咨询与建议

限定检索结果

文献类型

  • 914 篇 期刊文献
  • 540 篇 会议
  • 13 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,006 篇 工学
    • 689 篇 计算机科学与技术...
    • 550 篇 软件工程
    • 239 篇 信息与通信工程
    • 163 篇 电气工程
    • 114 篇 电子科学与技术(可...
    • 114 篇 生物工程
    • 112 篇 控制科学与工程
    • 102 篇 光学工程
    • 76 篇 生物医学工程(可授...
    • 63 篇 机械工程
    • 43 篇 动力工程及工程热...
    • 36 篇 仪器科学与技术
    • 36 篇 网络空间安全
    • 30 篇 交通运输工程
    • 28 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
  • 600 篇 理学
    • 259 篇 数学
    • 248 篇 物理学
    • 125 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 44 篇 化学
  • 247 篇 管理学
    • 155 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 92 篇 医学
    • 80 篇 临床医学
    • 68 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
    • 33 篇 公共卫生与预防医...
  • 36 篇 法学
    • 24 篇 社会学
  • 21 篇 经济学
  • 17 篇 农学
  • 15 篇 教育学
  • 9 篇 军事学
  • 6 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 38 篇 machine learning
  • 37 篇 deep learning
  • 32 篇 computer science
  • 30 篇 grid computing
  • 26 篇 computational mo...
  • 25 篇 semantics
  • 25 篇 feature extracti...
  • 22 篇 training
  • 21 篇 cloud computing
  • 19 篇 internet
  • 18 篇 computer archite...
  • 18 篇 data mining
  • 17 篇 protocols
  • 17 篇 artificial intel...
  • 16 篇 resource managem...
  • 16 篇 distributed comp...
  • 16 篇 quantum cryptogr...
  • 16 篇 computer network...
  • 15 篇 reinforcement le...
  • 15 篇 bandwidth

