咨询与建议

限定检索结果

文献类型

  • 19,361 篇 会议
  • 232 篇 期刊文献
  • 107 册 图书

馆藏范围

  • 19,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,548 篇 工学
    • 9,831 篇 计算机科学与技术...
    • 7,211 篇 软件工程
    • 2,598 篇 信息与通信工程
    • 1,858 篇 控制科学与工程
    • 1,337 篇 机械工程
    • 1,068 篇 电气工程
    • 974 篇 电子科学与技术(可...
    • 883 篇 仪器科学与技术
    • 639 篇 生物医学工程(可授...
    • 609 篇 生物工程
    • 436 篇 动力工程及工程热...
    • 418 篇 建筑学
    • 362 篇 安全科学与工程
    • 341 篇 交通运输工程
    • 337 篇 光学工程
    • 337 篇 化学工程与技术
    • 317 篇 土木工程
  • 4,231 篇 理学
    • 2,342 篇 数学
    • 908 篇 系统科学
    • 738 篇 物理学
    • 693 篇 统计学(可授理学、...
    • 679 篇 生物学
  • 3,930 篇 管理学
    • 2,549 篇 管理科学与工程(可...
    • 1,564 篇 图书情报与档案管...
    • 1,134 篇 工商管理
  • 569 篇 法学
    • 388 篇 社会学
  • 536 篇 医学
    • 416 篇 临床医学
    • 394 篇 基础医学(可授医学...
  • 490 篇 经济学
    • 487 篇 应用经济学
  • 397 篇 教育学
    • 386 篇 教育学
  • 213 篇 农学
  • 162 篇 文学
  • 89 篇 军事学
  • 59 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 588 篇 quality of servi...
  • 571 篇 educational inst...
  • 446 篇 servers
  • 418 篇 computer archite...
  • 412 篇 computational mo...
  • 332 篇 cloud computing
  • 314 篇 monitoring
  • 295 篇 computers
  • 265 篇 web services
  • 226 篇 data mining
  • 192 篇 vectors
  • 187 篇 software
  • 185 篇 databases
  • 166 篇 routing
  • 166 篇 wireless sensor ...
  • 165 篇 semantics
  • 158 篇 algorithm design...
  • 158 篇 mathematical mod...
  • 156 篇 feature extracti...
  • 152 篇 optimization

机构

  • 84 篇 department of co...
  • 45 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 school of comput...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 college of compu...
  • 25 篇 school of comput...
  • 23 篇 college of infor...
  • 23 篇 school of comput...
  • 22 篇 school of comput...
  • 21 篇 school of inform...
  • 20 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 department of co...
  • 18 篇 college of compu...
  • 18 篇 school of comput...
  • 18 篇 school of comput...

作者

  • 19 篇 wang lei
  • 19 篇 zhang lei
  • 17 篇 liu yang
  • 16 篇 li ying
  • 15 篇 wang wei
  • 14 篇 yang yang
  • 13 篇 ma yan
  • 13 篇 china
  • 12 篇 li yang
  • 12 篇 jiang wei
  • 12 篇 li li
  • 12 篇 wang tao
  • 11 篇 lei wang
  • 11 篇 zhang tao
  • 11 篇 li zhang
  • 11 篇 chen li
  • 11 篇 zhang yan
  • 10 篇 jing zhang
  • 10 篇 li tao
  • 10 篇 wang chao

