咨询与建议

限定检索结果

文献类型

  • 276 篇 会议
  • 154 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 291 篇 工学
    • 234 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 60 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 40 篇 生物工程
    • 21 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 18 篇 光学工程
    • 15 篇 仪器科学与技术
    • 14 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 9 篇 土木工程
    • 9 篇 化学工程与技术
    • 9 篇 环境科学与工程(可...
    • 8 篇 建筑学
  • 130 篇 理学
    • 70 篇 数学
    • 39 篇 生物学
    • 22 篇 系统科学
    • 20 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
  • 96 篇 管理学
    • 62 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 26 篇 医学
    • 25 篇 基础医学(可授医学...
    • 24 篇 临床医学
    • 14 篇 公共卫生与预防医...
    • 9 篇 药学(可授医学、理...
  • 20 篇 法学
    • 14 篇 社会学
  • 8 篇 教育学
  • 6 篇 经济学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 17 篇 software enginee...
  • 12 篇 semantics
  • 12 篇 software
  • 10 篇 reinforcement le...
  • 8 篇 edge computing
  • 7 篇 software systems
  • 7 篇 wireless sensor ...
  • 7 篇 analytical model...
  • 7 篇 machine learning
  • 7 篇 artificial intel...
  • 6 篇 internet of thin...
  • 6 篇 conferences
  • 6 篇 ecosystems
  • 6 篇 computer archite...
  • 6 篇 security
  • 5 篇 deep learning
  • 5 篇 decision making
  • 5 篇 accuracy
  • 5 篇 cloud computing
  • 5 篇 open source soft...

机构

  • 8 篇 state key labora...
  • 7 篇 national enginee...
  • 7 篇 shenzhen key lab...
  • 6 篇 the state key la...
  • 6 篇 guangdong labora...
  • 6 篇 state key labora...
  • 6 篇 university of ch...
  • 6 篇 state key lab fo...
  • 6 篇 national water a...
  • 5 篇 national enginee...
  • 5 篇 school of comput...
  • 5 篇 pca lab key lab ...
  • 4 篇 college of compu...
  • 4 篇 information syst...
  • 4 篇 the hong kong po...
  • 4 篇 software enginee...
  • 4 篇 school of comput...
  • 4 篇 institute for so...
  • 4 篇 state key lab of...
  • 4 篇 school of comput...

作者

  • 15 篇 ismail leila
  • 11 篇 buyya rajkumar
  • 9 篇 leila ismail
  • 8 篇 guangming xie
  • 8 篇 wang chen
  • 8 篇 chen wang
  • 7 篇 rabiser rick
  • 7 篇 xie guangming
  • 7 篇 yang jian
  • 6 篇 ghose aditya k.
  • 6 篇 ying he
  • 5 篇 lochau malte
  • 5 篇 lê lam-son
  • 5 篇 feichtinger kevi...
  • 5 篇 xia xin
  • 5 篇 choo kim-kwang r...
  • 5 篇 ghose aditya
  • 5 篇 schmidt-thieme l...
  • 5 篇 f. richard yu
  • 4 篇 xuechen zhao

