咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 16 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 5 篇 控制科学与工程
    • 3 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 测绘科学与技术
    • 1 篇 生物工程
  • 9 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 7 篇 理学
    • 3 篇 数学
    • 3 篇 系统科学
    • 1 篇 物理学
    • 1 篇 生物学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 3 篇 neural networks
  • 2 篇 computational mo...
  • 2 篇 predictive model...
  • 2 篇 computers
  • 2 篇 training
  • 2 篇 recurrent neural...
  • 1 篇 random errors
  • 1 篇 table lookup
  • 1 篇 structured singu...
  • 1 篇 computer science
  • 1 篇 surveys
  • 1 篇 tools
  • 1 篇 consumer behavio...
  • 1 篇 metals
  • 1 篇 reliability
  • 1 篇 learning systems
  • 1 篇 pseudospectra
  • 1 篇 data integrity
  • 1 篇 grasping
  • 1 篇 reinforcement le...

机构

  • 2 篇 college of compu...
  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 shool of compute...
  • 2 篇 shool of informa...
  • 2 篇 state key labora...
  • 2 篇 electronic engin...
  • 2 篇 shool of informa...
  • 2 篇 college of elect...
  • 2 篇 department of th...
  • 2 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 suoao technology...
  • 1 篇 school of comput...
  • 1 篇 the department o...
  • 1 篇 school of comput...
  • 1 篇 shool of opto-el...
  • 1 篇 the shool of eng...
  • 1 篇 shool of compute...
  • 1 篇 shool of compute...

作者

  • 2 篇 yu fei richard
  • 2 篇 zeng peigen
  • 2 篇 ma fei
  • 2 篇 hou haowen
  • 1 篇 niyato dusit
  • 1 篇 shrikarti bn
  • 1 篇 yuan wei
  • 1 篇 cao zehong
  • 1 篇 vu-le the-anh
  • 1 篇 michiels w.
  • 1 篇 bn shrikarti
  • 1 篇 changbin yu
  • 1 篇 wagenknecht t.
  • 1 篇 zhai hao
  • 1 篇 jie lian
  • 1 篇 chang su
  • 1 篇 li yichen
  • 1 篇 sujithra kanmani...
  • 1 篇 fengchao peng
  • 1 篇 you xinge

