咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 31 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 82 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 45 篇 计算机科学与技术...
    • 33 篇 软件工程
    • 11 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 6 篇 生物工程
    • 5 篇 电气工程
    • 3 篇 光学工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 核科学与技术
  • 29 篇 理学
    • 21 篇 数学
    • 9 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 3 篇 物理学
    • 3 篇 系统科学
  • 13 篇 管理学
    • 7 篇 图书情报与档案管...
    • 6 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 data mining
  • 4 篇 visualization
  • 4 篇 steganography
  • 3 篇 image fusion
  • 3 篇 feature extracti...
  • 2 篇 fuzzy logic
  • 2 篇 statistics
  • 2 篇 convolution
  • 2 篇 optimization
  • 2 篇 multimedia commu...
  • 2 篇 computational mo...
  • 2 篇 media
  • 2 篇 predictive model...
  • 2 篇 event detection
  • 2 篇 time series anal...
  • 2 篇 mobile communica...
  • 2 篇 clustering algor...
  • 2 篇 interpolation
  • 2 篇 measurement
  • 2 篇 data models

机构

  • 7 篇 college of compu...
  • 4 篇 shenzhen key lab...
  • 4 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 department of co...
  • 3 篇 engineering rese...
  • 3 篇 school of comput...
  • 3 篇 college of compu...
  • 2 篇 school of inform...
  • 2 篇 college of artif...
  • 2 篇 school of softwa...
  • 2 篇 markany inc. 10f...
  • 2 篇 south china univ...
  • 2 篇 department of di...
  • 2 篇 college of compu...
  • 2 篇 school of creati...
  • 2 篇 college of infor...
  • 2 篇 shenzhen key lab...
  • 2 篇 software enginee...
  • 2 篇 natural language...

作者

  • 3 篇 huang jiwu
  • 3 篇 tan shunquan
  • 3 篇 kim jongweon
  • 3 篇 byun youngbae
  • 2 篇 hae-chang rim
  • 2 篇 manickam adhiyam...
  • 2 篇 wang fushun
  • 2 篇 samuel r. dinesh...
  • 2 篇 zheng lu
  • 2 篇 liu niqi
  • 2 篇 wang bingshu
  • 2 篇 li changping
  • 2 篇 du xinxin
  • 2 篇 liu yong-jin
  • 2 篇 so-young park
  • 2 篇 haiwei pan
  • 2 篇 sun xiaohua
  • 2 篇 liu fang
  • 2 篇 zhou chao
  • 2 篇 luo weiqi

