咨询与建议

限定检索结果

文献类型

  • 1,344 篇 会议
  • 214 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,011 篇 工学
    • 849 篇 计算机科学与技术...
    • 733 篇 软件工程
    • 221 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 63 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 421 篇 理学
    • 253 篇 数学
    • 115 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 55 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 internet of thin...
  • 22 篇 data mining
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 university of re...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,441 篇 英文
  • 144 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1597 条 记 录,以下是1011-1020 订阅
排序:
Locality-sensitive hashing scheme based on dynamic collision counting  12
Locality-sensitive hashing scheme based on dynamic collision...
收藏 引用
2012 ACM SIGMOD International Conference on Management of Data, SIGMOD '12
作者: Gan, Junhao Feng, Jianlin Fang, Qiong Ng, Wilfred School of Software Sun Yat-Sen University Guangzhou China Dept. of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong
Locality-Sensitive Hashing (LSH) and its variants are well-known methods for solving the c-approximate NN Search problem in high-dimensional space. Traditionally, several LSH functions are concatenated to form a "... 详细信息
来源: 评论
Caching support for skyline query processing with partially-ordered domains  12
Caching support for skyline query processing with partially-...
收藏 引用
20th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2012
作者: Hsueh, Yu-Ling Zimmermann, Roger Ku, Wei-Shinn Dept. of Computer Science and Information Engineering National Chung Cheng University Taiwan Computer Science Department National University of Singapore Singapore Singapore Dept. of Computer Science and Software Engineering Auburn University United States
The results of skyline queries performed on data sets with partially-ordered domains vary depending on users' preference profiles specified for the partially-ordered domains. Existing work has addressed the issue ... 详细信息
来源: 评论
Modeling the intelligent community defense and security system with Petri nets
Modeling the intelligent community defense and security syst...
收藏 引用
4th International Conference on Digital Home, ICDH 2012
作者: Li, Naiwen Zheng, Hong Liu, Yulong Computer Science and Engineering Dept. East China University of Science and Technology Shanghai China Jiangsu Senchina Software Technology Co. Ltd. Yancheng China
With the increasing popularity of the intelligent community, the intelligent community defense and security system is the core module of the intelligent community system. Modeling the defense and security system is th... 详细信息
来源: 评论
Constructing a cloud-based IDS by merging VMI with FMA
Constructing a cloud-based IDS by merging VMI with FMA
收藏 引用
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
作者: Harrison, Christopher Cook, Devin McGraw, Robert Hamilton Jr., John A. Dept. Computer Science and Software Engineering Auburn University United States Ram Laboratories Inc. San Diego CA United States
Cloud computing has emerged in recent years as a major segment of the IT industry;however, security concerns remain the primary impediment to full-scale adoption. Leveraging properties of virtualization, virtual machi... 详细信息
来源: 评论
Self-configurable processor schedule window algorithm
Self-configurable processor schedule window algorithm
收藏 引用
作者: Rao, A. Prasanth Govardhan, A. Rao, P. V. V. Prasad Dept. of Computer Science and Engineering JNTUH Hyderabad India SETU Software Systems Pvt.. Ltd. IIIT Gouchibowli Hyderabad India
Most periodic tasks are assigned to processors using partition scheduling policy after checking feasibility conditions. A new approach is proposed for scheduling aperiodic tasks with periodic task system on multiproce... 详细信息
来源: 评论
C to O-O translation: Beyond the easy stuff
C to O-O translation: Beyond the easy stuff
收藏 引用
19th Working Conference on Reverse engineering, WCRE 2012
作者: Trudel, Marco Furia, Carlo A. Nordio, Martin Meyer, Bertrand Oriol, Manuel Department of Software Engineering ETH Zurich Switzerland Dept. of Computer Science University of York York United Kingdom ABB Corporate Research Industrial Software Systems Baden-Dättwil Switzerland
Can we reuse some of the huge code-base developed in C to take advantage of modern programming language features such as type safety, object-orientation, and contracts? This paper presents a source-to-source translati... 详细信息
来源: 评论
Automatic evaluation of document classification using n-gram statistics
Automatic evaluation of document classification using n-gram...
收藏 引用
2012 15th International Conference on Network-Based Information Systems, NBIS 2012
作者: Choi, Dongjin Ko, Byeongkyu Lee, Eunji Hwang, Myunggwon Kim, Pankoo Dept. of Computer Engineering Chosun University Gwangju Korea Republic of Dept. of Software Research Korea Institute of Science and Technology Institute Daejeon Korea Republic of
Due to the development of World Wide Web technologies, people are living in the place flooding trillions of web pages in every moment. The amount of web size has been increasing dramatically. For this reason, it is ge... 详细信息
来源: 评论
An improved security approach based on kerberos for M2M open IPTV system
An improved security approach based on kerberos for M2M open...
收藏 引用
2012 15th International Conference on Network-Based Information Systems, NBIS 2012
作者: Doh, Inshil Chae, Kijoon Lim, Jiyoung Chung, Min Young Dept. of Computer Science and Engineering Ewha Womans University Seoul Korea Republic of Dept. of Computer Software Korean Bible University Seoul Korea Republic of School of Information and Communication Engineering Sungkyunkwan University Suwon Korea Republic of
Open IPTV has attracted considerable attention and is expected to bring great changes in the IPTV service area. However, because of its openness and IP network characteristics, security is one of the major issues hind... 详细信息
来源: 评论
Impact of user interface generation on maintenance
Impact of user interface generation on maintenance
收藏 引用
2012 IEEE International Conference on computer science and Automation engineering, CSAE 2012
作者: Cerny, Tomas Chalupa, Vaclav Donahoo, Michael J. Dept. Computer Science and Engineering Czech Technical University Charles Square 13 Prague Czech Republic Dept. Software Engineering Czech Technical University Charles Square 13 Prague Czech Republic Dept. Computer Science Baylor University Waco TX United States
User interface development and maintenance is one of the most time consuming parts of software application development. User interfaces provide numerous graphical visualizations of user data, these are often influence... 详细信息
来源: 评论
On relaying for wireless industrial communications: Is careful placement of relayers strictly necessary?
On relaying for wireless industrial communications: Is caref...
收藏 引用
2012 9th IEEE International Workshop on Factory Communication Systems, WFCS 2012
作者: Willig, Andreas Uhlemann, Elisabeth University of Canterbury Dept. of Computer Science and Software Engineering Christchurch New Zealand Halmstad University CERES: Center for Research on Embedded Systems Halmstad Sweden
Relaying is a very promising technique to improve the reliability of data transmission in wireless (industrial) networks. With relaying, relay nodes support source nodes in carrying out retransmissions. A common assum... 详细信息
来源: 评论