咨询与建议

限定检索结果

文献类型

  • 97 篇 会议
  • 45 篇 期刊文献

馆藏范围

  • 142 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 95 篇 工学
    • 63 篇 计算机科学与技术...
    • 57 篇 软件工程
    • 17 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 6 篇 机械工程
    • 6 篇 生物工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 电气工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 轻工技术与工程
    • 3 篇 农业工程
    • 3 篇 网络空间安全
  • 51 篇 理学
    • 26 篇 数学
    • 10 篇 生物学
    • 8 篇 系统科学
    • 5 篇 物理学
    • 3 篇 化学
    • 3 篇 统计学(可授理学、...
  • 30 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
  • 8 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学

主题

  • 18 篇 xml
  • 6 篇 education
  • 6 篇 data mining
  • 5 篇 databases
  • 5 篇 mathematics
  • 5 篇 relational datab...
  • 4 篇 indexing
  • 4 篇 linux
  • 3 篇 computer science
  • 3 篇 wavelet transfor...
  • 3 篇 query processing
  • 3 篇 data privacy
  • 3 篇 rough sets
  • 3 篇 educational inst...
  • 3 篇 computational mo...
  • 3 篇 algorithm design...
  • 3 篇 protocols
  • 3 篇 secure storage
  • 3 篇 web sites
  • 3 篇 clustering algor...

机构

  • 14 篇 school of scienc...
  • 10 篇 teaching and res...
  • 9 篇 teaching and res...
  • 8 篇 teaching and res...
  • 7 篇 college of mathe...
  • 7 篇 teaching and res...
  • 6 篇 royal stoke univ...
  • 6 篇 cambridge univer...
  • 6 篇 department of co...
  • 5 篇 leeds institute ...
  • 5 篇 center for psych...
  • 5 篇 department of in...
  • 5 篇 institute for pa...
  • 5 篇 department of st...
  • 5 篇 university of pi...
  • 5 篇 arnie charbonnea...
  • 5 篇 ilsbio llc bioba...
  • 5 篇 department of mo...
  • 5 篇 osaka internatio...
  • 5 篇 research departm...

作者

  • 16 篇 lv teng
  • 15 篇 yan ping
  • 14 篇 teng lv
  • 11 篇 ping yan
  • 10 篇 he weimin
  • 8 篇 weimin he
  • 6 篇 su-fang zhang
  • 5 篇 jun-hai zhai
  • 5 篇 tang wei
  • 4 篇 wang ya-jun
  • 4 篇 feng bo
  • 4 篇 yu wei
  • 4 篇 lei jingsheng
  • 3 篇 zhang su-fang
  • 3 篇 mingdi xu
  • 3 篇 zhai jun-hai
  • 3 篇 qu yun-hui
  • 3 篇 lou yan
  • 3 篇 fan bing-bing
  • 3 篇 xi-zhao wang