语言

  • 410 篇 英文
  • 21 篇 其他
  • 5 篇 中文
检索条件"机构=Software and Systems Engineering Lab"
436 条 记 录,以下是241-250 订阅
排序:
Improving Learning Algorithm Performance for Spiking Neural Networks
Improving Learning Algorithm Performance for Spiking Neural ...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Qiang Fu Yuling Luo Junxiu Liu Jinjie Bi Senhui Qiu Yi Cao Xuemei Ding Guangxi Key Lab of Multi-Source Information Mining & Security Faculty of Electronic Engineering Guangxi Normal University Guangxi Experiment Centre of Information Science Department of Business Transformation and Sustainable Enterprise Surrey Business SchoolUniversity of Surrey Faculty of Software Fujian Normal University School of Computing and Intelligent Systems Faculty of Computing and Engineering Ulster University
This paper proposes three methods to improve the learning algorithm for spiking neural networks(SNNs). The aim is to improve learning performance in SNNs where neurons are allowed to fire multiple times. The perform... 详细信息
来源: 评论
Chemical Substance Classification Using Long Short-Term Memory Recurrent Neural Network
Chemical Substance Classification Using Long Short-Term Memo...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Jinlei Zhang Junxiu Liu Yuling Luo Qiang Fu Jinjie Bi Senhui Qiu Yi Cao Xuemei Ding Guangxi Key Lab of Multi-Source Information Mining & Security Faculty of Electronic Engineering Guangxi Normal University Guangxi Experiment Centre of Information Science Department of Business Transformation and Sustainable Enterprise Surrey Business SchoolUniversity of Surrey Faculty of Software Fujian Normal University School of Computing and Intelligent Systems Faculty of Computing and Engineering Ulster University
This paper proposed a chemical substance detection method using the Long Short-Term Memory of Recurrent Neural Networks(LSTM-RNN). The chemical substance data was collected using a mass spectrometer which is a time-se... 详细信息
来源: 评论
Global recursive based node importance evaluation  12th
Global recursive based node importance evaluation
收藏 引用
12th International Conference on Advanced Data Mining and Applications, ADMA 2016
作者: Zhao, Lu Xiong, Li Xue, Shan School of Management Shanghai University Shanghai200444 China Lab of Decision Systems and e-Service Intelligence Faculty of Engineering and Information Technology School of Software University of Technology Sydney Sydney2007 Australia
The world city network (WCN) research has been promoting the evaluation algorithms in complex networks. The study of urban network focuses on the measurements of city position in the WCN. In previous study, a set of a... 详细信息
来源: 评论
A network-based approach to detect spammer groups
A network-based approach to detect spammer groups
收藏 引用
2016 International Joint Conference on Neural Networks, IJCNN 2016
作者: Do, Quynh Ngoc Thuy Zhilin, Alexey Junior, Caibre Zordan Pio Wang, Gaoxiang Hussain, Farookh Khadeer Decision Support and e-Service Intelligence Lab Centre for Quantum Computation and Intelligent Systems Faculty of Engineering and Information Technology University of Technology Sydney Australia School of Software University of Technology Sydney Sydney Australia
Online reviews nowadays are an important source of information for consumers to evaluate online services and products before deciding which product and which provider to choose. Therefore, online reviews have signific... 详细信息
来源: 评论
Classification and retrieval of digital pathology scans: A new dataset
arXiv
收藏 引用
arXiv 2017年
作者: Babaie, Morteza Kalra, Shivam Sriram, Aditya Mitcheltree, Christopher Zhu, Shujin Khatami, Amin Rahnamayan, Shahryar Tizhoosh, H.R. KIMIA Lab University of Waterloo Canada Mathematics and Computer Science Amirkabir University Tehran Iran Electrical and Computer Engineering University of Waterloo Canada School of Electronic & Optical Eng. Nanjing University of Science & Technology Jiangsu China Institute for Intelligent Systems Research and Innovation Deakin University Australia Electrical Computer and Software Engineering University of Ontario Institute of Technology Oshawa Canada
In this paper, we introduce a new dataset, Kimia Path24, for image classification and retrieval in digital pathology. We use the whole scan images of 24 different tissue textures to generate 1,325 test patches of size... 详细信息
来源: 评论
7.3: Compare Variation of User's EEG Owing to Parallax Cue
收藏 引用
SID Symposium Digest of Technical Papers 2018年 第S1期49卷
作者: Haichen Hu Danli Wang Kang Yue Xinpan Yang Steve C. Chiu Beijing Key Lab of Human-Computer Interaction Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China The State Key Laboratory of Management and Control of Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China College of Science and Engineering Idaho State University Pocatello America
3D display has become increasingly popular in many fields. It can provide incredible immersion compared with 2D display. There are many researches referring to the change of user about no matter subjective experience ... 详细信息
来源: 评论
Temporal pattern discovery for accurate sepsis diagnosis in ICU patients
arXiv
收藏 引用
arXiv 2017年
作者: Sheetrit, Eitam Nissim, Nir Klimov, Denis Fuchs, Lior Elovici, Yuval Shahar, Yuval Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel Malware Lab Cyber Security Research Center Ben-Gurion University of the Negev Beer-Sheva Israel Medical Informatics Research Center Ben-Gurion University of the Negev Beer-Sheva Israel Soroka University Medical Center Beer-Sheva Israel
Sepsis is a condition caused by the body's overwhelming and life-threatening response to infection, which can lead to tissue damage, organ failure, and finally death. Common signs and symptoms include fever, incre... 详细信息
来源: 评论
Activity Recognition of a Badminton Game Through Accelerometer and Gyroscope
Activity Recognition of a Badminton Game Through Acceleromet...
收藏 引用
International Conference on Computer and Information Technology
作者: Md. Ariful Islam Anik Mehedi Hassan Hasan Mahmud Md. Kamrul Hasan Systems and Software Lab (SSL) Department of Computer Science and Engineering (CSE) Islamic University of Technology (IUT) Gazipur Bangladesh
The scope for doing physical exercises in daily life is declining day by day. But, the importance of human physical exercise for a healthy life, remains the same. It is necessary to generate a solution to simulate the... 详细信息
来源: 评论
EXPRESit: Interactive Messaging via Gestures
EXPRESit: Interactive Messaging via Gestures
收藏 引用
International Conference on Computer and Information Technology
作者: Md. Zubair Ibne Alam Arnab Rahman Chowdhury Mehedi Hassan Hasan Mahmud Md. Kamrul Hasan Systems and Software Lab (SSL) Department of Computer Science and Engineering (CSE) Islamic University of Technology (IUT) Gazipur Bangladesh
Text communication or messaging is devoid of emotional expression, gesture and intonation. As a result text communication has become a robotic conversation between human beings. People uses various applications like, ... 详细信息
来源: 评论
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable Computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论