咨询与建议

限定检索结果

文献类型

  • 865 篇 期刊文献
  • 630 篇 会议
  • 18 册 图书

馆藏范围

  • 1,513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 964 篇 工学
    • 641 篇 计算机科学与技术...
    • 528 篇 软件工程
    • 216 篇 信息与通信工程
    • 150 篇 生物工程
    • 126 篇 控制科学与工程
    • 115 篇 电气工程
    • 113 篇 生物医学工程(可授...
    • 75 篇 光学工程
    • 68 篇 电子科学与技术(可...
    • 55 篇 机械工程
    • 46 篇 仪器科学与技术
    • 45 篇 安全科学与工程
    • 40 篇 化学工程与技术
    • 38 篇 交通运输工程
    • 33 篇 土木工程
  • 606 篇 理学
    • 283 篇 数学
    • 177 篇 生物学
    • 140 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 50 篇 化学
    • 29 篇 地球物理学
  • 292 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 118 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 134 篇 医学
    • 114 篇 临床医学
    • 96 篇 基础医学(可授医学...
    • 60 篇 药学(可授医学、理...
    • 52 篇 公共卫生与预防医...
  • 55 篇 法学
    • 49 篇 社会学
  • 28 篇 经济学
  • 25 篇 农学
  • 17 篇 教育学
  • 4 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 48 篇 machine learning
  • 41 篇 deep learning
  • 37 篇 predictive model...
  • 36 篇 accuracy
  • 32 篇 training
  • 28 篇 computational mo...
  • 26 篇 reinforcement le...
  • 24 篇 artificial intel...
  • 24 篇 convolutional ne...
  • 23 篇 data models
  • 21 篇 optimization
  • 21 篇 federated learni...
  • 21 篇 forecasting
  • 20 篇 analytical model...
  • 19 篇 covid-19
  • 19 篇 neural networks
  • 18 篇 data mining
  • 17 篇 internet of thin...
  • 17 篇 feature extracti...
  • 16 篇 security

机构

  • 23 篇 school of comput...
  • 22 篇 institute for pl...
  • 21 篇 university of so...
  • 21 篇 school of data s...
  • 19 篇 scuola di ingegn...
  • 19 篇 king’s college l...
  • 19 篇 the university o...
  • 19 篇 infn sezione di ...
  • 19 篇 dipartimento di ...
  • 19 篇 università degli...
  • 19 篇 ligo laboratory ...
  • 19 篇 university of ma...
  • 19 篇 stony brook univ...
  • 19 篇 college of compu...
  • 19 篇 university of ch...
  • 18 篇 colorado state u...
  • 18 篇 infn sezione di ...
  • 18 篇 national tsing h...
  • 18 篇 university of mi...
  • 18 篇 nasa goddard spa...

作者

  • 33 篇 niyato dusit
  • 26 篇 brown donald e.
  • 26 篇 xiong zehui
  • 19 篇 j. c. bayley
  • 19 篇 k. komori
  • 19 篇 f. hellman
  • 19 篇 m. kinley-hanlon
  • 19 篇 t. mcrae
  • 19 篇 s. rowan
  • 19 篇 s. m. aronson
  • 19 篇 v. p. mitrofanov
  • 19 篇 a. j. tanasijczu...
  • 19 篇 g. moreno
  • 19 篇 g. hemming
  • 19 篇 a. z. jan
  • 19 篇 r. c. walet
  • 19 篇 b. f. neil
  • 19 篇 c. kim
  • 19 篇 f. muciaccia
  • 19 篇 b. garaventa

