咨询与建议

限定检索结果

文献类型

  • 299 篇 会议
  • 191 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 312 篇 工学
    • 240 篇 计算机科学与技术...
    • 198 篇 软件工程
    • 52 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 18 篇 仪器科学与技术
    • 17 篇 光学工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 14 篇 交通运输工程
    • 13 篇 生物医学工程(可授...
    • 11 篇 建筑学
    • 11 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 安全科学与工程
  • 153 篇 理学
    • 83 篇 数学
    • 44 篇 物理学
    • 24 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 12 篇 化学
  • 113 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 21 篇 医学
    • 19 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 18 篇 法学
    • 16 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 17 篇 computer science
  • 17 篇 accuracy
  • 13 篇 laboratories
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 testing
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 deep learning
  • 8 篇 information syst...
  • 8 篇 information secu...
  • 7 篇 educational tech...
  • 7 篇 wireless sensor ...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 7 篇 ontology
  • 6 篇 internet of thin...

机构

  • 72 篇 department of co...
  • 54 篇 school of softwa...
  • 41 篇 tsinghua nationa...
  • 25 篇 key laboratory f...
  • 14 篇 key laboratory f...
  • 12 篇 national enginee...
  • 10 篇 national key lab...
  • 9 篇 college of compu...
  • 9 篇 science & techno...
  • 8 篇 university of ch...
  • 7 篇 department of co...
  • 7 篇 computer vision ...
  • 6 篇 inria
  • 6 篇 guangdong provin...
  • 5 篇 school of softwa...
  • 5 篇 moe key laborato...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 department of au...

作者

  • 13 篇 yunhao liu
  • 12 篇 qiang wenwen
  • 12 篇 zheng changwen
  • 11 篇 wang bin
  • 10 篇 wang jianmin
  • 9 篇 xiong hui
  • 9 篇 herawan tutut
  • 8 篇 sun fuchun
  • 8 篇 yong jun-hai
  • 7 篇 wang chaokun
  • 7 篇 li jiangmeng
  • 7 篇 palaiahnakote sh...
  • 6 篇 ming gu
  • 6 篇 paul jean-claude
  • 6 篇 tong lu
  • 6 篇 shen linlin
  • 6 篇 poomrittigul suv...
  • 6 篇 zhang hui
  • 5 篇 xiang-yang li
  • 5 篇 sun jiaguang

