咨询与建议

限定检索结果

文献类型

  • 511 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 453 篇 工学
    • 305 篇 计算机科学与技术...
    • 266 篇 软件工程
    • 91 篇 信息与通信工程
    • 65 篇 仪器科学与技术
    • 62 篇 控制科学与工程
    • 59 篇 机械工程
    • 49 篇 电子科学与技术(可...
    • 22 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 动力工程及工程热...
    • 13 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 8 篇 土木工程
    • 7 篇 航空宇航科学与技...
    • 7 篇 安全科学与工程
  • 152 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 33 篇 图书情报与档案管...
  • 119 篇 理学
    • 78 篇 数学
    • 39 篇 系统科学
    • 17 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 8 篇 物理学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 16 篇 法学
    • 9 篇 社会学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 7 篇 农学
  • 7 篇 医学
  • 5 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 10 篇 web services
  • 9 篇 quality of servi...
  • 7 篇 component
  • 6 篇 internet of thin...
  • 6 篇 software design
  • 6 篇 cloud computing
  • 5 篇 ahp
  • 5 篇 data mining
  • 5 篇 security
  • 5 篇 middleware
  • 4 篇 video streaming
  • 4 篇 architecture
  • 4 篇 semantic web
  • 4 篇 software testing
  • 4 篇 qos
  • 4 篇 rfid
  • 4 篇 ontology
  • 3 篇 data warehouses
  • 3 篇 reliability
  • 3 篇 composition of s...

机构

  • 7 篇 faculty of compu...
  • 6 篇 international sc...
  • 5 篇 department of in...
  • 3 篇 research institu...
  • 3 篇 engineering inst...
  • 3 篇 department of so...
  • 2 篇 faculty of infor...
  • 2 篇 xiamen universit...
  • 2 篇 petroleum engine...
  • 2 篇 department of el...
  • 2 篇 school of comput...
  • 2 篇 department of sc...
  • 2 篇 department of in...
  • 2 篇 department of sc...
  • 2 篇 school of commun...
  • 2 篇 school of comput...
  • 2 篇 department of so...
  • 2 篇 computer and inf...
  • 2 篇 information and ...
  • 2 篇 beijing engineer...

作者

  • 27 篇 china
  • 5 篇 xu zhan
  • 5 篇 zhu quanyin
  • 4 篇 sung ho cho
  • 4 篇 li xinran
  • 4 篇 xiang chenhui
  • 3 篇 yang junkai
  • 3 篇 yuichi goto
  • 3 篇 li xiu
  • 3 篇 chen gang
  • 3 篇 sun xingping
  • 3 篇 hao wenning
  • 3 篇 yang shenglin
  • 3 篇 kang hongwei
  • 3 篇 liu dan
  • 3 篇 beijing 100876
  • 3 篇 duan qing
  • 2 篇 zhang hongjun
  • 2 篇 masayuki kawamat...
  • 2 篇 goto yuichi

