咨询与建议

限定检索结果

文献类型

  • 530 篇 会议
  • 128 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 662 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 402 篇 工学
    • 294 篇 计算机科学与技术...
    • 243 篇 软件工程
    • 99 篇 信息与通信工程
    • 75 篇 控制科学与工程
    • 51 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 34 篇 生物工程
    • 29 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 22 篇 光学工程
    • 19 篇 动力工程及工程热...
    • 19 篇 化学工程与技术
    • 14 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
  • 199 篇 理学
    • 99 篇 数学
    • 56 篇 物理学
    • 42 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 21 篇 化学
  • 125 篇 管理学
    • 87 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 23 篇 医学
    • 22 篇 基础医学(可授医学...
    • 21 篇 临床医学
    • 14 篇 药学(可授医学、理...
  • 19 篇 法学
    • 16 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 15 篇 农学
  • 12 篇 教育学
    • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 15 篇 computational mo...
  • 15 篇 feature extracti...
  • 12 篇 convolutional ne...
  • 11 篇 accuracy
  • 10 篇 machine learning
  • 10 篇 software
  • 9 篇 computer archite...
  • 9 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 authentication
  • 7 篇 predictive model...
  • 7 篇 genetic algorith...

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 romero francisco...
  • 5 篇 kuo yaw-wen