语言

  • 466 篇 英文
  • 17 篇 其他
  • 8 篇 中文
  • 1 篇 日文
检索条件"机构=Web Information System and Department of Software Technology"
491 条 记 录,以下是361-370 订阅
排序:
Temporal optimisations and temporal cardinality in the tOWL language
收藏 引用
International Journal of web Engineering and technology 2012年 第1期7卷 45-64页
作者: Milea, Viorel Frasincar, Flavius Kaymak, Uzay Houben, Geert-Jan Econometric Institute Erasmus University Rotterdam P.O. Box 1738 3000 DR Rotterdam Netherlands School of Industrial Engineering Eindhoven University of Technology P.O. Box 513 5600 MB Eindhoven Netherlands Web Information Systems Group Software Technology Department Delft University of Technology P.O. Box 5031 2600 GA Delft Netherlands
The tOWL language is a temporal web ontology language based on OWL-DL without nominals. The language enables the representation of time and time-related aspects, such as state transitions. The design choices of the la... 详细信息
来源: 评论
Asymptotic throughput for large-scale wireless networks with general node density
收藏 引用
Wireless Networks 2012年 第5期19卷 559-575页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Yunhao Liu Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China The Tsinghua National Laboratory for Information Science and Technology (TNLIST) Department of Computer Science and Engineering Tongji University Shanghai China The Department of Computer Science Illinois Institute of Technology Chicago USA The TNLIST and School of Software Tsinghua University Beijing China CSE The Hong Kong University of Science and Technology Kowloon Hong Kong
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast an...
来源: 评论
Feasibility of Double-Click Attack on a Passive Detection Quantum Key Distribution system
收藏 引用
Chinese Physics Letters 2011年 第7期28卷 27-30页
作者: ZHANG Peng LI Chao Department of Mathematics and System Science Science CollegeNational University of Defense TechnologyChangsha 410073 State Key Laboratory of Information Security Institute of SoftwareChinese Academy of SciencesBeijing 100190
An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical laye... 详细信息
来源: 评论
A new addressing schema for mapping honeycomb into different topologies
收藏 引用
Recent Patents on Computer Science 2011年 第3期4卷 211-216页
作者: Al-Shargabi, Bassam Al-Nahari, Abdulaziz Sabri, Alia Taha Faculty of Information Technology Department of Software engineering Isra University P O Box 33 Amman 11622 Jordan Applied Science Sana'a Community College Sana'a Yemen Faculty of Information Technology Department of Networking Information system Applied Science University Amman Jordan
In a parallel system, nodes communicate with each other by exchanging messages. Different topologies exist for arranging processors in a network based on the architecture of the network;or based on the fact that a net... 详细信息
来源: 评论
A comparative study for Arabic text classification algorithms based on stop words elimination  11
A comparative study for Arabic text classification algorithm...
收藏 引用
Proceedings of the 2011 International Conference on Intelligent Semantic web-Services and Applications
作者: Al-Shargabi, Bassam Al-Romimah, Waseem Olayah, Fekry Software Engineering Department Faculty of Information Technology Al-Isra University Amman Jordan Computer Information System Department Faculty of Information Technology University of Science and Technology Sana'a Yemen Management Information System Department Faculty of Administrative Science Al-Isra University Amman Jordan
This paper compares three techniques for Arabic text classification;these techniques are Support Vector Machine (SVM) with Sequential Minimal Optimization (SMO), Naïve Bayesian (NB), and J48. The main objective o... 详细信息
来源: 评论
Creating granular learning object towards reusability of Learning Object in e-learning context
Creating granular learning object towards reusability of Lea...
收藏 引用
2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011
作者: Noor, Siti Fadzilah Mat Yusof, Norazah Hashim, Siti Zaiton Mohd School of Information Technology Faculty of Technology and Information Science National University of Malaysia Malaysia Software Engineering Department Faculty of Computer Science and Information System University Technology of Malaysia Malaysia
Learning Object (LO) is one of the main research topics in the e-learning community in the recent years, and most researchers pay attention to the issue of Learning Object Reusability. The most obvious motivation is t... 详细信息
来源: 评论
DETECTING CRITICAL LEAST ASSOCIATION RULES IN MEDICAL DATABASES
收藏 引用
International Journal of Modern Physics: Conference Series 2012年 第9期ijmpcs卷 464-479页
作者: ZAILANI ABDULLAH TUTUT HERAWAN MUSTAFA MAT DERIS Department of Computer Science Universiti Malaysia Terengganu Mengabang Telipot Kuala Terengganu 21030 Terengganu Malaysia Database and Knowledge Management Research Group Faculty of Computer System and Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak Gambang 26300 Kuantan Pahang Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Parit Raja 86400 Batu Pahat Johor Malaysia
Least association rules are corresponded to the rarity or irregularity relationship among itemset in database. Mining these rules is very difficult and rarely focused since it always involves with infrequent and excep... 详细信息
来源: 评论
Integration of cultural dimensions into software localisation testing of assistive technology for deaf children
Integration of cultural dimensions into software localisatio...
收藏 引用
2011 5th Malaysian Conference in software Engineering, MySEC 2011
作者: Ping, Tan Ping Chan, Chiu Po Sharbini, Hamizan Julaihi, Azlina Ahmadi Department of Computing and Software Engineering Faculty of Computer Science and Information Technology Universiti Malaysia Sarawak Malaysia Department of Information Systems Faculty of Computer Science and Information Technology Universiti Malaysia Sarawak Malaysia Department of Computer System and Comm. Technologies Faculty of Computer Science and Information Technology Universiti Malaysia Sarawak Malaysia
Lack of hearing ability hinders deaf children from mastering grammar in language studies. Unfortunately, such software targeting Malay language is limited. This paper attempts to generate new approach in handling such... 详细信息
来源: 评论
Real-time volume caustics with image-based photon tracing
Real-time volume caustics with image-based photon tracing
收藏 引用
12th International Conference on Computer-Aided Design and Computer Graphics, CAD/Graphics 2011
作者: Wang, Yuxiang Wang, Bin Chen, Li School of Software Tsinghua University China Department of Computer Science and Technology Tsinghua University China Laboratory for Information System Security Ministry of Education of China China Tsinghua National Laboratory for Information Science and Technology China
Rendering of volume caustics in participating media is often expensive, even with different acceleration approaches. Basic volume photon tracing is used to render such effects, but rather slow due to its massive quant... 详细信息
来源: 评论
Efficiently querying business process models with BeehiveZ
Efficiently querying business process models with BeehiveZ
收藏 引用
19th Conference on Business Process Management 2011, BPM 2011
作者: Jin, Tao Wang, Jianmin Wen, Lijie Department of Computer Science and Technology Tsinghua University China School of Software Tsinghua University China Key Laboratory for Information System Security Ministry of Education China Tsinghua National Laboratory for Information Science and Technology China
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with Beehi... 详细信息
来源: 评论