语言

  • 31 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Shool of Computer Science and Engineering"
34 条 记 录,以下是21-30 订阅
排序:
A Novel Identity Authentication for FPGA Based IP Designs
A Novel Identity Authentication for FPGA Based IP Designs
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yin Huang Wei Liang Jing Long Jianbo Xu Kuan-Ching Li College of Computer Science and Engineering Hunan University of Science and Technology Xiangtan Hunan China Shool of Opto-Electronic and Communication Engineering Xiamen University of Technology Xiamen China College of Computer Science and Electronic Engineering Hunan University Changsha Hunan China School of Computer Science Hubei University of Education Wuhan China
With the rapid development of Internet-of-Things (IoT), hardware security becomes an important issue. Once a chip is attacked, the authentication always faces serious credibility crisis. In this work, a Hausdorff dist... 详细信息
来源: 评论
Scalable Hash Ripple Join on Spark
Scalable Hash Ripple Join on Spark
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Hao Liu Jiang Xiao Fengchao Peng The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Services Computing Technology and System Lab Cluster and Grid Computing Lab Shool of Computer Science and Technology Huazhong University of Science and Technology
Hash Ripple join is an online aggregation algorithm that can rapidly give good approximate join results increases with the progress of the join operation and converges to the real result when the join finishes. Luo et... 详细信息
来源: 评论
Integrative computing method for the prediction of zinc-binding sites in proteins
Integrative computing method for the prediction of zinc-bind...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Hui Li Dechang Pi Yinghong Liang Chuanming Chen Yongzhi Liu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Shool of Software Engineering Jinling Institute of Technology Nanjing Jiangsu China
A large number of metalloproteins contained in Protein Data Bank, taking metal ions as cofactors, have important biological functions. As the second most abundant bound trace metal elements in organism, zinc ion plays... 详细信息
来源: 评论
A Three-Stage Defect Prediction Model for Cross-Project Defect Prediction
A Three-Stage Defect Prediction Model for Cross-Project Defe...
收藏 引用
International Conference on Dependable Systems and Their Applications (DSA)
作者: Song Huang Yaning Wu Haijin Ji Chengzu Bai PLA Military Training Software Testing and Evaluation Centre Nanjing Jiangsu Province China Shool of Computer Science and Technology Huaiyin Normal University Huaian Jiangsu Province China Cornmand Information Institute Army Engineering University of PLA Nanjing Jiangsu Province China Institute of Meteorology & Oceanography National University of Defense Technology Changsha China
Aiming at dealing with the problems of the data deficiency, data high dimensionality in software defect prediction (SDP), this paper proposes a novel three-stage defect prediction model. First we introduced the inform... 详细信息
来源: 评论
Analysis of image stitching error based on scale invariant feature transform and random sample consensus  12
Analysis of image stitching error based on scale invariant f...
收藏 引用
12th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2015
作者: Shuang, Dou Cai, Hua Yang, Yong Tailin, Han Xue, Menghan School of Computer Engineering Changchun University of Science and Technology Changchun China College of Electronic and Information Engineer Changchun University of Science and Technology Changchun China Electronic Engineering Shool Beijing University of Posts and Telecommunications Changchun China
This article introduced the process of image stitching based on SIFT and RANSAC. It was pointed out that the reliability calculation of the RANSAC algorithm is based on an idealized assumption which does not hold. The... 详细信息
来源: 评论
Analysis of image stitching error based on scale invariant feature transform and random sample consensus
Analysis of image stitching error based on scale invariant f...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Dou Shuang Hua Cai Yong Yang Han Tailin Menghan Xue School of Computer Engineering Changchun University of Science and Technology Changchun China College of electronic and information engineer Changchun University of Science and Technology Changchun China Electronic Engineering Shool Beijing University of Posts and Telecommunications Changchun China
This article introduced the process of image stitching based on SIFT and RANSAC. It was pointed out that the reliability calculation of the RANSAC algorithm is based on an idealized assumption which does not hold. The... 详细信息
来源: 评论
Thinking on Design and Realization of Source Code Online Evaluation System
Thinking on Design and Realization of Source Code Online Eva...
收藏 引用
2013 2nd International Conference on Social science and Education(ICSSE 2013)
作者: Yuansong Li Software Engineering Department Shool of Computer Science Sichuan University of Science and Engineering
The traditional evaluation procedure is mainly manual evaluation in practical teaching field. Such work is very complicated. With the constant development and improvement of computer technology, there are high require... 详细信息
来源: 评论
Software design of intelligent solar drying system for agricultural and sideline products
Software design of intelligent solar drying system for agric...
收藏 引用
International Conference on Control, Automation, Robotics and Vision (ICARCV)
作者: Sijie Ouyang Jianping Chen Qijun Xiao Shun Cheng Shool of Electronic Information & Mechanical Electrical Engineering Zhaoqing University Zhaoqing China School of Computer Science Zhaoqing University Zhaoqing China
Solar energy is renewable energy which can be used in the drying of agricultural and sideline products. The lower computer measurement and control subsystem is designed and the improved binary table lookup algorithm i... 详细信息
来源: 评论
Privacy-Preserving Protocol for Epidemiology in Effect of Radiation
Privacy-Preserving Protocol for Epidemiology in Effect of Ra...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Hiroaki Kikuchi Tomoki Sato Jun Sakuma Department of Frontier Media Science School of Interdisciplinary Mathematical Sciences Meiji University Tokyo Japan Guraduate School of Engineering Tokai University Tokyo Japan Computer Science Department Guraduate Shool of Systems and Information Engineering University of Tsukuba Tsukuba Japan
This paper studies privacy issues in epidemiology that aims to clarify statistical significant of interested attribute that is distributed into two independent parties. The first proposed protocol computes the size of... 详细信息
来源: 评论
Association Rules Mining with Multiple Constraints
收藏 引用
Procedia engineering 2011年 15卷 1678-1683页
作者: Li Guang-yuan Cao Dan-yang Guo Jian-wei School of Computer and Communication Engineering University of Science&Technology Beijing Beijing China Shool of Computer and Information Engineering Guangxi Teachers Education University Nanning China
Association rules mining(ARM) is an important task in the field of data mining, mining frequent itemsets is a key step of many algorithms for ARM. In a very large dataset, rules generated may be very large, but some o... 详细信息
来源: 评论