咨询与建议

限定检索结果

文献类型

  • 2,195 篇 期刊文献
  • 1,741 篇 会议
  • 88 册 图书

馆藏范围

  • 4,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,637 篇 工学
    • 2,081 篇 计算机科学与技术...
    • 1,692 篇 软件工程
    • 577 篇 信息与通信工程
    • 375 篇 控制科学与工程
    • 349 篇 生物工程
    • 340 篇 电气工程
    • 237 篇 生物医学工程(可授...
    • 200 篇 光学工程
    • 177 篇 机械工程
    • 172 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 99 篇 动力工程及工程热...
    • 98 篇 网络空间安全
    • 95 篇 化学工程与技术
    • 89 篇 安全科学与工程
    • 88 篇 仪器科学与技术
  • 1,339 篇 理学
    • 720 篇 数学
    • 380 篇 生物学
    • 288 篇 物理学
    • 245 篇 统计学(可授理学、...
    • 148 篇 系统科学
    • 113 篇 化学
  • 805 篇 管理学
    • 469 篇 管理科学与工程(可...
    • 360 篇 图书情报与档案管...
    • 262 篇 工商管理
  • 299 篇 医学
    • 256 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 136 篇 公共卫生与预防医...
    • 99 篇 药学(可授医学、理...
  • 153 篇 法学
    • 117 篇 社会学
  • 80 篇 经济学
  • 57 篇 教育学
  • 57 篇 农学
  • 10 篇 文学
  • 10 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 133 篇 deep learning
  • 123 篇 machine learning
  • 90 篇 feature extracti...
  • 86 篇 artificial intel...
  • 76 篇 computational mo...
  • 76 篇 accuracy
  • 75 篇 semantics
  • 74 篇 training
  • 62 篇 predictive model...
  • 56 篇 data models
  • 53 篇 internet of thin...
  • 51 篇 data mining
  • 51 篇 federated learni...
  • 45 篇 cloud computing
  • 44 篇 computer science
  • 44 篇 reinforcement le...
  • 44 篇 convolutional ne...
  • 43 篇 optimization
  • 36 篇 visualization
  • 35 篇 security

机构

  • 171 篇 school of comput...
  • 72 篇 school of comput...
  • 71 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 school of data a...
  • 44 篇 school of comput...
  • 37 篇 school of comput...
  • 34 篇 nanyang technolo...
  • 32 篇 school of comput...
  • 32 篇 college of compu...
  • 31 篇 college of compu...
  • 30 篇 beijing advanced...
  • 29 篇 school of comput...
  • 27 篇 school of inform...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 national enginee...
  • 24 篇 school of comput...
  • 21 篇 the school of co...

作者

  • 99 篇 niyato dusit
  • 47 篇 buyya rajkumar
  • 27 篇 rajkumar buyya
  • 26 篇 xiong zehui
  • 23 篇 jin hai
  • 21 篇 pardamean bens
  • 21 篇 huang qingming
  • 20 篇 yang yang
  • 20 篇 lo david
  • 19 篇 wu jia
  • 18 篇 bens pardamean
  • 17 篇 kang jiawen
  • 16 篇 tao dacheng
  • 16 篇 han zhu
  • 16 篇 chen mingzhe
  • 15 篇 wirth anthony
  • 15 篇 zheng baihua
  • 15 篇 shen linlin
  • 14 篇 zheng wei-shi
  • 14 篇 bailey james

