咨询与建议

限定检索结果

文献类型

  • 914 篇 期刊文献
  • 540 篇 会议
  • 13 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,006 篇 工学
    • 689 篇 计算机科学与技术...
    • 550 篇 软件工程
    • 239 篇 信息与通信工程
    • 163 篇 电气工程
    • 114 篇 电子科学与技术(可...
    • 114 篇 生物工程
    • 112 篇 控制科学与工程
    • 102 篇 光学工程
    • 76 篇 生物医学工程(可授...
    • 63 篇 机械工程
    • 43 篇 动力工程及工程热...
    • 36 篇 仪器科学与技术
    • 36 篇 网络空间安全
    • 30 篇 交通运输工程
    • 28 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
  • 600 篇 理学
    • 259 篇 数学
    • 248 篇 物理学
    • 125 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 44 篇 化学
  • 247 篇 管理学
    • 155 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 92 篇 医学
    • 80 篇 临床医学
    • 68 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
    • 33 篇 公共卫生与预防医...
  • 36 篇 法学
    • 24 篇 社会学
  • 21 篇 经济学
  • 17 篇 农学
  • 15 篇 教育学
  • 9 篇 军事学
  • 6 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 38 篇 machine learning
  • 37 篇 deep learning
  • 32 篇 computer science
  • 30 篇 grid computing
  • 26 篇 computational mo...
  • 25 篇 semantics
  • 25 篇 feature extracti...
  • 22 篇 training
  • 21 篇 cloud computing
  • 19 篇 internet
  • 18 篇 computer archite...
  • 18 篇 data mining
  • 17 篇 protocols
  • 17 篇 artificial intel...
  • 16 篇 resource managem...
  • 16 篇 distributed comp...
  • 16 篇 quantum cryptogr...
  • 16 篇 computer network...
  • 15 篇 reinforcement le...
  • 15 篇 bandwidth

