咨询与建议

限定检索结果

文献类型

  • 5,209 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 5,216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,326 篇 工学
    • 1,989 篇 计算机科学与技术...
    • 1,343 篇 软件工程
    • 553 篇 信息与通信工程
    • 528 篇 机械工程
    • 387 篇 仪器科学与技术
    • 331 篇 电子科学与技术(可...
    • 325 篇 控制科学与工程
    • 294 篇 电气工程
    • 130 篇 网络空间安全
    • 113 篇 生物医学工程(可授...
    • 91 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 84 篇 生物工程
    • 77 篇 化学工程与技术
    • 74 篇 土木工程
    • 71 篇 光学工程
    • 58 篇 交通运输工程
  • 960 篇 理学
    • 629 篇 数学
    • 175 篇 统计学(可授理学、...
    • 165 篇 系统科学
    • 132 篇 物理学
    • 105 篇 生物学
  • 926 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 154 篇 经济学
    • 150 篇 应用经济学
  • 88 篇 医学
    • 71 篇 基础医学(可授医学...
    • 69 篇 临床医学
  • 81 篇 文学
    • 78 篇 新闻传播学
  • 76 篇 教育学
    • 71 篇 教育学
  • 54 篇 法学
  • 41 篇 农学
  • 35 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 63 篇 data mining
  • 60 篇 educational inst...
  • 55 篇 wireless sensor ...
  • 55 篇 computational mo...
  • 51 篇 artificial neura...
  • 50 篇 monitoring
  • 47 篇 computers
  • 47 篇 cryptography
  • 45 篇 computer science
  • 41 篇 xml
  • 40 篇 databases
  • 39 篇 image segmentati...
  • 36 篇 software
  • 35 篇 variable speed d...
  • 34 篇 component
  • 33 篇 information mana...
  • 32 篇 authentication
  • 32 篇 web services
  • 31 篇 visualization
  • 31 篇 semantics

机构

  • 20 篇 school of inform...
  • 18 篇 school of comput...
  • 14 篇 school of electr...
  • 13 篇 engineering mana...
  • 12 篇 school of inform...
  • 12 篇 school of inform...
  • 11 篇 state key labora...
  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 college of infor...
  • 7 篇 school of inform...
  • 7 篇 college of infor...

作者

  • 101 篇 china
  • 12 篇 nadeem ehsan
  • 10 篇 li-minn ang
  • 9 篇 wang wei
  • 9 篇 p.r.china
  • 8 篇 yang yang
  • 8 篇 wu di
  • 7 篇 wang hui
  • 7 篇 yang xiao
  • 7 篇 wang yan
  • 7 篇 guangzhi qu
  • 7 篇 kiseon kim
  • 6 篇 jing zhang
  • 6 篇 chan tak-wai
  • 6 篇 suwimon kooptiwo...
  • 6 篇 vishnu kant soni
  • 6 篇 ebtisam mirza
  • 6 篇 zhang hongke
  • 6 篇 xiaoping li
  • 6 篇 manoj kumar mish...

