咨询与建议

限定检索结果

文献类型

  • 1,343 篇 会议
  • 213 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,013 篇 工学
    • 851 篇 计算机科学与技术...
    • 735 篇 软件工程
    • 221 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 64 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 422 篇 理学
    • 253 篇 数学
    • 116 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 54 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 data mining
  • 21 篇 internet of thin...
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 university of re...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,530 篇 英文
  • 53 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1595 条 记 录,以下是951-960 订阅
排序:
A hybrid mobility model based on social, cultural and language diversity
A hybrid mobility model based on social, cultural and langua...
收藏 引用
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013
作者: Karim, Lutful Mahmoud, Qusay H. School of Information and Communications Technology Seneca College of Applied Arts and Science Toronto ON Canada Dept. Electrical Computer and Software Engineering University of Ontario Institute of Technology Oshawa ON Canada
Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial featur... 详细信息
来源: 评论
Multimedia and Ubiquitous engineering  1
收藏 引用
丛书名: Lecture Notes in Electrical engineering
2013年
作者: James J. (Jong Hyuk) Park Joseph Kee-Yin Ng Hwa-Young Jeong Borgy Waluyo
The new multimedia standards (for example, MPEG-21) facilitate the seamless integration of multiple modalities into interoperable multimedia frameworks, transforming the way people work and interact with multimedia da... 详细信息
来源: 评论
Using unconventional awareness mechanisms to support mobile work  13
Using unconventional awareness mechanisms to support mobile ...
收藏 引用
2013 Chilean Conference on Human - computer Interaction, ChileCHI 2013
作者: Monares, Alvaro Ochoa, Sergio F. Pino, José A. Ruiz-Lopez, Tomás Noguera, Manuel Dept. of Computer Science University of Chile Av. Blanco Encalada 2120 Santiago Chile Dept. of Software Engineering University of Granada Periodista Daniel Saucedo Aranda s/n Granada Spain
Awareness mechanisms are normally used to deliver context information to computer systems users. These mechanisms have been extensively studied as part of collaborative solutions designed for stationary scenarios, and... 详细信息
来源: 评论
Accelerating k-12 computational thinking using scaffolding, staging, and abstraction  13
Accelerating k-12 computational thinking using scaffolding, ...
收藏 引用
44th ACM Technical Symposium on computer science Education, SIGCSE 2013
作者: Touretzky, David S. Marghitu, Daniela Ludi, Stephanie Bernstein, Debra Ni, Lijun Computer Science Department Carnegie Mellon University Pittsburgh PA 15213 United States Computer Science and Software Engineering Auburn University Auburn AL 36849 United States Dept. of Software Engineering Rochester Institute of Technology Rochester NY 14623 United States TERC Cambridge MA 02140 United States Georgia Inst. of Technology Atlanta GA 30332-0760 United States
We describe a three-stage model of computing instruction beginning with a simple, highly scaffolded programming en-vironment (Kodu) and progressing to more challenging frame-works (Alice and Lego NXT-G). In moving bet... 详细信息
来源: 评论
On detection of emerging anomalous traffic patterns using GPS data
On detection of emerging anomalous traffic patterns using GP...
收藏 引用
作者: Pang, Linsey Xiaolin Chawla, Sanjay Liu, Wei Zheng, Yu School of Information Technologies University of Sydney Australia Dept. of Computer Science and Software Engineering University of Melbourne Australia Microsoft Research Asia Microsoft Research Asia Australia NICTA Sydney Australia
The increasing availability of large-scale trajectory data provides us great opportunity to explore them for knowledge discovery in transportation systems using advanced data mining techniques. Nowadays, large number ... 详细信息
来源: 评论
Scalable Attack Representation Model Using Logic Reduction Techniques
Scalable Attack Representation Model Using Logic Reduction T...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Jin Bum Hong Dong Seong Kim Tadao Takaoka Computer Science and Software Engineering Dept. University of Canterbury Christchurch New Zealand
Automated construction methods of attack graphs (AGs) and their improved attack representation models (ARMs) have been proposed, but the AG has a state space explosion when analysing the security of very large sized n... 详细信息
来源: 评论
Measuring similarity of Android applications via reversing and k-gram birthmarking  13
Measuring similarity of Android applications via reversing a...
收藏 引用
2013 Research in Adaptive and Convergent Systems, RACS 2013
作者: Ko, Jeonguk Shim, Hyungjoon Kim, Dongjin Jeong, Youn-Sik Cho, Seong-Je Park, Minkyu Han, Sangchul Kim, Seong Baeg Dept. of Software Security Dankook University Yongin 448-701 Korea Republic of Dept. of Computer Science Dankook University Yongin 448-701 Korea Republic of Dept. of Computer Engineering Konkuk University Chungbuk 380-701 Korea Republic of Dept. of Computer Education Jeju National University Jeju 650-756 Korea Republic of
By measuring similarity of programs, we can determine whether someone illegally copies a program from another program or not. If the similarity is significantly high, it means that a program is a copy of the other. Th... 详细信息
来源: 评论
LIDAR: A layered intrusion detection and remediationframework for smartphones
LIDAR: A layered intrusion detection and remediationframewor...
收藏 引用
4th ACM Sigsoft International Symposium on Architecting Critical Systems, ISARCS 2013
作者: Roshandel, Roshanak Arabshahi, Payman Poovendran, Radha Seattle University Dept. of Computer Science and Software Engineering P.O. Box 222000 Seattle WA 98122-1090 United States University of Washington Department of Electrical Engineering Box 352500 Seattle WA 98195-2500 United States
Given the advanced set of capabilities offered by smartphone and tablet computing devices, they have become the platform of choice for many users for day-to-day work and leisure. There is however a fundamental differe... 详细信息
来源: 评论
QoS Traffic Mapping for a Multi-Participant Session in Unified Communications Networks
QoS Traffic Mapping for a Multi-Participant Session in Unifi...
收藏 引用
IEEE Canadian Conference on Electrical and computer engineering
作者: Abdelwahab M. Elnaka Qusay H. Mahmoud School of Computer Science University of Guelph Dept. of Electrical Computer and Software Engineering University of Ontario Institute of Technology
Unified communications (UC) offers users an uninterrupted communication service regardless of the device which the user is using, the heterogeneous networks to which he might be connected, the physical and logical con... 详细信息
来源: 评论
Analyzing impact of video codec, encapsulation methods and streaming protocols on the quality of video streaming
Analyzing impact of video codec, encapsulation methods and s...
收藏 引用
International Conference on Digital Information Management (ICDIM)
作者: Afaq Iqbal Fahim Arif Nasru Minallah Dept. Computer Software Engineering National University of Science and Technology Islamabad Pakistan Dept. Computer System Engineering University of Engineering and Technology Peshawar Pakistan
There are various factors involved in the transmission of video over internet. These factors have direct impact on the quality of the transmitted video. The underlying video codec, encapsulation method and protocol ar... 详细信息
来源: 评论