咨询与建议

限定检索结果

文献类型

  • 19,361 篇 会议
  • 232 篇 期刊文献
  • 107 册 图书

馆藏范围

  • 19,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,548 篇 工学
    • 9,831 篇 计算机科学与技术...
    • 7,211 篇 软件工程
    • 2,598 篇 信息与通信工程
    • 1,858 篇 控制科学与工程
    • 1,337 篇 机械工程
    • 1,068 篇 电气工程
    • 974 篇 电子科学与技术(可...
    • 883 篇 仪器科学与技术
    • 639 篇 生物医学工程(可授...
    • 609 篇 生物工程
    • 436 篇 动力工程及工程热...
    • 418 篇 建筑学
    • 362 篇 安全科学与工程
    • 341 篇 交通运输工程
    • 337 篇 光学工程
    • 337 篇 化学工程与技术
    • 317 篇 土木工程
  • 4,231 篇 理学
    • 2,342 篇 数学
    • 908 篇 系统科学
    • 738 篇 物理学
    • 693 篇 统计学(可授理学、...
    • 679 篇 生物学
  • 3,930 篇 管理学
    • 2,549 篇 管理科学与工程(可...
    • 1,564 篇 图书情报与档案管...
    • 1,134 篇 工商管理
  • 569 篇 法学
    • 388 篇 社会学
  • 536 篇 医学
    • 416 篇 临床医学
    • 394 篇 基础医学(可授医学...
  • 490 篇 经济学
    • 487 篇 应用经济学
  • 397 篇 教育学
    • 386 篇 教育学
  • 213 篇 农学
  • 162 篇 文学
  • 89 篇 军事学
  • 59 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 588 篇 quality of servi...
  • 571 篇 educational inst...
  • 446 篇 servers
  • 418 篇 computer archite...
  • 412 篇 computational mo...
  • 332 篇 cloud computing
  • 314 篇 monitoring
  • 295 篇 computers
  • 265 篇 web services
  • 226 篇 data mining
  • 192 篇 vectors
  • 187 篇 software
  • 185 篇 databases
  • 166 篇 routing
  • 166 篇 wireless sensor ...
  • 165 篇 semantics
  • 158 篇 algorithm design...
  • 158 篇 mathematical mod...
  • 156 篇 feature extracti...
  • 152 篇 optimization

机构

  • 84 篇 department of co...
  • 45 篇 school of comput...
  • 39 篇 school of comput...
  • 38 篇 school of comput...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 college of compu...
  • 25 篇 school of comput...
  • 23 篇 college of infor...
  • 23 篇 school of comput...
  • 22 篇 school of comput...
  • 21 篇 school of inform...
  • 20 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 department of co...
  • 18 篇 college of compu...
  • 18 篇 school of comput...
  • 18 篇 school of comput...

作者

  • 19 篇 wang lei
  • 19 篇 zhang lei
  • 17 篇 liu yang
  • 16 篇 li ying
  • 15 篇 wang wei
  • 14 篇 yang yang
  • 13 篇 ma yan
  • 13 篇 china
  • 12 篇 li yang
  • 12 篇 jiang wei
  • 12 篇 li li
  • 12 篇 wang tao
  • 11 篇 lei wang
  • 11 篇 zhang tao
  • 11 篇 li zhang
  • 11 篇 chen li
  • 11 篇 zhang yan
  • 10 篇 jing zhang
  • 10 篇 li tao
  • 10 篇 wang chao

