咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 41 册 图书
  • 40 篇 期刊文献

馆藏范围

  • 3,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,915 篇 工学
    • 1,280 篇 计算机科学与技术...
    • 847 篇 软件工程
    • 215 篇 信息与通信工程
    • 204 篇 机械工程
    • 189 篇 电气工程
    • 178 篇 控制科学与工程
    • 138 篇 仪器科学与技术
    • 110 篇 电子科学与技术(可...
    • 66 篇 生物医学工程(可授...
    • 65 篇 生物工程
    • 57 篇 建筑学
    • 52 篇 网络空间安全
    • 45 篇 土木工程
    • 43 篇 动力工程及工程热...
    • 43 篇 化学工程与技术
    • 39 篇 环境科学与工程(可...
  • 452 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 146 篇 工商管理
    • 128 篇 图书情报与档案管...
  • 390 篇 理学
    • 178 篇 数学
    • 84 篇 物理学
    • 74 篇 生物学
    • 58 篇 系统科学
    • 39 篇 统计学(可授理学、...
  • 141 篇 教育学
    • 137 篇 教育学
  • 115 篇 文学
    • 113 篇 新闻传播学
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 60 篇 医学
    • 50 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 50 篇 社会学
  • 51 篇 农学
  • 22 篇 艺术学
  • 8 篇 军事学
  • 1 篇 历史学

主题

  • 370 篇 computer science
  • 315 篇 application soft...
  • 216 篇 information tech...
  • 188 篇 computer archite...
  • 178 篇 educational inst...
  • 149 篇 costs
  • 145 篇 computer network...
  • 129 篇 programming
  • 121 篇 technology manag...
  • 116 篇 educational tech...
  • 116 篇 humans
  • 111 篇 data mining
  • 109 篇 internet
  • 106 篇 computer industr...
  • 100 篇 standards develo...
  • 92 篇 software enginee...
  • 92 篇 computational mo...
  • 92 篇 computer science...
  • 91 篇 control systems
  • 88 篇 hardware

机构

  • 21 篇 department of co...
  • 10 篇 research center ...
  • 10 篇 college of compu...
  • 10 篇 faculty of compu...
  • 9 篇 research center ...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of optica...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 6 篇 college of compu...
  • 5 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 department of co...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 department of co...

作者

  • 18 篇 china
  • 7 篇 mohammad syuhaim...
  • 6 篇 vahid rafe
  • 6 篇 reza rafeh
  • 6 篇 kasmiran jumari
  • 5 篇 dominik ertl
  • 5 篇 guangyuan zhao
  • 5 篇 zhang rubo
  • 5 篇 boonchuan ng
  • 5 篇 zhang hao
  • 5 篇 wei wang
  • 4 篇 aswir premadi
  • 4 篇 jun wang
  • 4 篇 jing zhang
  • 4 篇 li li
  • 4 篇 x.m. han
  • 4 篇 tang jie
  • 4 篇 yang xiao
  • 4 篇 tomomasa nagashi...
  • 4 篇 yang xu

