咨询与建议

限定检索结果

文献类型

  • 49 篇 会议
  • 30 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 80 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53 篇 工学
    • 44 篇 计算机科学与技术...
    • 32 篇 软件工程
    • 11 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 6 篇 生物工程
    • 5 篇 电气工程
    • 4 篇 光学工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 核科学与技术
  • 30 篇 理学
    • 21 篇 数学
    • 9 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 4 篇 物理学
    • 3 篇 系统科学
  • 12 篇 管理学
    • 7 篇 图书情报与档案管...
    • 5 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 data mining
  • 4 篇 visualization
  • 3 篇 image fusion
  • 3 篇 feature extracti...
  • 3 篇 steganography
  • 2 篇 fuzzy logic
  • 2 篇 statistics
  • 2 篇 convolution
  • 2 篇 optimization
  • 2 篇 multimedia commu...
  • 2 篇 computational mo...
  • 2 篇 media
  • 2 篇 predictive model...
  • 2 篇 event detection
  • 2 篇 time series anal...
  • 2 篇 mobile communica...
  • 2 篇 clustering algor...
  • 2 篇 interpolation
  • 2 篇 measurement
  • 2 篇 data models

机构

  • 7 篇 college of compu...
  • 4 篇 shenzhen key lab...
  • 4 篇 college of compu...
  • 4 篇 department of co...
  • 3 篇 engineering rese...
  • 3 篇 state key labora...
  • 3 篇 school of comput...
  • 3 篇 college of compu...
  • 2 篇 school of inform...
  • 2 篇 college of artif...
  • 2 篇 school of softwa...
  • 2 篇 markany inc. 10f...
  • 2 篇 department of di...
  • 2 篇 school of creati...
  • 2 篇 college of infor...
  • 2 篇 shenzhen key lab...
  • 2 篇 software enginee...
  • 2 篇 natural language...
  • 2 篇 jiangsu key labo...
  • 2 篇 department of co...

作者

  • 3 篇 huang jiwu
  • 3 篇 tan shunquan
  • 3 篇 kim jongweon
  • 3 篇 byun youngbae
  • 2 篇 hae-chang rim
  • 2 篇 manickam adhiyam...
  • 2 篇 wang fushun
  • 2 篇 samuel r. dinesh...
  • 2 篇 zheng lu
  • 2 篇 liu niqi
  • 2 篇 wang bingshu
  • 2 篇 li changping
  • 2 篇 du xinxin
  • 2 篇 liu yong-jin
  • 2 篇 so-young park
  • 2 篇 haiwei pan
  • 2 篇 sun xiaohua
  • 2 篇 liu fang
  • 2 篇 zhou chao
  • 2 篇 luo weiqi