语言

  • 1,146 篇 英文
  • 354 篇 其他
  • 13 篇 中文
  • 3 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=University of Virginia Systems and Information Engineering Data Science"
1513 条 记 录,以下是1441-1450 订阅
排序:
A Comparison of Utility-Based information Management Policies in Sensor Networks
A Comparison of Utility-Based Information Management Policie...
收藏 引用
IEEE Symposium on systems and information engineering Design, SIEDS
作者: Shanif Dhanani John Arseneau Andrew Weatherton Byron Caswell Navdeep Singh Stephen Patek Computer Science and Systems and Information Engineering Departments University of Virginia Charlottesville VA USA
We develop and compare the performance of two information management policies for wireless sensor networks. The first, sensor-centric utility-based (SCUB) is a distributed approach that instructs individual sensors to... 详细信息
来源: 评论
Implementation of an Appropriate Household Water Purification System in Tourou, Cameroon
Implementation of an Appropriate Household Water Purificatio...
收藏 引用
IEEE Symposium on systems and information engineering Design, SIEDS
作者: Katherine L. Clopeck Lauren E. Foster Carly F. Krause Jason P. Manto Dara J. Phillips Brooke L. Yamakoshi AeroSpace Engineering student University of Virginia USA Systems and Information Engineering University of Virginia USA Environmental Science University of Virginia USA Biomedical Engineering University of Virginia USA Civil Engineering student University of Virginia USA
The two goals of this project were to develop a household water purification method and to provide a framework for sustaining this technology in a low-income community. According to the World Health Organization, wate... 详细信息
来源: 评论
Semantics, Web and Mining: Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2006年 4289 LNAI卷 v-vi页
作者: Berendt, Bettina Hotho, Andreas Mladenič, Dunja Semeraro, Giovanni Spiliopoulou, Myra Stumme, Gerd Van Someren, Maarten Ackermann, Markus Grobelnik, Marko Svátek, Vojtěch Institute of Information Systems Humboldt University Berlin Germany Knowledge and Data Engineering Group University of Kassel Germany J. Stefan Institute Ljubljana Slovenia Department of Informatics University of Bari Italy Faculty of Computer Science Otto-von-Guericke-Univ. Magdeburg Germany Informatics Institute University of Amsterdam Netherlands Dept. of Natural Language Processing Institute for Computer Science University of Leipzig Germany University of Economics Prague Czech Republic
来源: 评论
data Storage Media Sanitization Procedures at the U.S. Agency For International Development (USAID)
收藏 引用
EDPACS 2006年 第8期29卷 11-19页
作者: James Craft William Cleveland The Information Systems Security Officer at the United States Agency for International Development (USAID) Bureau for Management Information Resources Management (M/IRM) Information Systems Security Team. He has a BS in business management from George Mason University and has 22 years of experience focusing primarily on systems engineering cybersecurity and enterprise operations. He has played a major role in the implementation of the U.S. Government's Model Information Security Policy. The USAID PRIME Security Program Manager Computer Sciences Corporation in Arlington Virginia. He has MS degrees in information and telecommunications systems management and in military science. Cleveland has over 20 years of experience in the planning and management of a wide variety of functions including business process reengineering and IT security.
This article is derived from a Best Security Practice (BSP) developed by the U.S. Agency for International Development (USAID), Bureau for Management, information Resources Management (M/IRM), information systems Secu...
来源: 评论
Background subtraction under varying illumination
收藏 引用
systems and Computers in Japan 2006年 第4期37卷 77-88页
作者: Matsuyama, Takashi Wada, Toshikazu Habe, Hitoshi Tanahashi, Kazuya Graduate School of Informatics Kyoto University Kyoto 606-8501 Japan Mitsubishi Electric Corporation NTT Data Corporation Department of Intelligence Science and Technology Graduate School of Informatics Kyoto University International Association for Pattern Recognition IEICE Information Processing Society of Japan Japanese Society for Artificial Intelligence IEEE Computer Society Department of Computer and Communication Sciences Faculty of Systems Engineering Wakayama University IEEE
Background subtraction is widely used as an effective method for detecting moving objects in a video image. However, background subtraction requires a prerequisite in that image variation cannot be observed, and the r... 详细信息
来源: 评论
Meeting the information Assurance Crisis in the U.S. Now
收藏 引用
EDPACS 2006年 第6期28卷 1-14页
