咨询与建议

限定检索结果

文献类型

  • 1,683 篇 会议
  • 249 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 1,970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,233 篇 工学
    • 1,020 篇 计算机科学与技术...
    • 869 篇 软件工程
    • 284 篇 信息与通信工程
    • 160 篇 控制科学与工程
    • 131 篇 生物工程
    • 104 篇 电气工程
    • 87 篇 电子科学与技术(可...
    • 87 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 52 篇 机械工程
    • 52 篇 安全科学与工程
    • 46 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 36 篇 交通运输工程
    • 33 篇 土木工程
    • 32 篇 化学工程与技术
  • 529 篇 理学
    • 320 篇 数学
    • 143 篇 生物学
    • 94 篇 统计学(可授理学、...
    • 90 篇 物理学
    • 66 篇 系统科学
  • 375 篇 管理学
    • 215 篇 管理科学与工程(可...
    • 184 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 74 篇 医学
    • 72 篇 临床医学
    • 69 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
  • 73 篇 法学
    • 53 篇 社会学
  • 43 篇 经济学
    • 43 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 5 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 61 篇 software
  • 59 篇 software enginee...
  • 56 篇 accuracy
  • 54 篇 machine learning
  • 45 篇 feature extracti...
  • 45 篇 training
  • 40 篇 computational mo...
  • 39 篇 deep learning
  • 39 篇 real-time system...
  • 34 篇 computer science
  • 33 篇 semantics
  • 30 篇 artificial intel...
  • 29 篇 data mining
  • 29 篇 predictive model...
  • 28 篇 internet of thin...
  • 28 篇 data models
  • 26 篇 analytical model...
  • 24 篇 computer archite...
  • 23 篇 support vector m...
  • 22 篇 scalability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 shafiur rahman
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 dong min

