咨询与建议

限定检索结果

文献类型

  • 299 篇 会议
  • 191 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 312 篇 工学
    • 240 篇 计算机科学与技术...
    • 198 篇 软件工程
    • 52 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 18 篇 仪器科学与技术
    • 17 篇 光学工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 14 篇 交通运输工程
    • 13 篇 生物医学工程(可授...
    • 11 篇 建筑学
    • 11 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 安全科学与工程
  • 153 篇 理学
    • 83 篇 数学
    • 44 篇 物理学
    • 24 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 12 篇 化学
  • 113 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 21 篇 医学
    • 19 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 18 篇 法学
    • 16 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 17 篇 computer science
  • 17 篇 accuracy
  • 13 篇 laboratories
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 testing
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 deep learning
  • 8 篇 information syst...
  • 8 篇 information secu...
  • 7 篇 educational tech...
  • 7 篇 wireless sensor ...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 7 篇 ontology
  • 6 篇 internet of thin...

机构

  • 72 篇 department of co...
  • 54 篇 school of softwa...
  • 41 篇 tsinghua nationa...
  • 25 篇 key laboratory f...
  • 14 篇 key laboratory f...
  • 12 篇 national enginee...
  • 10 篇 national key lab...
  • 9 篇 college of compu...
  • 9 篇 science & techno...
  • 8 篇 university of ch...
  • 7 篇 department of co...
  • 7 篇 computer vision ...
  • 6 篇 inria
  • 6 篇 guangdong provin...
  • 5 篇 school of softwa...
  • 5 篇 moe key laborato...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 department of au...

作者

  • 13 篇 yunhao liu
  • 12 篇 qiang wenwen
  • 12 篇 zheng changwen
  • 11 篇 wang bin
  • 10 篇 wang jianmin
  • 9 篇 xiong hui
  • 9 篇 herawan tutut
  • 8 篇 sun fuchun
  • 8 篇 yong jun-hai
  • 7 篇 wang chaokun
  • 7 篇 li jiangmeng
  • 7 篇 palaiahnakote sh...
  • 6 篇 ming gu
  • 6 篇 paul jean-claude
  • 6 篇 tong lu
  • 6 篇 shen linlin
  • 6 篇 poomrittigul suv...
  • 6 篇 zhang hui
  • 5 篇 xiang-yang li
  • 5 篇 sun jiaguang

