咨询与建议

限定检索结果

文献类型

  • 1,999 篇 会议
  • 10 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,013 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,633 篇 工学
    • 1,175 篇 计算机科学与技术...
    • 724 篇 软件工程
    • 330 篇 信息与通信工程
    • 239 篇 机械工程
    • 181 篇 材料科学与工程(可...
    • 179 篇 控制科学与工程
    • 153 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 95 篇 冶金工程
    • 93 篇 化学工程与技术
    • 80 篇 仪器科学与技术
    • 67 篇 力学(可授工学、理...
    • 57 篇 动力工程及工程热...
    • 55 篇 生物医学工程(可授...
    • 53 篇 生物工程
    • 52 篇 土木工程
    • 49 篇 建筑学
    • 44 篇 光学工程
    • 42 篇 交通运输工程
  • 602 篇 理学
    • 362 篇 数学
    • 171 篇 物理学
    • 100 篇 统计学(可授理学、...
    • 80 篇 化学
    • 69 篇 系统科学
    • 62 篇 生物学
  • 463 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 135 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 55 篇 教育学
    • 53 篇 教育学
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 42 篇 农学
  • 41 篇 法学
  • 39 篇 医学
  • 15 篇 文学
  • 10 篇 军事学
  • 9 篇 艺术学

主题

  • 34 篇 educational inst...
  • 32 篇 cloud computing
  • 26 篇 computational mo...
  • 25 篇 genetic algorith...
  • 22 篇 conferences
  • 22 篇 data mining
  • 22 篇 algorithm design...
  • 21 篇 neural networks
  • 21 篇 feature extracti...
  • 20 篇 deep learning
  • 20 篇 mathematical mod...
  • 19 篇 computer archite...
  • 19 篇 servers
  • 19 篇 network security
  • 19 篇 clustering algor...
  • 18 篇 wireless sensor ...
  • 17 篇 vectors
  • 17 篇 neural network
  • 17 篇 computer vision
  • 17 篇 training

机构

  • 9 篇 3-30-1 wajiro-hi...
  • 8 篇 school of comput...
  • 7 篇 beijing key labo...
  • 6 篇 school of comput...
  • 6 篇 kunming universi...
  • 6 篇 national univers...
  • 6 篇 the islamic univ...
  • 5 篇 school of comput...
  • 5 篇 school of inform...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 college of infor...
  • 5 篇 college of infor...
  • 5 篇 beijing universi...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 college of compu...
  • 4 篇 school of mathem...
  • 4 篇 college of infor...
  • 4 篇 institute of inf...

作者

  • 8 篇 barolli leonard
  • 7 篇 piao lin hua
  • 6 篇 ikeda makoto
  • 5 篇 kulla elis
  • 5 篇 liu yang
  • 5 篇 xhafa fatos
  • 5 篇 zhang bao li
  • 5 篇 zhao yang
  • 5 篇 li ying
  • 5 篇 li bo
  • 5 篇 zhang jun
  • 5 篇 zhang wei
  • 4 篇 wan ahmad wan fa...
  • 4 篇 kim ji-hwan
  • 4 篇 liu ying
  • 4 篇 park jeong-sik
  • 4 篇 huang lin na
  • 4 篇 xia yao wen
  • 4 篇 tian anhong
  • 4 篇 mei chuan zhi

