咨询与建议

限定检索结果

文献类型

  • 49 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 58 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32 篇 工学
    • 26 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 12 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 机械工程
    • 3 篇 仪器科学与技术
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 测绘科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
  • 12 篇 理学
    • 8 篇 数学
    • 3 篇 物理学
    • 2 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 医学
    • 3 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 农学
    • 1 篇 农业资源与环境

主题

  • 4 篇 computer science
  • 3 篇 educational inst...
  • 3 篇 delay
  • 2 篇 image enhancemen...
  • 2 篇 hidden markov mo...
  • 2 篇 lagrangian funct...
  • 2 篇 speech
  • 2 篇 face recognition
  • 2 篇 bandwidth
  • 2 篇 fourier transfor...
  • 2 篇 data mining
  • 2 篇 monitoring
  • 2 篇 design engineeri...
  • 2 篇 discrete fourier...
  • 2 篇 steganography
  • 2 篇 correlation
  • 2 篇 complexity theor...
  • 2 篇 error analysis
  • 2 篇 polynomials
  • 2 篇 interpolation

机构

  • 4 篇 depart. of compu...
  • 4 篇 depart. of compu...
  • 2 篇 school of inform...
  • 2 篇 college of infor...
  • 2 篇 maulana azad nat...
  • 2 篇 depart. electric...
  • 2 篇 depart. of compu...
  • 2 篇 depart. of it ve...
  • 2 篇 depart. informat...
  • 2 篇 depart. computer...
  • 2 篇 depart. electric...
  • 1 篇 11. department o...
  • 1 篇 depart. of netwo...
  • 1 篇 depart. of infor...
  • 1 篇 sri sankara arts...
  • 1 篇 92. department o...
  • 1 篇 national central...
  • 1 篇 96. chelsea scho...
  • 1 篇 school of scienc...
  • 1 篇 constantine the ...

作者

  • 6 篇 su-ling lee
  • 6 篇 chien-cheng tsen...
  • 3 篇 huang liusheng
  • 2 篇 chen hsing-chung
  • 2 篇 passonneau rebec...
  • 2 篇 gupta vipul
  • 2 篇 jong-seon no
  • 2 篇 ji-woong jang
  • 2 篇 ahmad khaleel
  • 2 篇 wuu lih-chyau
  • 2 篇 xu hongli
  • 2 篇 venkit pranav na...
  • 2 篇 basu sankar
  • 2 篇 wilson shomir
  • 2 篇 arsheen sobiya
  • 2 篇 kuo wen-chung
  • 2 篇 young-sik kim
  • 2 篇 wu junmin
  • 2 篇 sang-hyo kim
  • 1 篇 hee je kim