语言

  • 1,880 篇 英文
  • 76 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=dept. of Computer and Software Engineering"
1970 条 记 录,以下是1831-1840 订阅
排序:
Preface
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2003年 2659卷 V-VI页
作者: Sloot, Peter M. A. Abramson, David Bogdanov, Alexander V. Dongarra, Jack J. Zomaya, Albert Y. Gorbachev, Yuriy E. University of Amsterdam Informatics Institute Section of Computational Science Kruislaan 403 Amsterdam Netherlands Monash University School of Computer Science and Software Engineering Wellington Road ClaytonVIC Australia Institute for High-Performance Computing and Information Systems Fontanka emb. 6 St. Petersburg Russia University of Tennessee and Oak Ridge National Laboratory Computer Science Dept. 1122 Volunteer Blvd. KnoxvilleTN United States The University of Sydney School of Information Technologies CISCO Systems Madsen Building F09 SydneyNSW Australia
来源: 评论
Bisimulation-based Non-deterministic Admissible Interference and its Application to the Analysis of Cryptographic Protocols
收藏 引用
Electronic Notes in Theoretical computer Science 2002年 61卷 154-177页
作者: Stéphane Lafrance John Mullins Dept. of Computer and Software Engineering École Polytechnique de Montréal Montréal Canada
In this paper, we first define bisimulation-based non-deterministic admissible interference (BNAI), derive its process-theoretic characterization and present a compositional verification method with respect to the mai...
来源: 评论
Unanticipated software evolution  1
收藏 引用
16th European Conference on Object-Oriented Programming, ECOOP 2002
作者: Kniesel, Günter Noppen, Joost Mens, Tom Buckley, Jim Dept. of Computer Science III University of Bonn Germany Software Engineering Lab University of Twente Enschede Netherlands Vrije Universiteit Brussel Belgium University of Limerick Castletroy Limerick Ireland
This workshop was dedicated to research towards better support for unanticipated software evolution (USE) in development tools, programming languages, component models and related runtime *** report gives an overview ... 详细信息
来源: 评论
Reliable message delivery for mobile agents: Push or pull  9
Reliable message delivery for mobile agents: Push or pull
收藏 引用
9th International Conference on Parallel and Distributed Systems, ICPADS 2002
作者: Cao, Jiannong Feng, Xinyu Lu, Jian Chan, Henry Das, Sajal K. Internet Computing and E-Commerce Lab. Dept. of Computing Hong Kong Polytechnic University Hung Hom Kowloon Hong Kong State Key Laboratory for Novel Software Technology Dept. of Computer Science Nanjing University Nanjing China Dept. of Computer Science and Engineering Univ. of Texas at Arlington ArlingtonTX76019 United States
Two of the fundamental issues in message passing between mobile agents are tracking the migration of the target agent and delivering messages to it. In order to provide reliable message delivery, protocols are needed ... 详细信息
来源: 评论
A guided interaction approach for architectural design in a table-type VR environment  3rd
A guided interaction approach for architectural design in a ...
收藏 引用
3rd IEEE Pacific Rim Conference on Multimedia, PCM 2002
作者: Kim, Myoung-Hee Choi, Soo-Mi Rhee, Seon-Min Kwon, Doo-Young Kim, Hyo-Sun Ewha Womans Univ Dept. of Computer Science and Engineering 11-1 Daehyun-dong Seodaemun-gu Seoul Korea Republic of Ewha Womans Univ Center for Computer Graphics and Virtual Reality 11-1 Daehyundong Seodaemun-gu Seoul Korea Republic of Sejong Univ Dept. of Software Engineering 98 Gunja-dong Gwangjin-gu Seoul Korea Republic of
In this paper, we present a guided interaction approach for architectural design in a table-type VR environment (virtual table). By making it easier to communicate between two or more people in a virtual space, the vi... 详细信息
来源: 评论
A hierarchical manufacturing route planner based on heuristic algorithm: Design and evaluation
收藏 引用
Systems Analysis Modelling Simulation 2002年 第7期42卷 1119-1141页
作者: Al-Titinchi, Ali A. Al-Aubidy, Kasim M. Electrical and Computer Engineering Department Applied Science University Jordan Computer and Software Eng. Dept. Philadelphia University Jordan
This paper presents the design and evaluation of a manufacturing route planner for flexible manufacturing systems. The aim of the planner is to find the optimal manufacturing routes for jobs using well-designed cost f... 详细信息
来源: 评论
Pragma: An infrastructure for runtime management of grid applications  16
Pragma: An infrastructure for runtime management of grid app...
收藏 引用
16th International Parallel and Distributed Processing Symposium, IPDPS 2002
作者: Parashar, M. Hariri, S. Applied Software System Laboratory Rutgers the State University of New Jersey PiscatawayNJ08854 United States Dept. of Electrical and Computer Engineering University of Arizona TucsonAZ85721 United States
This paper presents an overview of Pragma, an adaptive runtime infrastructure capable of reactively and proactively managing and optimizing application execution using current system and application state, predictive ...
来源: 评论
Improving SAT using 2SAT  02
Improving SAT using 2SAT
收藏 引用
Australasian computer Science Conference
作者: Lei Zheng Peter J. Stuckey Dept. of Computer Science & Software Engineering The University of Melbourne VIC 3010. Australia
Propositional satisfiability (SAT) is a fundamental problem of immense practical importance. While SAT is NP-complete when clauses can contain 3 literals or more, the problem can be solved in linear time when the give... 详细信息
来源: 评论
A new approach for line recognition in large-size images using hough transform
A new approach for line recognition in large-size images usi...
收藏 引用
16th International Conference on Pattern Recognition, ICPR 2002
作者: Song, Jiqiang Cai, Min Lyu, Michael R. Cai, Shijie Dept. Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong State Key Lab. of Novel Software Technology Nanjing University Nanjing China
Applications of the Hough Transform (HT) have been limited to small-size images for a long time. For large-size images, peak detection and line verification become much more time-consuming. Many HT-based line detectio... 详细信息
来源: 评论
Graphics recognition from binary images: One step or two steps
Graphics recognition from binary images: One step or two ste...
收藏 引用
16th International Conference on Pattern Recognition, ICPR 2002
作者: Song, Jiqiang Cai, Min Lyu, Michael R. Cai, Shijie Dept. Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong State Key Lab. of Novel Software Technology Nanjing University Nanjing China
Recognizing graphic objects from binary images is an important task in many real-life applications. Generally, there are two ways to do the graphics recognition: onestep methods and two-step methods. The former recogn... 详细信息
来源: 评论