语言

  • 78 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=College of Computer Software and Media Technology"
82 条 记 录,以下是41-50 订阅
排序:
An effective SVM-based active feedback framework for image retrieval
An effective SVM-based active feedback framework for image r...
收藏 引用
2017 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2017
作者: Rao, Yunbo Liu, Wei Wang, Shiqi Gou, Jianping He, Wu School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Computer Science and Telecommunications Engineering Jiangsu University Zhenjiang212013 China College of Movie and Media Sichuan Normal University Chengdu610068 China
Due to the time and hardware restriction, the amount of feedback information is limited in each image retrieval loop. To solve this problem, this paper proposes an effective relevance feedback (RF) method based on Sup... 详细信息
来源: 评论
Information security policy compliance behavior based on comprehensive dimensions of information security culture: A conceptual framework  17
Information security policy compliance behavior based on com...
收藏 引用
2017 International Conference on Information System and Data Mining, ICISDM 2017
作者: Nasir, Akhyari Arshah, Ruzaini Abdullah Ab Hamid, Mohd Rashid Faculty of Computer Media and Tech. Management TATI University College Teluk Kalong Kemaman Terengganu24000 Malaysia Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak Kuantan Pahang26300 Malaysia Faculty of Industrial Sciences and Technology Universiti Malaysia Pahang Lebuhraya Tun Razak Kuantan Pahang26300 Malaysia
The adherence of employees towards Information Security Policy (ISP) established in the organization is crucial in reducing information security risks. Some scholars have suggested that employees' compliance to IS... 详细信息
来源: 评论
WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images
arXiv
收藏 引用
arXiv 2018年
作者: Zeng, Jishen Tan, Shunquan Liu, Guangqing Li, Bin Huang, Jiwu Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Peng Cheng Laboratory Shenzhen518052 China
Until recently, deep steganalyzers in spatial domain have been all designed for gray-scale images. In this paper, we propose WISERNet (the wider separate-then-reunion network) for steganalysis of color images. We prov... 详细信息
来源: 评论
Towards ‘verifying’ a water treatment system
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Jingyi Jun, Sun Jia, Yifan Qin, Shengchao Xu, Zhiwu Singapore University of Technology and Design School of Computing Media and the Arts Teesside University College of Computer Science and Software Engineering Shenzhen University TUV-SUD Asia Pacific Pte Ltd Singapore
Modeling and verifying real-world cyber-physical systems is challenging, which is especially so for complex systems where manually modeling is infeasible. In this work, we report our experience on combining model lear... 详细信息
来源: 评论
Optimizing guidance for an active shooter event
Optimizing guidance for an active shooter event
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Sean Gunn Peter B. Luh Xuesong Lu Brock Hotaling College of Computer Science and Electronic Engineering Hunan University Changsha China Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Institute of Software Application Technology Guangzhou Branch of Institute of Software Chinese Academy of Science Guangzhou China
It is unclear what triggers the behavior of active shooters, but their consequences are severe. There is opportunity to implement an automated response system capable of delivery guidance to evacuees' to aide peop... 详细信息
来源: 评论
Guest editorial: Challenges of embedded systems as they evolve into M2M, internet of things
收藏 引用
ACM Transactions on Embedded Computing Systems 2016年 第2期15卷 1–2页
作者: Rho, Seungmin Rahayu, Wenny Min, Geyong Department of Media Software Sungkyul University Anyang-si Korea Republic of Department of Computer Science and Information Technology La Trobe University Australia College of Engineering Mathematics and Physical Sciences University of Exeter United Kingdom
With the rapid progress in information communication technology (ICT), multidisciplinary research fields such as Internet of Things (IoT), machine to machine (M2M), and embedded systems have been widely explored in re... 详细信息
来源: 评论
A Beautiful Story behind the Battle of Privacy
A Beautiful Story behind the Battle of Privacy
收藏 引用
IEEE International Conference on Internet of Things
作者: Tianyuan Liu Guoyun Li Yaozhi Zhang Yuqing Sum School of Computer Science and Technology Shandong University Jinan China Software College Shandong University JinanChina Engineering Research Center of Digital Media Technology Ministry of Education of PRC
Mobile intelligent devices are widely used in our daily lives. User private information can be easily accessed by mobile apps, which are facing fierce threats. Although Android offers a native permission mechanism and... 详细信息
来源: 评论
Coherent Photon Mapping on the Intel MIC Architecture
收藏 引用
Journal of computer Science & technology 2015年 第3期30卷 519-527页
作者: 康春萌 王璐 王佩 徐延宁 孟祥旭 School of Computer Science and Technology Shandong University Jinan 250101 China Engineering Research Center of Digital Media Technology Ministry of Education Jinan 250101 China Software College Shandong University Jinan 250101 China
Photon mapping is a global illumination algorithm which is composed of two steps: photon tracing and photon searching. During photon searching step, each shading point needs to search the photon-tree to find k-neighb... 详细信息
来源: 评论
Detecting Malicious Behavior and Collusion for Online Rating System
Detecting Malicious Behavior and Collusion for Online Rating...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Liu Cao Yuqing Sun Shaoqing Wang Mingzhu Li Ministry of Education of PRC Engineering Research Center of Digital Media Technology School of Computer Science and Technology Shandong University Jinan China Taishan College Shandong University Jinan China School of-Software Engineering Shandong University Jinan China
Since the collective ratings and reviews on an online rating system have a high influence on user decisions, there exist more and more fraudulent behaviors, such as "ballot stuffing" and "bad-mouthing&q... 详细信息
来源: 评论
Using pre-test to validate the Questionnaire for Website Usability (QWU)
Using pre-test to validate the Questionnaire for Website Usa...
收藏 引用
International Conference on software Engineering and computer Systems (ICSECS)
作者: Nur Sukinah Aziz Adzhar Kamaludin Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Pahang Malaysia Faculty of Computer Media and Technology Management TATI University College Kemaman Terengganu Malaysia
Usability is one of important criteria to measure website quality. One of the approaches to measure website usability is survey using questionnaire. The aim of this study is to validate the questionnaire instrument to... 详细信息
来源: 评论