咨询与建议

限定检索结果

文献类型

  • 6,172 篇 会议
  • 124 篇 期刊文献
  • 57 册 图书

馆藏范围

  • 6,353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,979 篇 工学
    • 4,034 篇 计算机科学与技术...
    • 2,743 篇 软件工程
    • 691 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 380 篇 生物工程
    • 333 篇 电气工程
    • 258 篇 机械工程
    • 244 篇 电子科学与技术(可...
    • 234 篇 生物医学工程(可授...
    • 209 篇 光学工程
    • 173 篇 仪器科学与技术
    • 156 篇 材料科学与工程(可...
    • 147 篇 化学工程与技术
    • 144 篇 建筑学
    • 111 篇 土木工程
    • 107 篇 安全科学与工程
  • 2,308 篇 教育学
    • 2,298 篇 教育学
  • 1,458 篇 理学
    • 701 篇 数学
    • 413 篇 物理学
    • 395 篇 生物学
    • 200 篇 统计学(可授理学、...
    • 168 篇 化学
    • 110 篇 系统科学
  • 1,351 篇 管理学
    • 808 篇 管理科学与工程(可...
    • 593 篇 图书情报与档案管...
    • 547 篇 工商管理
  • 261 篇 法学
    • 234 篇 社会学
  • 233 篇 医学
    • 192 篇 临床医学
    • 166 篇 基础医学(可授医学...
  • 130 篇 经济学
    • 126 篇 应用经济学
  • 66 篇 农学
  • 28 篇 文学
  • 26 篇 艺术学
  • 10 篇 军事学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 451 篇 students
  • 232 篇 education
  • 194 篇 computer science
  • 190 篇 computer science...
  • 162 篇 engineering educ...
  • 142 篇 teaching
  • 94 篇 technological in...
  • 91 篇 curricula
  • 87 篇 computing educat...
  • 84 篇 computer program...
  • 80 篇 computer aided i...
  • 56 篇 software enginee...
  • 56 篇 education comput...
  • 54 篇 e-learning
  • 48 篇 artificial intel...
  • 46 篇 learning systems
  • 45 篇 big data
  • 45 篇 cs1
  • 44 篇 programming
  • 43 篇 semantics

机构

  • 39 篇 université de st...
  • 37 篇 università di sa...
  • 36 篇 university moham...
  • 35 篇 università di ca...
  • 35 篇 infn sezione di ...
  • 35 篇 north-west unive...
  • 35 篇 infn sezione di ...
  • 35 篇 institut univers...
  • 35 篇 national centre ...
  • 35 篇 tno technical sc...
  • 35 篇 infn sezione di ...
  • 35 篇 school of comput...
  • 34 篇 in2p3 lpc campus...
  • 34 篇 nikhef national ...
  • 34 篇 university würzb...
  • 34 篇 ncsr demokritos ...
  • 34 篇 lpc caen normand...
  • 34 篇 university of am...
  • 34 篇 western sydney u...
  • 33 篇 university of jo...

作者

  • 39 篇 ferrara g.
  • 39 篇 ardid m.
  • 39 篇 kalekin o.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 39 篇 coleiro a.
  • 38 篇 calvo d.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 dornic d.
  • 38 篇 carretero v.
  • 38 篇 ardid s.
  • 38 篇 bendahman m.
  • 38 篇 brunner j.
  • 38 篇 di palma i.
  • 37 篇 gagliardini s.
  • 37 篇 huang f.
  • 37 篇 de martino b.
  • 36 篇 carenini f.
  • 36 篇 coniglione r.