语言

  • 5,202 篇 英文
  • 7 篇 其他
  • 6 篇 中文
  • 1 篇 法文
检索条件"任意字段=2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010"
5216 条 记 录,以下是161-170 订阅
排序:
CStorage: A cloud storage management system for USTC campus
CStorage: A cloud storage management system for USTC campus
收藏 引用
2010 3rd ieee international conference on computer science and information technology, iccsit 2010
作者: Li, Shupeng Li, Jing Li, Ling Wu, Ryan School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China Intel China Research Center Ltd. Beijing China
Cloud Storage has been increasing in popularity recently due to per-use pricing and elastic scalability, providing a significant advantage over the typical acquisition and deployment of equipment that was previously r... 详细信息
来源: 评论
LCS based Text Steganography through Indian Languages
LCS based Text Steganography through Indian Languages
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Changder, S. Ghosh, D. Debnath, N. C. Natl Inst Technol Dept CSE Dept Comp Applicat Durgapur India Winona State Univ Dept Comp Sci Winona MN USA
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography method... 详细信息
来源: 评论
Research on privacy preserving keyword search in cloud storage
Research on privacy preserving keyword search in cloud stora...
收藏 引用
2010 3rd ieee international conference on computer science and information technology, iccsit 2010
作者: Liu, Hong-Xia Dai, Jia-Zhu Chao, Jiang School of Computer Science Shanghai University Shanghai China
The development of cloud storage services makes companies who outsourced their data to cloud storage server can't control their data by themselves as before. Then comes the security issues, especially the privacy ... 详细信息
来源: 评论
Developing an Interactive Dental Casting Educational Game
Developing an Interactive Dental Casting Educational Game
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Yang, Cheng-Yi Lo, Yu-Sheng Liu, Chien-Tsai Taipei Med Univ Grad Inst Biomed Informat Doctors Degree Taipei Taiwan Taipei Med Univ Grad Inst Biomed Informat Taipei Taiwan
In order to provide a more relaxing environment where the dental students can learn to memorize the fundamental knowledge as well as the processes and techniques in dental casting, we used the GBL concept as the basis... 详细信息
来源: 评论
A Comprehensive Online Tool [WR-3] that Detects Security Flaws in Networks
A Comprehensive Online Tool [WR-3] that Detects Security Fla...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Trivedi, Aakash SRM Univ Comp Sci & Engn NCR Campus Ghaziabad India
As networks became an integral part of everyone's lives, advanced network intrusion techniques have been introduced by various crackers and network programmers. Many new technologies have also been implemented to ... 详细信息
来源: 评论
Design of temperature acquisition system for three-phase transformer
Design of temperature acquisition system for three-phase tra...
收藏 引用
international conference on computer science and information technology (CSIT)
作者: Wei, Qiang Wang, Wei School of Information and Communications Engineering Tianjin Polytechnic University Tianjin China School of Electrical Engineering and Automation Tianjin Polytechnic University Tianjin China
The running state monitoring of the power transformer is the effective method to lower its failure rate. Three windings power transformer and site environment as monitoring object, a multi-channels temperature acquisi... 详细信息
来源: 评论
Advanced algorithm partitioning of Markov and color image segmentation
Advanced algorithm partitioning of Markov and color image se...
收藏 引用
2010 3rd ieee international conference on computer science and information technology, iccsit 2010
作者: Toure, Mohamed Lamine Beiji, Zou Musau, Felix School of Infonnation Science and Engineering Central South University Changsha 4100S3 Hunan China
The color vision systems require a first step of classifying pixels in a given image into a discrete set of color classes. In this paper we introduce a new method of algorithm partitioning, and color image segmentatio... 详细信息
来源: 评论
Research of improved genetic algorithm for thresholding image segmentation based on maximum entropy
Research of improved genetic algorithm for thresholding imag...
收藏 引用
international conference on computer science and information technology (CSIT)
作者: Jiang, Hua Wei Yang, Kai College of Information Science and Engineering Henan University of Technology Zhengzhou China
In the paper a novel improved genetic algorithm is proposed based on the maximum entropy for thresholding image segmentation. First of all, the encoded mode is made and the maximum entropy function is selected as the ... 详细信息
来源: 评论
computer Simulation for Electroluminescence Efficiency and Multi-Peak Structure of Nano-Porous Oxidized Silicon Photodiode
Computer Simulation for Electroluminescence Efficiency and M...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Qianting Cui Haoyang Gujing Yujiaying Tongji Univ Dept Informat & Commun Shanghai Peoples R China Shanghai Tech Inst Elect & Informat Dept Commun & Informat Engn Shanghai Peoples R China Shanghai Univ Elect Power Dept Elect Sci & Technol Shanghai Peoples R China
Based on the semiconductor heterojunction theory and three-layer model of Si-SiO2, the expressions of electroluminescence intensity ratio of interface layer to silicon core were deduced. The result can explain the low... 详细信息
来源: 评论
A certificateless proxy re-signature scheme
A certificateless proxy re-signature scheme
收藏 引用
international conference on computer science and information technology (CSIT)
作者: Guo, Duntao Wei, Ping Yu, Dan Yang, Xiaoyuan Key Laboratory of Network and Information Security Engineering College of Chinese Armied Police Force Xi'an 710086 China
Proxy re-signature is greatly concerned by researchers recently. It is a very useful tool for sharing web certificates, forming weak group signatures, and authenticating a network path. In this paper, we propose the f... 详细信息
来源: 评论