咨询与建议

限定检索结果

文献类型

  • 446 篇 会议
  • 220 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 675 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 251 篇 计算机科学与技术...
    • 215 篇 软件工程
    • 80 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 52 篇 生物工程
    • 41 篇 生物医学工程(可授...
    • 36 篇 机械工程
    • 31 篇 光学工程
    • 28 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 土木工程
    • 22 篇 化学工程与技术
    • 18 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 16 篇 安全科学与工程
    • 14 篇 建筑学
    • 12 篇 交通运输工程
  • 221 篇 理学
    • 99 篇 数学
    • 69 篇 生物学
    • 49 篇 系统科学
    • 34 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 19 篇 化学
  • 88 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 42 篇 医学
    • 36 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
    • 13 篇 公共卫生与预防医...
  • 16 篇 农学
  • 12 篇 法学
  • 11 篇 经济学
  • 9 篇 教育学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 26 篇 computer science
  • 19 篇 software enginee...
  • 16 篇 application soft...
  • 16 篇 software
  • 15 篇 mobile computing
  • 14 篇 protocols
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 accuracy
  • 12 篇 robustness
  • 11 篇 control systems
  • 11 篇 analytical model...
  • 11 篇 routing protocol...
  • 11 篇 mobile communica...
  • 10 篇 mobile ad hoc ne...
  • 10 篇 educational inst...
  • 10 篇 monitoring
  • 10 篇 internet
  • 10 篇 predictive model...
  • 10 篇 performance anal...

机构

  • 39 篇 beijing key labo...
  • 28 篇 school of electr...
  • 22 篇 seventh research...
  • 10 篇 division of rese...
  • 9 篇 lovely professio...
  • 9 篇 school of electr...
  • 8 篇 department of co...
  • 8 篇 seventh research...
  • 8 篇 division of info...
  • 7 篇 department of co...
  • 7 篇 kkr and ksr inst...
  • 7 篇 department of co...
  • 6 篇 kkr and ksr inst...
  • 6 篇 division of scie...
  • 6 篇 division of info...
  • 6 篇 the seventh rese...
  • 6 篇 division of soft...
  • 6 篇 university of si...
  • 6 篇 department of so...
  • 5 篇 division of neph...

作者

  • 44 篇 yingmin jia
  • 41 篇 junping du
  • 24 篇 fashan yu
  • 16 篇 mohammad s. obai...
  • 12 篇 sanjay k. dhuran...
  • 9 篇 deyuan meng
  • 9 篇 shiying yuan
  • 9 篇 cheol-hoon lee
  • 8 篇 obaidat mohammad...
  • 7 篇 jun zhang
  • 7 篇 dhurandher sanja...
  • 7 篇 won-tae kim
  • 7 篇 do-hyung kim
  • 6 篇 isaac woungang
  • 6 篇 wenling li
  • 6 篇 azka mir
  • 6 篇 pei yan
  • 6 篇 rehman attique u...
  • 6 篇 attique ur rehma...
  • 6 篇 mir azka

