咨询与建议

限定检索结果

文献类型

  • 29 篇 期刊文献
  • 18 篇 会议
  • 6 册 图书

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28 篇 工学
    • 21 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 化学工程与技术
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 18 篇 理学
    • 12 篇 数学
    • 9 篇 物理学
    • 5 篇 化学
    • 3 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 农学

主题

  • 5 篇 programming tech...
  • 4 篇 theory of comput...
  • 4 篇 information syst...
  • 4 篇 mathematics of c...
  • 4 篇 computer imaging...
  • 4 篇 computer systems...
  • 3 篇 software enginee...
  • 3 篇 graphics process...
  • 2 篇 public key crypt...
  • 2 篇 deep learning
  • 2 篇 cognitive comput...
  • 2 篇 elliptic curve c...
  • 2 篇 instruments
  • 2 篇 informatics
  • 2 篇 computer communi...
  • 2 篇 denotational mat...
  • 2 篇 computational in...
  • 2 篇 laboratories
  • 2 篇 predictive model...
  • 2 篇 cognitive inform...

机构

  • 4 篇 computer science...
  • 4 篇 school of comput...
  • 4 篇 caep software ce...
  • 4 篇 institute for hi...
  • 4 篇 informatics inst...
  • 3 篇 school of inform...
  • 2 篇 school of mathem...
  • 2 篇 center for high ...
  • 2 篇 shanghaitech lab...
  • 2 篇 department of ps...
  • 2 篇 shanghai key lab...
  • 2 篇 computational sy...
  • 2 篇 school of physic...
  • 2 篇 state key labora...
  • 2 篇 beijing key lab ...
  • 2 篇 university of ch...
  • 2 篇 centre for distr...
  • 2 篇 laboratory of co...
  • 2 篇 institute of app...
  • 2 篇 computational an...

作者

  • 4 篇 peter m. a. sloo...
  • 4 篇 alexander v. bog...
  • 4 篇 jack j. dongarra
  • 4 篇 david abramson
  • 4 篇 albert y. zomaya
  • 4 篇 yuriy e. gorbach...
  • 3 篇 yingxu wang
  • 2 篇 stephanides geor...
  • 2 篇 škraba andrej
  • 2 篇 george stephanid...
  • 2 篇 zhang yan
  • 2 篇 wang yuanqing
  • 2 篇 henry michael m.
  • 2 篇 shaidurov vladim...
  • 2 篇 semenkin eugene
  • 2 篇 konstantinos cha...
  • 2 篇 chen zhi x.
  • 2 篇 stephanides g.
  • 2 篇 kovalev igor
  • 2 篇 mao runze

