咨询与建议

限定检索结果

文献类型

  • 1,343 篇 会议
  • 215 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 852 篇 计算机科学与技术...
    • 736 篇 软件工程
    • 223 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 64 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 422 篇 理学
    • 253 篇 数学
    • 116 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 54 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 data mining
  • 21 篇 internet of thin...
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 university of re...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,532 篇 英文
  • 53 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1597 条 记 录,以下是801-810 订阅
排序:
Performance analysis of electrical parameters of PKL electricity (An experimental analysis on discharge rates, capacity & discharge time, pulse performance and cycle life & deep discharge of Pathor Kuchi Leaf (PKL) electricity cell)
Performance analysis of electrical parameters of PKL electri...
收藏 引用
IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia)
作者: Kamrul Alam Khan Akhlaqur Rahman Md. Siddikur Rahman Aniqa Tahsin Kazi Md. Jubyer Shuva Paul Dept. of Physics Jagannath University Dhaka Bangladesh School of Software and Electrical Engineering Swinburne University of Technology Victoria Australia Dept. of Electrical and Electronic Engineering American International University Bangladesh Dhaka Bangladesh Dept. of Electrical Engineering and Computer Science South Dakota State University South Dakota United States of America
Battery/cell has some important parameters which make it unique to operate. PKL Electricity Cell is a voltaic/quasi galvanic cell, which has also some important parameters to make it unique from traditional cell/batte... 详细信息
来源: 评论
Continuous learning process assessment model  1
Continuous learning process assessment model
收藏 引用
1st International Workshop on software Process Education, Training and Professionalism, SPETP 2015 - co-located with 15th International Conference on software Process Improvement and Capability dEtermination, SPICE 2015
作者: Mirzianov, Oleg Mitasiunas, Antanas Software Engineering Dept. Vilnius University Lithuania Computer Science Dept. Vilnius University MIT-SOFT Ltd. Lithuania
Process capability maturity modeling elaborated by the software engineering community became applicable for any process-oriented activity assessment and improvement. The purpose of this paper is to contribute to the s... 详细信息
来源: 评论
Subsuming methods: Finding new optimisation opportunities in object-oriented software  15
Subsuming methods: Finding new optimisation opportunities in...
收藏 引用
6th ACM/SPEC International Conference on Performance engineering, ICPE 2015
作者: Maplesden, David Tempero, Ewan Hosking, John Grundy, John C. Dept. of Computer Science University of Auckland New Zealand Faculty of Science University of Auckland New Zealand School of Software and Electrical Engineering Swinburne University of Technology Australia
The majority of existing application profiling techniques ag- gregate and report performance costs by method or call- ing context. Modern large-scale object-oriented applications consist of thousands of methods with c... 详细信息
来源: 评论
A flash-aware buffering scheme using on-the-fly redo  15
A flash-aware buffering scheme using on-the-fly redo
收藏 引用
24th ACM International Conference on Information and Knowledge Management, CIKM 2015
作者: Jeong, Kyosung Kim, Sang-Wook Lim, Sungchae Dept. of Electronics and Computer Engineering Hanyang University Seoul Korea Republic of Dept. of Computer and Software Hanyang University Seoul Korea Republic of Dept. of Computer Science Dongduk Women's University Seoul Korea Republic of
In this paper, we address how to reduce the amount of page updates in flash-based DBMS equipped with SSD (solid state drive). We propose a novel buffering scheme that evicts a dirty page X without flushing it into SSD... 详细信息
来源: 评论
POSTER: A hybrid approach for mobile security threat analysis  8
POSTER: A hybrid approach for mobile security threat analysi...
收藏 引用
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2015
作者: You, Wanqing Qian, Kai Guo, Minzhe Bhattacharya, Prabir Qian, Ying Tao, Lixin Department of Computer Science and Software Engineering Southern Polytechnic State University MariettaGA United States Department of Electrical Engineering and Computing Systems University of Cincinnati United States Department of Computer Science East China Normal University Shanghai China Dept. of Computer Science Pace University New York United States
Research on effective and efficient mobile threat analysis becomes an emerging and important topic in cybersecurity research area. Static analysis and dynamic analysis constitute two of the most popular types of techn... 详细信息
来源: 评论
Learning automaton based context oriented middleware architecture for precision agriculture
Learning automaton based context oriented middleware archite...
收藏 引用
International Conference on computer, Information and Telecommunication Systems, IEEE CITS 2015
作者: Venkata Krishna, P. Sivanesan, S. Misra, Sudip Obaidat, Mohammad S. Department of Computer Science Sri Padmavathi Mahila Visvavidyalayam Tirupati India School of Computing Science and Engineering VIT University Vellore India School of Information Technology Indian Institute of Technology Kharagpur India Dept. of Computer Science and Software Engineering Monmouth University NJ United States
The continuous alteration of living landscape in earth due to the greatest impact of information technology has converted the whole earth into a small digital village. That means anyone could share information in any ... 详细信息
来源: 评论
Research on highly consumable platform for business analytics
Research on highly consumable platform for business analytic...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Qingwei Wu Zhen Gao Enzhong Wang Hong Min Zhihua Wei School of Software Engineering Tongji University Shanghai China System and Technology Group IBM Beijing China T. J. Watson Research Center IBM Yorktown Heights NY USA Dept. of Computer Science and Technology Tongji University Shanghai China
Business analytics is an important means of gaining new insights and understanding of business performance. Data mining technology provides information needed by business analytics based on data. But due to the barrie... 详细信息
来源: 评论
A testbed using USRP(TM) and LabView(R) for dynamic spectrum access in cognitive radio networks  29
A testbed using USRP(TM) and LabView(R) for dynamic spectrum...
收藏 引用
29th IEEE International Conference on Advanced Information Networking and Applications, AINA 2015
作者: Sharma, Nimish Rawat, Danda B. Bista, Bhed B. Shetty, Sachin Department of Electrical Engineering Georgia Sothern University United States Faculty of Software and Information Science Iwate Prefectural University Japan Dept. of Electrical and Computer Engineering Tennessee State University United States
Dynamic spectrum access is regarded as a backbone for cognitive radio networks where unlicensed secondary users (SUs) access spectrum opportunistically which is licensed to licensed primary users (PUs). SUs are requir... 详细信息
来源: 评论
Malicious behavior pattern mining using Control Flow Graph
Malicious behavior pattern mining using Control Flow Graph
收藏 引用
Research in Adaptive and Convergent Systems, RACS 2015
作者: Choi, Chang Piao, Xuefeng Choi, Junho Lee, Mungyu Kim, Pankoo Department of Computer Engineering Chosun University Gwangju Korea Republic of School of Computer Science and Technology Harbin Institute of Technology China Division of Undeclared Majors Chosun University Gwangju Korea Republic of Dept. of Software Convergence Engineering Chosun University Gwangju Korea Republic of
Cyber hacking attacks based on malicious code are becoming diversified. Malicious code analysis is very important because static flow analysis can naturally be helpful as part of the detection process given that malic... 详细信息
来源: 评论
Novel methods for reflective symmetry detection in scanned 3D models
Novel methods for reflective symmetry detection in scanned 3...
收藏 引用
International Conference on Image and Vision Computing New Zealand, IVCNZ
作者: Matthew Stephenson Adrian Clark Richard Green Computer Science and Software Engineering Dept University of Canterbury Christchurch New Zealand
The concept of detecting symmetry within 3D models has received an extensive amount of research within the past decade. Numerous algorithms have been proposed to identify reflective symmetry within 3D meshes and to ex... 详细信息
来源: 评论