语言

  • 138 篇 英文
  • 4 篇 中文
检索条件"机构=Section of Computer Teaching and Research"
142 条 记 录,以下是101-110 订阅
排序:
Text Categorization research Based on Cluster Idea
Text Categorization Research Based on Cluster Idea
收藏 引用
International Workshop on Education Technology and computer Science, ETCS
作者: Jialun Lin Xiaoling Li Yuan Jiao Computer Teaching and Research Section Hainan Medical College China
Classification and clustering are frequently-used methods in data excavation technology. This paper introduces the idea of text clustering into the categorization algorithm study. The authors also attempt to use the t... 详细信息
来源: 评论
Face recognition based on 2DPCA and fuzzy-rough technique
Face recognition based on 2DPCA and fuzzy-rough technique
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Zhai, Jun-Hai Bai, Chen-Yan Zhang, Su-Fang Machine Learning Center Faculty of Mathematics and Computer Science Hebei University Baoding 071002 China Teaching and Research of Section of Mathematics Hebei Information Engineering School Baoding 071000 China
To remove the redundant features extracted by using 2DPCA methods, a face recognition method is presented based on 2DPCA and fuzzy-rough technique in this paper. The proposed method selects the important features for ... 详细信息
来源: 评论
research and realization of the mechanism of embedded linux kernel semaphore
Research and realization of the mechanism of embedded linux ...
收藏 引用
International Conference on Advanced computer Theory and Engineering, ICACTE
作者: Ya-Jun Wang The teaching and research section of computer The Peoples Armed Police Forces Academy Langfang Hebei China the teaching and research section of computer the Chinese People's Armed Police Forces Academy langfang hebei China
Linux kernel semaphore mechanism is an effective means of synchronizing tasks which compete against each other to enter the same kernel critical section. However, the problem of priority inversion in Linux kernel sema... 详细信息
来源: 评论
Experiences from implementing an educational MMORPG
Experiences from implementing an educational MMORPG
收藏 引用
International IEEE Consumer Electronics Society's Games Innovations Conference, ICE-GIC
作者: Bian Wu Alf Inge Wang Yuanyuan Zhang Department of Computer and Information Science Norwegian University of Science and Technology Trondheim Norway Computer Teaching and Research Section Institute of Chemical Defense of People Liberation Army Beijing China
This paper describes the implementation of an educational Massively Multiplayer Online Role-Playing Game (MMORPG), named World of Wisdom (WoW). WoW is designed under the context of game design theory and game features... 详细信息
来源: 评论
Face recognition based on 2DPCA and fuzzy-rough technique
Face recognition based on 2DPCA and fuzzy-rough technique
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jun-Hai Zhai Chen-Yan Bai Su-Fang Zhang Machine Learning Center Faculty of Mathematics and Computer Science Hebei University Baoding China Teaching and research of section of mathematics Hebei Information Engineering School Baoding China
To remove the redundant features extracted by using 2DPCA methods, a face recognition method is presented based on 2DPCA and fuzzy-rough technique in this paper. The proposed method selects the important features for ... 详细信息
来源: 评论
Bloom filter-based keyword search over XML data in structured Peer-to-Peer systems
Bloom filter-based keyword search over XML data in structure...
收藏 引用
International Conference on computer Science and Information Technology (CSIT)
作者: Weimin He Teng Lv Department of Computing and New Media Technologies University of Wisconsin Stevens Stevens Point WI USA Teaching and Research Section of Computer Artillery Academy of PLA Hefei Anhui China
With the popularity of Extensible Markup Language (XML) as the new standard of data exchange on the web, a large number of data sources are represented or encoded in XML format. Therefore, querying and searching XML d... 详细信息
来源: 评论
A Simulation Based Verification Method for Elevator Traffic Planning
A Simulation Based Verification Method for Elevator Traffic ...
收藏 引用
The 2010 International Conference on computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Yang Zhenshan Zhang Yunli College of Information Science and Engineering Bohai University Jinzhou P.R.China Computer Teaching and Research Section Liaoning Medical University Jinzhou P.R.China
Elevator traffic systems are the main vertical transportation facilities in high-rise buildings which play a vital role in modern life. A well-designed elevator traffic system should provide passengers with both suffi... 详细信息
来源: 评论
A survey of modelling uncertain data
A survey of modelling uncertain data
收藏 引用
International Conference on computer Science and Information Technology (CSIT)
作者: Teng Lv Weimin He Ping Yan Teaching and Research Section of Computer Artillery Academy of PLA Hefei China Department of Computing and New Media Technologies University of Wisconsin Stevens Stevens Point WI USA School of Science Anhui Agricultural University Hefei China
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering p... 详细信息
来源: 评论
research and application of reverse mobile commerce platform
Research and application of reverse mobile commerce platform
收藏 引用
1st International Conference on Information Science and Engineering, ICISE2009
作者: Hu, Zhiyong Computer Teaching and Research Section Guangzhou Communication Institute Guangzhou 510502 China
Reverse Mobile Commerce Platform is an innovative e-commerce mode that reverses the traditional business process of e-commerce. Commodities traded on such platform are invisible information such as certain public idea... 详细信息
来源: 评论
网络入侵检测系统中关键技术的应用研究
网络入侵检测系统中关键技术的应用研究
收藏 引用
第21届全国计算机新科技与计算机教育学术大会
作者: KAN Yuan 阚媛 ZHANG Guoqing 张国庆 ZHENG Guixing 郑贵省 Teaching and Research Section of Computer Military Transportation University Tianjin 300161 军事交通学院计算机教研室 天津300161
当今信息时代,入侵检测作为一种主动的安全防护技术,提供了对内部攻击、外部攻击和误操作的实时保护,能够从网络安全的立体纵深、多层次防御的角度出发提供安全服务,由此成为安全领域的研究热点之一。对于组成入侵检测系统的各个模... 详细信息
来源: 评论