语言

  • 51 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Computational Systems and Software Engineering Laboratory"
53 条 记 录,以下是31-40 订阅
排序:
An agent-based simulation study of a complex adaptive collaboration network  13
An agent-based simulation study of a complex adaptive collab...
收藏 引用
Simulation Winter Conference
作者: Özgür Özmen Jeffrey Smith Levent Yilmaz Computational Sciences and Engineering Division Oak Ridge National Laboratory Oak Ridge TN USA Industrial and Systems Engineering Auburn University Auburn AL USA Computer Science and Software Engineering Auburn University Auburn AL USA
One of the most significant problems in organizational scholarship is to discern how social collectives govern, organize, and coordinate the actions of individuals to achieve collective outcomes. The collectives are u... 详细信息
来源: 评论
Human genome meeting 2016 : Houston, TX, USA. 28 February - 2 March 2016
收藏 引用
Human genomics 2016年 第1期10 Suppl 1卷 12页
作者: A. K. Srivastava Y. Wang R. Huang C. Skinner T. Thompson L. Pollard T. Wood F. Luo R. Stevenson R. Polimanti J. Gelernter X. Lin I. Y. Lim Y. Wu A. L. Teh L. Chen I. M. Aris S. E. Soh M. T. Tint J. L. MacIsaac F. Yap K. Kwek S. M. Saw M. S. Kobor M. J. Meaney K. M. Godfrey Y. S. Chong J. D. Holbrook Y. S. Lee P. D. Gluckman N. Karnani A. Kapoor D. Lee A. Chakravarti C. Maercker F. Graf M. Boutros G. Stamoulis F. Santoni P. Makrythanasis A. Letourneau M. Guipponi N. Panousis M. Garieri P. Ribaux E. Falconnet C. Borel S. E. Antonarakis S. Kumar J. Curran J. Blangero S. Chatterjee J. Akiyama D. Auer C. Berrios L. Pennacchio T. R. Donti G. Cappuccio M. Miller P. Atwal A. Kennedy A. Cardon C. Bacino L. Emrick J. Hertecant F. Baumer B. Porter M. Bainbridge P. Bonnen B. Graham R. Sutton Q. Sun S. Elsea Z. Hu P. Wang Y. Zhu J. Zhao M. Xiong David A. Bennett A. Hidalgo-Miranda S. Romero-Cordoba S. Rodriguez-Cuevas R. Rebollar-Vega E. Tagliabue M. Iorio E. D’Ippolito S. Baroni B. Kaczkowski Y. Tanaka H. Kawaji A. Sandelin R. Andersson M. Itoh T. Lassmann Y. Hayashizaki P. Carninci A. R. R. Forrest C. A. Semple E. A. Rosenthal B. Shirts L. Amendola C. Gallego M. Horike-Pyne A. Burt P. Robertson P. Beyers C. Nefcy D. Veenstra F. Hisama R. Bennett M. Dorschner D. Nickerson J. Smith K. Patterson D. Crosslin R. Nassir N. Zubair T. Harrison U. Peters G. Jarvik F. Menghi K. Inaki X. Woo P. Kumar K. Grzeda A. Malhotra H. Kim D. Ucar P. Shreckengast K. Karuturi J. Keck J. Chuang E. T. Liu B. Ji A. Tyler G. Ananda G. Carter H. Nikbakht M. Montagne M. Zeinieh A. Harutyunyan M. Mcconechy N. Jabado P. Lavigne J. Majewski J. B. Goldstein M. Overman G. Varadhachary R. Shroff R. Wolff M. Javle A. Futreal D. Fogelman L. Bravo W. Fajardo H. Gomez C. Castaneda C. Rolfo J. A. Pinto K. C. Akdemir L. Chin S. Patterson C. Statz S. Mockus S. N. Nikolaev X. I. Bonilla L. Parmentier B. King F. Bezrukov G. Kaya V. Zoete V. Seplyarskiy H. Sharpe T. McKee K. Popadin N. Basset-Seguin R. Ben Chaabene M. Andrianova C. Verdan K. Grosdemange O. Sumara M. E JCSRI Greenwood Genetic Center Greenwood USA School of Computing Clemson University Clemson USA Biochemical Genetics Laboratory Greenwood Genetic Center Greenwood USA Department Psychiatry Yale Sch Med and VA CT Healthcare Center West Haven USA Department Genetics Yale Sch Med and VA CT Healthcare Center West Haven USA Department Neurobiology Yale Sch Med and VA CT Healthcare Center West Haven USA Singapore Institute for Clinical Sciences Singapore Singapore National University of Singapore Singapore Singapore University of British Columbia Vancouver Canada KK Women’s and Children’s Hospital Singapore Singapore University of Southampton and University Hospital Southampton NHS Foundation Trust Southampton UK University of Auckland Auckland New Zealand McKusick-Nathans Institute of Genetic Medicine Johns Hopkins University School of Medicine Baltimore USA Esslingen University of Applied Sciences Esslingen Germany German Cancer Research Center Heidelberg Germany Department of Genetic Medicine and Development University of Geneva Medical School Geneva Switzerland Geneva University Hospitals-HUG Service of Genetic Medicine Geneva Switzerland GE3 