咨询与建议

限定检索结果

文献类型

  • 729 篇 期刊文献
  • 580 篇 会议
  • 25 册 图书

馆藏范围

  • 1,334 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 886 篇 工学
    • 564 篇 计算机科学与技术...
    • 451 篇 软件工程
    • 153 篇 信息与通信工程
    • 138 篇 光学工程
    • 132 篇 电气工程
    • 130 篇 生物医学工程(可授...
    • 125 篇 电子科学与技术(可...
    • 118 篇 生物工程
    • 103 篇 控制科学与工程
    • 100 篇 仪器科学与技术
    • 46 篇 机械工程
    • 43 篇 航空宇航科学与技...
    • 38 篇 化学工程与技术
    • 33 篇 动力工程及工程热...
  • 579 篇 理学
    • 278 篇 物理学
    • 183 篇 数学
    • 134 篇 生物学
    • 81 篇 化学
    • 77 篇 地球物理学
    • 62 篇 统计学(可授理学、...
    • 40 篇 系统科学
  • 203 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 83 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 131 篇 医学
    • 111 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 60 篇 药学(可授医学、理...
    • 50 篇 公共卫生与预防医...
  • 28 篇 法学
    • 22 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 18 篇 农学
  • 15 篇 教育学
  • 5 篇 文学
  • 5 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 45 篇 computational mo...
  • 39 篇 deep learning
  • 32 篇 machine learning
  • 27 篇 neutrons
  • 27 篇 accuracy
  • 25 篇 computer science
  • 22 篇 distributed comp...
  • 20 篇 magnetic resonan...
  • 19 篇 artificial intel...
  • 16 篇 feature extracti...
  • 16 篇 forecasting
  • 16 篇 training
  • 15 篇 concurrent compu...
  • 15 篇 computer archite...
  • 15 篇 predictive model...
  • 15 篇 convolutional ne...
  • 14 篇 image segmentati...
  • 14 篇 visualization
  • 14 篇 semantics
  • 14 篇 decision making

机构

  • 95 篇 institut univers...
  • 94 篇 north-west unive...
  • 94 篇 tno technical sc...
  • 92 篇 national centre ...
  • 89 篇 université de st...
  • 89 篇 nikhef national ...
  • 88 篇 infn sezione di ...
  • 85 篇 university of jo...
  • 85 篇 ncsr demokritos ...
  • 84 篇 infn sezione di ...
  • 83 篇 infn sezione di ...
  • 82 篇 infn sezione di ...
  • 80 篇 infn sezione di ...
  • 78 篇 western sydney u...
  • 78 篇 università la sa...
  • 75 篇 university würzb...
  • 75 篇 university moham...
  • 72 篇 university of am...
  • 72 篇 tbilisi state un...
  • 70 篇 università di sa...

作者

  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 87 篇 coleiro a.
  • 87 篇 gozzini s.r.
  • 87 篇 dallier r.
  • 87 篇 enzenhöfer a.
  • 87 篇 celli s.
  • 85 篇 bendahman m.
  • 85 篇 brunner j.
  • 85 篇 cherubini s.
  • 84 篇 boettcher m.
  • 84 篇 carretero v.
  • 84 篇 di palma i.
  • 84 篇 giorgio e.

