咨询与建议

限定检索结果

文献类型

  • 7,423 篇 会议
  • 5,038 篇 期刊文献
  • 264 册 图书

馆藏范围

  • 12,725 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,849 篇 工学
    • 5,577 篇 计算机科学与技术...
    • 4,567 篇 软件工程
    • 1,876 篇 信息与通信工程
    • 1,338 篇 控制科学与工程
    • 954 篇 电气工程
    • 894 篇 生物工程
    • 766 篇 电子科学与技术(可...
    • 648 篇 生物医学工程(可授...
    • 607 篇 机械工程
    • 470 篇 光学工程
    • 392 篇 仪器科学与技术
    • 341 篇 动力工程及工程热...
    • 293 篇 安全科学与工程
    • 285 篇 交通运输工程
    • 265 篇 化学工程与技术
  • 3,999 篇 理学
    • 2,155 篇 数学
    • 1,002 篇 生物学
    • 934 篇 物理学
    • 745 篇 统计学(可授理学、...
    • 578 篇 系统科学
    • 313 篇 化学
  • 2,295 篇 管理学
    • 1,485 篇 管理科学与工程(可...
    • 896 篇 图书情报与档案管...
    • 765 篇 工商管理
  • 712 篇 医学
    • 614 篇 临床医学
    • 512 篇 基础医学(可授医学...
    • 294 篇 公共卫生与预防医...
    • 281 篇 药学(可授医学、理...
  • 414 篇 法学
    • 340 篇 社会学
  • 265 篇 经济学
    • 261 篇 应用经济学
  • 194 篇 教育学
  • 145 篇 农学
  • 41 篇 文学
  • 39 篇 艺术学
  • 34 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 366 篇 computer science
  • 329 篇 deep learning
  • 233 篇 machine learning
  • 214 篇 information syst...
  • 209 篇 computational mo...
  • 204 篇 feature extracti...
  • 181 篇 data mining
  • 168 篇 internet of thin...
  • 157 篇 artificial intel...
  • 144 篇 optimization
  • 134 篇 support vector m...
  • 131 篇 wireless sensor ...
  • 124 篇 software enginee...
  • 121 篇 predictive model...
  • 119 篇 neural networks
  • 119 篇 quality of servi...
  • 118 篇 educational inst...
  • 111 篇 computer archite...
  • 109 篇 application soft...
  • 109 篇 semantics

机构

  • 92 篇 school of comput...
  • 74 篇 school of comput...
  • 63 篇 school of comput...
  • 55 篇 information syst...
  • 47 篇 department of ma...
  • 45 篇 pillar of inform...
  • 44 篇 department of la...
  • 42 篇 the school of co...
  • 39 篇 department of co...
  • 37 篇 department of in...
  • 34 篇 school of comput...
  • 34 篇 the pillar of in...
  • 30 篇 school of inform...
  • 29 篇 school of comput...
  • 29 篇 department of in...
  • 29 篇 graduate school ...
  • 28 篇 ieee
  • 27 篇 department of co...
  • 26 篇 department of el...
  • 25 篇 school of comput...

作者

  • 110 篇 niyato dusit
  • 44 篇 bentahar jamal
  • 40 篇 arjan durresi
  • 39 篇 guo hong
  • 38 篇 leonard barolli
  • 36 篇 tao dacheng
  • 34 篇 abdelwahed motwa...
  • 31 篇 xiong zehui
  • 27 篇 shen xuemin
  • 26 篇 rajkumar buyya
  • 26 篇 han zhu
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 xiaohong jiang
  • 23 篇 kang jiawen
  • 22 篇 pedrycz witold
  • 21 篇 xu minrui
  • 20 篇 soni mukesh
  • 20 篇 lin iuon-chang
  • 20 篇 dusit niyato
  • 19 篇 tao yang