语言

  • 513 篇 英文
检索条件"任意字段=2012 IEEE 3rd International Conference on Software Engineering and Service Science, ICSESS 2012"
513 条 记 录,以下是401-410 订阅
排序:
Game Theory Analysis for Message Dropping Attacks Prevention Strategy in Mobile P2P Live Streaming System
Game Theory Analysis for Message Dropping Attacks Prevention...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Jing Chen School of Electronic and Information engineering Xi'an Jiaotong University Xi'an 710049,ChinaLei Li and Zhihong Zhang School of Information engineering Zhengzhou University Zhengzhou 450001,ChinaXiaoshe Dong School of Electronic and Information engineering Xi'an Jiaotong University Xi'an 710049,China
With the rapid growth of wireless and mobile communication technology,P2P live streaming application is extending to mobile *** order to prevent Message Dropping Attacks (MDAs) in mobile P2P live streaming system,we m... 详细信息
来源: 评论
Study on Waterway Freight Volume Forecast Based on Grey Markov
Study on Waterway Freight Volume Forecast Based on Grey Mark...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Fan Lei School of Transportation Wuhan University of Technology Wuhan,ChinaLuo Jun School of Transportation Wuhan University of Technology Wuhan,China
Waterway freight volume is not only an important indicator to determine the demand for waterway logistics,but also a major basis on which organization concerned determine the scale of the inland waterway infrastructur... 详细信息
来源: 评论
Segmentation Method of Moving Vehicles Based on Semi-fuzzy Cluster
Segmentation Method of Moving Vehicles Based on Semi-fuzzy C...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Cui Liang Students ' affairs department Shi Jia Zhuang Tiedao University Shi Jia Zhuang,ChinaWang Xingpeng,Feng Guojie School of Economics and Management,Office of Academic Affairs Shi Jia Zhuang Tiedao University Shi Jia Zhuang,China
Moving vehicles segmentation is the most fundamental and vital problem in the intelligent transportation *** paper proposes a moving vehicles segmentation method that combines the semi-fuzzy cluster algorithm under th... 详细信息
来源: 评论
An Efficient Algorithm for Mining Closed Weighted Frequent Pattern over Data Streams
An Efficient Algorithm for Mining Closed Weighted Frequent P...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Wang Jie School of Management,Capital Normal University Beijing 100089,ChinaZeng Yu Beijing Computing Center Beijing 100094,China
Weighted frequent pattern mining is suggested to discover more important frequent pattern by considering different weights of each item,and closed frequent pattern mining can reduces the number of frequent patterns an... 详细信息
来源: 评论
A Popularizing Movable Environmental Detection and Regulating System Based on Smart Home Technology
A Popularizing Movable Environmental Detection and Regulatin...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Junkai Yang Department of Telecommunications engineering,international school Beijing University of Posts and Telecommunications Road West 10,Haidian District,Beijing,ChinaMengyu Hua Department of Telecommunications engineering,international school Beijing University of Posts and Telecommunications Road West 10,Haidian District,Beijing,China
"Smart home",a word that takes the world by storm rapidly over the recent years,is approaching our daily life on multiple fronts,however,the technology does not really involve our daily *** high concentratio... 详细信息
来源: 评论
Usability Analysis of Web service Behavior Based on Interface Automata
Usability Analysis of Web Service Behavior Based on Interfac...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Yan Zhang Department of Computer science and Technology Beijing Electronic science and Technology Institute Beijing,P. R. China 100070 State Key Lab. for Novel software Technology Nanjing University Nanjing,P.R. China 210093Xiaofeng Yu School of Business State Key Lab. for Novel software Technology Nanjing University Nanjing,P. R. China 210093Tian Zhang Department of Computer science and Technology State Key Lab. for Novel software Technology Nanjing University Nanjing,P. R. China 210093
In the Web service world,it is an important tech-nique that taking the usable behaviors in the existed web services provides some value-added functions by the service ***,the usability analysis of web service behavior... 详细信息
来源: 评论
The Method of Interval Multi-attribute Decision-making Based on Cross Entropy
The Method of Interval Multi-attribute Decision-making Based...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Meng Zhao School of Economics and Business Northeastern University at Qinhuangdao Qinhuangdao,Hebei Province,ChinaJingsong Yang,Rongrong Ren School of Economics and Business Northeastern University at Qinhuangdao Qinhuangdao,Hebei Province,China
This paper presents a new method to solve the problem in the interval multiple attribute decision making based on cross *** using the cross entropy between an alternative (which will be evaluated) and the ideal soluti... 详细信息
来源: 评论
Designing a Hybrid Position Evaluation Function for Chinese-Chess Computer Game
Designing a Hybrid Position Evaluation Function for Chinese-...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Tingting Fu Department of Computer science Beijing JiaoTong University Haibin College Huanghua,061100,ChinaHongfeng Yin Department of Computer science Beijing JiaoTong University Haibin College Huanghua,061100,China
The position evaluation function plays an important role for building an intelligent Chinese-chess computer game (CCCG) *** mostly used evaluation functions include standard heuristic evaluation function (SHEF) and se... 详细信息
来源: 评论
An Identity-based Mechanism for Enhancing SIP Security
An Identity-based Mechanism for Enhancing SIP Security
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Rongwei Yu Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education Wuhan,China,430072Jie Yuan School of Computer,Wuhan University Wuhan,China,430072Gang Du Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education Wuhan,China,430072Peng Li School of Computer,Wuhan University Wuhan,China,430072
Session Initiation Protocol is widely used for establishing VoIP calls in wireless packet *** to shortages of SIP and relevant security mechanisms,a secure identity-based mechanism was proposed in this *** scheme real... 详细信息
来源: 评论
Design of Ground Monitor and Control System for UAV Remote Sensing Based on World Wind
Design of Ground Monitor and Control System for UAV Remote S...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Jianxia Zhang 1 2 Tao Yu 2 Jiping Chen 2 Liying Hou 2 Jingjing Diao 1 2 Yumeng Zhang 1 2 1 Shool of Surveying &Land Information engineering Henan Polytechnic University Jiaozuo 454000 China 2 State Key Laboratory of Remote Sensing science Institute of Remote Sensing Applications CAS Beijing 100101 China
In recent years,with the wide application of UAV,as an important component of the UAV system,ground monitor and control system for UAV is also in constant *** order to satisfy people with higher requirements of inform... 详细信息
来源: 评论