机构

  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 tomsk state univ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 1,176 篇 英文
  • 271 篇 其他
  • 19 篇 中文
  • 2 篇 德文
检索条件"机构=Web Computing Laboratory Computer Science and Information Engineering Department"
1467 条 记 录,以下是1261-1270 订阅
排序:
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
RESTful web service composition: Extracting a process model from Linear Logic theorem proving
RESTful web service composition: Extracting a process model ...
收藏 引用
International Conference on Next Generation web Services Practices (NWeSP)
作者: Xia Zhao Enjie Liu Gordon J. Clapworthy Na Ye Yueming Lu Department of Computer Science and Technology University of Bedfordshire Luton UK School of Electronic and Information Engineering Xi'an Jiaotong University Xian China School of Information and Control Engineering Xi'an University of architecture and technology Xian China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
This paper introduces a two-stage Linear Logic based program synthesis approach to automatic RESTful web service composition. The Linear Logic theorem proof is applied at both resource and service invocation method le... 详细信息
来源: 评论
Flexible-ICA algorithm for a reliable Iris recognition
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2011年 6990 LNCS卷 188-208页
作者: Bouraoui, Imen Chitroub, Salim Bouridane, Ahmed Signal and Image Processing Laboratory Electronics and Computer Science Faculty USTHB El - Alia Bab - Ezzouar P.O. Box 32 Algiers 16111 Algeria School of Computing Engineering and Information Sciences Northumbria University Pandon Building Newcastle upon Tyne United Kingdom Department of Computer Science King Saud University P.O. Box 2454 Riyadh 11451 Saudi Arabia
In many large scale biometric-based recognition problems, knowledge of the limiting capabilities of underlying recognition systems is constrained by a variety of factors including a choice of a source encoding techniq... 详细信息
来源: 评论
Design of a Robot Cloud Center
Design of a Robot Cloud Center
收藏 引用
International Symposium on Autonomous Decentralized Systems (ISADAS)
作者: Zhihui Du Weiqiang Yang Yinong Chen Xin Sun Xiaoying Wang Chen Xu Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China School of Software and Microelectronics Peking University Beijing China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ USA International School Beijing University of Posts and Telecommunications Beijing China
Service-oriented architecture and cloud computing have become the prevalent computing paradigm. In this paradigm, computing resources can be accessed like other utility services available in today's society. In th... 详细信息
来源: 评论
Towards an industrial grade IVE for Java and next generation research platform for JML
收藏 引用
International Journal on Software Tools for Technology Transfer 2010年 第6期12卷 429-446页
作者: Chalin, Patrice Robby James, Perry R. Lee, Jooyong Karabotsos, George Department of Computer Science and Software Engineering Concordia University Montreal QC Canada SAnToS Laboratory Department of Computing and Information Sciences Kansas State University Manhattan KS United States
Tool support for the Java Modeling Language (JML) is a very pressing problem. A main issue with current tools is their architecture;the cost of keeping up with the evolution of Java is prohibitively high, e.g., Java 5... 详细信息
来源: 评论
Reactive programming optimizations in pervasive computing
Reactive programming optimizations in pervasive computing
收藏 引用
IEEE/information PROCESSING SOCIETY JAPAN International Symposium on Applications and The Internet
作者: Chen, Chao Xu, Yi Li, Kun Helal, Sumi Mobile and Pervasive Computing Laboratory Computer and Information Science and Engineering Department University of Florida Gainesville FL 326011 United States
Pervasive computing systems are begging for programming models and methodologies specifically suited to the particular cyber-physical nature of these systems. Reactive (rule-based) programming is an attractive model t... 详细信息
来源: 评论
Toward a programming model for safer pervasive spaces
Toward a programming model for safer pervasive spaces
收藏 引用
International Conference on Autonomic and Trusted computing
作者: Chen, Chao Helal, Sumi Mobile and Pervasive Computing Laboratory Computer and Information Science and Engineering Department University of Florida Gainesville FL 326011 United States
This paper addresses issues of safety in pervasive spaces. We show how pervasive systems are different from traditional computer systems, and how their cyber-physical nature ties intimately with the users. Errors and ... 详细信息
来源: 评论
A novel clustering topology control for reliable multi-hop routing in wireless sensor networks
收藏 引用
Journal of Communications 2010年 第9期5卷 654-664页
作者: Du, Ruiying Ai, Chunyu Guo, Longjiang Chen, Jing Liu, Jianwei He, Jing Li, Yingshu School of Computer science Wuhan University Wuhan China State Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China Department of Mathematics Physics Computer Science and Geomatics Troy University Troy AL 36082 United States Department of Computer Science Heilongjiang University Harbin China Department of Computer Science Georgia State University Atlanta GA 30303 United States School of Electronics Information Engineering Beihang University Beijing China
The reliability of wireless sensor networks is significant in certain applications, especially the reliable routing. Most existing routing protocols use multi-paths to improve routing reliability. However, multi-paths... 详细信息
来源: 评论
Augmenting trust establishment in dynamic systems with social networks  10
Augmenting trust establishment in dynamic systems with socia...
收藏 引用
Proceedings of the Sixth Annual Workshop on Cyber Security and information Intelligence Research
作者: Lagesse, Brent Kumar, Mohan Venkatesh, Svetha Lazarescu, Mihai Cyberspace Science and Information Intelligence Research Group Computational Science and Engineering Division Oak Ridge National Laboratory United States Department of Computer Science Engineering University of Texas Arlington TX United States Department of Computing Curtin University Australia
Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resou... 详细信息
来源: 评论
Hybrid uniform distribution of particle swarm optimizer
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and computer sciences 2010年 第10期E93-A卷 1782-1791页
作者: Zhang, Junqi Tan, Ying Ni, Lina Xie, Chen Tang, Zheng Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Qingdao China Tongji University Shanghai 200092 China Key Laboratory of Machine Perception Ministry of Education Qingdao China Department of Machine Intelligence School of Electronics Engineering and Computer Science Peking University Beijing 100871 China College of Info Sci and Engi Shandong University of Science and Technology Qingdao China Department of Intellectual Information Systems Engineering University of Toyama Toyama-shi 930-8555 Japan
Particle swarm optimizer (PSO) is a stochastic global optimization technique based on a social interaction metaphor. Because of the complexity, dynamics and randomness involved in PSO, it is hard to theoretically anal... 详细信息
来源: 评论