咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 22 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 9 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 7 篇 理学
    • 5 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 2 篇 mixed reality
  • 2 篇 costs
  • 2 篇 cryptography
  • 2 篇 heuristic algori...
  • 1 篇 covid-19
  • 1 篇 computer science
  • 1 篇 conferences
  • 1 篇 accuracy estimat...
  • 1 篇 cyberinfrastruct...
  • 1 篇 computer network...
  • 1 篇 segmentation
  • 1 篇 energy resolutio...
  • 1 篇 routing
  • 1 篇 deep learning
  • 1 篇 multicast algori...
  • 1 篇 data centers
  • 1 篇 pain
  • 1 篇 magnetic resonan...
  • 1 篇 abnormality dete...
  • 1 篇 virtual organiza...

机构

  • 3 篇 computer system ...
  • 2 篇 master of inform...
  • 2 篇 comp sc. and com...
  • 2 篇 computer sc. eng...
  • 2 篇 adamas universit...
  • 1 篇 energy res grp o...
  • 1 篇 computer sc. & i...
  • 1 篇 university of il...
  • 1 篇 natl sci fdn was...
  • 1 篇 puerto rico nucl...
  • 1 篇 dept intern med ...
  • 1 篇 sch civil & env ...
  • 1 篇 stn dept agron p...
  • 1 篇 int gas technol
  • 1 篇 union elec co st...
  • 1 篇 department of tr...
  • 1 篇 dept chem engn p...
  • 1 篇 environmental re...
  • 1 篇 dept chem engn u...
  • 1 篇 univ calif santa...

作者

  • 2 篇 saiteja veeramal...
  • 2 篇 vivek tanniru
  • 2 篇 tathagata bhatta...
  • 2 篇 bhupesh rawat
  • 2 篇 ankur singh bist
  • 2 篇 biswas ankur
  • 1 篇 leich harold h.
  • 1 篇 bruce r. r.
  • 1 篇 may g. a.
  • 1 篇 klein david h.
  • 1 篇 dougal merwin d.
  • 1 篇 pisano mark a.
  • 1 篇 r budiarto
  • 1 篇 eaton david
  • 1 篇 brewer max c.
  • 1 篇 seifer william w...
  • 1 篇 duncan donald m.
  • 1 篇 herricks edwin e...
  • 1 篇 kverno nelson b.
  • 1 篇 rosentraub mark ...