语言

  • 6,123 篇 英文
  • 178 篇 其他
  • 46 篇 中文
  • 4 篇 西班牙文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 俄文
检索条件"任意字段=Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education"
6353 条 记 录,以下是4931-4940 订阅
排序:
FPGA implementation of AES algorithm resistant power analysis attacks  7
FPGA implementation of AES algorithm resistant power analysi...
收藏 引用
7th International conference on computer Engineering and Networks, CENet 2017
作者: Li, Lang Zou, Yi Jiao, Ge College of Computer Science and Technology Hengyang Normal University HengYang421002 China
In order to be more effectively resist differential power analysis attacks, the improved fixed value masking algorithm is proposed for resource-constrained smart card based on fixed value masking and random masking. F... 详细信息
来源: 评论
Collaboration or plagiarism: What happens when students work together
Poceedings of the Conference on Integrating Technology into ...
收藏 引用
Poceedings of the conference on Integrating technology into computer science education, ITiCSE 1999年 52-55页
作者: Carter, Janet Univ of Kent at Canterbury Kent United Kingdom
This paper describes the findings of a small-scale case study concerning the collaborative aspects of student working practices. It is a pilot investigation into the strategies that are employed by students when attem... 详细信息
来源: 评论
A Security-Enhanced Modbus TCP Protocol and Authorized Access Mechanism  6
A Security-Enhanced Modbus TCP Protocol and Authorized Acces...
收藏 引用
6th IEEE International conference on Data science in Cyberspace, DSC 2021
作者: Yi, Fumin Zhang, Lei Yang, Shumian Zhao, Dawei Shandong Provincial Key Laboratory Of Computer Networks Jinan250014 China
Because of the communication schemes and communication protocols in the industrial control systems (Industrial Control System, ICS) rarely consider security at the beginning of the design, and with the rapid developme... 详细信息
来源: 评论
Image Analysis of Facial Blood Vessels for Anti-Spoofing of Printed Image and 3D Mask Attacks
Image Analysis of Facial Blood Vessels for Anti-Spoofing of ...
收藏 引用
2022 International conference on Image Processing and Media Computing, ICIPMC 2022
作者: Li, Lei Yao, Zhihao Zhou, Shixi Ma, Yupeng Wu, Jun Xia, Zhaoqiang Shandong University of Finance and Economics School of Computer Science and Technology Jinan China Northwestern Polytechnical University School of Electronics and Information Xi'an China Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Anhui University Information Materials and Intelligent Sensing Laboratory of Anhui Province Hefei China
In recent years, many face spoofing detection methods based on video frame or video sequence have been proposed to counteract the security threats of face recognition system. Although the video sequence based detectio... 详细信息
来源: 评论
Why do fools fall into infinite loops: Singing to your computer science class
Poceedings of the Conference on Integrating Technology into ...
收藏 引用
Poceedings of the conference on Integrating technology into computer science education, ITiCSE 1999年 167-170页
作者: Siegel, Eric V. Columbia Univ New York United States
One effective way to introduce a dose of humanity, acknowledge the needs and struggles of CS1 students, and appeal to a broader range of learning styles is to present a computer science topic in an entertaining manner... 详细信息
来源: 评论
Architectural distortion detection approach guided by mammary gland spatial pattern in digital breast tomosynthesis
Architectural distortion detection approach guided by mammar...
收藏 引用
conference on Medical Imaging - computer-Aided Diagnosis
作者: Li, Yue Xie, Zheng He, Zilong Ma, Xiangyuan Guo, Yanhui Chen, Weiguo Lu, Yao Sun Yat Sen Univ Sch Data & Comp Sci Guangzhou Peoples R China Southern Med Univ Nanfang Hosp Dept Radiol Guangzhou Peoples R China Univ Illinois Dept Comp Sci Springfield IL 62703 USA Sun Yat Sen Univ Guangdong Prov Key Lab Computat Sci Guangzhou Peoples R China
Architectural distortion (AD) is one of the most important potentially ominous signs of breast cancer. As a 3D imaging, digital breast tomosynthesis (DBT) is an accurate tool to detect AD. We developed a deep learning... 详细信息
来源: 评论
The Empirical study and analysis of the Blockchain technology  3
The Empirical study and analysis of the Blockchain Technolog...
收藏 引用
3rd International conference on Inventive Research in Computing Applications, ICIRCA 2021
作者: Bharti, Vishal Anand, Darpan Chandigarh University Department of Computer Science and Engineering Punjab Gharuan Mohali140413 India
Blockchain is the emerging technological field for the current era due to its advantages such as distributed computing, transparency, cryptography enabled secure communication and message as well as source integrity. ... 详细信息
来源: 评论
Special learning environment for repeat students
Poceedings of the Conference on Integrating Technology into ...
收藏 引用
Poceedings of the conference on Integrating technology into computer science education, ITiCSE 1999年 56-59页
作者: Sheard, Judy Hagan, Dianne Monash Univ
In 1997, surveys of a group of introductory programming students, in a class with a predominance of repeat students (i.e., students who had previously failed the subject), provided an opportunity to establish a profil... 详细信息
来源: 评论
Level value density task scheduling algorithm for cyber physical systems on cloud
Level value density task scheduling algorithm for cyber phys...
收藏 引用
2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017
作者: Kuang, Ling Zhang, Lichen Faculty of Computer Science and Technology Guangdong University of Technology Guangzhou China
Task scheduling, a key part of increasing resource utilization and enhancing system performance, is a never outdated problem especially in cloud platforms and Cyber-Physical System (CPS). Based on the Value Density al... 详细信息
来源: 评论
Why? When an otherwise successful intervention fails
Poceedings of the Conference on Integrating Technology into ...
收藏 引用
Poceedings of the conference on Integrating technology into computer science education, ITiCSE 1999年 9-12页
作者: McCracken, Michael Waters, Robert Coll of Computing Atlanta United States
Problem-Based Learning (PBL) has been an effective technique in developing self-directed learning and problem-solving skills in students - especially in the medical school environment. This paper looks at some prelimi... 详细信息
来源: 评论