 篇 centre for astro...
  • 6 篇 institute of nat...
  • 6 篇 beijing institut...
  • 5 篇 department of ph...
  • 5 篇 faculty of scien...
  • 5 篇 institute for pa...
  • 5 篇 departamento de ...
  • 5 篇 department for p...
  • 5 篇 department of ph...
  • 5 篇 computer network...
  • 5 篇 yerevan physics ...
  • 5 篇 kirchhoff-instit...
  • 5 篇 institut für ast...

作者

  • 12 篇 liu ya-feng
  • 11 篇 shedeed howida a...
  • 10 篇 tolba mohamed f.
  • 9 篇 ebied hala m.
  • 8 篇 ettaouil mohamed
  • 7 篇 yu wei
  • 7 篇 hala m. ebied
  • 6 篇 abualigah laith
  • 5 篇 michael kramer
  • 5 篇 ma yingjin
  • 5 篇 xu dachuan
  • 5 篇 howida a. shedee...
  • 4 篇 xiao nachuan
  • 4 篇 aviad levis
  • 4 篇 alan p. marscher
  • 4 篇 jirong mao
  • 4 篇 charles f. gammi...
  • 4 篇 razieh emami
  • 4 篇 svetlana jorstad
  • 4 篇 nicola marchili

语言

  • 385 篇 英文
  • 22 篇 其他
  • 3 篇 中文
检索条件"机构=Scientific Computing and Computer sciences"
410 条 记 录,以下是361-370 订阅
排序:
Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization
Addressing Accuracy Issues in Privacy Preserving Data Mining...
收藏 引用
IEEE International Conference on Intelligence and Security Informatics, ISI
作者: Jie Wang Jun Zhang Laboratory for High Performance Scientific Computing and Computer SimulationDepartment of Compute Sciences University of Kentucky Lexington KY USA
Maintaining data mining accuracy on distorted datasets is an important issue in privacy preserving data mining. Using matrix approximation, we propose several efficient and flexible techniques to address this issue, a... 详细信息
来源: 评论
Numerical approaches for dipole modeling in finite element method based source analysis
收藏 引用
International Congress Series 2007年 1300卷 189-192页
作者: Wolters, C.H. Köstler, H. Möller, C. Härdtlein, J. Anwander, A. Institute for Biomagnetism and Biosignalanalysis Münster University Hospital Münster Germany Scientific Computing and Imaging Institute University of Utah Salt Lake City United States Department of Computer Science 10 University Erlangen-Nuremberg Erlangen Germany Max Planck Institute for Human Cognitive and Brain Sciences Leipzig Germany
In EEG/MEG source analysis, a mathematical dipole is widely used as the "atomic" structure of the primary current distribution. When using realistic finite element models for the forward problem, the current... 详细信息
来源: 评论
NNMF-based factorization techniques for high-accuracy privacy protection on non-negative-valued datasets
NNMF-based factorization techniques for high-accuracy privac...
收藏 引用
作者: Wang, Jie Zhong, Weijun Zhang, Jun Department of Management Sciences and Engineering Southeast University Nanjing 210096 China Laboratory for High Performance Scientific Computing and Computer Simulation Department of Computer Sciences University of Kentucky Lexington KY 4056 United States
The challenge in preserving data privacy is how to protect attribute values without jeopardizing the similarity between data objects under analysis. In this paper, we further our previous work on applying matrix techn... 详细信息
来源: 评论
Adaptive Surface Reconstruction from Non Uniform Point Sets
Adaptive Surface Reconstruction from Non Uniform Point Sets
收藏 引用
International Conference on computer Engineering and Systems
作者: M. S. Abdel-wahab A. S. Hussein M. S. Gaber Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt
In this paper, a proposed algorithm for surface reconstruction from uniform or non-uniform point sets is introduced. The points are typically acquired with multiple range scans of any 3D object. The proposed algorithm... 详细信息
来源: 评论
NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets
NNMF-Based Factorization Techniques for High-Accuracy Privac...
收藏 引用
IEEE International Conference on Data Mining Workshops (ICDM Workshops)
作者: Jie Wang Weijun Zhong Jun Zhang Department of Management Sciences and Engineering South-East University Nanjing China Laboratory for High Performance Scientific Computing and Computer Simulation Department of Computer Sciences University of Kentucky USA
The challenge in preserving data privacy is how to protect attribute values without jeopardizing the similarity between data objects under analysis. In this paper, we further our previous work on applying matrix techn... 详细信息
来源: 评论
Improved string matching algorithm
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第2期32卷 62-64页