语言

  • 19,202 篇 英文
  • 472 篇 中文
  • 20 篇 其他
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=2012 International Conference on Computer Science and Service System, CSSS 2012"
19700 条 记 录,以下是651-660 订阅
排序:
Verifiable dynamic fuzzy search over encrypted data in cloud computing  15th
Verifiable dynamic fuzzy search over encrypted data in cloud...
收藏 引用
15th international conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Zhu, Xiaoyu Liu, Qin Wang, Guojun School of Information Science and Engineering Central South University Changsha410083 China School of Information Science and Engineering Hunan University Changsha410082 China
With the increasing popularity of cloud computing, large scale of documents are being outsourced to the cloud. To avoid information leakage, sensitive files usually have to be encrypted before out-sourcing. Thus, it i... 详细信息
来源: 评论
Analysis of repair cost in distributed storage systems with Fault-Tolerant coding strategies  15th
Analysis of repair cost in distributed storage systems with ...
收藏 引用
15th international conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Lu, Yanbo Hao, Jie Liu, Xin-Ji Xia, Shu-Tao Graduate School at Shenzhen Tsinghua University Shenzhen518055 China Tsinghua National Laboratory for Information Science and Technology Beijing100084 China
To achieve reliability in distributed storage systems, fault tolerance techniques like replication strategy are adopted. As the rapid growth of data, distributed storage systems have been transitioning replication str... 详细信息
来源: 评论
Minimizing resource expenditure while maximizing destructiveness for node capture attacks  15th
Minimizing resource expenditure while maximizing destructive...
收藏 引用
15th international conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Lin, Chi Wu, Guowei Lai, Xiaochen Qiu, Tie School of Software Dalian University of Technology Dalian116621 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian University of Technology Dalian116621 China
In node capture attacks, an attacker intellectually captures nodes and extracts cryptographic keys from their memories to wreck security, reliability and confidentiality of wireless sensor networks. Previous methods s... 详细信息
来源: 评论
TADOOP: Mining network traffic anomalies with Hadoop  11th
TADOOP: Mining network traffic anomalies with Hadoop
收藏 引用
11th international conference Security and Privacy in Communication Networks, SecureComm 2015
作者: Tian, Geng Wang, Zhiliang Yin, Xia Li, Zimu Shi, Xingang Lu, Ziyi Zhou, Chao Yu, Yang Wu, Dan Department of Computer Science and Technology Tsinghua University Beijing China Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Beijing China Cisco Systems Inc Shanghai China
Today, various anomalies and large number of flows in a network make traffic anomaly detection a big challenge. In this paper, we propose DTE-FP (Dual q Tsallis Entropy for flow Feature with Properties), a more effici... 详细信息
来源: 评论
Better statistical forecast accuracy does not always lead to better inventory control efficiency: The case of lumpy demand  14
Better statistical forecast accuracy does not always lead to...
收藏 引用
14th international conference on Modeling and Applied Simulation, MAS 2015
作者: Solis, Adriano O. Management Science Area School of Administrative Studies York University TorontoONM3J 1P3 Canada
Neural network (NN) modeling has been applied to forecasting of lumpy demand (Gutierrez, Solis, and Mukhopadhyay 2008;Mukhopadhyay, Solis, and Gutierrez 2012) and empirically compared with a number of well-referenced ... 详细信息
来源: 评论
Human-machine cooperation in general game playing  8
Human-machine cooperation in general game playing
收藏 引用
8th international conference on Advances in computer-Human Interactions, ACHI 2015
作者: Świechowski, Maciej Merrick, Kathryn Mańdziukz, Jacek Abbass, Hussein Systems Research Institute Polish Academy of Sciences Warsaw Poland School of Engineering and Information Technology University of New South Wales Canberra Australia Faculty of Mathematics and Information Science Warsaw University of Technology Warsaw Poland
This paper presents a framework for cooperation between a human and a general game playing agent. Cooperation is defined as two entities causing each other to modify their behaviour to achieve some mutual advantage. S... 详细信息
来源: 评论
Peking: Building Semantic Dependency Graphs with a Hybrid Parser  9
Peking: Building Semantic Dependency Graphs with a Hybrid Pa...
收藏 引用
9th international Workshop on Semantic Evaluation, SemEval 2015
作者: Du, Yantao Zhang, Fan Zhang, Xun Sun, Weiwei Wan, Xiaojun Institute of Computer Science and Technology Peking University The MOE Key Laboratory of Computational Linguistics Peking University China
This paper is a description of our system for SemEval-2015 Task 18: Broad-Coverage Semantic Dependency Parsing. We implement a hybrid parser which benefits from both transition-based and graph-based parsing approaches... 详细信息
来源: 评论
A data-centric tool to improve the performance of multithreaded program on NUMA  15th
A data-centric tool to improve the performance of multithrea...
收藏 引用
15th international conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Zeng, Dan Zhu, Liang Liao, Xiaofei Jin, Hai Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Non-uniform memory access (NUMA) is one of the main architectures of today’s high-performance server. The key feature of NUMA is the non-uniformity of access latency. Access from a processor to attached memory is fas... 详细信息
来源: 评论
Cryptanalysis of advanced biometric-based user authentication scheme for wireless sensor networks*  6
Cryptanalysis of advanced biometric-based user authenticatio...
收藏 引用
6th FTRA international conference on computer science and its Applications, CSA 2014
作者: Choi, Younsung Nam, Junghyun Lee, Youngsook Jung, Seyoun Won, Dongho Department of Computer Engineering Sungkyunkwan University 2066 Seoburo SuwonGyeonggido440746 Korea Republic of Department of Computer Engineering Konkuk University 268 Chungwondaero ChungjuChungcheongbukdo380701 Korea Republic of Department of Cyber Investigation Police Howon University 64 Howon University 3Gil Impi-Myeon Gunsan-SiJeonrabuk-Do573718 Korea Republic of Master of Intellectual Property Korea Advanced Institute of Science and Technology 373-1 Guseong-dong Yuseong-gu Daejeon-Si305701 Korea Republic of
Recently, wireless sensor networks can provide a practicable realtime monitoring system because wireless sensors can be easily deployed in various environments. To provide secure and efficient communication, various u... 详细信息
来源: 评论
Improved algorithms for the boxed-mesh permutation pattern matching problem  1
收藏 引用
26th Annual Symposium on Combinatorial Pattern Matching, CPM 2015
作者: Cho, Sukhyeun Na, Joong Chae Sim, Jeong Seop Department of Computer and Information Engineering Inha University Incheon Korea Republic of Department of Computer Science and Engineering Sejong University Sejong Korea Republic of
Recently, various types of permutation patterns such as mesh patterns, boxed-mesh patterns, and consecutive patterns, have been studied where relative order between characters is considered rather than characters them... 详细信息
来源: 评论