语言

  • 3,740 篇 英文
  • 15 篇 中文
  • 12 篇 其他
  • 2 篇 乌克兰文
检索条件"任意字段=2009 International Conference on Computer Technology and Development, ICCTD 2009"
3769 条 记 录,以下是911-920 订阅
排序:
The investigation of vulnerability test in application software
The investigation of vulnerability test in application softw...
收藏 引用
2009 international conference on the Current Trends in Information technology, CTIT 2009
作者: Sedaghat, Shahrzad Adibniya, Fazlollah Sarram, MehdiAgha Information Technology Engineering Yazd University Yazd Iran Computer Engineering Department Yazd University Yazd Iran
Security challenges of application software that are about 70 percent of monthly discovered vulnerability of this kind are one of the most important concerns of managers. In this article, after the introduction of bri... 详细信息
来源: 评论
Networking Modeling for the Network-in-the-Loop Training Simulation
Networking Modeling for the Network-in-the-Loop Training Sim...
收藏 引用
international conference on computer technology and development (icctd)
作者: Zhi-Chun Gan Hua Tian Jian-Jun Shen Department 2 Commanding Communications Academy Wuhan China
Network-in-the-loop is the direction that the military training simulation is advancing forward. Dynamic networking modeling is the key issue for constructing the network-in-the-loop training simulation. For this purp... 详细信息
来源: 评论
Spur Gear Design with an S-shaped Transition Curve Application Using Mathematica and CAD Tools
Spur Gear Design with an S-shaped Transition Curve Applicati...
收藏 引用
international conference on computer technology and development (icctd)
作者: Saifudin Hafiz Yahaya Jamaludin Md. Ali Mohd Shukor Salleh Faculty of Manufacturing Engineering Universiti Teknikal Malaysia Melaka Malacca Malaysia School of Mathematical Sciences Universiti Sains Islam Malaysia Penang Malaysia
The aim of this paper is to introduce the application of an S-shaped transition curve in designing and generating a spur gear. In engineering field, the spur gear usually designed by using an involute curve where this... 详细信息
来源: 评论
Protection Access Network: An Architecture Approach to Remote Monitor and Control
Protection Access Network: An Architecture Approach to Remot...
收藏 引用
international conference on computer technology and development (icctd)
作者: Aswir Premadi Boonchuan Ng M. Mastang Mohammad Syuhaimi Ab-Rahman Kasmiran Jumari Spectrum Technology Research Division Computer and Network Security Research Group Computer and Network Security Research Group Department of Electrical Electronics and Systems Engineering Faculty of Engineering and Built Environment Universiti Kebangsaan Malaysia Selangor Darul Ehsan Malaysia
This paper presented architecture approach to remote monitor and control for providing protection and self-restoration against fault in the distribution region of fiber-to-the-home passive optical network (FTTH-PON). ...
来源: 评论
An Improved Cellular Automaton Model for Urban Walkway Bi-directional Pedestrian Flow
An Improved Cellular Automaton Model for Urban Walkway Bi-di...
收藏 引用
international conference on Measuring technology and Mechatronics Automation
作者: Wang Tao Chen Jun Southeast Univ Sch Transportat Nanjing Peoples R China Southeast Univ Nanjing Peoples R China
In order to describe traffic operation characteristics of bi-directional pedestrian flow in urban pedestrian walkways and work for walking safe, authors proposed an improved cellular automaton bi-directional pedestria... 详细信息
来源: 评论
Online Platform Support for Sustained, Collaborative and Self-directed Engagement of Teachers in a Blended Professional development Program
收藏 引用
8th international conference on Web Based Learning (ICWL 2009)
作者: Osburg, Thomas Todorova, Albena Intel Corp CAG Europe D-85622 Feldkirchen Germany
Professional development of teachers plays a significant role for the success of educational reforms and for student achievement. Programs for developing teachers' skills to integrate digital media in the classroo... 详细信息
来源: 评论
Combine elliptic curve cryptography with digital watermark for OWL-based ontology encryption
Combine elliptic curve cryptography with digital watermark f...
收藏 引用
2009 international conference on Computational Intelligence and Security, CIS 2009
作者: Kong, Hongbin Zeng, Zhengquan Yan, Lijun Yang, Jicheng Yao, Shaowen Sheng, Nuoya School of Information Science and Engineer Yunnan University Kunming Yunnan Province China School of Computer Science and Engineer South China University of Technology Guangzhou Guangdong Province China
Although progress has been made on Semantic Web during the past decades, security is still one of the major challenges in the development of Semantic Web. Elliptic curve cryptography (ECC) serves as an excellent candi... 详细信息
来源: 评论
Numerical Investigation on Two-Phase Flow Distribution in Plate-Fin Heat Exchangers and Experimental Verification
Numerical Investigation on Two-Phase Flow Distribution in Pl...
收藏 引用
international conference on computer technology and development (icctd)
作者: Jianghong Wu Xihui Wang Guang Ouyang School of Mechanical and Automotive Engineering South China University of Technology Guangzhou China
The controlled distribution of a fluid to the entrance surface of a process, or into the volume of equipment, is an important issue for various aspects of process performance. The flow field in the inlet double-bend d... 详细信息
来源: 评论
The Urban System Impact on Post-Games development of the Olympics' Venues in China
The Urban System Impact on Post-Games Development of the Oly...
收藏 引用
Spring conference of the international-Association-of-computer-Science-and-Information-technology
作者: Cheng, Xiaoduo Heilongjiang Univ Sch Business Adm & Econ Prod Res Ctr Harbin Peoples R China
As the constrained conditions, the urban system of the host cities influence the Post-Games development of the Olympics' venues significantly. Based on the interactive mechanism between the urban system and the Ol... 详细信息
来源: 评论
Role-based access control in geological database web system
Role-based access control in geological database web system
收藏 引用
2009 international conference on Information Engineering and computer Science, ICIECS 2009
作者: Liu, Wen-Yu Wu, Xiang-Bin Mao, Xian-Cheng An, Jing Wang, Dong School of Geo-science and Environmental Engineering Central South University Changsha 410083 China Department of Computer Science and Technology Foshan University Foshan Guangdong 528000 China
Security is an important aspect in Web development, and the access control and authorization is the key problem in Web security. The core idea of role-based access control (RBAC) is to implement safe access of data by... 详细信息
来源: 评论