咨询与建议

限定检索结果

文献类型

  • 3,321 篇 会议
  • 2,034 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,392 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,199 篇 工学
    • 2,008 篇 计算机科学与技术...
    • 1,541 篇 软件工程
    • 974 篇 信息与通信工程
    • 509 篇 电气工程
    • 487 篇 电子科学与技术(可...
    • 413 篇 控制科学与工程
    • 276 篇 生物工程
    • 217 篇 生物医学工程(可授...
    • 195 篇 光学工程
    • 179 篇 机械工程
    • 171 篇 仪器科学与技术
    • 152 篇 动力工程及工程热...
    • 121 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 99 篇 网络空间安全
    • 87 篇 安全科学与工程
  • 1,659 篇 理学
    • 829 篇 数学
    • 560 篇 物理学
    • 318 篇 生物学
    • 252 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 131 篇 化学
  • 731 篇 管理学
    • 483 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 238 篇 工商管理
  • 248 篇 医学
    • 201 篇 临床医学
    • 170 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 120 篇 法学
    • 89 篇 社会学
  • 92 篇 经济学
    • 91 篇 应用经济学
  • 91 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 20 篇 军事学
  • 11 篇 艺术学

主题

  • 159 篇 computer network...
  • 137 篇 computer science
  • 116 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 internet
  • 78 篇 computer archite...
  • 78 篇 wireless communi...
  • 73 篇 accuracy
  • 71 篇 computational mo...
  • 70 篇 routing
  • 69 篇 delay
  • 67 篇 resource managem...
  • 66 篇 monitoring
  • 66 篇 costs
  • 64 篇 feature extracti...
  • 63 篇 machine learning

