咨询与建议

限定检索结果

文献类型

  • 3,313 篇 会议
  • 2,007 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,357 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,183 篇 工学
    • 1,976 篇 计算机科学与技术...
    • 1,520 篇 软件工程
    • 955 篇 信息与通信工程
    • 489 篇 电气工程
    • 484 篇 电子科学与技术(可...
    • 400 篇 控制科学与工程
    • 275 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 169 篇 仪器科学与技术
    • 150 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 115 篇 材料科学与工程(可...
    • 87 篇 网络空间安全
    • 86 篇 安全科学与工程
  • 1,651 篇 理学
    • 835 篇 数学
    • 557 篇 物理学
    • 316 篇 生物学
    • 261 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 130 篇 化学
  • 720 篇 管理学
    • 478 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 234 篇 工商管理
  • 241 篇 医学
    • 196 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 120 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 91 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 159 篇 computer network...
  • 137 篇 computer science
  • 116 篇 bandwidth
  • 106 篇 hadron colliders
  • 104 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 78 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 73 篇 accuracy
  • 71 篇 computational mo...
  • 70 篇 routing
  • 69 篇 delay
  • 67 篇 resource managem...
  • 66 篇 costs
  • 65 篇 monitoring
  • 64 篇 feature extracti...
  • 63 篇 machine learning

机构

  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 department of ph...
  • 136 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 128 篇 università di ca...
  • 127 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 4,858 篇 英文
  • 411 篇 其他
  • 81 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5357 条 记 录,以下是3961-3970 订阅
排序:
A Vagueness-based Obfuscation Technique for Protecting Location Privacy
A Vagueness-based Obfuscation Technique for Protecting Locat...
收藏 引用
IEEE International Conference on Social Computing (SocialCom)
作者: Jafar Haadi Jafarian Network Security and CERT Center Department of Computer Engineering Sharif University of Technology Tehran Iran
Technical evolution of location technologies has augmented the development and growth of location-based services. With widespread adoption of these services, threats to location privacy are increasing, entailing more ... 详细信息
来源: 评论
Web-Based Instruction Diffusion and Adoption Model
Web-Based Instruction Diffusion and Adoption Model
收藏 引用
International Conference on Information Technology and computer Science, ITCS
作者: Yajie Wang Hongyu Du Ying Hao Department Computer Teaching and Network Information Beijing University of Civil Engineering and Architecture Beijing China
This article proposed that Web-Based Instruction (WBI) diffusion in colleges and universities was an innovation. Under the guidance of Diffusion of Innovation theory, the article described the WBI diffusion and adopti... 详细信息
来源: 评论
Capability-Centric Attack Model for network Security Analysis
Capability-Centric Attack Model for Network Security Analysi...
收藏 引用
2010 2nd International Conference on Signal Processing System(2010年信号处理系统国际会议 ICSPS 2010)
作者: Shunhong Song Huan Yuan Yuliang Lu Weiwei Cheng Department of Network Engineering Electronic Engineering Institute Hefei 230037 China Department of Computer Research JiangNan Institute of Computing Technology Wuxi 214083 China
Most network attack models have the problem of lacking ablility to describe all types of attack patterns in deltail, with no consideration of attacker's skill and policy. To address the problem, this paper pro... 详细信息
来源: 评论
BotDigger: A Fuzzy Inference System for Botnet Detection
BotDigger: A Fuzzy Inference System for Botnet Detection
收藏 引用
International Conference on Internet Monitoring and Protection, ICIMP
作者: Basheer Al-Duwairi Lina Al-Ebbini Network Engineering and Security Department Jordan University of Science and Technology Irbid Jordan Computer Engineering Department Jordan University of Science and Technology Irbid Jordan
This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algor... 详细信息
来源: 评论
Nonlinear effects in actively mode-locked fiber lasers
Nonlinear effects in actively mode-locked fiber lasers
收藏 引用
作者: Lam, Huy Quoc Binh, Le Nguyen Shum, Ping Temasek Laboratory at NTU Nanyang Technological University Singapore Singapore Electrical and Computer Systems Engineering Department Monash University Australia Network Technology Research Centre Nanyang Technological University Singapore Singapore
Nonlinear effects in actively mode-locked fiber lasers are presented. A laser model including a gain media, a band pass filter, optical fiber and an intensity modulator is introduced to investigate the performance of ... 详细信息
来源: 评论
Improving the performance of a parallel data mining algorithm using communication message scheduling
Improving the performance of a parallel data mining algorith...
收藏 引用
International Conference on Electrical engineering/Electronics, computer, Telecommunications and Information Technology, ECTI-CON
作者: Nunnapus Benjamas Putchong Uthayopas High Performance Computing and Network Center (HPCNC) Department of Computer Engineering Kasetsart University Bangkok Thailand
In this paper, we propose several strategies for communication scheduling that can help increase the speed of parallel data mining algorithm. The proposed method based on the smart scheduling that enable parallel data... 详细信息
来源: 评论
The future data center for e-governance
The future data center for e-governance
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Sok Chuob Manish Pokharel Jong Sou Park Network and Embedded Security Laboratory Computer Engineering Department Korea Aerospace University Goyang South Korea
Data center facilitates the e-governance system. Data center is a huge repository of data that is required by every stakeholders of e-governance system. It consists of many sensitive governments' data. Access of t... 详细信息
来源: 评论
Estimation of communication signal strength in robotic networks
Estimation of communication signal strength in robotic netwo...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Yasamin Mostofi Mehrzad Malmirchegini Alireza Ghaffarkhah Cooperative Network Lab Department of Electrical and Computer Engineering University of New Mexico Albuquerque NM USA
In this paper we consider estimating the spatial variations of a wireless channel based on a small number of measurements in a robotic network. We use a multi-scale probabilistic model in order to characterize the cha... 详细信息
来源: 评论
Design and formal analysis of a new fair Multi-Party Certified Mail Protocol
Design and formal analysis of a new fair Multi-Party Certifi...
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Gao, Yue-Xiang Peng, Dai-Yuan Yan, Li -Li School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China School of Computer Science SiChuan Normal University Chengdu 610068 China Department of Network Engineering Chengdu University of Information Technology Chengdu 610225 China
Fair Multi-Party Certified Mail Protocol is a value service to deliver important data over internet with guaranteed receipt for each successful delivery. Therefore, the protocol needs to be Confidential, Non-repudiati... 详细信息
来源: 评论
An adaptive multi-heuristic ant colony system for finding optimal elimination orderings in Bayesian networks
An adaptive multi-heuristic ant colony system for finding op...
收藏 引用
International Conference on Electrical engineering Computing Science and Automatic Control
作者: Dong, Xuchu Zhang, Yonggang Cai, Dianbo Yu, Haihong Ye, Yuxin Department of Computer Science and Technology Jilin University China Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of Education China Network Monitor Maintenance Centre of Jilin Branch China Telecom Corporation Limited Changchun Jilin China
To find an optimal elimination ordering for Bayesian networks, a multi-heuristic-based ant colony system named MHC-HS-ACS is proposed. MHC-HS-ACS uses a set of heuristics to guide the ants to search solutions. The heu... 详细信息
来源: 评论