语言

  • 58 篇 英文
检索条件"机构=Depart. of Computer Science and Technology"
58 条 记 录,以下是1-10 订阅
排序:
A secure destination-sequenced distance-vector routing protocol for ad hoc networks
收藏 引用
Journal of Networks 2010年 第8期5卷 942-948页
作者: Wang, Jyu-Wei Chen, Hsing-Chung Lin, Yi-Ping Depart. of Photonics and Communication Engineering Asia University No.500 Lioufong Rd. Wufong Township Taichung County 413 Taiwan Depart. of Computer Science and Information Technology Asia University Taichung Taiwan
This paper presents a secure destination- sequenced distance-vector (SDSDV) routing protocol for mobile ad hoc wireless networks. The proposed protocol is based on the regular DSDV protocol. Within SDSDV, each node ma... 详细信息
来源: 评论
Adaptive reversible data hiding based on histogram
Adaptive reversible data hiding based on histogram
收藏 引用
2010 10th International Conference on Intelligent Systems Design and Applications, ISDA'10
作者: Kuo, Wen-Chung Lai, Po-Yu Wuu, Lih-Chyau Depart. of Computer Science and Information Engineering National Formosa University Yunlin 640 Taiwan Depart. of Computer Science and Information Engineering National YunLin University of Science and Technology Yunlin 640 Taiwan
Due to the development of internet rapidly, the secure transmission of information has become more and more importance. Until now, there are many scholars study in the topic of data hiding. Specially, the reversible d... 详细信息
来源: 评论
T-S fuzzy control for a class of networked control system
T-S fuzzy control for a class of networked control system
收藏 引用
2012 International Conference on Fuzzy Theory and Its Applications, iFUZZY 2012
作者: Chen, Ti-Hung Kung, Chung-Chun Lin, Chi-Jheng Depart. of Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan County Taiwan Depart. of Electrical Engineering Tatung University Taipei Taiwan
In this paper, we will propose the T-S fuzzy controller design for a class of networked control system (NCS) with the network transmission delay and the data packet dropout. In the NCS, the controlled plant is approxi... 详细信息
来源: 评论
CrowdLoc: Wireless jammer localization with crowdsourcing measurements
CrowdLoc: Wireless jammer localization with crowdsourcing me...
收藏 引用
2nd International Workshop on Ubiquitous Crowdsourcing, UbiCrowd'11, Co-located with UbiComp 2011
作者: Sun, Yanqiang Wang, Xiaodong Önen, Melek Molva, Refik Depart. of Computer Science National University of Defense Technology Changsha 410073 China Depart. of Networking and Security Institute Eurecom Sophia Antipolis 06904 France
Jamming attacks can severely affect the performance of wireless networks due to the broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the jammer. In this paper... 详细信息
来源: 评论
Tracking persons using a network of RGBD cameras  14
Tracking persons using a network of RGBD cameras
收藏 引用
7th ACM International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2014
作者: Galanakis, George Zabulis, Xenophon Koutlemanis, Panagiotis Paparoulis, Spiros Kouroumalis, Vassilis Institute of Computer Science Foundation for Research and Technology Hellas Computer Science Depart. University of Crete Greece Institute of Computer Science Foundation for Research and Technology Hellas Greece
A computer vision system that employs an RGBD camera network to track multiple humans is presented. The acquired views are used to volumetrically and photometrically reconstruct and track the humans robustly and in re... 详细信息
来源: 评论
SLR: A Systematic Literature Review on Blockchain Applications in Healthcare
SLR: A Systematic Literature Review on Blockchain Applicatio...
收藏 引用
2021 International Conference on Information science and Communications Technologies, ICISCT 2021
作者: Arsheen, Sobiya Ahmad, Khaleel Maulana Azad National Urdu University Depart. of Computer Science and Information Technology Hyderabad India
In a very less time from its advent, blockchain technology has entered into mainstream research all over the world. The Bitcoin cryptocurrency is the first open-source implementation of blockchain technology. The appl... 详细信息
来源: 评论
Blockchain-Enabled Immunization System: A Novel Idea to Leverage Reliability and Traceability  3
Blockchain-Enabled Immunization System: A Novel Idea to Leve...
收藏 引用
3rd International Conference for Emerging technology, INCET 2022
作者: Arsheen, Sobiya Ahmad, Khaleel Maulana Azad National Urdu University Depart. of Computer Science and Information Technology Hyderabad India
Blockchain technology is one of the emerging technologies of the decade. Immutability, reliability, and distributed ledger are the main features of the blockchain, making this technology very popular in the short time... 详细信息
来源: 评论
Hill-down strategy based density clustering and its application to medical image data: (Work-in-progress)  2
Hill-down strategy based density clustering and its applicat...
收藏 引用
2nd International Conference on Scalable Information Systems, InfoScale 2007
作者: Xie, Conghua Chang, Jinyi Song, Yuqing Depart. of Computer Science and Engineering Changshu Institute of Technology 215500 China School of Computer Science and Engineering Jiangsu University 212013 China
In order to overcome problems of DENCLUE and improve it for medical image segmentation, we propose HD-DENCLUE algorithm. It takes the optimization step length to find density attractor, designs a hill-down strategy to... 详细信息
来源: 评论
Tourist: Self-adaptive structured overlay
Tourist: Self-adaptive structured overlay
收藏 引用
6th International Conference on Networking, ICN'07
作者: Zhang, Huanan Hu, Jinfeng Hong, Chunhui Wang, Dongsheng Depart. of Computer Science and Technology Tsinghua University Beijing China IBM China Research Lab Beijing China
Structured overlays provide a basic substrate for many peer-to-peer systems. Existing structured overlays can be classified into two categories, 0(logN)-hop ones and 0(1)-hop ones. The former are suitable for large an... 详细信息
来源: 评论
Sociodemographic Bias in Language Models: A Survey and Forward Path  5
Sociodemographic Bias in Language Models: A Survey and Forwa...
收藏 引用
5th Workshop on Gender Bias in Natural Language Processing, GeBNLP 2024, held in conjunction with the 62nd Annual Meeting of the Association for Computational Linguistics, ACL 2024
作者: Gupta, Vipul Venkit, Pranav Narayanan Wilson, Shomir Passonneau, Rebecca J. Depart. of Computer Science & Engineering College of Engineering United States College of Information Sciences and Technology Pennsylvania State University United States
Sociodemographic bias in language models (LMs) has the potential for harm when deployed in real-world settings. This paper presents a comprehensive survey of the past decade of research on sociodemographic bias in LMs... 详细信息
来源: 评论