咨询与建议

限定检索结果

文献类型

  • 5,209 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 5,216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,326 篇 工学
    • 1,989 篇 计算机科学与技术...
    • 1,343 篇 软件工程
    • 553 篇 信息与通信工程
    • 528 篇 机械工程
    • 387 篇 仪器科学与技术
    • 331 篇 电子科学与技术(可...
    • 325 篇 控制科学与工程
    • 294 篇 电气工程
    • 130 篇 网络空间安全
    • 113 篇 生物医学工程(可授...
    • 91 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 84 篇 生物工程
    • 77 篇 化学工程与技术
    • 74 篇 土木工程
    • 71 篇 光学工程
    • 58 篇 交通运输工程
  • 960 篇 理学
    • 629 篇 数学
    • 175 篇 统计学(可授理学、...
    • 165 篇 系统科学
    • 132 篇 物理学
    • 105 篇 生物学
  • 926 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 255 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 154 篇 经济学
    • 150 篇 应用经济学
  • 88 篇 医学
    • 71 篇 基础医学(可授医学...
    • 69 篇 临床医学
  • 81 篇 文学
    • 78 篇 新闻传播学
  • 76 篇 教育学
    • 71 篇 教育学
  • 54 篇 法学
  • 41 篇 农学
  • 35 篇 军事学
  • 32 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 63 篇 data mining
  • 60 篇 educational inst...
  • 55 篇 wireless sensor ...
  • 55 篇 computational mo...
  • 51 篇 artificial neura...
  • 50 篇 monitoring
  • 47 篇 computers
  • 47 篇 cryptography
  • 45 篇 computer science
  • 41 篇 xml
  • 40 篇 databases
  • 39 篇 image segmentati...
  • 36 篇 software
  • 35 篇 variable speed d...
  • 34 篇 component
  • 33 篇 information mana...
  • 32 篇 authentication
  • 32 篇 web services
  • 31 篇 visualization
  • 31 篇 semantics

机构

  • 20 篇 school of inform...
  • 18 篇 school of comput...
  • 14 篇 school of electr...
  • 13 篇 engineering mana...
  • 12 篇 school of inform...
  • 12 篇 school of inform...
  • 11 篇 state key labora...
  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 school of inform...
  • 8 篇 department of co...
  • 8 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 college of infor...
  • 7 篇 school of inform...
  • 7 篇 college of infor...

作者

  • 101 篇 china
  • 12 篇 nadeem ehsan
  • 10 篇 li-minn ang
  • 9 篇 wang wei
  • 9 篇 p.r.china
  • 8 篇 yang yang
  • 8 篇 wu di
  • 7 篇 wang hui
  • 7 篇 yang xiao
  • 7 篇 wang yan
  • 7 篇 guangzhi qu
  • 7 篇 kiseon kim
  • 6 篇 jing zhang
  • 6 篇 chan tak-wai
  • 6 篇 suwimon kooptiwo...
  • 6 篇 vishnu kant soni
  • 6 篇 ebtisam mirza
  • 6 篇 zhang hongke
  • 6 篇 xiaoping li
  • 6 篇 manoj kumar mish...

