咨询与建议

限定检索结果

文献类型

  • 323 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 333 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 265 篇 工学
    • 242 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 34 篇 信息与通信工程
    • 25 篇 生物工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 控制科学与工程
    • 12 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 建筑学
    • 10 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 环境科学与工程(可...
    • 6 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 机械工程
    • 4 篇 光学工程
  • 90 篇 理学
    • 57 篇 数学
    • 25 篇 生物学
    • 12 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 4 篇 大气科学
  • 63 篇 管理学
    • 35 篇 图书情报与档案管...
    • 30 篇 管理科学与工程(可...
    • 23 篇 工商管理
  • 11 篇 法学
    • 8 篇 社会学
  • 7 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 农学
  • 3 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 mobile computing
  • 12 篇 cloud computing
  • 7 篇 ubiquitous compu...
  • 5 篇 quantum computin...
  • 5 篇 distributed comp...
  • 5 篇 edge computing
  • 4 篇 computation theo...
  • 4 篇 application soft...
  • 4 篇 computer archite...
  • 4 篇 recommender syst...
  • 4 篇 processor schedu...
  • 4 篇 semantics
  • 4 篇 virtual machine
  • 3 篇 internet of thin...
  • 3 篇 reinforcement le...
  • 3 篇 genes
  • 3 篇 grid computing
  • 3 篇 computer applica...
  • 3 篇 energy utilizati...
  • 3 篇 computing power

机构

  • 8 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 nit calicut
  • 2 篇 hong kong polyte...
  • 2 篇 university of be...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...
  • 2 篇 university of co...
  • 2 篇 the hong kong po...
  • 2 篇 marquette univer...
  • 2 篇 dept. of compute...
  • 2 篇 computing instit...
  • 2 篇 institute of com...
  • 2 篇 center for relia...
  • 2 篇 school of comput...
  • 2 篇 university of wa...

作者

  • 6 篇 hong jiman
  • 5 篇 hung chih-cheng
  • 5 篇 song enmin
  • 4 篇 zulkernine moham...
  • 4 篇 cho yookun
  • 4 篇 liu hong
  • 3 篇 kim bongjae
  • 3 篇 varadharajan vij...
  • 3 篇 zambonelli franc...
  • 3 篇 ahamed sheikh iq...
  • 3 篇 leong hong va
  • 3 篇 rahman ataur
  • 2 篇 song jie
  • 2 篇 kühn eva
  • 2 篇 sheikh iqbal aha...
  • 2 篇 weldemariam komm...
  • 2 篇 mayer wolfgang
  • 2 篇 freitas fred
  • 2 篇 claycomb william
  • 2 篇 yu mali

