咨询与建议

限定检索结果

文献类型

  • 325 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 335 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 266 篇 工学
    • 243 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 34 篇 信息与通信工程
    • 25 篇 生物工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 控制科学与工程
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 建筑学
    • 10 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 环境科学与工程(可...
    • 6 篇 材料科学与工程(可...
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
  • 90 篇 理学
    • 57 篇 数学
    • 25 篇 生物学
    • 12 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 4 篇 大气科学
  • 63 篇 管理学
    • 35 篇 图书情报与档案管...
    • 30 篇 管理科学与工程(可...
    • 23 篇 工商管理
  • 11 篇 法学
    • 8 篇 社会学
  • 7 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 农学
  • 3 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 mobile computing
  • 12 篇 cloud computing
  • 7 篇 ubiquitous compu...
  • 6 篇 quantum computin...
  • 5 篇 distributed comp...
  • 5 篇 edge computing
  • 4 篇 computation theo...
  • 4 篇 application soft...
  • 4 篇 computer archite...
  • 4 篇 recommender syst...
  • 4 篇 processor schedu...
  • 4 篇 semantics
  • 4 篇 virtual machine
  • 3 篇 internet of thin...
  • 3 篇 reinforcement le...
  • 3 篇 genes
  • 3 篇 grid computing
  • 3 篇 computer applica...
  • 3 篇 energy utilizati...
  • 3 篇 computing power

机构

  • 8 篇 school of comput...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 nit calicut
  • 2 篇 hong kong polyte...
  • 2 篇 university of be...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...
  • 2 篇 university of co...
  • 2 篇 the hong kong po...
  • 2 篇 marquette univer...
  • 2 篇 dept. of compute...
  • 2 篇 computing instit...
  • 2 篇 institute of com...
  • 2 篇 center for relia...
  • 2 篇 school of comput...
  • 2 篇 university of wa...

作者

  • 6 篇 hong jiman
  • 5 篇 hung chih-cheng
  • 5 篇 song enmin
  • 4 篇 zulkernine moham...
  • 4 篇 cho yookun
  • 4 篇 liu hong
  • 3 篇 kim bongjae
  • 3 篇 varadharajan vij...
  • 3 篇 zambonelli franc...
  • 3 篇 ahamed sheikh iq...
  • 3 篇 leong hong va
  • 3 篇 rahman ataur
  • 2 篇 song jie
  • 2 篇 kühn eva
  • 2 篇 sheikh iqbal aha...
  • 2 篇 weldemariam komm...
  • 2 篇 mayer wolfgang
  • 2 篇 freitas fred
  • 2 篇 claycomb william
  • 2 篇 yu mali

