咨询与建议

限定检索结果

文献类型

  • 900 篇 期刊文献
  • 525 篇 会议
  • 13 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 973 篇 工学
    • 664 篇 计算机科学与技术...
    • 536 篇 软件工程
    • 238 篇 信息与通信工程
    • 160 篇 电气工程
    • 114 篇 生物工程
    • 109 篇 电子科学与技术(可...
    • 107 篇 控制科学与工程
    • 97 篇 光学工程
    • 72 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 41 篇 动力工程及工程热...
    • 36 篇 仪器科学与技术
    • 36 篇 网络空间安全
    • 31 篇 交通运输工程
    • 25 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
  • 592 篇 理学
    • 256 篇 数学
    • 242 篇 物理学
    • 126 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 43 篇 化学
  • 246 篇 管理学
    • 156 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 86 篇 医学
    • 76 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 38 篇 药学(可授医学、理...
    • 30 篇 公共卫生与预防医...
  • 35 篇 法学
    • 24 篇 社会学
  • 19 篇 经济学
  • 17 篇 农学
  • 15 篇 教育学
  • 9 篇 军事学
  • 7 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 38 篇 machine learning
  • 35 篇 deep learning
  • 33 篇 computer science
  • 30 篇 grid computing
  • 29 篇 computational mo...
  • 26 篇 semantics
  • 24 篇 feature extracti...
  • 23 篇 training
  • 20 篇 cloud computing
  • 19 篇 computer archite...
  • 19 篇 internet
  • 18 篇 artificial intel...
  • 17 篇 data mining
  • 17 篇 protocols
  • 16 篇 resource managem...
  • 16 篇 distributed comp...
  • 16 篇 quantum cryptogr...
  • 16 篇 computer network...
  • 15 篇 bandwidth
  • 15 篇 servers