作者: Corey Schou Deborah Frincke Charles Reynolds James Frost The Associate Dean of Information Systems Programs at Idaho State University (ISU) in Pocatello and the director of the Center for Decision Support. Currently he serves as the Chair of the National Colloquium on Information System Security Education. Schou also directs the ISU National Center of Excellence in Information Assurance Education and the ISU Technology Innovation Center. Contact Corey Schou one of the authors of this article and the Chair of the NCISSE by email at Schou@*** for help in finding additional ways to address the issues raised in this article. A member of the University of Idaho College of Engineering faculty. She graduated from the University of California at Davis. Frincke is the co-director and co-founder of the university's Center for Secure and Dependable Software (CSDS). She was the program chair for the 2nd International Workshop on Recent Advances in Intrusion Detection (RAID). A professor of Computer Science at the College of Integrated Science and Technology at James Madison University in Harrisonburg Virginia. He holds a Ph.D. in computer science from the University of Texas at Austin and a BA in philosophy from the University of Houston. Reynolds is the Director of Information System Security Education at James Madison University. Since 1997 Reynolds has led the development of the first remote Internet-based curriculum that leads to an M.S. degree in computer science with a concentration in information security. Thus far 160 students have completed this program. A professor of computer information systems at Idaho State University and the manager of its Simplot Decision Support Center.
T he only difference etween evolution and revolution is the speed at which each occurs.
来源: 评论
Application of the inoperability input-output model (IIM) for systemic risk assessment and management of interdependent infrastructures
收藏 引用
systems engineering 2005年 第4期8卷 323-341页
作者: Crowther, Kenneth G. Haimes, Yacov Y. University of Virginia Systems and Information Engineering University of Virginia University of Virginia Center for Risk Management of Engineering Systems School of Engineering and Applied Science Systems and Information Engineering Civil Engineering Faculties AAAS IEEE ASCE AWRA IWRA INCOSE Center for Risk Management of Engineering Systems University of Virginia 112 Olsson Hall Charlottesville VA 22904-4736
Our modern era is characterized by a large-scale web of interconnected and interdependent economic and infrastructure systems, coupled with threats of terrorism. This paper demonstrates the value of introducing interd... 详细信息
来源: 评论
Simulation and analysis of the inspection process of cargo containers
Simulation and analysis of the inspection process of cargo c...
收藏 引用
2005 IEEE systems and information engineering Design Symposium
作者: Sharpe, Jason Tawney, Barb Preston White Jr., K. Engineering Science School of Engineering and Applied Science University of Virginia Charlottesville VA 22904 Systems and Information Engineering School of Engineering and Applied Science University of Virginia Charlottesville VA 22904 University of Virginia Department of Systems and Information Engineering University of Virginia
This project simulates and analyzes the inspection process of cargo containers as they enter the United States Seaports. The purpose for this project is to create a more efficient inspection process allowing more cont... 详细信息
来源: 评论
Topic-oriented mining and reasoning
Topic-oriented mining and reasoning
收藏 引用
2005 International Conference on Active Media Technology, AMT 2005
作者: Li, Yuefeng Zhong, Ning Yao, Y.Y. School of Software Engineering and Data Communications Queensland University of Technology Brisbane QLD 4001 Australia Department of Systems and Information Engineering Maebashi Institute of Technology Japan Department of Computer Science University of Regina Canada
The discovery of the association between terms and a specified topic is a difficult task. A new data mining technique, topic-oriented mining and reasoning, is presented for this task. The technique consists of two thr... 详细信息
来源: 评论
Towards a reusable and maintainable multiagent system engineering (MaSE) methodology
Towards a reusable and maintainable multiagent system engine...
收藏 引用
2005 International Conference on Artificial Intelligence, ICAI'05
作者: Mohamad, Radziah Deris, Safaai Ammar, Hany H. Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Skudai Johor Malaysia Computer Science and Electrical Engineering Department West Virginia University Morgantown WV 26506 United States
Multiagent System engineering Methodology (MaSE) is a general purpose agent-based software engineering method for developing heterogeneous multiagent systems. The goal of MaSE is to guide a system developer from an in... 详细信息
来源: 评论