咨询与建议

限定检索结果

文献类型

  • 299 篇 会议
  • 191 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 312 篇 工学
    • 240 篇 计算机科学与技术...
    • 198 篇 软件工程
    • 52 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 18 篇 仪器科学与技术
    • 17 篇 光学工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 14 篇 交通运输工程
    • 13 篇 生物医学工程(可授...
    • 11 篇 建筑学
    • 11 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 安全科学与工程
  • 153 篇 理学
    • 83 篇 数学
    • 44 篇 物理学
    • 24 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 12 篇 化学
  • 113 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 21 篇 医学
    • 19 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 18 篇 法学
    • 16 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 17 篇 computer science
  • 17 篇 accuracy
  • 13 篇 laboratories
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 testing
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 deep learning
  • 8 篇 information syst...
  • 8 篇 information secu...
  • 7 篇 educational tech...
  • 7 篇 wireless sensor ...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 7 篇 ontology
  • 6 篇 internet of thin...

机构

  • 72 篇 department of co...
  • 54 篇 school of softwa...
  • 41 篇 tsinghua nationa...
  • 25 篇 key laboratory f...
  • 14 篇 key laboratory f...
  • 12 篇 national enginee...
  • 10 篇 national key lab...
  • 9 篇 college of compu...
  • 9 篇 science & techno...
  • 8 篇 university of ch...
  • 7 篇 department of co...
  • 7 篇 computer vision ...
  • 6 篇 inria
  • 6 篇 guangdong provin...
  • 5 篇 school of softwa...
  • 5 篇 moe key laborato...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 department of au...

作者

  • 13 篇 yunhao liu
  • 12 篇 qiang wenwen
  • 12 篇 zheng changwen
  • 11 篇 wang bin
  • 10 篇 wang jianmin
  • 9 篇 xiong hui
  • 9 篇 herawan tutut
  • 8 篇 sun fuchun
  • 8 篇 yong jun-hai
  • 7 篇 wang chaokun
  • 7 篇 li jiangmeng
  • 7 篇 palaiahnakote sh...
  • 6 篇 ming gu
  • 6 篇 paul jean-claude
  • 6 篇 tong lu
  • 6 篇 shen linlin
  • 6 篇 poomrittigul suv...
  • 6 篇 zhang hui
  • 5 篇 xiang-yang li
  • 5 篇 sun jiaguang