Institute of Genetics and Genomics of Geneva University of Geneva Medical School Geneva Switzerland South Texas Diabetes and Obesity Institute School of Medicine University of Texas Rio-Grande Valley Edinburg USA South Texas Diabetes and Obesity Institute School of Medicine University of Texas Rio-Grande Valley Brownsville USA Institute of Genetic Medicine Johns Hopkins University Baltimore USA Genomics Division Lawrence Berkeley National Laboratory Berkeley USA Molecular and Human Genetics Baylor College of Medicine Houston USA Department of Translational Medical Sciences Federico II University Naples Italy Metabolon Inc Durham USA Section of Pediatric Neurology and Neuroscience Baylor College of Medicine Houston USA Tawam Hospital Abu Dhabi United Arab Emirates Stanford Medical School Stanford USA Sch
O1 The metabolomics approach to autism: identification of biomarkers for early detection of autism spectrum disorder A. K. Srivastava, Y. Wang, R. Huang, C. Skinner, T. Thompson, L. Pollard, T. Wood, F. Luo, R. Steven... 详细信息
来源: 评论
Practical implementation of identity based encryption for secure e-mail communication
Practical implementation of identity based encryption for se...
收藏 引用
Pan-Hellenic Conference on Informatics
作者: Kihidis, Anastasios Chalkias, Konstantinos Stephanides, George Department of Applied Informatics Computational Systems and Software Engineering Laboratory University of Macedonia Thessaloniki Greece
Identity Based Encryption (IBE) constitutes an alternative cryptographic method to the conventional public key systems. The main feature of IBE is that public keys are not transmitted over the network, but they are ef... 详细信息
来源: 评论
Practical Implementation of Identity Based Encryption for Secure E-mail Communication
Practical Implementation of Identity Based Encryption for Se...
收藏 引用
Panhellenic Conference on Informatics (PCI)
作者: Anastasios Kihidis Konstantinos Chalkias George Stephanides Computational Systems and Software Engineering Laboratory Department of Applied Informatics University of Macedonia Thessaloniki Greece
Identity Based Encryption (IBE) constitutes an alternative cryptographic method to the conventional public key systems. The main feature of IBE is that public keys are not transmitted over the network, but they are ef... 详细信息
来源: 评论
Reports of the AAAI 2010 conference workshops
Reports of the AAAI 2010 conference workshops
收藏 引用
作者: Aha, David W. Boddy, Mark Bulitko, Vadim D'Avila Garcez, Artur S. Doshi, Prashant Edelkamp, Stefan Geib, Christopher Gmytrasiewicz, Piotr Goldman, Robert P. Halevy, Alon Hitzler, Pascal Isbell, Charles Josyula, Darsana Kaelbling, Leslie Pack Kersting, Kristian Kunda, Maithilee Lamb, Luis C. Marthi, Bhaskara McGreggor, Keith Mihalkova, Lilyana Nastase, Vivi Natarajan, Sriraam Provan, Gregory Raja, Anita Ram, Ashwin Riedl, Mark Russell, Stuart Sabharwal, Ashish Smaus, Jan-Georg Sukthankar, Gita Tuyls, Karl Van Der Meyden, Ron Adaptive Systems Section Naval Research Laboratory Washington DC United States Adventium Labs. Minneapolis MN United States Department of Computer Science University of Alberta Canada City University London United Kingdom University of Georgia United States University of Bremen Germany School of Informatics University of Edinburgh United Kingdom University of Illinois Chicago United States Smart Information Flow Technologies LLC Minneapolis MN United States Structured Data Group Google Research United States Department of Computer Science Wright State University Dayton OH United States School of Interactive Computing Georgia Institute of Technology Atlanta GA United States Department of Computer Science Bowie State University United States Department of Computer Science and Engineering Massachusetts Institute of Technology United States Statistical Relational Mining Group Fraunhofer IAIS Germany Department of Computer Science Federal University of Rio Grande Do sul Brazil Willow Garage Inc. CA United States Computer Science Department University of Maryland College Park United States Heidelberg Institute for Theoretical Studies Heidelberg Germany Department of Computer Science University of Wisconsin Madison United States University College Cork Ireland Cork Complex Systems Lab. Ireland Department of Software and Information Systems University of North Carolina Charlotte United States Department of Computer Science and Engineering University of California Berkeley United States Department of Computer Science Cornell University United States Institute for Computational Sustainability United States University of Freiburg Germany School of Electrical Engineering and Computer Science University of Central Florida United States Maastricht University Netherlands University of New South Wales NICTA Australia