语言

  • 77 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=College of Computer Software and Media Technology"
80 条 记 录,以下是31-40 订阅
排序:
Blockchain Based System for Secure Production Information Management
Blockchain Based System for Secure Production Information Ma...
收藏 引用
Communication, Image and Signal Processing (CCISP), International Conference on
作者: Liu Yuanyuan Zhan Qianyi Xie Zhenping Liu Yuan College of Artificial Intelligence and Computer Jiangnan University WuXi China Jiangsu Key Laboratory of Media Design and Software Technology Jiangnan University WuXi China Jiangsu Key Laboratory of Media Design and Software Jiangnan University WuXi China
In the field of production, the collection, transmission, and storage of production information have a significant impact on production management. This paper proposes a blockchain-based secure production information ...
来源: 评论
Using pre-test to validate the Questionnaire for Website Usability (QWU)
Using pre-test to validate the Questionnaire for Website Usa...
收藏 引用
International Conference on software Engineering and computer Systems (ICSECS)
作者: Nur Sukinah Aziz Adzhar Kamaludin Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Pahang Malaysia Faculty of Computer Media and Technology Management TATI University College Kemaman Terengganu Malaysia
Usability is one of important criteria to measure website quality. One of the approaches to measure website usability is survey using questionnaire. The aim of this study is to validate the questionnaire instrument to... 详细信息
来源: 评论
Information security policy compliance behavior based on comprehensive dimensions of information security culture: A conceptual framework  17
Information security policy compliance behavior based on com...
收藏 引用
2017 International Conference on Information System and Data Mining, ICISDM 2017
作者: Nasir, Akhyari Arshah, Ruzaini Abdullah Ab Hamid, Mohd Rashid Faculty of Computer Media and Tech. Management TATI University College Teluk Kalong Kemaman Terengganu24000 Malaysia Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak Kuantan Pahang26300 Malaysia Faculty of Industrial Sciences and Technology Universiti Malaysia Pahang Lebuhraya Tun Razak Kuantan Pahang26300 Malaysia
The adherence of employees towards Information Security Policy (ISP) established in the organization is crucial in reducing information security risks. Some scholars have suggested that employees' compliance to IS... 详细信息
来源: 评论
Automatic Spelling Correction Rule Extraction and Application for Spoken-Style Korean Text
Automatic Spelling Correction Rule Extraction and Applicatio...
收藏 引用
International Conference on Advanced Language Processing and Web Information technology (ALPIT)
作者: JeungHyun Byun Hae-Chang Rim So-Young Park Natural Language Processing Laboratory Korea University Seoul South Korea College of Computer Software & Media Technology SangMyung University Seoul South Korea
Nowadays, spoken-style text is prevailing because lots of information are being written in spoken-style such as Short-Message-Service(SMS) messages. However, the spokenstyle text contains more spelling errors than the... 详细信息
来源: 评论
A New Approach for Korean Word Spacing Incorporating Confidence Value of User's Input
A New Approach for Korean Word Spacing Incorporating Confide...
收藏 引用
International Conference on Advanced Language Processing and Web Information technology (ALPIT)
作者: Seung-Wook Lee Hae-Chang Rim So-Young Park Natural Language Processing Laboratory Korea University Seoul South Korea College of Computer Software & Media Technology SangMyung University Seoul South Korea
One of the problems of automatic word spacers is that the spacer mis-corrects the correctly spaced user's input. In this paper, we propose a new approach of estimating the confidence of user's input and incorp... 详细信息
来源: 评论
Transaction-centric split synchronization mechanism for mobile e-business applications
Transaction-centric split synchronization mechanism for mobi...
收藏 引用
International Workshop on Data Engineering Issues in E-Commerce, DEEC
作者: Mi-Seon Choi Young-Kuk Kim Juno Chang Computer Science Department Woosong University Daejeon South Korea Computer Science Department Chungnam National University Daejeon South Korea College of Computer Software and Media Technology Sangmyung University South Korea
A mobile e-business client application may intentionally operate in disconnected mode to reduce the communication cost and the power consumption of mobile devices. We use "data hoarding" to allow business tr... 详细信息
来源: 评论
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security  24
GAN-based Symmetric Embedding Costs Adjustment for Enhancing...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ye, Miaoxin Zhou, Saixing Luo, Weiqi Tan, Shunquan Huang, Jiwu Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou China Shenzhen Key Laboratory of Media Security College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University Shenzhen China
Designing embedding costs is pivotal in modern image steganography. Many studies have shown adjusting symmetric embedding costs to asymmetric ones can enhance steganographic security. However, most existing methods he... 详细信息
来源: 评论
A Beautiful Story behind the Battle of Privacy
A Beautiful Story behind the Battle of Privacy
收藏 引用
IEEE International Conference on Internet of Things
作者: Tianyuan Liu Guoyun Li Yaozhi Zhang Yuqing Sum School of Computer Science and Technology Shandong University Jinan China Software College Shandong University JinanChina Engineering Research Center of Digital Media Technology Ministry of Education of PRC
Mobile intelligent devices are widely used in our daily lives. User private information can be easily accessed by mobile apps, which are facing fierce threats. Although Android offers a native permission mechanism and... 详细信息
来源: 评论
An End-to-End Graph Attention Network Hashing for Cross-Modal Retrieval  38
An End-to-End Graph Attention Network Hashing for Cross-Moda...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Jin, Huilong Zhang, Yingxue Shi, Lei Zhang, Shuang Kou, Feifei Yang, Jiapeng Zhu, Chuangying Luo, Jia College of Engineering Hebei Normal University China College of Computer and Cyber Security Hebei Normal University China State Key Laboratory of Media Convergence and Communication Communication University of China China Key Laboratory of Education Informatization for Nationalities Yunnan Normal University Ministry of Education China School of Computer Science Beijing University of Posts and Telecommunications China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology China Chongqing Research Institute Beijing University of Technology China
Due to its low storage cost and fast search speed, cross-modal retrieval based on hashing has attracted widespread attention and is widely used in real-world applications of social media search. However, most existing...
来源: 评论
Semi-fragile watermarking based on dither modulation
Semi-fragile watermarking based on dither modulation
收藏 引用
5th Pacific Rim Conference on Multimedia, PCM 2004
作者: Kim, Jongweon Byun, Youngbae College of Computer Software and Media Technology Sangmyung University 7 Hongji-dong Jongno-gu Seoul110-743 Korea Republic of MarkAny Inc. 10F Ssanglim Bldg. 151-11 Ssanglim-dong Jung-gu Seoul100-400 Korea Republic of
In this paper, a semi-fragile watermarking algorithm is proposed to prevent images from being altered, based on dither modulation and linearity of discrete cosine transform (DCT). As the algorithm transforms DCT coeff... 详细信息
来源: 评论