语言

  • 645 篇 英文
  • 22 篇 其他
  • 7 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and Software Engineering Division"
675 条 记 录,以下是441-450 订阅
排序:
Minimizing the operational cost of chemical sensor networks
Minimizing the operational cost of chemical sensor networks
收藏 引用
2010 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010
作者: Karunasekera, Shanika Skvortsov, Alex Gunatilaka, Ajith Department of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia HPP Division Defence Science and Technology Organisation 506 Lorimer Street Fishermans Bend VIC 3207 Australia
Minimizing the sensing activity during the pre-attack phase while meeting the performance requirements is critical for reducing the operational costs of chemical sensor networks. In this paper, we present a formal pro... 详细信息
来源: 评论
Alerts analysis and visualization in network-based intrusion detection systems
Alerts analysis and visualization in network-based intrusion...
收藏 引用
IEEE International Conference on Social Computing
作者: Yang, Li Gasior, Wade Katipally, Rajeshwar Cui, Xiaohui Department of Computer Science and Engineering Univeristy of Tennessee at Chattanooga Chattanooga TN 37403 United States Applied Software Engineering Research Group Computational Sciences and Engineering Division Oak Ridge National Laboratory Oak Ridge TN 37831 United States
The alerts produced by network-based intrusion detection systems, e.g. Snort, can be difficult for network administrators to efficiently review and respond to due to the enormous number of alerts generated in a short ... 详细信息
来源: 评论
The effect of correlation of chemical tracers on chemical sensor network performance
The effect of correlation of chemical tracers on chemical se...
收藏 引用
2010 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010
作者: Mendis, Champake Gunatilaka, Ajith Skvortsov, Alex Karunasekera, Shanika Department of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia HPP Division Defence Science and Technology Organisation 506 Lorimer Street Fishermans Bend VIC 3207 Australia
Chemical sensor networks are used to detect the presence of hazardous chemicals released intentionally or accidentally into the atmosphere. Although many performance attributes of chemical sensor networks, such as ene... 详细信息
来源: 评论
Feedback iterative learning control for time-delay systems based on 2D analysis approach
收藏 引用
控制理论与应用(英文版) 2010年 第4期8卷 457-463页
作者: Deyuan MENG Yingmin JIA Junping DU Shiying YUAN The Seventh Research Division Beihang University Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan 454000 China
This paper deals with the iterative learning control (ILC) design for multiple-input multiple-output (MIMO),time-delay systems (TDS).Two feedback ILC schemes are considered using the so-called two-dimensional ... 详细信息
来源: 评论
Network layer based secure routing protocol for wireless ad hoc sensor networks in urban environments
Network layer based secure routing protocol for wireless ad ...
收藏 引用
作者: Dhurandher, Sanjay K. Obaidat, Mohammad S. Gupta, Deepank Gupta, Nidhi Asthana, Anupriya Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science and Software Engineering Monmouth University NJ United States
Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages.... 详细信息
来源: 评论
A decentralized dynamic sensor activation protocol for chemical sensor networks
A decentralized dynamic sensor activation protocol for chemi...
收藏 引用
2010 9th IEEE International Symposium on Network Computing and Applications, NCA 2010
作者: Karunasekera, Shanika Mendis, Champake Skvortsov, Alex Gunatilaka, Ajith Department of Computer Science and Software Engineering University of Melbourne Melbourne VIC 3010 Australia Human Protection and Performance Division Defence Science and Technology Organisation Fishermans Bend 506 Lorimer Street VIC 3207 Australia
Due to the significant amount of energy consumed by chemical sensors for sensing, reducing sensing activity is critical for improving the lifespan of chemical sensor networks. In this paper, we consider a simple decen... 详细信息
来源: 评论
A distributed eResearch tool for evaluating source backtracking algorithms
A distributed eResearch tool for evaluating source backtrack...
收藏 引用
2010 6th IEEE International Conference on e-Science, eScience 2010
作者: Karunasekera, Shanika Beaton, John Dimech, Adrian Skvortsov, Alex Gunatilaka, Ajith Department of Computer Science and Software Engineering University of Melbourne Melbourne VIC 3010 Australia Human Protection and Performance Division Defence Science and Technology Organisation 506 Lorimer Street Fishermans Bend VIC 3207 Australia
This paper presents an eResearch tool for evaluating and comparing Chemical, Biological, Radiological and Nuclear (CBRN) source-backtracking algorithms. The tool enables users to define a CBRN threat scenario to be si... 详细信息
来源: 评论
Using AOP to ensure component interactions in component-based software
Using AOP to ensure component interactions in component-base...
收藏 引用
International Conference on computer and Automation engineering, ICCAE
作者: Jingang Zhou Yong Ji Dazhe Zhao Jiren Liu National Engineering Research Center of Computer Software Northeastern University Shenyang China Platform Software Division Neusoft Corporation Dalian China
Component-based software development (CBSD) has been got considerable adoption in software industry, but it is still lack of language support to ensure proper interactions among components, i.e. modularity assurance, ... 详细信息
来源: 评论
Platform engineering in Enterprise Application Development
Platform Engineering in Enterprise Application Development
收藏 引用
International Conference on E-Business and E-Government (ICEE)
作者: Jingang Zhou Yong Ji Dazhe Zhao Jiren Liu National Engineering Research Center of Computer Software Northeastern University Shenyang China Platform Software Division Neusoft Corporation Dalian China
Although component-based software development, model-driven development, software product line engineering, and similar things considerably improve software productivity and software quality, modern web based enterpri... 详细信息
来源: 评论
Friend-based secure routing through challenges in mobile ad hoc networks
Friend-based secure routing through challenges in mobile ad ...
收藏 引用
2010 International Symposium on Performance Evaluation of computer and Telecommunication Systems, SPECTS 2010
作者: Dhurandher, Sanjay K. Obaidat, Mohammad S. Verma, Karan Gupta, Pushkar Dhurandher, Pravina Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science and Software Engineering Monmouth University NJ United States Karnataka State Open University Mysore Karnataka India
This paper proposes a Friend-based security scheme for efficient routing in mobile ad hoc networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in... 详细信息
来源: 评论