The AAAI-10 workshop program was held on July 11-12, 2010, at the Westin Peachtree Plaza in Atlanta, Georgia. The workshop program included 13 workshops covering a wide range of topics in artificial intelligence. Ther... 详细信息
来源: 评论
Comparing Commercial Tools and State-of-the-Art Methods for Generating Text Summaries
Comparing Commercial Tools and State-of-the-Art Methods for ...
收藏 引用
Mexican International Conference on Artificial Intelligence, MICAI
作者: René Arnulfo García-Hernández Yulia Ledeneva Griselda Matías Mendoza Ángel Hernández Dominguez Jorge Chavez Alexander Gelbukh José Luis Tapia Fabela Software Engineering Department Autonomous University of the State of Mexico Santiago Tianguistenco Mexico Computer Science Department Juarez Autonomous University of Tabasco Mexico Computational Systems Engineering Iguala Institute of Technology Iguala Guerrero Mexico Natural Language Laboratory National Polytechnic Institute CIC Mexico
Nowadays, there are commercial tools that allow automatic generation of text summaries. However, it is not known the quality of the generated summaries and the method that it is used for the generation of the summarie... 详细信息
来源: 评论
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Two types of key-compromise impersonation attacks against on...
收藏 引用
作者: Chalkias, K. Baldimtsi, F. Hristu-Varsakelis, D. Stephanides, G. Computational Systems and Software Engineering Laboratory Department of Applied Informatics University of Macedonia 156 Egnatia St. Thessaloniki Greece
Key establishment protocols are among the most important security mechanisms via which two or more parties can encrypt their communications over an insecure network. This paper is concerned with the vulnerability of o... 详细信息
来源: 评论
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography
An Implementation Infrastructure for Server-Passive Timed-Re...
收藏 引用
International Symposium on Information Assurance and Security (IAS)
作者: Konstantinos Chalkias Foteini Baldimtsi Dimitrios Hristu-Varsakelis George Stephanides Computational Systems and Software Engineering Laboratory Department of Applied Informatics University of Macedonia Thessaloniki Greece
As online transactions become increasingly practical, a broad range of industrial and e-government applications have emerged which depend on time-based protection of confidential data. Despite theoretical progress in ... 详细信息
来源: 评论
Low-cost anonymous timed-release encryption
Low-cost anonymous timed-release encryption
收藏 引用
3rd Internationl Symposium on Information Assurance and Security, IAS 2007
作者: Hristu-Varsakelis, D. Chalkias, K. Stephanides, G. University of Macedonia Department of Applied Informatics Computational Systems and Software Engineering Laboratory Thessaloniki Greece
We propose a new server-based efficient protocol for time-release encryption (TRE), or - as sometimes referred to -sending information "into the future". As with other recently-proposed schemes, ours is base... 详细信息
来源: 评论
Low-cost Anonymous Timed-Release Encryption
Low-cost Anonymous Timed-Release Encryption
收藏 引用
International Symposium on Information Assurance and Security (IAS)
作者: D. Hristu-Varsakelis K. Chalkias G. Stephanides Department of Applied Informatics Computational Systems and Software Engineering Laboratory University of Macedonia Thessaloniki Greece
We propose a new server-based efficient protocol for time-release encryption (TRE), or - as sometimes referred to - sending information "into the future". As with other recently-proposed schemes, ours is bas... 详细信息
来源: 评论