语言

  • 1,195 篇 英文
  • 132 篇 其他
  • 7 篇 中文
  • 1 篇 德文
检索条件"机构=Centre for Parallel Computing School of Computer Science and Engineering"
1334 条 记 录,以下是1091-1100 订阅
排序:
Security impact assessment of industrial automation systems using genetic algorithm and simulation
Security impact assessment of industrial automation systems ...
收藏 引用
International Conference on Emerging Technologies and Factory Automation (ETFA)
作者: Nikolaos Papakonstantinou Seppo Sierla Konstantinia Charitoudi Bryan O'Halloran Tommi Karhela Valeriy Vyatkin Irem Turner Department of Electrical Engineering and Automation Aalto University Finland Faculty of Computing Engineering and Science (FCES) University of South Wales UK School of Mechanical Industrial and Manufacturing Engineering Oregon State University OR USA VTT Technical Research Centre of Finland Finland Department of Computer Science Electrical and Space Engineering Luleå Tekniska Universitet Sweden Oregon State University Corvallis OR US
Much of the research on security of industrial automation systems has focused on countermeasures such as intrusion detection, certificate management or public key infrastructures. Due to limited resources, countermeas... 详细信息
来源: 评论
Highlights from the 11th ISCB Student Council Symposium 2015. Dublin, Ireland. 10 July 2015
收藏 引用
BMC bioinformatics 2016年 第3期17 Suppl 3卷 95页
作者: Katie Wilkins Mehedi Hassan Margherita Francescatto Jakob Jespersen R. Gonzalo Parra Bart Cuypers Dan DeBlasio Alexander Junge Anupama Jigisha Farzana Rahman Griet Laenen Sander Willems Lieven Thorrez Yves Moreau Nagarajan Raju Sonia Pankaj Chothani C. Ramakrishnan Masakazu Sekijima M. Michael Gromiha Paddy J Slator Nigel J Burroughs Przemysław Szałaj Zhonghui Tang Paul Michalski Oskar Luo Xingwang Li Yijun Ruan Dariusz Plewczynski Giulia Fiscon Emanuel Weitschek Massimo Ciccozzi Paola Bertolazzi Giovanni Felici Pieter Meysman Manu Vanaerschot Maya Berg Hideo Imamura Jean-Claude Dujardin Kris Laukens Westa Domanova James R. Krycer Rima Chaudhuri Pengyi Yang Fatemeh Vafaee Daniel J. Fazakerley Sean J. Humphrey David E. James Zdenka Kuncic Plant Pathology and Plant-Microbe Biology Section School of Integrative Plant Science Cornell University Ithaca USA Graduate Field of Computational Biology Cornell University Ithaca USA School of Computing & Mathematics University of South Wales Cardiff UK Department of Genome Biology for Neurodegenerative Diseases German Center for Neurodegenerative Diseases (DZNE) within the Helmholtz Association ᅟ Germany Department of Surgery Massachusetts General Hospital The Broad Institute of MIT and Harvard Boston USA Department of Systems Biology Technical University of Denmark Kemitorvet Denmark Protein Physiology Lab Facultad de Ciencias Exactas y Naturales Universidad de Buenos Aires Buenos Aires Argentina Molecular Parasitology Unit (MPU) Institute of Tropical Medicine Antwerp Belgium Advanced Database Research and Modeling (ADReM) research group University of Antwerp Antwerpen Belgium Department of Computer Science University of Arizona Tucson USA Department of Veterinary Clinical and Animal Sciences Center for non-coding RNA in Technology and Health University of Copenhagen Copenhagen Denmark University College Dublin Dublin Ireland Department of Electrical Engineering (ESAT) STADIUS Center for Dynamical Systems Signal Processing and Data Analytics KU Leuven Leuven Belgium Minds Medical IT Department Leuven Belgium Scientific Institute of Public Health (WIV-ISP) Platform of Biotechnology and Molecular Biology (PBB) Brussels Belgium Department of Development and Regeneration @ Kulak KU Leuven Kortrijk Belgium Department of Biotechnology Bhupat and Jyoti Metha School of Biosciences Indian Institute of Technology Madras Chennai India Philips Research North America Briarcliff Manor USA Global Scientific Information and Computing Center (GSIC) Tokyo Institute of Technology Tokyo Japan Systems Biology Centre University of Warwick Senate House Coventry UK Systems Biology Doctoral Training Centre University of Warwick Senate House Coventry UK Center for B
A1 Highlights from the eleventh ISCB Student Council Symposium 2015 Katie Wilkins, Mehedi Hassan, Margherita Francescatto, Jakob Jespersen, R. Gonzalo Parra, Bart Cuypers, Dan DeBlasio, Alexander Junge, Anupama Jigish... 详细信息
来源: 评论
Synchronization in Time-varying Networks of Non-Introspective Agents without Exchange of Controller States
Synchronization in Time-varying Networks of Non-Introspectiv...
收藏 引用
American Control Conference
作者: Tao Yang Havard Fjaer Grip Ali Saberi Meirong Zhang Anton A. Stoorvogel ACCESS Linnaeus Centre Royal Institute of Technology (KTH) SE-100 44 Stockholm Sweden Department of Engineering Cybernetics Norwegian University of Science and Technology School of Electrical Engineering and Computer Science Washington State University Pullman WA 99164-2752 USA Department of Electrical Engineering Mathematics and Computing Science University of Twente P.O. Box 217 7500 AE Enschede The Netherlands
We consider two synchronization problems, namely, state synchronization for networks of identical linear agents, and regulated output synchronization for networks of non-identical linear agents, under a time-varying t... 详细信息