机构

  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 tomsk state univ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 33 篇 chao-tung yang
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 1,318 篇 英文
  • 97 篇 其他
  • 22 篇 中文
  • 2 篇 德文
检索条件"机构=Web Computing Laboratory Computer Science and Information Engineering Department"
1438 条 记 录,以下是1291-1300 订阅
排序:
Combining MDE and UML to Reverse Engineer web-Based Legacy Systems
Combining MDE and UML to Reverse Engineer Web-Based Legacy S...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Jianjun Pu Hongji Yang Baowen Xu Lei Xu William Cheng-Chung Chu Software Technology Research Laboratory De Montfort University UK Computing School South-East University China Department of Computer Science and Information Engineering Tunghai University Taiwan
The research in this paper focuses on an approach to reverse engineering web-based legacy systems with the integration of model-driven engineering and UML. Three types of link-based models of web-based legacy systems ... 详细信息
来源: 评论
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
MRBAC: Hierarchical Role Management and Security Access Cont...
收藏 引用
International Symposium on Object-Oriented Real-Time Distributed computing
作者: Na Zhao Min Chen Shu-Ching Chen Mei-Ling Shyu Distributed Multimedia Information System Laboratory School of Computing and Information Sciences Florida International University Miami FL USA Department of Computer Science University of Montana Missoula MT USA Department of Electrical & Computer Engineering University of Miami Coral Gables FL USA
In this paper, a role-based access control (KBAC) model is applied and extended to a multimedia version called multi-role based access control (MRBAC), which can fully support the comprehensive and multilevel security... 详细信息
来源: 评论
A novel data distortion approach via selective SSVD for privacy protection
收藏 引用
International Journal of information and computer Security 2008年 第1期2卷 48-70页
作者: Wang, Jie Zhang, Jun Xu, Shuting Zhong, Weijun Laboratory for High Performance Scientific Computing and Computer Simulation Department of Computer Science University of Kentucky Lexington KY 40506-0046 United States Department of Computer Information Systems Virginia State University Petersburg VA 23806 United States Department of Management Sciences and Engineering Southeast University Nanjing 210096 China
Data privacy preservation has become one of the major concerns in the design of practical data-mining applications. In this paper, a novel data distortion approach based on structural partition and Sparsified Singular... 详细信息
来源: 评论
Automatic Digest Generation by Extracting Important Scenes from the Content of Presentations
Automatic Digest Generation by Extracting Important Scenes f...
收藏 引用
International Workshop on Database and Expert Systems Applications
作者: Hieu Hanh Le Thitiporn Lertrusdachakul Tetsutaro Watanabe Haruo Yokota Department of Computer Science Tokyo Institute of Technology Japan Department of Computer Science Graduate School of Information and Engineering Tokyo Institute of Technology Japan Application Lab Ricoh Company Ltd Application Laboratory Software R&D Group Ricoh Company Limited Japan Department of Computer Science Tokyo Institute of Technology Global Scientific Information and Computing Center Tokyo Institute of Technology
Recently, combining a video recording of a presentation along with the digital slides used in it has become popular in e-learning and presentation of archives. For users of the archives, it is useful to preview a dige... 详细信息
来源: 评论
Research on rough set theory and applications in China
收藏 引用
Lecture Notes in computer science
作者: Wang, Guoyin Zhang, Qinghua Huang, Houkuan Ye, Dongyi Hu, Qinghua Hu, Xuegang Shi, Zhongzhi Li, Yongli Shang, Lin An, Liping Sai, Ying Chen, Shanben Liang, Jiye Qin, Keyun Zeng, Huanglin Xie, Keming Miao, Duoqian Min, Fan Wu, Zhaocong Wu, Weizhi Dai, Jianhua Institute of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing 400065 China School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China College of Math. and Computer Fuzhou University Fuzhou 350002 China Harbin Institute of Technology PO Box 458 Harbin 150006 China School of Computer and Information Hefei University of Technology Hefei 230009 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Lanzhou University No.222 Tianshui South Rd. Lanzhou 730000 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Management Science and Engineering Department Business School Nankai University Tianjin 300071 China Shandong University of Finance No.40 Shun-geng Road Jinan 250014 China Welding Engineering Institute Shanghai Jiaotong University Shanghai 200030 China School of Computer and Information Technology Shanxi University Taiyuan 030006 China Intelligent Control Development Center Southwest Jiaotong University Chengdu 610031 China Artificial Intelligence of Key Laboratory Sichuan University of Science and Engineering Zigong 643000 China Department of Automation College of Information Engineering Taiyuan University of Technology Taiyuan 030024 China 4800 CaoAn Highway Shanghai 201804 China School of Computer Science and Technology University of Electronic Science and Technology of China Chengdu 610054 China School of Remote Sensing Information Engineering Wuhan University Wuhan 430079 China Institute for Information and System Sciences Faculty of Science Xi'an Jiaotong University Xi'an 710049 China Information College Zhejiang Ocean University Zhejiang 316004 China Institute of Artificial Intelligence Zhejiang University Hangzhou 310027 China
This article gives a capsule view of research on rough set theory and applications ongoing at universities and laboratories in China. Included in this capsule view of rough set research is a brief description of the f... 详细信息
来源: 评论
Editorial: Dependability and security
收藏 引用
IEEE Transactions on Dependable and Secure computing 2008年 第1期5卷 1-3页
作者: Iyer, Ravishankar K. Gligor, Virgil D. Kalbarczyk, Zbigniew T. Kanoun, Karama Katzenbeisser, Stefan Mukherjee, Shubu Shieh, Shiuhpyng Zorian, Yervant Department of Electrical and Computer Engineering Carnegie Mellon University Microsoft's Trusted Computing Academic Advisory Board Center for Reliable and High-Performance Computing Coordinated Science Laboratory University of Illinois Urbana-Champaign United States IEEE IEEE Computer Society LAAS CNRS IFIP Working Group 10.4 on Dependable Computing and Fault Tolerance Special Interest Group on Dependability Benchmarking IFIP Working Group 10.4 French SEE Technical Committee on Trustworthy Computer Systems SEE Working Group Design and Validation for Dependability Technical University Munich Germany Darmstadt University of Technology ACM IACR Intel's SER Tech Council Intel's Architecture Patent Committee Taiwan Information Security Center NCTU IEEE Reliability Society Taipei and Tainan IACR United States Virage Logic Corp. AT and T Bell Laboratories Logic Vision Inc. University of British Columbia IEEE Test Technology Technical Council
来源: 评论
A Newborn Screening System Based on Service-Oriented Architecture Embedded Support Vector Machine
A Newborn Screening System Based on Service-Oriented Archite...
收藏 引用
2008 IEEE International Symposium on Service-Oriented System engineering
作者: Sung-Huai Hsieh Sheau-Ling Hsieh Yin-Hsiu Chien Zhenyu Wang Yung-Ching Weng Feipei Lai Department of Computer Science and Information Engineering National Taiwan University Taipei Taiwan Information Systems Office National Taiwan University Hospital Taipei Taiwan Network and Computer Centre National Chiao Tung University Hsinchu Taiwan Department of Medical Genetics National Taiwan University Hospital Taiwan Computing Laboratory Oxford University Oxford UK Department of Electrical Engineering National Taiwan University Taipei Taiwan
The clinical symptoms of metabolic disorders are rarely apparent during the neonatal period, and if they are not treated early, irreversible damage, such as mental retardation, or even death, may occur. Therefore, the... 详细信息
来源: 评论
Learning educational research methods through collaborative research: The PhICER initiative
Conferences in Research and Practice in Information Technolo...
收藏 引用
Conferences in Research and Practice in information Technology Series 2008年 78卷 35-42页
作者: Berglund, Anders Box, Ilona Eckerdal, Anna Lister, Raymond Pears, Arnold Uppsala Computing Education Research Group UpCERG Uppsala University Department of Information Technology P.O. Box 337 SE-751 05 Uppsala Sweden Faculty of Information Technology University of Technology Sydney P.O. Box 123 Broadway 2007 Sydney Australia Helsinki University of Technology COMPSER laboratory Department of Computer Science and Engineering Espoo Finland
To accommodate an increasing interest in phenomenography among the computing education research community, the authors of this paper have organised two workshops, or intensive courses, in phenomenography, intended for... 详细信息
来源: 评论
Hierarchical background subtraction using local pixel clustering
Hierarchical background subtraction using local pixel cluste...
收藏 引用
International Conference on Pattern Recognition
作者: Bineng Zhong Hongxun Yao Shiguang Shan Xilin Chen Wen Gao Department of Computer Science and Engineering Harbin Institute of Technology Digital Media Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Chinese Academy and Sciences Beijing China Digital Media Institute Peking University Beijing China
We propose a robust hierarchical background subtraction technique which takes the spatial relations of neighboring pixels in a local region into account to detect objects in difficult conditions. Our algorithm combine... 详细信息
来源: 评论
New approximation operator of rough fuzzy sets
收藏 引用
Tongji Daxue Xuebao/Journal of Tongji University 2008年 第6期36卷 827-831页
作者: Cheng, Yi Miao, Duoqian Liu, Yong Feng, Qinrong Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 201804 China College of Mathematical Sciences Ocean University of China Qingdao 266071 China Department of Computer Science and Technology Tongji University Shanghai 201804 China College of Information Science and Engineering Ocean University of China Qingdao 266071 China
For Dubois rough fuzzy sets, the membership of the lower or upper approximations is defined as the elements memberships' infimum or supsmum in equivalent class. As a result of not considering the elements whose me... 详细信息
来源: 评论