语言

  • 5,202 篇 英文
  • 7 篇 其他
  • 6 篇 中文
  • 1 篇 法文
检索条件"任意字段=2010 3rd IEEE International Conference on Computer Science and Information Technology—ICCSIT 2010"
5216 条 记 录,以下是191-200 订阅
排序:
An improved mechanism for four-way handshake procedure in ieee802.11i
An improved mechanism for four-way handshake procedure in IE...
收藏 引用
2010 3rd ieee international conference on computer science and information technology, iccsit 2010
作者: Xiao, Xiawen Ding, Jie Zhou, Nanrun Department of Electronic Infonnation Engineering Nanchang University Nanchang 330031 China
With the development of WLAN (wireless local area network), the security problems become more apparent than before. 802.11i protocol enhances the security performance such as encryption and authentication, however, th... 详细信息
来源: 评论
The Risk Control Model in Corporate Governance - Based on Conditional Random Fields Based Security Risk Evaluation for IT Systems
The Risk Control Model in Corporate Governance - Based on Co...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Tang Jing Shen Leping South China Univ Technol Sch Business Adm Guangzhou 510640 Guangdong Peoples R China Univ Foreign Studies Res Ctr Int Trade & Econ Guangzhou 510006 Guangdong Peoples R China
Reducing the risk of IT governance often get a lot of attention. Journal and newspaper articles abound, and professional books have been written on the subject. this article presents a Conditional Random Fields (CRF) ... 详细信息
来源: 评论
Research on the Key technology of Reconstructing Attack Scenario Based on State Machine
Research on the Key Technology of Reconstructing Attack Scen...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Feng Xuewei Wang Dongxia Ma Guoqing Li Jin Beijing Inst Syst Engineer Beijing 100101 Peoples R China
An attack activity to cyberspace will cause the security devices generating huge number of security events, it is unfeasible to analyze these events by the manual way for the security manager. After analyzing the exis... 详细信息
来源: 评论
A New System for Hidden Data within Header Space for EXE-File Using Object Oriented Technique
A New System for Hidden Data within Header Space for EXE-Fil...
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: AL-Nabhani, Yahya Zaidan, A. A. Zaidan, B. B. Jalab, Hamid A. Alanazi, Hamdan. O. Univ Malaya Fac Comp Sci & Informat Technol Kuala Lumpur 50603 Malaysia
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to atta... 详细信息
来源: 评论
Service priority based target tracking framework
Service priority based target tracking framework
收藏 引用
2010 3rd ieee international conference on computer science and information technology, iccsit 2010
作者: Ur Rahman, Akond Ashfaque Naznin, Mahmuda Mollah, Md. Atiqul Islam Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Dhaka Bangladesh
Multiple targets tracking is one of the challenging applications in a wireless sensor network due to targets' movement in different directions, targets' speed variations and frequent connectivity failures of l... 详细信息
来源: 评论
Infrared and Visible Images Registration Using BEMD and MI
Infrared and Visible Images Registration Using BEMD and MI
收藏 引用
3rd ieee international conference on computer science and information technology (iccsit)
作者: Zhang, Xiuqiong Men, Tao Liu, Chun Yang, Jian Leshan Normal Univ Coll Comp Sci Lab Intelligent Informat Proc & Applicat Leshan 614000 Peoples R China Leshan Publ Secur Bur Criminal Invest Div Leshan 614000 Peoples R China
Enhanced vision especially in poor weather conditions can be achieved by image fusion between the infrared and visible images. Image registration is a crucial step in image fusion. In order to register the infrared an... 详细信息
来源: 评论
An automated oracle approach to test decision-making structures
An automated oracle approach to test decision-making structu...
收藏 引用
2010 3rd ieee international conference on computer science and information technology, iccsit 2010
作者: Shahamiri, Seyed Reza Wan Kadir, Wan Mohd Nasir Bin Ibrahim, Suhaimi Department of Software Engineering Faculty of Computer Science and Information System Uneversiti Teknologi Malaysia Skudai Malaysia
Decision-making structures are important building blocks in most of the software;however, it may be difficult to verify them because there are various input conditions and several paths causing them to behave differen... 详细信息
来源: 评论
RETRACTED ARTICLE: Dimension of two-point codes on the quotient of Hermitian curves
RETRACTED ARTICLE: Dimension of two-point codes on the quoti...
收藏 引用
作者: Chen, Qi Pei, Dingyi Li, Chao School of Mathematics and Information Sciences Guangzhou University Guangzhou 510006 China Department of Mathematics and System Science National University of Defense Technology Changsha 410073 China
In this correspondence, the dimension of tow-point codes on the quotient of Hermitian curves are determined by using an idea of Homma and Kim in reference [2]. © 2010 ieee.
来源: 评论
Improved LSB matching steganography resisting histogram attacks
Improved LSB matching steganography resisting histogram atta...
收藏 引用
2010 3rd ieee international conference on computer science and information technology, iccsit 2010
作者: Xi, Ling Ping, Xijian Zhang, Tao Zhengzhou Information Science and Technology Institute Zhengzhou China
This paper presents an improved LSD matching steganography, which complementarily modifies the pairs of pixels with adjacent intensity to embed secrete message. In LSD matching steganography, when adding or subtractin... 详细信息
来源: 评论
Microcontroller-based single-phase automatic voltage regulator
Microcontroller-based single-phase automatic voltage regulat...
收藏 引用
international conference on computer science and information technology (CSIT)
作者: Nang, Kaythi Hlaing Lwin, Lwin Oo Hardware Technology Department Computer University PangLong Myanmar Hardware Technology Department Computer University Larshio Myanmar
This paper proposes the design and implementation of a microcontroller- based single-phase automatic voltage regulator (AVR). The basic building blocks for this design include a PIC 16f 628 microcontroller, a triac, a... 详细信息
来源: 评论