语言

  • 22 篇 英文
检索条件"机构=Comp Sc. and Computer Information System"
22 条 记 录,以下是1-10 订阅
排序:
A Survey on Retrieving Confidential Data Using Phishing Attack
A Survey on Retrieving Confidential Data Using Phishing Atta...
收藏 引用
2023 Congress in computer sc.ence, computer Engineering, and Applied computing, Csc. 2023
作者: Bhattacharya, Tathagata Veeramalla, Saiteja Tanniru, Vivek Auburn University at Montgomery Comp Sc. and Computer Information System Montgomery United States
Internet technology has improved the lives of individuals in a multitude of manners due to its broad use, namely social media sites and banking. Because of the advancement of Internet technologies, security threats to... 详细信息
来源: 评论
Enhancing the Energy Efficiency with DURGA, a Novel Geographical Load Balancer
Enhancing the Energy Efficiency with DURGA, a Novel Geograph...
收藏 引用
Cluster, Cloud and Internet computing Workshops (CCGridW), IEEE/ACM International Symposium on
作者: Tathagata Bhattacharya Vivek Tanniru Subhashis Majumder Saiteja Veeramalla Comp Sc. and Computer Information System Auburn University at Montgomery Montgomery USA Comp Sc. and Engineering Heritage Institute of Technology Kolkta India
The increasing energy consumption in cloud-based systems has led to concerns about the environmental impact and cost-effectiveness of such cloud-based systems. To address this issue, researchers have proposed various ... 详细信息
来源: 评论
A Survey on Retrieving Confidential Data Using Phishing Attack
A Survey on Retrieving Confidential Data Using Phishing Atta...
收藏 引用
computer sc.ence, computer Engineering, & Applied computing (Csc.), Congress in
作者: Tathagata Bhattacharya Saiteja Veeramalla Vivek Tanniru Comp Sc. and Computer Information System Auburn University at Montgomery Montgomery USA
Internet technology has improved the lives of individuals in a multitude of manners due to its broad use, namely social media sites and banking. Because of the advancement of Internet technologies, security threats to...
来源: 评论
Novel Framework to Define Extended & Mixed Reality for Online Learning  4
Novel Framework to Define Extended & Mixed Reality for Onlin...
收藏 引用
4th International Conference on Cybernetics and Intelligent system, ICORIS 2022
作者: Rawat, Bhupesh Bist, Ankur Singh Rahardja, Untung Harahap, Eka Purnama Septian, Rafly Ananda Dwi Computer Sc. Engg Graphic Era Hill University Uttarakhand India Master of Information Technology University of Raharja Tangerang Indonesia Computer System University of Raharja Tangerang Indonesia
COVID-19 has taken educational protocols to different track. Online education is the way to execute process smoothly. There are various tools that are providing services to fill the pain points. Role of emerging techn... 详细信息
来源: 评论
Proposing a Novel Framework for Prediction of Stock using Machine Learning
Proposing a Novel Framework for Prediction of Stock using Ma...
收藏 引用
International Conference on Cyber and IT Service Management (CITSM)
作者: Ankur Singh Bist Bhupesh Rawat Sandy Kosasi Qurotul Aini Fitra Putri Oganda Ahmad Bayu Yadila Computer Sc. & engg. Graphic Era Hill University Uttarakhand India Faculty of Informatics Engineering STMIK Pontianak West Kalimantan Indonesia Information System University of Raharja Tangerang Indonesia Computer System University of Raharja Tangerang Indonesia
Stock prices are highly volatile, dynamic, and non-linear, making it very difficult to predict the exact price at any given time. In addition, stock prices are influenced by several factors, such as political conditio...
来源: 评论
Implementation of Cyber Security for Enabling Data Protection Analysis and Data Protection using Robot Key Homomorphic Encryption  6
Implementation of Cyber Security for Enabling Data Protectio...
收藏 引用
6th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2022
作者: Biswas, Ankur Karan, Ashish Nigam, Nidhi Doreswamy, Hema Sadykanova, Serikkhan Rauliyevna, Mangazina Zhanel Adamas University Dept. of Comp. Sc. & Engg. Kolkata India Computer Science Independent Researcher and Government Officer Delhi India Computer Science and Information Technology Rajiv Gandhi Proudyogiki Vishwavidyalaya' India Welingkar Institute of Management India International Education Corporation Department of Linguistics Almaty Kazakhstan
Cloud computing plays major role in the development of accessing clouduser's document and sensitive information stored. It has variety of content and representation. Cyber security and attacks in the cloud is a ch... 详细信息
来源: 评论
Novel Framework to Define Extended & Mixed Reality for Online Learning
Novel Framework to Define Extended & Mixed Reality for Onlin...
收藏 引用
International Conference on Cybernetics and Intelligent system (ICORIS)
作者: Bhupesh Rawat Ankur Singh Bist Untung Rahardja Eka Purnama Harahap Rafly Ananda Dwi Septian Computer Sc. Engg Graphic Era Hill University Uttarakhand India Master of Information Technology University of Raharja Tangerang Indonesia Computer System University of Raharja Tangerang Indonesia
COVID-19 has taken educational protocols to different track. Online education is the way to execute process smoothly. There are various tools that are providing services to fill the pain points. Role of emerging techn... 详细信息
来源: 评论
Automated Banking Fraud Detection for Identification and Restriction of Unauthorised Access in Financial Sector  3
Automated Banking Fraud Detection for Identification and Res...
收藏 引用
3rd International Conference on Smart Electronics and Communication, ICOSEC 2022
作者: Biswas, Ankur Deol, Ramandeep Singh Jha, Barun Kumar Jakka, Geethamanikanta Suguna, M. Raja Thomson, Benjamin Isaac Adamas University Dept. of Comp. Sc. & Engg. Kolkata India Lkctc Dept. Management Jalandhar India University of Delhi Department of Commerce Atma Ram Sanatan Dharma College India University of the Cumberlands Information Technology United States Computer Science and Engineering R.M.K. College Engineering and Technology India BTech Biotechnology Sathyabama Institute of Science and Technology India
Modern techniques have allowed for using advanced technology and tools in order detect fraud within an organisation. It is essential for any Banking sector or financial sector to identify those fraudulent activities t... 详细信息
来源: 评论
KeySED:An Efficient Keyword based Search over Encrypted Data in Cloud Environment  5
KeySED:An Efficient Keyword based Search over Encrypted Data...
收藏 引用
5th International Conference on Data sc.ence and Engineering, ICDSE 2019
作者: Dhal, Kasturi Rai, Satyananda Champati Pattnaik, Prasant Kumar Tripathy, Somanath Silicon Institute of Technology Dept. of Comp. Sc. and Engg. Bhubaneswar India Silicon Institute of Technology Dept. of Information Technology Bhubaneswar India School of Computer Engineering KIIT University Bhubaneswar India Indian Institute of Technology Dept. of Comp. Sc. and Engg. Patna Bihta India
To maintain confidentiality of certain specific data, it is required to encrypt the data by using Ciphertext-Policy Attribute-Based Encryption (CPABE) mechanism, before its upload onto a untrusted cloud server. Moreov... 详细信息
来源: 评论
Participant selection problem - Relative performance of five optimization solvers  17
Participant selection problem - Relative performance of five...
收藏 引用
8th International Conference on computer Modeling and Simulation, ICCMS 2017
作者: Lin, C.Y. Liu, J.W.S. Yeh, K.L. Chu, E.T.H. Department of Computer Science Tsing Hua University Hsinchu Taiwan Institute of Information Science Academia Sinica Nangang Taipei Taiwan Dept. of Comp. Sci. and Info. Eng. Yunlin Univ. of Sc. and Technology Yunlin Taiwan
This paper presents integer linear programming formulations of four variants of the participant selection problem (PSP) that we may encounter in likely disaster sc.narios. An evaluation study was carried out to get da... 详细信息
来源: 评论