语言

  • 635 篇 英文
  • 19 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. Computer Science and Software Engineering"
662 条 记 录,以下是431-440 订阅
排序:
Estimation of ship's extremely low frequency electromagnetic signature based on fuzzy fusion for target detection
Estimation of ship's extremely low frequency electromagnetic...
收藏 引用
IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)
作者: Yihai Liu Xiaomin Zhang Jianfeng Shao Bingqi Zhang School of Marine Science and Technology Northwestern Polytechnical University Xi'an China Dep. of Electrical & Computer Engineering State University of New York New Paltz USA
The alternative electromagnetic (EM) fields radiating from a ship are widely recognized as new contributors to the application of underwater target detection. This paper focuses on the estimation of this extremely low... 详细信息
来源: 评论
A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme
A lightweight mutual authentication mechanism for improving ...
收藏 引用
IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)
作者: Sirine Ben Ameur Faouzi Zarai Salima Smaoui Mohammad S. Obaidat K.F. Hsiao LETI laboratory University of Sfax Tunisia Computer Science and Software Engineering Department Monmouth University NJ USA Dep.of Information Management Ming-Chuan University Taiwan
In the last decade, the request for Internet access in heterogeneous environments keeps on growing, principally in mobile platforms such as buses, airplanes and trains. Consequently, several extensions and schemes hav... 详细信息
来源: 评论
A LIGHTWEIGHT MUTUAL AUTHENTICATION MECHANISM FOR IMPROVING FAST PMIPV6-BASED NETWORK MOBILITY SCHEME
A LIGHTWEIGHT MUTUAL AUTHENTICATION MECHANISM FOR IMPROVING ...
收藏 引用
2014 4th IEEE International Conference on Network Infrastructure and Digital Content
作者: Sirine Ben Ameur Faouzi Zarai Salima Smaoui Mohammad S.Obaidat K.F.Hsiao LETI laboratory University of SfaxTunisia Computer Science and Software Engineering Department Monmouth University NJ 07764 USA Dep.of Information Management Ming-Chuan University
In the last decade, the request for Internet access in heterogeneous environments keeps on growing, principally in mobile platforms such as buses, airplanes and trains. Consequently, several extensions and schemes hav... 详细信息
来源: 评论
Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance
Detection of JavaScript of Malware with Un-readability Using...
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Kentaro Takamori Mai Iwamoto Shunsuke Oshima Takuo Nakashima Production System Engineering Course Kumamoto National College of Technology Yatsushiro Kumamoto Japan Kumamoto National College of Technology ICT Center for Learning Support Yatsushiro Kumamoto Japan Kumamoto National College of Technology Center for Technical and Educational Support Yatsushiro Kumamoto Japan Dep. of Electronics Engineering and Computer Science Tokai University Kumamoto Japan
Increasing of Java Scripts of malware requires automatic malware detection systems in these days. Our research takes note of the appearence probability and the state transition probability of first order Markov source... 详细信息
来源: 评论
Nonminimum-phase channel equalization using all-pass CMA
Nonminimum-phase channel equalization using all-pass CMA
收藏 引用
2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2013
作者: Blom, Koen C.H. Gerards, Marco E.T. Kokkeler, Ándre B.J. Smit, Gerard J.M. Dep. of Electrical Engineering Mathematics and Computer Science University of Twente P.O. Box 217 7500 AE Enschede Netherlands
A nonminimum-phase channel can always be decomposed into a minimum-phase part and an all-pass part. In our approach, called all-pass CMA, the dimensionality of the CMA algorithm has been reduced to improve blind equal... 详细信息
来源: 评论
Static analysis of worst-case stack cache behavior  13
Static analysis of worst-case stack cache behavior
收藏 引用
21st International Conference on Real-Time Networks and Systems, RTNS 2013
作者: Jordan, Alexander Brandner, Florian Schoeberl, Martin Compilers and Languages Group Institute of Computer Languages Vienna University of Technology Austria Embedded Systems Engineering Section Dep. of Applied Mathematics and Computer Science Technical University of Denmark Denmark
Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar... 详细信息
来源: 评论
Ubiquitous mobile instrumentation
Ubiquitous mobile instrumentation
收藏 引用
2013 ACM Conference on Ubiquitous Computing, UbiComp 2013
作者: Ferreira, Denzil Koehler, Christian Karapanos, Evangelos Kostakos, Vassilis Dep. Computer Science and Engineering University of Oulu Finland Human-Computer Interaction Institute Carnegie Mellon University United States Madeira Interactive Technologies Institute University of Madeira Portugal
Mobile phones allow us to reach people anywhere, at anytime. In addition to the benefits for end users, researchers and developers can also benefit from the powerful devices that participants carry on a daily basis. C... 详细信息
来源: 评论
HIP-IKEv2: A proposal to improve internet key exchange protocol-based on host identity protocol
HIP-IKEv2: A proposal to improve internet key exchange proto...
收藏 引用
3rd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, SIMULTECH 2013
作者: Smaoui, S. Zarai, F. Obaidat, M.S. Hsiao, K.F. Kamoun, L. LETI laboratory University of Sfax Sfax Tunisia Computer Science and Software Engineering Department Monmouth University West Long Branch NJ 07764 United States Dep. of Information Management Ming-Chuan University Taoyuan County 333 Taiwan
IKEv2 offers authentication, authorization and key agreement services to establish a security association between two peers bound to IP addresses, but it is still vulnerable to some security problems such as denial of... 详细信息
来源: 评论
Wavelet compression inspired implementation for high performances and low complexity ECG removal in wireless sEMG electrodes
Wavelet compression inspired implementation for high perform...
收藏 引用
IEEE International Conference on Electronics, Circuits and Systems (ICECS)
作者: Mohamed El Fares Djellatou Daniel Massicotte Mounir Boukadoum Dep. Electrical and Computer Engineering LSSI Dep. Computer Science Université du Québec à Montréal
This study addresses the removal of electrocardiogram pulses (ECG) from surface electromyography signals (sEMG) in wireless sEMG electrodes. We describe a wavelet-compression inspired filtering technique in order to m... 详细信息
来源: 评论
Feature selection methods in persian sentiment analysis
收藏 引用
18th International Conference on Application of Natural Language to Information Systems, NLDB 2013
作者: Saraee, Mohamad Bagheri, Ayoub School of Computing Science and Engineering University of Salford Manchester United Kingdom Intelligent Database Data Mining and Bioinformatics Lab Electrical and Computer Engineering Dep. Isfahan University of Technology Isfahan Iran
With the enormous growth of digital content in internet, various types of online reviews such as product and movie reviews present a wealth of subjective information that can be very helpful for potential users. Senti... 详细信息
来源: 评论