语言

  • 1,968 篇 英文
  • 38 篇 中文
  • 7 篇 其他
检索条件"任意字段=2013 3rd International Conference on Computer Science and Network Technology, ICCSNT 2013"
2013 条 记 录,以下是51-60 订阅
排序:
A Novel Code-Shift-Keying Scheme Against Upstream Eavesdropping in Optical Code Division Multiple Access network  3
A Novel Code-Shift-Keying Scheme Against Upstream Eavesdropp...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Zhu, Huatao Pu, Tao Chen, Yinfang Fang, Tao Zheng, Jilin PLA Univ Sci & Technol Inst Commun Engn Nanjing Jiangsu Peoples R China
A 4-code code switching keying (CSK) modulation scheme was proposed. It can scramble the optical codes (OC) bit by bit to defeat the differential eavesdropping toward the upstream of the optical code division multiple... 详细信息
来源: 评论
Improvement on Wu-Manber Multi-pattern Matching Algorithm  3
Improvement on Wu-Manber Multi-pattern Matching Algorithm
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Zhang, Liang Wang, Dawei He, Longtao Wang, Wei Coordinat Ctr Natl Comp Network Emergency Response Tech Team Beijing Peoples R China Harbin Engn Univ Harbin Peoples R China
With development of computer and network technology, string matching are widely used in information retrieval, intrusion detection, network data analysis and other fields. String matching algorithms and experimental a... 详细信息
来源: 评论
Validating Lower Extremity Counterpulsation during CPR by computer Simulated Evolution  3
Validating Lower Extremity Counterpulsation during CPR by Co...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Zeng, Huangcun Guangdong Teachers Coll Foreign Language & Arts Dept Informat Technol Guangzhou Guangdong Peoples R China
Nowadays the outcome of Cardiopulmonary Resusciation (CPR) is dismal. There has been some research showing that if lower extremity counterpulsation is applied during CPR, it might augment coronary perfusion pressure, ... 详细信息
来源: 评论
An Empirical Study of Gamification Impact on E-Learning Environment  3
An Empirical Study of Gamification Impact on E-Learning Envi...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Amriani, Afifa Aji, Alham F. Utomo, Andika Y. Junus, Kasiyah M. Univ Indonesia Fac Comp Sci Depok Indonesia
Effective e-Learning requiresstudents to be active, thus, creating an environment that engages the students is one of the challenges. One of the ways to build an engaging e-Learning environment is by applying gamifica... 详细信息
来源: 评论
A Fine-Grained Access Control Model with Secure Label on Data Resource  3
A Fine-Grained Access Control Model with Secure Label on Dat...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Gao, Lijie Liu, Lianzhong Jin, Ze Han, Chunyan Beihang Univ Sch Comp Sci & Engn Beijing Key Lab Network Technol Beijing 100191 Peoples R China
With the demand driven of Web-Based security and the privacy protection for sensitive information, the research on Fine-Grained mandatory access control for data resources in database is getting more attention. A Fine... 详细信息
来源: 评论
A Monitoring System with Dynamic-Deployed Probes in Large-Scale network  3
A Monitoring System with Dynamic-Deployed Probes in Large-Sc...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Chang, Jing Jin, Yuehui Yang, Tan Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing Peoples R China
Because of the complex structure of large-scale network, it is necessary to study a targeted monitoring method. This article describes the cloud monitoring system, which consists of a cloud monitoring platform and sev... 详细信息
来源: 评论
An Improved Methodology of Soft Drink Discrimination Using an Electronic Nose  3
An Improved Methodology of Soft Drink Discrimination Using a...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Lu, Xiaoli Teng, Jing Yanching Inst Technol Dept Informat Engn Langfang Peoples R China North China Elect Power Univ Sch Control & Comp Engn Beijing Peoples R China
An improved methodology of soft drink discrimination using an electronic nose is developed in this study. 4 kinds of soft drinks, namely Coca Cola, Pepsi Cola, Future Cola and Sprite are detected. 3 pattern recognitio... 详细信息
来源: 评论
Visual Analysis and Detection of network Flood Attacks through Two-Layer Density Approach  3
Visual Analysis and Detection of Network Flood Attacks throu...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Huang, Mao Lin Zhang, Jinson Tianjin Univ Sch Comp Software Tianjin Peoples R China Univ Technol Sydney Sch Software Fac Engn & IT Sydney NSW Australia
Flood attack patterns have variability depending on the network environment. It has been necessitated that the need for visual analysis within an Intrusion Detection System (IDS) is to identify these flood-attack patt... 详细信息
来源: 评论
Capacity Analysis of Cooperative Cellular Uplink network with Incremental-Relaying  3
Capacity Analysis of Cooperative Cellular Uplink Network wit...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Guo, Kefeng Chen, Jin Li, Guoxin Chen, Yang PLA Univ Sci & Technol Coll Commun Engn Nanjing 210007 Jiangsu Peoples R China
This paper analyses an incremental relaying uplink model with partial relay selection. It describes the transmission between the base station (BS) and the mobile station (MS). The BS is a multi-antenna destination. Th... 详细信息
来源: 评论
Segmentation of Lung CT with Pathologies Based on Adapt Active Appearance Models  3
Segmentation of Lung CT with Pathologies Based on Adapt Acti...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Li, Yong Miao, Zhuang Wang, Bin Jilin Teathers Inst Engn & Technol Coll Informat Engn Changchun Peoples R China Jilin Univ Dept Neurosurg China Japan Union Hosp Changchun Peoples R China Jilin Prov Tumor Hosp Dept Abdominal Surg Changchun Peoples R China
An adapt Active Appearance Model (AAM) which can initialize the contour automatically is proposed to segment lung CT images with pathologies. Current segmentation methods have failed because the traditional PCA is not... 详细信息
来源: 评论