咨询与建议

限定检索结果

文献类型

  • 3,948 篇 会议
  • 2,063 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,769 篇 工学
    • 3,025 篇 计算机科学与技术...
    • 2,485 篇 软件工程
    • 749 篇 信息与通信工程
    • 505 篇 控制科学与工程
    • 416 篇 生物工程
    • 337 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 231 篇 机械工程
    • 222 篇 电子科学与技术(可...
    • 191 篇 光学工程
    • 140 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 118 篇 交通运输工程
  • 1,692 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 367 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,146 篇 管理学
    • 712 篇 管理科学与工程(可...
    • 498 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 227 篇 医学
    • 201 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 137 篇 教育学
    • 132 篇 教育学
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 145 篇 feature extracti...
  • 140 篇 training
  • 136 篇 semantics
  • 123 篇 deep learning
  • 112 篇 software
  • 111 篇 machine learning
  • 110 篇 computer science
  • 107 篇 accuracy
  • 99 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 86 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 231 篇 college of compu...
  • 104 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 53 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 49 篇 school of big da...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,733 篇 英文
  • 310 篇 其他
  • 52 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6089 条 记 录,以下是4411-4420 订阅
排序:
Highly birefringent photonic crystal fibers with flattened dispersion and low confinement loss
收藏 引用
Optoelectronics Letters 2013年 第1期9卷 45-48页
作者: 曹晔 李荣敏 童峥嵘 Key Laboratory of Film Electronics and Communication Devices Key Laboratory of Intelligent Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology
A highly birefringent index-guiding photonic crystal fiber (PCF) with flattened dispersion and low confinement loss is proposed by introducing two small air holes with the same diameter in the core area. The fundament... 详细信息
来源: 评论
On RFID authentication protocols with wide-strong privacy
收藏 引用
Cryptology and Information Security Series 2013年 11卷 3-16页
作者: Li, Nan Mu, Yi Susilo, Willy Guo, Fuchun Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Department of Computing Faculty of Science Macquarie University Sydney Australia
Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, ... 详细信息
来源: 评论
Towards estimating computer users' mood from interaction behaviour with keyboard and mouse
收藏 引用
Frontiers of Computer Science 2013年 第6期7卷 943-954页
作者: Iflikhar Ahmed KHAN Willem-Paul BRINKMAN Robert HIERONS Department of Computer Software Engineering University of Engineering & Technology Mardan 23200 Pakistan Interactive Intelligence Group Delft University of Technology Delft 2628B the Netherlands Department of Information Systems and Computing Brunel University West London UB83PH UK
The purpose of this exploratory research was to study the relationship between the mood of computer users and their use of keyboard and mouse to examine the possibility of creating a generic or individualized mood mea... 详细信息
来源: 评论
A secure elliptic curve based RFID ownership transfer scheme with controlled delegation
收藏 引用
Cryptology and Information Security Series 2013年 11卷 31-43页
作者: Cheng, Shu Varadharajan, Vijay Mu, Yi Susilo, Willy Department of Computing Faculty of Scicence Macquarie University Sydney Australia Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia
In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers security and privacy... 详细信息
来源: 评论
Use of OpenMP to parallelise a one-dimensional multiphase flow code
收藏 引用
AIP Conference Proceedings 2015年 第1期1648卷
作者: Stamatis Kalogerakos Mustapha Gourma Ninghong Jia *Fira Software Ltd 49 Station Road Polegate East Sussex BN26 6EA U.K. †Applied Mathematics and Computing School of Engineering Cranfield University MK43 0AL U.K. **State Key Laboratory of Enhanced Oil Recovery RIPED Petrochina Beijing China 10083
The project of parallelising a Fortran code designed to simulate one-dimensional multiphase flow simulations has been successfully completed. Parallelisation of such a code is of crucial importance due to its use for ...
来源: 评论
Detecting flu transmission by social sensor in China
Detecting flu transmission by social sensor in China
收藏 引用
2013 IEEE International Conference on Green computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social computing, GreenCom-iThings-CPSCom 2013
作者: Huang, Jiangmiao Zhao, Hui Zhang, Jie Key Laboratory of Trustworthy Computing of Shanghai Software Engineering Institute East China Normal University Shanghai China
The control and prevention of transmissible diseases is an important public health concern. This paper gives a strategy to detect the transmission of contagion based on social network. With the popularity of the Weibo... 详细信息
来源: 评论
Provably secure certificateless one-way and two-party authenticated key agreement protocol
Provably secure certificateless one-way and two-party authen...
收藏 引用
15th International Conference on Information Security and Cryptology, ICISC 2012
作者: Zhang, Lei Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China
Key agreement protocols are one of the fundamental primitives in cryptography. In this paper, we formalize the security model for certificateless one-way and two-party authenticated key agreement protocols and propose... 详细信息
来源: 评论
Bichromatic reverse ranking query in two dimensions
Bichromatic reverse ranking query in two dimensions
收藏 引用
9th International Conference on Advanced Data Mining and Applications, ADMA 2013
作者: Zhang, Zhao Kang, Qiangqiang Jin, Cheqing Zhou, Aoying Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China
Capturing potential customers for a given product based on individual preferences is very important in many personalized applications. Reverse ranking queries are widely employed in this scenario from the perspective ... 详细信息
来源: 评论
An improved identity-based batch verification scheme for VANETs
An improved identity-based batch verification scheme for VAN...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Liu, Bao Zhang, Lei Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China
Vehicular ad-hoc networks (VANETs) have recently received considerable attention. To widely deploy VANETs in the civilian area, it is critical to tackle the secure and privacy challenges in VANETs. In this paper, we p... 详细信息
来源: 评论
Unifying operational semantics with algebraic semantics for instantaneous reactions
Unifying operational semantics with algebraic semantics for ...
收藏 引用
4th International Symposium on Unifying Theories of Programming, UTP 2012
作者: Wu, Chengcheng Zhao, Yongxin Zhu, Huibiao Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University China School of Computing National University of Singapore Singapore Singapore
The signal calculus for event-based synchronous languages is developed for the specification and programming of embedded systems. This paper first explores a structural operational semantics for conceptually instantan... 详细信息
来源: 评论