咨询与建议

限定检索结果

文献类型

  • 151 篇 会议
  • 13 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 35 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 10 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 6 篇 电气工程
    • 4 篇 仪器科学与技术
    • 3 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 21 篇 理学
    • 11 篇 数学
    • 5 篇 物理学
    • 3 篇 生物学
    • 3 篇 系统科学
    • 2 篇 化学
    • 1 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 37 篇 computer science
  • 11 篇 neural networks
  • 8 篇 electronic mail
  • 8 篇 costs
  • 7 篇 conferences
  • 7 篇 computer archite...
  • 7 篇 humans
  • 7 篇 protocols
  • 7 篇 software
  • 7 篇 testing
  • 6 篇 traffic control
  • 6 篇 computational mo...
  • 6 篇 equations
  • 5 篇 asynchronous tra...
  • 5 篇 object detection
  • 5 篇 application soft...
  • 5 篇 software enginee...
  • 5 篇 signal processin...
  • 5 篇 pixel
  • 5 篇 bandwidth

机构

  • 12 篇 department of co...
  • 10 篇 dept. of comput....
  • 6 篇 national taiwan ...
  • 5 篇 institute of inf...
  • 3 篇 department of co...
  • 3 篇 dept. of comput....
  • 3 篇 dept. of inf. & ...
  • 3 篇 inst. of inf. sc...
  • 2 篇 inf. center guan...
  • 2 篇 dept of electric...
  • 2 篇 institutes of co...
  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 vipccl departmen...
  • 2 篇 dept. of compute...
  • 2 篇 fir-uf universit...
  • 2 篇 dept. of comput....
  • 2 篇 faculty of techn...
  • 2 篇 dept. of compute...

作者

  • 3 篇 felix dobslaw
  • 3 篇 mylopoulos john
  • 2 篇 binggui huang
  • 2 篇 lapouchnian alex...
  • 2 篇 shenghui he
  • 2 篇 feng-jian wang
  • 2 篇 y.-h. huang
  • 2 篇 francisco gomes ...
  • 2 篇 de virgilio robe...
  • 2 篇 h.-t. chu
  • 2 篇 c.-c. yang
  • 2 篇 hong-yuan mark l...
  • 2 篇 j. evans
  • 2 篇 w.-s. chen
  • 2 篇 di noia tommaso
  • 2 篇 g. minden
  • 2 篇 han-chieh chao
  • 2 篇 j.-y. chen
  • 2 篇 hsiao-rong tyan
  • 2 篇 tao lv