语言

  • 335 篇 英文
检索条件"任意字段=Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing"
335 条 记 录,以下是211-220 订阅
排序:
A group-based security policy for wireless sensor networks  10
A group-based security policy for wireless sensor networks
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Claycomb, William Lopes, Rodrigo Shin, Dongwan Kim, Byunggi Secure Computing Laboratory New Mexico Tech. 801 Leroy Place Socorro NM 87801 United States Soongsil University 511 Sangdo-dong Dongjak-gu Seoul 156-743 Korea Republic of
the protection of wireless sensor networks is an important task, especially for critical situations such as intrusion detection, tamper monitoring, or military applications. To date, much of the emphasis on protecting... 详细信息
来源: 评论
Exploiting non-functional preferences in architectural adaptation for self-managed systems  10
Exploiting non-functional preferences in architectural adapt...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Sykes, Daniel Heaven, William Magee, Jeff Kramer, Jeff Department of Computing Imperial College London United Kingdom
Among the many challenges of engineering dependable, self-managed, component-based systems is their need to make informed decisions about adaptive reconfigurations in response to changing requirements or a changing en... 详细信息
来源: 评论
Summarizing observational client-side data to reveal web usage patterns  10
Summarizing observational client-side data to reveal web usa...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: De Santana, Vagner Figuerêdo Baranauskas, M. Cecília C. Institute of Computing-UNICAMP 1251 Albert Einstein Av. Campinas SP Brazil
Client-side event logs may reveal patterns of usage of Web pages. Nevertheless, extracting useful and novel information from this voluminous data set is a challenge for evaluation tools, since a few minutes simple tas... 详细信息
来源: 评论
Investigating the influence of social computing applications on website quality  10
Investigating the influence of social computing applications...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Goh, Dion Hoe-Lian Chua, Alton Y. K. Nanyang Technological University Wee Kim Wee School of Communication and Information 31 Nanyang Link Singapore 637718 Singapore
Social computing applications hold immense potential in enriching communication, enabling collaboration and fostering innovation. However, little work has been done to studying social computing applications in library... 详细信息
来源: 评论
Energy-efficient real-time scheduling of multimedia tasks on multi-core processors  10
Energy-efficient real-time scheduling of multimedia tasks on...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Wei, Yi-Hung Yang, Chuan-Yue Kuo, Tei-Wei Hung, Shih-Hao Chu, Yuan-Hua Department of Computer Science and Information Engineering Graduate Institute of Networking and Multimedia National Taiwan University Taiwan SoC Technology Center Industrial Technology Research Institute Taiwan
In recent years, various multi-core architectures have become popular selections for the designs of mobile platforms. With the strong computing demands from many multimedia applications, how to energy-efficiently util... 详细信息
来源: 评论
Towards semantic-based adaptation decisions for context-aware mobile computing  10
Towards semantic-based adaptation decisions for context-awar...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Wei, Edwin J. Y. Chan, Alvin T. S. Department of Computing Hong Kong Polytechnic University Hung Hom Kowloon Hong Kong
this paper studies the problem of adaptation decisions for context-aware mobile computing. In most context-aware systems to date, context-aware adaptation decisions are made by developers during the design-time or com... 详细信息
来源: 评论
Probabilistic anti-spam filtering with dimensionality reduction  10
Probabilistic anti-spam filtering with dimensionality reduct...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Almeida, Tiago A. Yamakami, Akebo Almeida, Jurandy School of Electrical and Computer Engineering University of Campinas - UNICAMP 13083-970 Campinas SP Brazil Institute of Computing University of Campinas - UNICAMP 13083-970 Campinas SP Brazil
One of the biggest problems of e-mail communication is the massive spam message delivery. Everyday, billion of unwanted messages are sent by spammers and this number does not stop growing. Helpfully, there are differe... 详细信息
来源: 评论
A distributed protocol for ensuring replicated database consistency in mobile computing environments  10
A distributed protocol for ensuring replicated database cons...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Costa, Alex Monteiro, Jose Maria Brayner, Angelo University of Fortaleza Fortaleza Brazil
A mobile replicated database is comprised of several mobile and fixed servers and clients interconnected through a wireless network. In order to ensure data consistency in mobile replicated databases, several replicat... 详细信息
来源: 评论
Improving complex distributed software system availability through information hiding  10
Improving complex distributed software system availability t...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Wang, Li Leiferman, Yair Ren, Shangping Kwiat, Kevin Li, Xiaowei Department of CS Illinois Institute of Technology Chicago IL 60616 United States Cyber Science Branch Air Force Research Laboratory AFRL/RIGG Rome NY 13441-4505 United States Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
For distributed software systems, ensuring their availability under intentional attacks is critical. Traffic analysis, conducted by the attacker, could reveal the protocol being carried out by the components. Furtherm... 详细信息
来源: 评论
Prom-oogle: Data mining and integration of on-line databases to discover gene promoters  10
Prom-oogle: Data mining and integration of on-line databases...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Cheng, Dean Sheldon, John Marcet-Palacios, Marcelo Zaïane, Osmar R. Department of Computing Science University of Alberta Canada Department of Medicine University of Alberta Canada
the vast number of on-line biological and medical databases available can be a great resource for biomedical researchers. However, the different types of data and interfaces available can be overwhelming for many biom... 详细信息
来源: 评论