机构

  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 tomsk state univ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 1,176 篇 英文
  • 271 篇 其他
  • 19 篇 中文
  • 2 篇 德文
检索条件"机构=Web Computing Laboratory Computer Science and Information Engineering Department"
1467 条 记 录,以下是1201-1210 订阅
Metamaterial absorbers realized in an X-band rectangular waveguide
收藏 引用
Chinese Physics B 2012年 第11期21卷 474-478页
作者: 黄勇军 文光俊 李建 钟靖平 王平 孙元华 O.Gordon 朱卫仁 Key Laboratory of Broadband Optical Fiber Transmission&Communication Networks School of Communication and Information EngineeringUniversity of Electronic Science and Technology of China Advanced Computing and Simulation Laboratory(AχL) Department of Electrical and Computer Systems EngineeringMonash University
In this paper, we demonstrate six types of metamaterial absorbers (MMAs) by measuring their absorptivities in an X-band (8 12 GHz) rectangular waveguide. Some of the MMAs have been demonstrated previously by using... 详细信息
来源: 评论
Inertial estimator learning automata
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and computer sciences 2012年 第6期E95-A卷 1041-1048页
作者: Zhang, Junqi Ni, Lina Xie, Chen Gao, Shangce Tang, Zheng Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 200092 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China Department of Intellectual Information Systems Engineering University of Toyama Toyama-shi 930-8555 Japan
This paper presents an inertial estimator learning automata scheme by which both the short-term and long-term perspectives of the environment can be incorporated in the stochastic estimator-the long term information c... 详细信息
来源: 评论
Reconstructing 3D human poses from uncalibrated monocular images with strong perspective effects
收藏 引用
Journal of Computational information Systems 2012年 第15期8卷 6437-6445页
作者: Chen, Shu Peng, Xiaoning School of Information Engineering Xiangtan Universtiy Xiangtan 411105 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan 411105 China School of Information Science and Engineering Central South University Changsha 410083 China Department of Computer Science and Technology Huaihua College Huaihua 418008 China
This paper present a geometric method to reconstruct human motion pose from 2D point correspondences obtained from uncalibrated monocular images. The proposed algorithm can handle images with very strong perspective e... 详细信息
来源: 评论
A Personalized Sleep Quality Assessment Mechanism Based on Sleep Pattern Analysis
A Personalized Sleep Quality Assessment Mechanism Based on S...
收藏 引用
International Conference on Innovations in Bio-inspired computing and Applications (IBICA)
作者: Shiao-Ping Cheng Hsing Mei Web Computing Laboratory Department of Computer Science and Information Engineering Fu Jen Catholic University Taipei Taiwan
Most sleep management systems lack reliable assessment of sleep quality and receive single information source only. In this paper, we proposed a sleep quality assessment mechanism based on the physiological sleep patt... 详细信息
来源: 评论
Integrating nature-inspired optimization algorithms to K-means clustering
Integrating nature-inspired optimization algorithms to K-mea...
收藏 引用
7th International Conference on Digital information Management, ICDIM 2012
作者: Tang, Rui Fong, Simon Yang, Xin-She Deb, Suash Department of Computer and Information Science University of Macau Taipa China Mathematics and Scientific Computing National Physical Laboratory Teddington United Kingdom Department of Computer Science and Engineering C. V. Raman College of Engineering Bidyanagar India
Although K-means clustering algorithm is simple and popular, it has a fundamental drawback of falling into local optima that depend on the randomly generated initial centroid values. Optimization algorithms are well k... 详细信息
来源: 评论
Wolf search algorithm with ephemeral memory
Wolf search algorithm with ephemeral memory
收藏 引用
7th International Conference on Digital information Management, ICDIM 2012
作者: Tang, Rui Fong, Simon Yang, Xin-She Deb, Suash Department of Computer and Information Science University of Macau Taipa China Mathematics and Scientific Computing National Physical Laboratory Teddington United Kingdom Department of Computer Science and Engineering C. V. Raman College of Engineering Bidyanagar India
In computer science, a computational challenge exists in finding a globally optimized solution from a tremendously large search space. Heuristic optimization methods have therefore been created that can search the ver... 详细信息
来源: 评论
Propagation-based social-aware replication for social video contents
Propagation-based social-aware replication for social video ...
收藏 引用
20th ACM International Conference on Multimedia, MM 2012
作者: Wang, Zhi Sun, Lifeng Chen, Xiangwen Zhu, Wenwu Liu, Jiangchuan Chen, Minghua Yang, Shiqiang Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China Department of Information Engineering Chinese University of Hong Kong Hong Kong School of Computing Science Simon Fraser University Vancouver BC Canada
Online social network has reshaped the way how video contents are generated, distributed and consumed on today's Internet. Given the massive number of videos generated and shared in online social networks, it has ... 详细信息
来源: 评论
Efficient approximation of the maximal preference scores by lightweight cubic views
Efficient approximation of the maximal preference scores by ...
收藏 引用
15th International Conference on Extending Database Technology, EDBT 2012
作者: Chen, Yueguo Cui, Bin Du, Xiaoyong Tung, Anthony K. H. Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE China Department of Computer Science Peking University Beijing China School of Information Renmin University of China Beijing China School of Computing National University of Singapore Singapore Singapore
Given a multi-features data set, a best preference query (BPQ) computes the maximal preference score (MPS) that the tuples in the data set can achieve with respect to a preference function. BPQs are very useful in app... 详细信息
来源: 评论
Providing fairness on shared-memory multiprocessors via process scheduling  12
Providing fairness on shared-memory multiprocessors via proc...
收藏 引用
12th Joint International Conference on Measurement and Modeling of computer Systems, ACM SIGMETRICS/Performance 2012
作者: Xu, Di Wu, Chenggang Yew, Pen-Chung Li, Jianjun Wang, Zhenjiang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Graduate University Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering University of Minnesota at Twin-Cities MN United States Institute of Information Science Academia Sinica Taiwan
Competition for shared memory resources on multiprocessors is the most dominant cause for slowing down applications and makes their performance varies unpredictably. It exacerbates the need for Quality of Service (QoS... 详细信息
来源: 评论
Accountable authority key policy attribute-based encryption
收藏 引用
science China(information sciences) 2012年 第7期55卷 1631-1638页
作者: WANG YongTao 1,2 ,CHEN KeFei 1,3 ,LONG Yu 1,4 & LIU ZhaoHui 2 1 department of computer science and engineering,Shanghai Jiao Tong University,Shanghai 200240,China 2 China information Technology Security Evaluation Center,Beijing 100085,China 3 Shanghai Key laboratory of Scalable computing and Systems,Shanghai Jiao Tong University,Shanghai,200240,China 4 State Key laboratory of information Security,Graduate School of Chinese Academy of sciences,100039,China 1. Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China2. China Information Technology Security Evaluation Center Beijing 100085 China3. Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China4. State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100039 China
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable aut... 详细信息
来源: 评论