语言

  • 161 篇 英文
  • 4 篇 其他
检索条件"机构=Computer and Inf. Science and Engineering"
165 条 记 录,以下是31-40 订阅
排序:
Granger causality on horizontal sum of Boolean algebras
arXiv
收藏 引用
arXiv 2018年
作者: Bohdalová, Mária Kalina, Martin Nánásiová, Olga Dept. of Inf. Systems Faculty of Management Comenius University Bratislava Dept. of Mathematics Faculty of Civil Engineering Slovak University of Technology Bratislava Institute of Computer Science and Mathematics Faculty of Electrical Engineering and Information Technology Slovak University of Technology Bratislava
The intention of this paper is to discuss the mathematical model of causality introduced by C.W.J. Granger in 1969. The Granger's model of causality has become well-known and often used in various econometric mode... 详细信息
来源: 评论
TEM Characterization of the Edges of CsPb2Br5 Perovskite Crystals
收藏 引用
Microscopy and Microanalysis 2018年 第S1期24卷 1984-1985页
作者: Hector A. Calderon Francisco Robles-Hernandez Yanan Wang Chong Wang Xinghua Su Viktor G. Hadjiev Yizhou Ni Md Kamrul Alam Yan Yao Yu Yang Instituto Politecnico Nacional ESFM Depto. Fisica CDMX Mexico 07338 Inst. of Fund. Frontier Scie. U. of Electronic Science and Technology Sichuan610054 China Dep. of Electrical and Computer Engineering University of Houston Houston Texas77204 USA Inst. of Optoel. Inf. Mat. School of Mat. Sci. and Eng. Yunnan University Kunming 650091 China School of Materials Science and Engineering Chang'an University Xi'an Shaanxi710061 China Texas Center for Superconductivity University of Houston Houston TX77204 USA Department of Mechanical Engineering University of Houston Houston TX77204 USA Department of Physics University of Houston Houston Texas77204 USA Materials Science & Engineering University of Houston Houston Texas77204 USA
来源: 评论
Anomaly detection and monitoring in Internet of Things communication
Anomaly detection and monitoring in Internet of Things commu...
收藏 引用
International Conference on inf.rmation Technology and Electrical engineering (ICITEE)
作者: Deris Stiawan Mohd. Yazid Idris Reza Firsandaya Malik Siti Nurmaini Rahmat Budiarto Department of Computer Engineering Universitas Sriwijaya Dept. Soft Engineering Universiti Teknologi Malaysia College of Computer Science & Inf. Technology Albaha University Saudi Arabia
The Internet of Things (IoT) presents unique challenges in detecting anomaly and monitoring all connected devices in a network. Moreover, one of the objectives of anonymity in communication is to protect the data traf... 详细信息
来源: 评论
Double Constrained NMF for Partial Multi-View Clustering
Double Constrained NMF for Partial Multi-View Clustering
收藏 引用
Proceedings of the Digital Image Computing: Technqiues and Applications (DICTA)
作者: Bin Qian Xiaobo Shen Yanyang Gu Zhenmin Tang Yuhua Ding School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Sch. of Inf. & Commun. Technol. Griffith Univ. Nathan Griffith NSW Australia
Many computer vision problems involve data with multiple views, where each view corresponds to a certain type of feature. To integrate inf.rmation from multiple views in the unsupervised setting, multi-view clustering... 详细信息
来源: 评论
GMiner: Rule-Based Fuzzy Clustering for Google Drive Behavioral Type Mining
GMiner: Rule-Based Fuzzy Clustering for Google Drive Behavio...
收藏 引用
International computer Symposium (ICS)
作者: Chih-Hung Hsieh Cheng-Hao Yan Ching-Hao Mao Chi-Ping Lai Jenq-Shiou Leu Institute for Information Industry Taipei Taiwan Inst. for Inf. Ind. Taipei Taiwan Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taiwan R.O.C
Due to more and more on-premises services are migrating onto cloud, user behavioral analysis then gets popular as a data-driven way to administer lots accounts of on-cloud services. This paper proposes a novel rule-ba... 详细信息
来源: 评论
Dynamic content selection-and-prediction framework applied to reversible data hiding
Dynamic content selection-and-prediction framework applied t...
收藏 引用
IEEE International Workshop on inf.rmation Forensics and Security (WIFS)
作者: Han-Zhou Wu Hong-Xia Wang Yun-Qing Shi School of Inf. Science & Technology Southwest Jiaotong University Chengdu P. R. China Dept. of Electrical & Computer Engineering New Jersey Institute of Technology Newark NJ United States
The existing reversible data hiding (RDH) methods often use a fixed pixel preselection pattern and predictor to generate prediction errors that are then utilized for embedding secret data. According to Kerckhoffs'... 详细信息
来源: 评论
MOOCs for K-12 and Higher Education in Taiwan
MOOCs for K-12 and Higher Education in Taiwan
收藏 引用
IIAI International Conference on Advanced Applied inf.rmatics (IIAIAAI)
作者: Stephen J. H. Yang Jeff C. H. Huang Anna Y. Q. Huang Irene Y. L. Chen Department of Computer Science and Information Engineering National Central University Taiwan ROC Dept. of Comput. Sci. & Inf. Eng. Hwa Hsia Univ. of Technol. Taiwan Dept. of Comput. Sci. & Inf. Eng. Nat. Central Univ. Jhongli Taiwan Department of Accounting National Changhua University of Education Taiwan ROC
According to the phenomenon of MOOCs gained widespread exposure in the U. S. academic world, the inf.sion of MOOCs into traditional education has become a new trend in Taiwan since 2013. By February 2016, more than 17... 详细信息
来源: 评论
A Study on Efficient Log Visualization Using D3 Component against APT: How to Visualize Security Logs Efficiently?
A Study on Efficient Log Visualization Using D3 Component ag...
收藏 引用
International Conference on Platform Technology and Service (PlatCon)
作者: Jaehee Lee Jinhyeok Jeon Changyeob Lee Junbeom Lee Jaebin Cho Kyungho Lee Department of Information Security Korea University Seoul Korea Department of Computer Science and Engineering Sogang University Seoul Korea Deparment of Convergence Secuirty Kyonggi University Seoul Korea Dept. of Inf. & Telecommun. Eng. Univ. of Suwon Seoul South Korea Department of Information and Telecommunications Engineering University of Suwon Seoul Korea
APT attack has caused chaos in society since 2006. Especially, the vulnerability of the inf.astructure is exposed to the outside a lot due to the development of the IT inf.astructure in Korea. In addition, APT attacks... 详细信息
来源: 评论
Optimal Dynamic Power Management for Green Coordinated Multipoint Systems
Optimal Dynamic Power Management for Green Coordinated Multi...
收藏 引用
IEEE Global Communications Conference
作者: Xin Wang Tianyi Chen Yu Zhang Georgios B. Giannakis Key Lab for Inf. Sci. of EMW (MoE) Dept. of Communication Science & Engineering Fudan University Dept. of Electrical & Computer Engineering Digital Technology Center University of Minnesota
The paper deals with dynamic energy management for smart-grid powered coordinated multi-point (CoMP) transmissions. Aiming to minimize the expected energy transaction cost while guaranteeing the worst-case users' ... 详细信息
来源: 评论
Re-visiting the 'Maintainability Index' Metric from an Object-Oriented Perspective
Re-visiting the 'Maintainability Index' Metric from an Objec...
收藏 引用
Euromicro Conference on Software engineering and Advanced Applications (SEAA)
作者: S. Counsell X. Liu S. Eldh R. Tonelli M. Marchesi G. Concas A. Murgia Dept. of Computer Science Brunel University London Ericsson AB Kista Sweden Dept. of Electrical Engineering University of Cagliari Italy Dept. of Mathematics-Inf. University of Antwerp Belgium
The Maintainability Index (MI) metric was proposed in the early nineties to gauge ease of code maintenance. A high value of MI indicates well-constructed code which is easy to maintain and a low MI, the opposite. The ... 详细信息
来源: 评论