语言

  • 466 篇 英文
  • 17 篇 其他
  • 8 篇 中文
  • 1 篇 日文
检索条件"机构=Web Information System and Department of Software Technology"
491 条 记 录,以下是411-420 订阅
排序:
Phosphor: A cloud based DRM scheme with sim card
Phosphor: A cloud based DRM scheme with sim card
收藏 引用
12th International Asia Pacific web Conference, APweb 2010
作者: Zou, Peng Wang, Chaokun Liu, Zhang Bao, Dalei School of Software Tsinghua University Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security Ministry of Education China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
As 3G networks provide enhanced capabilities of data transportation, a considerable amount of mobile applications and services, which involve mass of unstructured digital contents, e.g., video and audio, are available... 详细信息
来源: 评论
Recognition of walking intention using multiple bio/kinesthetic sensors for lower limb exoskeletons
Recognition of walking intention using multiple bio/kinesthe...
收藏 引用
作者: Jang, Eun-Hye Cho, Young-Jo Chi, Su-Young Lee, Jae-Yeon Kang, Sang Seung Chun, Byung-Tae Robot/Cognition System Research Department IT Convergence Technology Research Laboratory Electronics and Telecommunications Research Institute Daejeon Korea Republic of Department of Web Information Engineering Hankyong National University Ansung Korea Republic of
In order to assist the lower limb disabled people to walk, walking-support exoskeletons with bio/kinesthetic sensors such as EMG (Electromyography), gyroscope, and FSR (Force Sensing Resistor) have been developed. It ... 详细信息
来源: 评论
Online information sharing issues in website personalization
Online information sharing issues in website personalization
收藏 引用
1st International Conference on User Science and Engineering 2010, iUSEr 2010
作者: Razali, Mohd Norhisham Fun, Tan Soo Razak, Fariza Hanis Abdul Hanapi, Rozita Software Engineering School of Engineering and Information Technology University Malaysia Sabah Malaysia Network and System Management School of Engineering and Information Technology University Malaysia Sabah Malaysia Department of System Science Faculty of Computer and Mathematical Sciences University Teknologi MARA Shah Alam Selangor Malaysia Office System Management Faculty of Office Management and Technology Universiti Teknologi MARA Puncak Alam Selangor Malaysia
website Personalization is one of strategic technique in delivering services in online applications. A part of process for building personalization applications is to collect particular information from the user which... 详细信息
来源: 评论
A face-based shape matching method for IGES surface model
A face-based shape matching method for IGES surface model
收藏 引用
International Conference on Shape Modeling and Applications - Shape Modeling International Conference, SMI 2010
作者: Hu, Kai-Mo Wang, Bin Gao, Yi Yuan, Qi-Ming Yong, Jun-Hai School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
IGES is a widely used standard for mechanical data exchange. In this paper, we present a new method for the retrieval task of IGES surface model. Based on this method, a novel distinctive face selection strategy is pr... 详细信息
来源: 评论
Robustify a job-shop schedule according to the payload of the machine
Robustify a job-shop schedule according to the payload of th...
收藏 引用
7th International Conference on Service systems and Service Management, ICSSSM'10
作者: You, Zhiyang Sun, Zhigang Zhao, Xibin Zang, Daxin Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing China Key Laboratory of Information System Security Ministry of Education School of Software Tsinghua University Beijing 100084 China Software Engineering Institute Beijing University of Aeronautics and Astronautics Beijing 100084 China
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza... 详细信息
来源: 评论
Reconstructing 3D objects from 2D sectional views of engineering drawings using volume-based method
Reconstructing 3D objects from 2D sectional views of enginee...
收藏 引用
International Conference on Shape Modeling and Applications - Shape Modeling International Conference, SMI 2010
作者: Wen, Yamei Zhang, Hui Yu, Zhongmian Sun, Jiaguang Paul, Jean-Claude School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China INRIA France
Sectional views are widely used in engineering practice due to their clear and concise expression. However, it is difficult for computers to understand because of the large numbers of omitted entities and their divers... 详细信息
来源: 评论
The transition between sharp and rounded features and the manipulation of incompatible boundary in filling n sided holes
The transition between sharp and rounded features and the ma...
收藏 引用
International Conference on Shape Modeling and Applications - Shape Modeling International Conference, SMI 2010
作者: Shi, Kan-Le Yong, Jun-Hai Liu, Peng Sun, Jia-Guang Paul, Jean-Claude School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education of China Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China INRIA France
N -sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatibl... 详细信息
来源: 评论
Compositional abstraction refinement for timed systems
Compositional abstraction refinement for timed systems
收藏 引用
2010 4th International Symposium on Theoretical Aspects of software Engineering, TASE 2010
作者: He, Fei Zhu, He Hung, William N. N. Song, Xiaoyu Gu, Ming School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security MOE China Synopsys Inc. Mountain View CA United States Department of ECE Portland State University Portland OR United States
Model checking suffers from the state explosion problem. Compositional abstraction and abstraction refinement have been investigated in many areas to address this problem. This paper considers the compositional model ... 详细信息
来源: 评论
E-cost estimation using expert judgment and COCOMO II
E-cost estimation using expert judgment and COCOMO II
收藏 引用
2010 International Symposium on information technology, ITSim'10
作者: Mansor, Zulkefli Bin Kasirun, Zarinah Mohd Arshad, Noor Habibah Hj Yahya, Saadiah Department of Computer Science Faculty of Industrial Information Technology Universiti Industri Selangor Selangor Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia System Science Studies Faculty of Computer Science and Mathematics Universiti Teknologi Mara Selangor Malaysia Computer Technology and Networking Studies Faculty of Computer Science and Mathematics Universiti Teknologi Mara Selangor Malaysia
The accuracy and efficiency of cost estimation methodology for web-based application is very important for software development as it would be able to assist the management team to estimate the cost. Furthermore, it w... 详细信息
来源: 评论
Availability based trust model of clusters for MANET
Availability based trust model of clusters for MANET
收藏 引用
7th International Conference on Service systems and Service Management, ICSSSM'10
作者: Zhao, Xibin You, Zhiyang Zhao, Zhifeng Chen, Danning Peng, Feng Key Laboratory for Information System Security of Ministry of Education School of Software Tsinghua University 100084 China Department of Computer Science and Technology Tsinghua University 100084 China Department of Computer Science Zhenjiang Watercraft College 212003 China School of Software Tsinghua University 100084 China China Minzu Securities Co. Ltd. 100096 China
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis... 详细信息
来源: 评论