语言

  • 333 篇 英文
检索条件"任意字段=Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing"
333 条 记 录,以下是141-150 订阅
排序:
Implicit environment-based coordination in pervasive computing  05
Implicit environment-based coordination in pervasive computi...
收藏 引用
20th Annual acm symposium on applied computing
作者: Tafat, Amine Courant, Michele Hirsbrunner, Béat PAI Group Informatics Department Fribourg University Switzerland
By immersing computational systems into the physical world, pervasive computing brings us from traditional desktop computing interactions into a form closer to human interactions, which are characterized by their depe... 详细信息
来源: 评论
Enhancing security enforcement on unmodified Android  13
Enhancing security enforcement on unmodified Android
收藏 引用
28th Annual acm symposium on applied computing, SAC 2013
作者: Jeon, Cheol Kim, Bongjae Kim, WooChur Cho, Yookun School of Computer Science and Engineering Seoul National University Seoul Korea Republic of School of Computing Soongsil University Seoul Korea Republic of
Android OS have several security vulnerabilities. Most of existing proposals require extensive modification of Android kernel or application framework. So, they are not feasible for end users which use stock Android O... 详细信息
来源: 评论
Honeynet based distributed adaptive network forensics and active real time investigation  05
Honeynet based distributed adaptive network forensics and ac...
收藏 引用
20th Annual acm symposium on applied computing
作者: Ren, Wei Jin, Hai Department of Computer Science School of Information Zhongnan University of Economics and Law Wuluo Road 114 Wuhan 430064 China Cluster and Grid Computing Lab. School of Computer Huazhong University of Science and Technology Luoyu Road 1037 Wuhan 430074 China
Network forensics and honeynet systems have the same features of collecting information about the computer misuses. Honeynet system can lure attackers and gain information about new types of intrusions. Network forens... 详细信息
来源: 评论
computing the cube of an interval matrix is NP-hard  05
Computing the cube of an interval matrix is NP-hard
收藏 引用
20th Annual acm symposium on applied computing
作者: Kosheleva, Olga Kreinovich, Vladik Mayer, Günter Nguyen, Hung T. Pan-American Center for Earth and Environmental Studies University of Texas at El Paso El Paso TX 79968 United States Fachbereich Mathematik Universität Rostock Universitätsplatz 1 D-18051 Rostock Germany Dept. of Math. Sciences New Mexico State University Las Cruces NM 88003 United States
In many practical applications, we are interested in computing the product of given matrices and/or a power of a given matrix. In some cases, the initial matrices are only known with interval uncertainty. It turns out... 详细信息
来源: 评论
Wireless spatio-semantic transactions on multimedia datasets  04
Wireless spatio-semantic transactions on multimedia datasets
收藏 引用
applied computing 2004 - proceedings of the 2004 acm symposium on applied computing
作者: Carswell, James D. Gardiner, Keith Neumann, Marco Digital Media Centre Dublin Institute of Technology Ireland
Advances in spatially enabled semantic computing can provide situation aware assistance for mobile users. this intelligent and context-aware technology presents the right information at the right time, place and situa... 详细信息
来源: 评论
Protecting Android applications with steganography-based software watermarking  13
Protecting Android applications with steganography-based sof...
收藏 引用
28th Annual acm symposium on applied computing, SAC 2013
作者: Jang, Joonhyouk Jung, Jinman Ji, Hyunho Hong, Jiman Kim, Dongkyun Jung, Soon Ki Seoul National University Dept. of Computer Science and Engineering Seoul Korea Republic of Soongsil University School of Computing Seoul Korea Republic of Kyungpook National University School of Computer Science and Engineering Daegu Korea Republic of
In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previ... 详细信息
来源: 评论
A New Algorithm for computing Certified Numerical Approximations of the Roots of a Zero-dimensional System
A New Algorithm for Computing Certified Numerical Approximat...
收藏 引用
34th International symposium on Symbolic and Algebraic Computation
作者: Graillat, Stef Trebuchet, Philippe LIP6 CNRS UPMC PEQUAN Team F-75016 Paris France
this paper provides a new method for computing numerical approximations of the roots of a zero-dimensional system. It works on general systems, even those with multiple roots, and avoids any arbitrary choice of linear... 详细信息
来源: 评论
Filtering spams using the minimum description length principle  10
Filtering spams using the minimum description length princip...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Almeida, Tiago A. Yamakami, Akebo Almeida, Jurandy School of Electrical and Computer Engineering University of Campinas - UNICAMP 13083-970 Campinas SP Brazil Institute of Computing University of Campinas 13083-970 Campinas SP Brazil
Spam has become an increasingly important problem with a big economic impact in society. Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an acti... 详细信息
来源: 评论
Dynamic channel allocation for linear macrocellular topology  99
Dynamic channel allocation for linear macrocellular topology
收藏 引用
proceedings of the 1999 14th acm symposium on applied computing, SAC-99
作者: Bassiouni, Mostafa A. Fang, Chun-Chin Univ of Central Florida Orlando FL United States
In this paper, we present a dynamic channel assignment scheme for highway macrocellular networks that is suitable for real-time services in terms of execution overhead and efficient in terms of reducing call blocking.... 详细信息
来源: 评论
An efficient security framework for mobile WiMAX  12
An efficient security framework for mobile WiMAX
收藏 引用
27th Annual acm symposium on applied computing, SAC 2012
作者: Rodoper, Mete Baliga, Arati Jung, Edward Trappe, Wade Rutgers University North Brunswick NJ United States AT and T Security Research Center Middletown NJ United States School of Computing and SE Southern Polytechnic State Univ. Marietta GA United States
WiMAX is a technology that provides continuous high data throughput with low delays for various user types and modes of operation. the security protocols proposed for WiMAX impose a heavy performance overhead, especia... 详细信息
来源: 评论