咨询与建议

限定检索结果

文献类型

  • 4,135 篇 会议
  • 2,693 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,371 篇 工学
    • 3,340 篇 计算机科学与技术...
    • 2,690 篇 软件工程
    • 857 篇 信息与通信工程
    • 692 篇 控制科学与工程
    • 468 篇 生物工程
    • 427 篇 电气工程
    • 314 篇 机械工程
    • 305 篇 生物医学工程(可授...
    • 285 篇 电子科学与技术(可...
    • 220 篇 光学工程
    • 167 篇 仪器科学与技术
    • 162 篇 动力工程及工程热...
    • 151 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,980 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 499 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 157 篇 化学
  • 1,471 篇 管理学
    • 908 篇 管理科学与工程(可...
    • 667 篇 图书情报与档案管...
    • 508 篇 工商管理
  • 354 篇 医学
    • 304 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
  • 248 篇 法学
    • 208 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 154 篇 教育学
    • 145 篇 教育学
  • 81 篇 农学
  • 27 篇 文学
  • 21 篇 艺术学
  • 19 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 141 篇 computational mo...
  • 129 篇 artificial intel...
  • 123 篇 information syst...
  • 104 篇 software enginee...
  • 103 篇 training
  • 100 篇 accuracy
  • 95 篇 semantics
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 92 篇 feature extracti...
  • 92 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 82 篇 predictive model...
  • 79 篇 security
  • 78 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 43 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 department of in...
  • 38 篇 information syst...
  • 37 篇 university of ch...
  • 34 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 26 篇 school of softwa...
  • 26 篇 school of comput...
  • 25 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 abdelwahed motwa...
  • 18 篇 lo david
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman

语言

  • 6,523 篇 英文
  • 380 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6954 条 记 录,以下是4931-4940 订阅
排序:
New impossible differential attack on SAFER+ and SAFER ++
New impossible differential attack on SAFER+ and SAFER ++
收藏 引用
15th International Conference on information Security and Cryptology, ICISC 2012
作者: Zhao, Jingyuan Wang, Meiqin Chen, Jiazhe Zheng, Yuliang Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China School of Mathematics Shandong University Jinan 250100 China Department of Software and Information Systems UNC Charlotte 9201 University City Blvd Charlotte NC 28223 United States
SAFER+ was a candidate block cipher for AES with 128-bit block size and a variable key sizes of 128, 192 or 256 bits. Bluetooth uses customized versions of SAFER+ for security. The numbers of rounds for SAFER+ with ke... 详细信息
来源: 评论
A Preliminary User Evaluation of an Infrastructure to Support Activity-Based computing in Global software Development (ABC4GSD)
A Preliminary User Evaluation of an Infrastructure to Suppor...
收藏 引用
International Conference on Global software Engineering (ICGSE)
作者: Paolo Tell Muhammad Ali Babar John Grundy Software System Section IT University of Copenhagen Denmark Kobenhavns Universitet Kobenhavns DK Centre for Computing and Engineering Software Systems Swinburne University of Technology Australia
Global software Engineering (GSE) teams face challenges due to the need to replace traditional physical presence interactions and co-ordination with computer-mediated means. A vast majority of the available tool suppo... 详细信息
来源: 评论
Mobile computing application for industrial field service engineering: A case for ABB service engineers
Mobile computing application for industrial field service en...
收藏 引用
IEEE Conference on ALocal Computer Networks Workshops (LCN Workshops)
作者: Welderufael B. Tesfay Markus Aleksy Karl Andersson Marko Lehtola pervasive and Mobile Computing Laboratory Luleå University of Technology Sweden ABB Corporate Research Industrial Software Systems Program Ladenburg Germany Industrial Software Systems Program ABB Corporate Research Ladenburg Germany Industrial Software Systems Program ABBCorporate Research Västerås Sweden
The increasing digitalization of our daily lives is gaining a new momentum recently in what is called the post-desktop era of computing. This wide spread in digitalization is made possible by the introduction of handy... 详细信息
来源: 评论
Poster: Revisiting anomaly detection system design philosophy  13
Poster: Revisiting anomaly detection system design philosoph...
收藏 引用
2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013
作者: Ashfaq, Ayesha Binte Ali, Muhammad Qasim Al-Shaer, Ehab Khayam, Syed Ali School of Electrical Engineering and Computer Science National University of Sciences and Technology Islamabad Pakistan Department of Software and Information Systems University of North Carolina Charlotte Charlotte NC United States PLUMgrid Inc. Sunnyvale CA United States
The inherent design of anomaly detection systems (ADSs) make them highly susceptible to evasion attacks and hence their wide-spread commercial deployment has not been witnessed. There are two main reasons for this: 1)... 详细信息
来源: 评论
An innovative approach for automatically grading spelling in essays using rubric-based scoring
An innovative approach for automatically grading spelling in...
收藏 引用
作者: Fazal, Anhar Hussain, Farookh Khadeer Dillon, Tharam S. School of Information Systems Curtin University of Technology Perth WA Australia Decision Support and E-Service Intelligence Lab. School of Software University of Technology Sydney NSW Australia Department of Computer Science and Computer Engineering La Trobe University Melbourne VIC Australia
Automated Essay Grading (AEG) is defined as a computer technology that evaluates and scores written prose. A number of AEG systems have been developed since the 1960s and in most of them, an ad-hoc or generalized appr... 详细信息
来源: 评论
Predictive Control for Visual Servo Stabilization of Nonholonomic Mobile Robots
收藏 引用
自动化学报 2013年 第8期39卷 1238-1245页
作者: CAO Zheng-Cai YIN Long-Jie FU Yi-Li LIU Tian-Long College of Information Science and Technology Beijing University of Chemical TechnologyBeijing 100029China Key Laboratory of Embedded System and Service Computing Ministry of EducationTongji UniversityShanghai 201804China State Key Laboratory of Robotics and Systems Harbin Institute of TechnologyHarbin 150080China
活动机器人获得了的 nonholonomic 的视觉伺服稳定广泛的注意。当前,这个问题的解决方案不管多么不认为可见性限制和致动器是限制,因此设计控制器是困难的在实际申请认识到令人满意的性能。在这份报纸,为一个活动机器人的视觉伺服稳... 详细信息
来源: 评论
Agile product manufacturing by dynamically generating control instructions
Agile product manufacturing by dynamically generating contro...
收藏 引用
IEEE International Symposium on Assembly and Manufacturing (ISAM)
作者: Daniël Telgen Leo van Moergestel Erik Puik Arjen van Zanten Ammar Abdulamir John-Jules Meyer Department of Micro Systems Technology and Embedded Systems University of Applied Sciences Utrecht Utrecht Netherlands Department of Information and Computing Sciences Utrecht University Utrecht Netherlands
Grid Manufacturing (GM) is a new production paradigm, based upon the use of standardized and modular Reconfigurable Manufacturing systems (RMS). In GM all systems have a virtual counterpart that actsautonomously, this... 详细信息
来源: 评论
Wait-free Hyperobjects for Task-Parallel Programming systems
Wait-free Hyperobjects for Task-Parallel Programming Systems
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Martin Wimmer Institute of Information Systems Research Group Parallel Computing Faculty of Informatics Vienna University of Technology Vienna Austria
Hyperobjects are efficient mechanisms to coordinate accesses to shared variables and data-structures in task-parallel programming models, where each thread can operate on its own coordinated local view of the shared d... 详细信息
来源: 评论
Migrating into the Cloud: Identifying the major security and privacy concerns
Migrating into the Cloud: Identifying the major security and...
收藏 引用
12th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2013
作者: Kalloniatis, Christos Manousakis, Vassilis Mouratidis, Haralambos Gritzalis, Stefanos Department of Cultural Technology and Communication University of the Aegean University Hill GR 81100 Mytilene Greece School of Architecture Computing and Engineering University of East London Docklands Campus 4-6 University Way E16 2RD London United Kingdom Information and Communication Systems Security Laboratory Department of Information and Communications Systems Engineering University of the Aegean GR 83200 Samos Greece
Cloud computing is without a doubt one of the most significant innovations presented in the global technological map. The number of potential users enrolling and using cloud services increases exponentially on a daily... 详细信息
来源: 评论
Reducing the Migration Times of Multiple VMs on WANs using a Feedback Controller
Reducing the Migration Times of Multiple VMs on WANs using a...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum
作者: Tae Seung Kang Mauricio Tsugawa Jose Fortes Takahiro Hirofuchi Advanced Computing and Information Systems Lab University of Florida National Institute of Advanced Industrial Science and Technology (AIST)
Virtual machine (VM) migration is affected by network latency and throughput, which are highly fluctuating and unpredictable in wide-area networks (WANs). Hence, it is difficult to statically minimize the time require... 详细信息
来源: 评论