作者: Wang, Cheng Liu, Jingang Joint Faculty of Computer Scientific Research Capital Normal University Beijing 100037 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
String matching algorithm is an important method in intrusion detection. An improved algorithm is proposed for string matching based on the discussions of several common string matching algorithms, for example, BF, KM... 详细信息
来源: 评论
Parallel PDE-based simulations using the common component architecture
收藏 引用
Lecture Notes in Computational Science and Engineering 2006年 51卷 327-381页
作者: McInnes, Lois Curfman Allan, Benjamin A. Armstrong, Robert Benson, Steven J. Bernholdt, David E. Dahlgren, Tamara L. Diachin, Lori Freitag Krishnan, Manojkumar Kohl, James A. Walter Larson, J. Lefantzi, Sophia Nieplocha, Jarek Norris, Boyana Parker, Steven G. Ray, Jaideep Zhou, Shujia Mathematics and Computer Science Division Argonne National Laboratory Argonne IL United States Livermore CA United States Computer Science and Mathematics Division Oak Ridge National Laboratory Oak Ridge TN United States Center for Applied Scientific Computing Lawrence Livermore National Laboratory Livermore CA United States Computational Sciences and Mathematics Pacific Northwest National Laboratory Richland WA United States Reacting Flow Research SNL Livermore CA United States Scientific Computing and Imaging Institute University of Utah Salt Lake City UT United States Advanced Software R and D SNL Livermore CA United States Northrop Grumman Corporation Information Technology Sector Chantilly VA United States
The complexity of parallel PDE-based simulations continues to increase as multimodel, multiphysics, and multi-institutional projects become widespread. A goal of component - based software engineering in such large-sc... 详细信息
来源: 评论
A hybrid system for three-dimensional objects reconstruction from point-clouds based on ball pivoting algorithm and radial basis functions
收藏 引用
WSEAS Transactions on computers 2005年 第7期4卷 796-804页
作者: Hussein, Ashraf Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Abbassia 11566 Cairo Egypt
In this paper, a new hybrid system for 3D objects reconstruction is presented. This system is based on the well-known Ball Pivoting Algorithm (BPA) of Bernardini et al. combined with the Radial Basis Function (RBF) mo... 详细信息
来源: 评论
Some properties on multivariate filter banks with a matrix factorization
收藏 引用
Progress in Natural Science:Materials International 2005年 第2期15卷 20-30页
作者: LIAN Qiaofang1, XIAO Hongying2* and CHEN Qiuhui3(1. Department of Mathematics, Beijing Jiaotong University, Beijing 100044, China 2. Institute of Mathematics, Academy of Mathematics and System sciences, Chinese Academy of sciences, Beijing 100080, China 3. Department of scientific computing and computer Applications, Zhongshan University, Guangzhou 510275, China) Department of Mathematics Beijing Jiaotong University Beijing 100044 China. Institute of Mathematics Academy of Mathematics and System Sciences Chinese Academy of Sciences Beijing 100080 China. Department of Scientific Computing and Computer Applications Zhongshan University Guangzhou 510275 China
A class of multivariate filter banks with a matrix factorization has been developed by Chen et al. The main purpose of this paper is to discuss some further properties of this kind of filter bank, such as the complete... 详细信息
来源: 评论
Tree wavelet approximations with applications
收藏 引用
Science China Mathematics 2005年 第5期48卷 680-702页
作者: XU Yuesheng & ZOU Qingsong Department of Mathematics, Syracuse University, Syracuse, NY 13244, USA Institute of Mathematics, Academy of Mathematics and System sciences, Chinese Academy of sciences, Beijing 100080, China Department of scientific computing and computer Science, Zhongshan University, Guangzhou 510275, China 1. Department of Mathematics Syracuse University 13244 Syracuse NY USA 2. Institute of Mathematics Academy of Mathematics and System Sciences Chinese Academy of Sciences 100080 Beijing China 3. Department of Scientific Computing and Computer Science Zhongshan University 510275 Guangzhou China
We construct a tree wavelet approximation by using a constructive greedy scheme (CGS). We define a function class which contains the functions whose piecewise polynomial approximations generated by the CGS have a pres... 详细信息
来源: 评论