咨询与建议

限定检索结果

文献类型

  • 1,526 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,137 篇 工学
    • 965 篇 计算机科学与技术...
    • 824 篇 软件工程
    • 268 篇 信息与通信工程
    • 206 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 316 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 137 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 1,499 篇 英文
  • 28 篇 其他
  • 22 篇 中文
  • 3 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1532 条 记 录,以下是1371-1380 订阅
排序:
A scalable peer-to-peer overlay for applications with time constraints
A scalable peer-to-peer overlay for applications with time c...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Bo, Liu Yansheng, Lu School of Computer Sci. and Tech. Huazhong University of Sci. and Tech. Wuhan 430074 China
With the development of Internet, p2p is increasingly receiving attention in research. Recently, a class of p2p applications with time constraints appear. these applications require a short time to locate the resource... 详细信息
来源: 评论
Incorporating a PMF-based injury model into a multi-agent representation of crowd behavior
Incorporating a PMF-based injury model into a multi-agent re...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: McKenzie, Frederic D. Piland III, Herbie H. Min, Song Department of Electrical and Computer Engineering Old Dominion University Norfolk VA 23529
throughout the years, much research has been conducted on human behavior models that focus on individual intelligent human agents. Fewer multi-agent based models have addressed group or crowd behavior from a psycholog... 详细信息
来源: 评论
Attack scenario construction with a new sequential mining technique
Attack scenario construction with a new sequential mining te...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Li, Wang Zhi-tang, Li Dong, Li Jie, Lei Computer Science Department Huazhong University of Science and Technology Hubei Wuhan 430074 China
Continuously increasing volume of security data makes it important to develop an advanced alert correlation system that can reduce alert redundancy, intelligently correlate security alerts and detect attack strategies... 详细信息
来源: 评论
A cluster-based and routing balanced P2P lookup protocol
A cluster-based and routing balanced P2P lookup protocol
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Yang, Lu Ming, Chen China University of Petroleum Beijing China
A fundamental problem in peer-to-peer (P2P) systems is how to efficiently locate the node that stores a particular data item. As a hot issue, a number of structured P2P lookup protocols have been presented during the ... 详细信息
来源: 评论
A web services based email extension for remote monitoring of embedded systems
A web services based email extension for remote monitoring o...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Liu, Peng Dai, Guojun Fu, Tingting Institute of Computer Application Technology Hangzhou Dianzi University Hangzhou 310018 China Institute of Graphics and Image Hangzhou Dianzi University Hangzhou 310018 China
Nowadays, remote control applications via the Internet are going to be used more and more widely with the development of powerful chips and network technology. For applications which do not need realtime communication... 详细信息
来源: 评论
Novel scheme based on ping-pong effect for predictive fast handovers for mobile IPv6
Novel scheme based on ping-pong effect for predictive fast h...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Hongmei, Wang Zongpu, Jia Huan, Zhao Institute of Computer Science and Technology He'nan Polytechnic University Jiaozuo Henan 454000 China Institute of Electrical Engineering and Automation He'nan Polytechnic University Jiaozuo Henan 454000 China
In the mobile IPv6 based integration of wireless communication and computer network technology, there is a problem of Ping-pong effect, namely Mobile Nodes(MN) hands over frequently between two access routers, causing... 详细信息
来源: 评论
Building personalized recommendation system in E-commerce using association rule-based mining and classification
Building personalized recommendation system in E-commerce us...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Zhang, Xizheng Department of Computer Science Hunan Institute of Engineering Xiangtan 411104 China
Due to the convenience of Internet, people can search for whatever information they need and buy whatever they want on the web. In the age of E-Commerce, it is difficult to provide support for customers to find the mo... 详细信息
来源: 评论
Development of an internal liquid cooling system for CPU using CAE
Development of an internal liquid cooling system for CPU usi...
收藏 引用
8th international conference on thermal, Mechanical and Multi-Physics Simulation and Experiments in Micro-Electronics and Micro-systems
作者: Flores, Sebastian Wang, Song-Hao Chang, Chong-Qing Mechanical Engineering Department Kun-Shan University Taiwan System Engineering Department National Tainan University Taiwan
Liquid cooling is currently one of the best and most immediate options for non uniform heat sources, high performance CPU/GPU. One of the main drawbacks of this alternative is that many customers may not be very enthu... 详细信息
来源: 评论
A proxy blind signature scheme based on elliptic curve with proxy revocation
A proxy blind signature scheme based on elliptic curve with ...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Liu, Wen-Yuan Tong, Feng Luo, Yong-An Zhang, Feng School of Economics and Management Yanshan University Qinhuangdao 066004 China Information Science and Engineering Institute Yanshan University Qinhuangdao 066004 China Computer Science Institute Nanchang University Nanchang 330029 China
Proxy signature allows an original signer to delegate his signing capacity to a proxy signer. then the proxy signer creates a signature on behalf of the original singer. When a receiver verifies proxy signature, he ve... 详细信息
来源: 评论
A distributed trust-based reputation model in P2P system
A distributed trust-based reputation model in P2P system
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Liu, Yu-Mei Yang, Shou-Bao Guo, Lei-Tao Chen, Wan-Ming Guo, Liang-Min Department of Computer Science and Technology University of Science and Technology of China Hefei China Department of Automation University of Science and Technology of China Hefei China
the P2P system is an anonymous and dynamic system, thus, some malicious behaviour can't be punished. In order to restrict the malicious behaviour in the P2P system, researchers have focused on establishing effecti... 详细信息
来源: 评论