语言

  • 12,160 篇 英文
  • 451 篇 其他
  • 102 篇 中文
  • 21 篇 日文
  • 7 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
检索条件"机构=Computer Science and Information Systems Engineering"
12725 条 记 录,以下是4921-4930 订阅
排序:
Choose-your-own-adventure routing: Lightweight load-time defect avoidance
Choose-your-own-adventure routing: Lightweight load-time def...
收藏 引用
7th ACM SIGDA International Symposium on Field-Programmable Gate Arrays, FPGA'09
作者: Rubin, Raphael DeHon, André Computer and Information Science University of Pennsylvania 3330 Walnut Street Philadelphia PA 19104 United States Electrical and Systems Engineering University of Pennsylvania 200 S. 33rd Street Philadelphia PA 19104 United States
Aggressive scaling increases the number of devices we can integrate per square millimeter but makes it increasingly difficult to guarantee that each device fabricated has the intended operational characteristics. With... 详细信息
来源: 评论
Development of an Active Contour Method Based on Contrast Features to Detect Keratitis in the Cornea
Development of an Active Contour Method Based on Contrast Fe...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Wahyu Saptha Negoro Sumijan Saiful Bukhori Faculty of Engineering and Computer Science Universitas Potensi Utama Medan Indonesia Faculty of Engineering and Computer Science Universitas of UPI YPTK Padang Indonesia Faculty of Computer Science Information Systems Universitas of Jember Jember Indonesia
Digital Image Processing (DIP) is a scientific discipline with techniques for processing images using computers. The digital image is expressed in a two-dimensional matrix. The research object is keratitis on the corn... 详细信息
来源: 评论
Ciphertext-only fault analysis of GIFT lightweight cryptosystem
收藏 引用
science China(information sciences) 2022年 第3期65卷 263-265页
作者: Wei LI Shan CAO Dawu GU Jiayao LI Tianpei CAI Menglin WANG Li SUN Zhiqiang LIU Ya LIU School of Computer Science and Technology Donghua University Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Computing and Systems Shanghai Jiao Tong University Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai Jiao Tong University Department of Computer Science and Engineering University of Shanghai for Science and Technology
Dear editor,The GIFT cryptosystem was proposed by Banik et al. [1]in CHES 2017. It can be widely applied to protect RFID tags and other low-resource devices. It has an SPN structure with a fixed 128-bit key size and t... 详细信息
来源: 评论
Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review  2
Unveiling the Landscape of Machine Learning and Deep Learnin...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Saeed, Nouf Majid Sultan Eid Ibrahim, Amer Ali, Liaqat Al-Dmour, Nidal A. Mohammed, Abdul Salam Ghazal, Taher M. American University In The Emirates Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates College Of Engineering Mutah University Department Of Computer Engineering Jordan Skyline University College University City Sharjah Shariah United Arab Emirates Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
The dynamic nature of cyber threats offers a continual problem in the field of cybersecurity in the context of the expanding internet environment. This study provides an in-depth assessment of the literature on machin... 详细信息
来源: 评论
Selective opening chosen ciphertext security directly from the DDH assumption
Selective opening chosen ciphertext security directly from t...
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Liu, Shengli Zhang, Fangguo Chen, Kefei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t... 详细信息
来源: 评论
Channel-borrowing handoff scheme based on user mobility in CDMA cellular systems
Channel-borrowing handoff scheme based on user mobility in C...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Dong-Jun Lee Dong-Ho Cho Communications and Information Systems Laboratory Division of Electrical Engineering Department of Electrical Engineering & Computer Science KAIST Taejon South Korea
CDMA cellular systems use soft handoff. Although the capacity of CDMA systems is interference-limited in nature, channel shortages may occur because soft handoff uses several channels simultaneously. To cope with this... 详细信息
来源: 评论
A Game Theoretic Investigation for High Interaction Honeypots
A Game Theoretic Investigation for High Interaction Honeypot...
收藏 引用
IEEE International Conference on Communications
作者: Osama Hayatle Hadi Otrok Amr Youssef Concordia Institute for Information Systems Engineering Concordia University Electrical and Computer Engineering Department Khalifa University of Science Technology & Research
Honeypots are traps designed to resemble easy-to-compromise computer systems in order to deceive botmasters. Such security traps help security professionals to collect valuable information about botmasters' techni... 详细信息
来源: 评论
Wake structure around moving elastic airfoils with projections and their characteristics of dynamic forces by fluid structure interaction simulation
Wake structure around moving elastic airfoils with projectio...
收藏 引用
ASME-JSME-KSME 2011 Joint Fluids engineering Conference, AJK 2011
作者: Aphaiwong, Junchangpood Nagata, Tetsushi Fuchiwaki, Masaki Tanaka, Kazuhiro Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology 680-4 Kawazu Iizuka-city Fukuoka 820-8502 Japan Department of Mechanical Information Science and Technology Kyushu Institute of Technology 680-4 Kawazu Iizuka-city Fukuoka 820-8502 Japan
The flow around an elastic body is treated as a fluid-structure interaction (FSI), numerous fluid-structure coupled problems have been performed. Recently, two-way coupled analysis, which considers the fluid-structure... 详细信息
来源: 评论
Towards the Automatic Reconstruction of Dendritic Trees using Particle Filters
Towards the Automatic Reconstruction of Dendritic Trees usin...
收藏 引用
IEEE Nonlinear Statistical Signal Processing Workshop,NSSPW
作者: D.R. Myatt S.J. Nasuto S.J. Maybank School of Systems Engineering Department of Cybernetics University of Reading UK Birkbeck School of Computer Science and Information Systems University of London UK
The 3D reconstruction of a Golgi-stained dendritic tree from a serial stack of images captured with a transmitted light bright-field microscope is investigated. Modifications to the boot-strap filter are discussed suc... 详细信息
来源: 评论
Enhancing service quality through Service Level Agreement (SLA) full implementation
Enhancing service quality through Service Level Agreement (S...
收藏 引用
International Conference on science in information Technology (ICSITech)
作者: Rodziah binti Atan Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia 43400 Serdang Selangor MALAYSIA
Various SLA monitoring systems are proposed by different features and abilities to evaluate the agreed SLA. The current SLA monitoring systems in cloud computing for its structural, behavioral characteristics and situ... 详细信息
来源: 评论