机构

  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 department of ph...
  • 136 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 128 篇 università di ca...
  • 127 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 4,746 篇 英文
  • 559 篇 其他
  • 81 篇 中文
  • 9 篇 日文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5392 条 记 录,以下是3991-4000 订阅
排序:
Social network learning based on Blue-Red Trees inference and analysis of Rule-Space Model
Social network learning based on Blue-Red Trees inference an...
收藏 引用
IET International Conference on Frontier Computing. Theory, Technologies and Applications
作者: Yung-Hui Chen Yen-Da Chen Chiou-Yng Lee Martin M. Weng Neil Y. Yen Hui-Ju Lu Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan Department of Computer Science and Information Engineering Tamkang University Taiwan Industrial and Systems Engineering University of Southern California USA
It is getting important that applies social network of collaborative learning to intelligent distance learning system. In this paper, we used the Rule-Space Model to infer reasonable Blue-Red trees of learning perform...
来源: 评论
Optimal Content Transmission Policy in Publish-Subscribe Mobile Social networks
Optimal Content Transmission Policy in Publish-Subscribe Mob...
收藏 引用
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
作者: Dusit Niyato Ping Wang Ekram Hossain Yifan Li Center of Multimedia and Network Technology (CeMNet) School of Computer Engineering Nanyang Technological University Singapore Department of Electrical and Computer Engineering University of Manitoba Canada
We consider the problem of dynamic content distribution in publish-subscribe mobile social networks. Mobile users subscribe to the content provider. Then, when new content is created, the provider transmits it to subs... 详细信息
来源: 评论
Preserving Target Area Coverage in Wireless Sensor networks by Using Computational Geometry
Preserving Target Area Coverage in Wireless Sensor Networks ...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: San-Yuan Wang Kuei-Ping Shih Yen-Da Chen Hsin-Hui Ku Department of Computer Science and Information Engineering I-shou University Kaohsiung Taiwan Department of Computer Science and Information Engineering Tamkang University Taipei Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan Taiwan
The activity scheduling of sensors to alternately wake up for sensing obligation such that the network lifetime can be efficiently prolonged is a very important issue in wireless sensor networks (WSNs). Target area co... 详细信息
来源: 评论
Compact wideband bandpass filter using single corners-cut isosceles triangular patch resonator
收藏 引用
Progress In Electromagnetics Research C 2010年 14卷 227-237页
作者: Alhawari, A.R.H. Ismail, A. Centre of Excellence for Wireless and Photonics Network Department of Computer and Communication Systems Engineering Faculty of Engineering Universiti Putra Malaysia 43400 UPM Serdang Selangor Malaysia
Compact and simple bandpass filter (BPF) structure using microstrip isosceles triangular patch resonator (ITPR) is proposed. The new filter design technique is based on two main ideas: Firstly, cutting the corners of ... 详细信息
来源: 评论
Complex networks in climate science: Progress, opportunities and challenges
Complex networks in climate science: Progress, opportunities...
收藏 引用
NASA Conference on Intelligent Data Understanding, CIDU 2010
作者: Steinhaeuser, Karsten Chawla, Nitesh V. Ganguly, Auroop R. Department of Computer Science and Engineering Interdisciplinary Center for Network Science and Applications University of Notre Dame Notre Dame IN 46556 United States Geographic Information Science and Technology Group Computational Sciences and Engineering Division Oak Ridge National Laboratory Oak Ridge TN 37831 United States
networks have been used to describe and model a wide range of complex systems, both natural as well as man-made. One particularly interesting application in the earth sciences is the use of complex networks to represe... 详细信息
来源: 评论
Applying social media for encouraging mutual support and social creativity
Applying social media for encouraging mutual support and soc...
收藏 引用
18th International Conference on computers in Education: Enhancing and Sustaining New Knowledge Through the Use of Digital Technology in Education, ICCE 2010
作者: Tao, Shu-Yuan Chen, Wei-Hung Liu, Chen-Chung Liu, Baw-Jhiune Chuang, Tsung-Yen Department of Computer Science and Engineering Yuan Ze University Taiwan Graduate Institute of Network Learning Technology National Central University Taiwan Department of Information and Learning Technology National University of Tainan Taiwan Department of Information Management Chungyu Institute of Technology Taiwan
This study applied the features of social media to implement a picture book in facilitating the students collaborative creative activity. Based on Amabile's componential theory, this study evaluated the influences... 详细信息
来源: 评论
A learning assessment mechanism with learning map based on SPC Table
A learning assessment mechanism with learning map based on S...
收藏 引用
IEEE International Conference on Ubi-Media Computing
作者: Martin M. Weng Yung-Hui Chen Ching-Tang Hsieh Jiung-Yao Huang Yu-Ren Chen Department of Computer Science and Information Engineering Tamkang University Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan Department of Electrical Engineering Tamkang University Taiwan Department of Computer Science and Information Engineering National Taipei University Taiwan Department of Computer Science National Taiwan University of Education Taiwan
In traditional learning environment, it includes learning and testing. These two parts of learning behaviors are the most students doing when they are learning. Especially In distance learning,, the learning behavior ... 详细信息
来源: 评论
A concept of context-aware computing based on symbol grounding perspective
A concept of context-aware computing based on symbol groundi...
收藏 引用
2010 2nd International Symposium on Aware Computing, ISAC 2010
作者: Manabe, Yusuke Fujitat, Shigeru Konno, Susumu Hara, Hideki Sugawara, Kenji Department of Information and Network Science Chiba Institute of Technology Narashino-shi Chiba 275-0016 Japan Department of Computer Science Chiba Institute of Technology Narashino-shi Chiba 275-0016 Japan Department of Electrical Electronics and Computer Engineering Chiba Institute of Technology Narashino-shi Chiba 275-0016 Japan
Conventional context-aware system refers to an intelligent mobile system that can sense the Real Space (RS). Its essential functions are to understand the situation in RS as well as to supply suitable information or s... 详细信息
来源: 评论
Sequential type-I optimal normal basis multiplier and multiplicative inverse in GF(2m)
收藏 引用
Tamkang Journal of Science and engineering 2010年 第4期13卷 423-432页
作者: Chiou, Che Wun Lee, Chiou-Yng Yeh, Yun-Chi Department of Computer Science and Information Engineering Ching Yun University Chung-Li 320 Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan 333 Taiwan Department of Electronic Engineering Ching Yun University Chung-Li 320 Taiwan
This study presents a novel sequential Type-I optimal normal basis multiplier in GF(2m) with a regular structure. The proposed multiplier has a slightly higher space complexity than the Reyhani-Masoleh- Hasan's (R... 详细信息
来源: 评论
A Vagueness-based Obfuscation Technique for Protecting Location Privacy
A Vagueness-based Obfuscation Technique for Protecting Locat...
收藏 引用
IEEE International Conference on Social Computing (SocialCom)
作者: Jafar Haadi Jafarian Network Security and CERT Center Department of Computer Engineering Sharif University of Technology Tehran Iran
Technical evolution of location technologies has augmented the development and growth of location-based services. With widespread adoption of these services, threats to location privacy are increasing, entailing more ... 详细信息
来源: 评论