来源: 评论
A mathematical model for empowerment of Beowulf clusters for exascale computing
A mathematical model for empowerment of Beowulf clusters for...
收藏 引用
2013 11th International Conference on High Performance computing and Simulation, HPCS 2013
作者: Mirtaheri, Seyedeh Leili Khaneghah, Ehsan Mousavi Grandinetti, Lucio Sharifi, Mohsen Center of High Performance Computing for Parallel and Distributed Processing University of Calabria Rende Italy School of Computer Engineering Iran University of Science and Technology Tehran Iran
High-performance computing (HPC) clusters are currently faced with two major challenges - namely, the dynamic nature of new generation of applications and the heterogeneity of platforms - if they are going to be usefu... 详细信息
来源: 评论
Consumerisation of IT: Mitigating Risky User Actions and Improving Productivity with Nudging
收藏 引用
Procedia Technology 2014年 16卷 508-517页
作者: Iryna Yevseyeva Charles Morisset James Turland Lynne Coventry Thomas Groß Christopher Laing Aad van Moorsel Centre for Cybercrime and Computer Security School of Computing Science Newcastle University Newcastle-upon-Tyne NE1 7RU United Kingdom Psychology and Communication Technology Laboratory School of Health & Life Sciences Northumbria University Newcastle-upon-Tyne NE1 8ST United Kingdom Faculty of Engineering and Environment Department of Computer Science Northumbria University Newcastle-upon-Tyne NE1 8ST United Kingdom
In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behav... 详细信息
来源: 评论
An Automatic Generation of Textual Pattern Rules for Digital Content Filters Proposal, Using Grammatical Evolution Genetic Programming
收藏 引用
Procedia Technology 2014年 16卷 806-812页
作者: Vitor Basto-Fernandes Iryna Yevseyeva Rafael Z. Frantz Carlos Grilo Noemí Pérez Díaz Michael Emmerich School of Technology and Management Computer Science and Communications Research Centre Polytechnic Institute of Leiria 2411-901 Leiria Portugall Centre for Cybercrime and Computer Security School of Computing Science Newcastle University Newcastle-upon-Tyne NE1 7RU UK UNIJUÍ University Department of Exact Sciences and Engineering Rua Lulu Ilgenfritz 480 - Bairro São Geraldo 98700-000 Ijuí RS Brazil University of Vigo Campus As Lagoas S/N 32004 Ourense Spain LIACS Leiden University 2333CA Leiden The Netherlands
This work presents a conceptual proposal to address the problem of intensive human specialized resources that are nowadays required for the maintenance and optimized operation of digital contents filtering in general ... 详细信息
来源: 评论
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt"
Relations among privacy notions for signcryption and key inv...
收藏 引用
18th Australasian Conference on Information Security and Privacy, ACISP 2013
作者: Wang, Yang Manulis, Mark Au, Man Ho Susilo, Willy Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Department of Computing University of Surrey United Kingdom
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and publ... 详细信息
来源: 评论
Informatization construction of moral education curriculum resources in schools and universities
Informatization construction of moral education curriculum r...
收藏 引用
IEEE Workshop on Electronics, computer and Applications (IWECA)
作者: Shardrom Johnson Jue Gao Minjie Bian Daniel Hsu Jiajin Yuan Ye Zhou Shanghai Municipal Education Commission Information Centre Shanghai Peoples Republic of China School of Computer Engineering and Science Shanghai University Shanghai Peoples Republic of China Computing Center Shanghai University Shanghai Peoples Republic of China College of Electronic and Electrical Engineering Shanghai University of Engineering Science Shanghai Peoples Republic of China Moral Education Department Shanghai Municipal Education Commission Shanghai Peoples Republic of China
To further promote the integration and overall planning of moral education curriculum resources, and enhance the efficiency of moral education continuity in schools and universities, the project of “Shanghai Platform... 详细信息
来源: 评论
An enhanced routing algorithm for congestion control in a home energy management system
An enhanced routing algorithm for congestion control in a ho...
收藏 引用
2013 IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013
作者: Liu, Qi Qian, Hong Wei Wang, Bao Wei Shen, Jian Linge, Nigel Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China School of Computing Science and Engineering University of Salford Salford United Kingdom
Wireless communication is well used in home energy management systems (HEMS). ZigBee, as a typical example helps to achieve cheap and fast deployment, but also brings resource limits and performance issues. An enhance... 详细信息
来源: 评论
Secure RFID ownership transfer protocols
Secure RFID ownership transfer protocols
收藏 引用
9th International Conference on Information Security Practice and Experience, ISPEC 2013
作者: Li, Nan Mu, Yi Susilo, Willy Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia Department of Computing Faculty of Science Macquarie University Sydney NSW Australia
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validity of the current ... 详细信息
来源: 评论