语言

  • 3,533 篇 英文
  • 460 篇 其他
  • 31 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information Systems"
4024 条 记 录,以下是3751-3760 订阅
排序:
HybridExploration: A distributed approach to terrain exploration using mobile and fixed sensor nodes
HybridExploration: A distributed approach to terrain explora...
收藏 引用
2008 IEEE/RSJ International Conference on Intelligent Robots and systems
作者: Ettore Ferranti Niki Trigoni Mark Levene Computing Laboratory University of Oxford Oxford UK School of Computer Science and Information Systems Birkbeck College University of London UK
When an emergency occurs within a building, it may be initially safer to send autonomous mobile nodes, instead of human responders, to explore the area and identify hazards and victims. Exploring all the area in the m... 详细信息
来源: 评论
An image quality assessment metric based contourlet
An image quality assessment metric based contourlet
收藏 引用
2008 IEEE International Conference on Image Processing, ICIP 2008
作者: Lu, Wen Gao, Xinbo Li, Xuelong Tao, Dacheng School of Electronic Engineering Xidian University Xi'an 710071 China School of Computer Science and Information Systems Birkbeck University of London London WC1E 7HX United Kingdom Department of computing Hong Kong Polytechnic University Hung Hom Kowloon Hong Kong
In reduced-reference (RR) image quality assessment (IQA), the visual quality of distorted images is evaluated with only partial information extracted from original images. In this paper, by considering the information... 详细信息
来源: 评论
Improving the Precision of Fowler's Definitions of Bad Smells
Improving the Precision of Fowler's Definitions of Bad Smell...
收藏 引用
Annual IEEE/ NASA Goddard Workshop on Software Engineering
作者: Min Zhang Nathan Baddoo Paul Wernick Tracy Hall School of Computer Science University of Herfordshire Hatfield Hertfordshire UK School of Information Systems Computing & Mathematics Brunei University Uxbridge Middlesex UK
Current approaches to detecting bad smells in code are mainly based on software metrics. We suggest that these methods lack precision in detecting bad smells, and we propose a code pattern-based approach to detecting ... 详细信息
来源: 评论
Geometrically invariant watermarking using affine covariant regions
Geometrically invariant watermarking using affine covariant ...
收藏 引用
2008 IEEE International Conference on Image Processing, ICIP 2008
作者: Deng, Cheng Gao, Xinbo Tao, Dacheng Li, Xuelong Lab of Video and Image Processing System School of Electronic Engineering Xidian University Xi'an China Department of computing Hong Kong Polytechnic University Hung Hom Kowloon Hong Kong School of Computer Science and Information Systems Birkbeck University of London London WC1E7HX United Kingdom
In this paper, we present a robust approach to digital watermarking embedding and retrieval for digital images. The affine-invariant point detector is used to extract feature regions of the given host image. Image nor... 详细信息
来源: 评论
Testing in the distributed test architecture
收藏 引用
作者: Chen, Jessica Hierons, Robert M. Ural, Hasan School of Computer Science University of Windsor Windsor ON N9B 3P4 Canada Department of Information Systems and Computing Brunel University Uxbridge Middlesex UB8 3PH United Kingdom School of Information Technology and Engineering University of Ottawa Ottawa ON K1N 6N5 Canada
The introduction of multiple remote testers to apply a test or checking sequence introduces the possibility of controllability and observability problems. These problems can require the use of external coordination me... 详细信息
来源: 评论
Bayesian tensor analysis
Bayesian tensor analysis
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Dacheng Tao Jimeng Sun Jialie Shen Xindong Wu Xuelong Li Stephen J. Maybank Christos Faloutsos Biometrics Research Centre Department of Computing Hong Kong Polytechnic University Hong Kong China Department of Computer Science Carnegie Mellon University Pittsburgh USA School of Information Systems Singapore Management University Singapore Department of Computer Science University of Vermont Burlington USA Department of Computing Hong Kong Polytechnic University Hong Kong China School of Computer Science and Information Systems University of London UK
Vector data are normally used for probabilistic graphical models with Bayesian inference. However, tensor data, i.e., multidimensional arrays, are actually natural representations of a large amount of real data, in da... 详细信息
来源: 评论
Innovations in measuring accessibility: Theoretical and practical perspectives  22
Innovations in measuring accessibility: Theoretical and prac...
收藏 引用
22nd British HCI Group Annual Conference on People and computers: Culture, Creativity, Interaction, BCS HCI 2008
作者: Petrie, Helen Power, Chris Adams, Ray Hwang, Faustina Weber, Gerhard Darzentas, Jenny Velasco, Carlos A. Department of Computer Science University of York YorkYO10 5DD United Kingdom CIRCUA School of Computing Science Middlesex University LondonNW4 4BT United Kingdom School of Systems Engineering University of Reading ReadingRG6 6AY United Kingdom Department of Computer Science Technische Universität Dresden Dresden01187 Germany Department of Product and Systems Design University of the Aegean Ermoupolis SyrosGR-84100 Greece Fraunhofer Institute of Applied Information Technology Sankt Augustin Germany
Recently, there has been an increased awareness in the general public, in government and in business that people with disabilities and older people have distinct needs and preferences that must be met in order for the... 详细信息
来源: 评论
Web Application Development Lifecycle for Small Medium-Sized Enterprises (SMEs) (Short Paper)
Web Application Development Lifecycle for Small Medium-Sized...
收藏 引用
International Conference on Quality Software
作者: Wei Huang Ru Li Carsten Maple Hongji Yang David Foskett Vince Cleaver Department of Computing & Information Systems University of Bedfordshire UK Kingsmede House Exxcom Limited Shefford Bedfordshire UK Computer Science Division School of Computing De Montfort University UK
Software engineering has proven to be very important for standard software development. But, can Web applications be engineered as well? Currently, J2EE, Apache/Perl/PDP/MySQL and .NET have been universally accepted a... 详细信息
来源: 评论
By when do you need this done? Discovering knowledge workers' time management practices
By when do you need this done? Discovering knowledge workers...
收藏 引用
14th Americas Conference on information systems, AMCIS 2008
作者: Wu, Dezhi Passerini, Katia Bartolacci, Michael R. Computer Science and Information Systems Department Southern Utah University Cedar City UT 84720 United States School of Management and College of Computing Sciences New Jersey Institute of Technology University Heights Newark NJ 07102 United States Information Sciences and Technology Penn State University - Berks P.O. Box 7009 Reading PA 19610 United States
This research investigates knowledge workers' individual time management practices. At an academic institution in the united States, a set of in-depth semi-structured interviews was conducted to explore how indivi... 详细信息
来源: 评论
On the scalability of particle swarm optimisation
On the scalability of particle swarm optimisation
收藏 引用
Congress on Evolutionary Computation
作者: Sebastien Piccand Michael O'Neill Jacqueline Walker Department of Computer Science ' Information Systems University of Limerick Limerick Ireland Natural Computing Research ' Applications group School of Computer Science ' Informatics University College Dublin Dublin Ireland Department of Electronic and Computer Engineering University of Limerick Limerick Ireland
Particle swarm has proven to be competitive to other evolutionary algorithms in the field of optimization, and in many cases enables a faster convergence to the ideal solution. However, like any optimization algorithm... 详细信息
来源: 评论