语言

  • 466 篇 英文
  • 17 篇 其他
  • 8 篇 中文
  • 1 篇 日文
检索条件"机构=Web Information System and Department of Software Technology"
491 条 记 录,以下是431-440 订阅
排序:
Evolutionary technologies: Fundamentals and applications to information/communication systems and manufacturing/logistics systems
IEEJ Transactions on Electronics, Information and Systems
收藏 引用
IEEJ Transactions on Electronics, information and systems 2010年 第5期130卷 731-736页
作者: Gen, Mitsuo Kawakami, Hiroshi Tsujimura, Yasuhiro Handa, Hisashi Lin, Lin Okamoto, Azuma Fuzzy Logic Systems Institute Japan Department of System Science Graduate School of Informatics Kyoto University Japan Nippon Institute of Technology Japan Division of Industrial Innovation Sciences Graduate School of Natural Science and Technology Okayama University Japan School of Software Dalian University of Technology China Faculty of Software and Information Science Iwate Prefectural University Japan
As efficient utilization of computational resources is increasing, evolutionary technology based on the Genetic Algorithm (GA), Genetic Programming (GP), Evolution Strategy (ES) and other Evolutionary Computations (EC... 详细信息
来源: 评论
Robustify a job-shop schedule according to the payload of the machine
Robustify a job-shop schedule according to the payload of th...
收藏 引用
International Conference on Services systems and Services Management, ICSSSM
作者: Zhiyang You Zhigang Sun Xibin Zhao Daxin Zang Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Key Laboratory of Information System Security Ministry of Education School of Software Tsinghua University Beijing China Software Engineering Institute Beijing Aeronautics and Astronautics University Beijing China
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza... 详细信息
来源: 评论
Real time traffic congestion degree computation for minor sensorless roads using cost efficient context reasoning
Real time traffic congestion degree computation for minor se...
收藏 引用
International IEEE Conference on Intelligent Transportation systems
作者: Raphiphan, Panraphee Prathombutr, Passakon Zaslavsky, Arkady Meesad, Phayung Caulfield School of Information Technology Monash University 900 Dandenong Rd Caulfield East VIC 3145 Australia 112 Thailand Science Park Phahon Yothin Rd Pathumthani 12120 Thailand Department of Computer Science and Electrical Engineering Luleå University of Technology Luleå Sweden Centre for Distributed System and Software Engineering Monash University Australia Department of Teacher Training in Electrical Education Faculty of Technical Education King Mongkut's University of Technology North Bangkok 1518 Pibulsongkram Rd Bangsue Bangkok 10800 Thailand
Traffic congestion is the cause of pollution and economic loss. The Real time traffic state report can alleviate this problem by assisting drivers for route planning and choosing unblocked roads. More traffic informat... 详细信息
来源: 评论
The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes
The Transition Between Sharp and Rounded Features and the Ma...
收藏 引用
International Conference on Shape Modeling and Applications
作者: Kan-Le Shi Jun-Hai Yong Peng Liu Jia-Guang Sun Jean-Claude Paul Key Laboratory of Information System Security Ministry of Education of China Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Software Tsinghua University Beijing China Tsinghua University Beijing Beijing CN INRIA France
N-sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatible... 详细信息
来源: 评论
Availability based trust model of clusters for MANET
Availability based trust model of clusters for MANET
收藏 引用
International Conference on Services systems and Services Management, ICSSSM
作者: Xibin Zhao Zhiyang You Zhifeng Zhao Danning Chen Feng Peng Key Laboratory of Information System Security of Ministry of Education School of Software Tsinghua University China Department of Computer Science and Technology Tsinghua University China Zhenjiang Watercraft College Department of Computer Science Zhenjiang Watercraft College China School of Software Tsinghua University China China Minzu Securities Company Limited China
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis... 详细信息
来源: 评论
DAWN: Energy efficient data aggregation in WSN with mobile sinks
DAWN: Energy efficient data aggregation in WSN with mobile s...
收藏 引用
International Workshop on Quality of Service
作者: ShaoJie Tang Jing Yuan XiangYang Li Yunhao Liu GuiHai Chen Ming Gu JiZhong Zhao Guojun Dai Department of Computer Science Illinois Institute of Technology Chicago IL USA State Key Laboratory of Novel Software Technology NanJing University NanJing China Institute of Computer Application Technology Hangzhou Dianzi University China Department of Computer Science and Engineering HKUST China Key Laboratory of Information System Security Tsinghua University China Department of Computer Science and Engineering Xi'An JiaoTong University China
The benefits of using mobile sink to prolong sensor network lifetime have been well recognized. However, few provably theoretical results remain are developed due to the complexity caused by time-dependent network top... 详细信息
来源: 评论
QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector
收藏 引用
Journal of Computer Science & technology 2009年 第2期24卷 357-372页
作者: 吴邦欲 支志雄 徐世杰 顾明 孙家广 School of Software Tsinghua University Key Laboratory for Information System Security Ministry of Education of China Department of Computer Science and Technology Tsinghua University
Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work ... 详细信息
来源: 评论
E-cost estimation using expert judgment and COCOMO II
E-cost estimation using expert judgment and COCOMO II
收藏 引用
International Symposium on information technology, ITSim
作者: Zulkefli Bin Mansor Zarinah Mohd Kasirun Noor Habibah Hj Arshad Saadiah Yahya Department of Computer Science Faculty of Industrial Information Technology Universiti Industri Selangor Selangor Darul Ehsan Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University Malaya Kuala Lumpur Malaysia System Science Studies Faculty of Computer Science and Mathematics Universiti Teknologi Mara Selangor Darul Ehsan Malaysia Computer Technology and Networking Studies Faculty of Computer Science and Mathematics Universiti Teknologi Mara Selangor Darul Ehsan Malaysia
The accuracy and efficiency of cost estimation methodology for web-based application is very important for software development as it would be able to assist the management team to estimate the cost. Furthermore, it w... 详细信息
来源: 评论
Adaptability infrastructure for bridging IT security evaluation and options theory  09
Adaptability infrastructure for bridging IT security evaluat...
收藏 引用
2nd International Conference on Security of information and Networks, SIN'09
作者: Abbas, Haider Yngström, Louise Hemani, Ahmed Department of Electronic Computer and Software Systems School of Information and Communication Technology Royal Institute of Technology Sweden Department of Computer and System Sciences Stockholm University Sweden
The constantly rising threats in IT infrastructure raise many concerns for an organization, altering security requirements according to dynamically changing environment, need of midcourse decision management and delib... 详细信息
来源: 评论
Equality detection for linear arithmetic constraints
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & Engineering) 2009年 第12期10卷 1784-1789页
作者: Li LI Kai-duo HE Ming GU Xiao-yu SONG Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China MOE Key Laboratory for Information System Security Beijing 100084 China Department of Electrical and Computer Engineering Portland State University Oregon 97207 USA
Satisfiability modulo theories (SMT) play a key role in verification applications. A crucial SMT problem is to combine separate theory solvers for the union of theories. In previous work, the simplex method is used to... 详细信息
来源: 评论