语言

  • 19,202 篇 英文
  • 472 篇 中文
  • 20 篇 其他
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=2012 International Conference on Computer Science and Service System, CSSS 2012"
19700 条 记 录,以下是591-600 订阅
排序:
A Novel Approach for DDoS Mitigation with Router
A Novel Approach for DDoS Mitigation with Router
收藏 引用
1st international conference on Intelligent Computing, Communication and Devices, ICCD 2014
作者: Deepthi, S. Hemanth, K.S.S. Rajesh, Duvvuru Kalyani, M. Department of Computer Science and Engineering Vignan's Lara Institute of Technology Guntur Andhra Pradesh India Department of Computer Science and Engineering National Institute of Technology Jamshedpur Jamshedpur Jharkhand India
Security is one of the critical attributes of any communication network. Various attacks have been reported over the last years but mainly denial of service effects entire network in a drastic way. So many mechanisms ... 详细信息
来源: 评论
A Multi-agent-Based Framework for Cloud service Description and Discovery Using Ontology
A Multi-agent-Based Framework for Cloud Service Description ...
收藏 引用
1st international conference on Intelligent Computing, Communication and Devices, ICCD 2014
作者: Parhi, Manoranjan Pattanayak, Binod Kumar Patra, Manas Ranjan Department of Computer Science and Engineering ITER Siksha 'O' Anusandhan University Bhubaneswar 751030 Odisha India Department of Computer Science Berhampur University Berhampur 760007 Odisha India
The spectrum of cloud service providers has become large these days with increasing popularity of cloud computing as a service. These services appear to be similar in their approaches excepting that they vary in their... 详细信息
来源: 评论
Projecting the Future for Design science Research: An Action-Case Based Analysis  10
收藏 引用
10th international conference on Design science Research in Information systems and Technology (DESRIST)
作者: Baskerville, Richard Pries-Heje, Jan Georgia State Univ Atlanta GA 30303 USA Curtin Univ Perth WA 6845 Australia Roskilde Univ Roskilde Denmark
Design science research should be relevant, valuable, purposeful and prescriptive. Its value as a relevant source of prescriptions implies the practical usefulness of its results beyond a single expository instantiati... 详细信息
来源: 评论
Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols  5th
Making Code Voting Secure Against Insider Threats Using Unco...
收藏 引用
5th international conference on E-Voting and Identity
作者: Desmedt, Yvo Erotokritou, Stelios Univ Texas Dallas Dept Comp Sci Richardson TX 75083 USA UCL Dept Comp Sci London England Cyprus Inst CaSToRC Nicosia Cyprus
It is clear to the public that when it comes to privacy, computers and "secure" communication over the Internet cannot fully be trusted. Chaum introduced code voting as a solution for using a possibly infect... 详细信息
来源: 评论
Embedded controlled language to facilitate information extraction from eGov policies  15
Embedded controlled language to facilitate information extra...
收藏 引用
17th international conference on Information Integration and Web-Based Applications and services, iiWAS 2015
作者: Safwat, Hazem Gruzitis, Normunds Enache, Ramona Davis, Brian Insight Centre for Data Analytics National University of Ireland Ireland Inst. of Mathematics and Computer Science University of Latvia Latvia Dept. of Computer Science and Engineering University of Gothenburg Sweden
The goal of this paper is to propose a system that can extract formal semantic knowledge representation from natural language eGov policies. We present an architecture that allows for extracting Controlled Natural Lan... 详细信息
来源: 评论
Is 'patient's online access to health records' a good reform? - Opinions from Swedish healthcare professionals differ
Is 'patient's online access to health records' a good reform...
收藏 引用
conference on ENTERprise Information systems (CENTERIS) / international conference on Project MANagement (ProjMAN) / international conference on Health and Social Care Information systems and Technologies (HCist)
作者: Scandurra, Isabella Jansson, Anette Forsberg-Fransson, Marie-Louise Alander, Ture Univ Orebro Sch Business Dept Informat S-70182 Orebro Sweden Reg Orebro Cty S-70362 Orebro Sweden Uppsala Univ Dept Publ Hlth & Caring Sci S-75122 Uppsala Sweden
Patients' access to their own electronic health record is a controversial issue. Many care professionals are concerned about negative effects deriving from patients reading their record information without support... 详细信息
来源: 评论
Optimizing Workload Category for Adaptive Workload Prediction in service Clouds  13th
Optimizing Workload Category for Adaptive Workload Predictio...
收藏 引用
13th international conference on service-Oriented Computing (ICSOC)
作者: Liu, Chunhong Shang, Yanlei Duan, Li Chen, Shiping Liu, Chuanchang Chen, Junliang Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Commonwealth Sci & Ind Res Org DATA61 Sydney NSW Australia
It is important to predict the total workload for facilitating auto scaling resource management in service cloud platforms. Currently, most prediction methods use a single prediction model to predict workloads. Howeve... 详细信息
来源: 评论
DistDL: A Distributed Deep Learning service Schema with GPU Accelerating  17th
DistDL: A Distributed Deep Learning Service Schema with GPU ...
收藏 引用
17th Asia-Pacific Web conference (APWeb)
作者: Wang, Jianzong Cheng, Lianglun Guangdong Univ Technol Fac Comp Sci Guangzhou 510006 Guangdong Peoples R China Guangdong Univ Technol Fac Automat Guangzhou 510006 Guangdong Peoples R China
Deep Learning is a hot topic developed by the industry and academia which integrates the broad field of artificial intelligence with the deployment of deep neural networks in the big data era. Recently, the capability... 详细信息
来源: 评论
Integration Key Technology Of Smart Parts
Integration Key Technology Of Smart Parts
收藏 引用
2016 6th international conference on Machinery,Materials,Environment,Biotechnology and computer(MMEBC 2016)
作者: Zheng Rongmao Yang Jin-yan Xu Yuehua Guangdong Vocational College of mechanical and electrical technology information engineering college Division of science and technology Guangdong Vocational College of mechanical and electrical technology
The Smart parts are the trend of the development of IOT, which means the parts have the wisdom nodes, and use wisdom nodes to record all kinds of parts description information or run stateSmart parts can to solve the ... 详细信息
来源: 评论
A real-time android malware detection system based on network traffic analysis  15th
A real-time android malware detection system based on networ...
收藏 引用
15th international conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Han, Hongbo Chen, Zhenxiang Yan, Qiben Peng, Lizhi Zhang, Lei School of Information Science and Engineering University of Jinan Jinan250022 China Shape Security Mountain ViewCA94040 United States
Mobile devices are everywhere nowadays, such as mobile phone, mobile tablets. Meanwhile, various malwares on mobile terminals are emerging one after another, especially on the open-source Android system. Traditional d... 详细信息
来源: 评论