咨询与建议

限定检索结果

文献类型

  • 3,313 篇 会议
  • 2,002 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,189 篇 工学
    • 1,975 篇 计算机科学与技术...
    • 1,519 篇 软件工程
    • 955 篇 信息与通信工程
    • 490 篇 电气工程
    • 485 篇 电子科学与技术(可...
    • 400 篇 控制科学与工程
    • 275 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 169 篇 仪器科学与技术
    • 150 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 116 篇 材料科学与工程(可...
    • 91 篇 核科学与技术
    • 87 篇 网络空间安全
  • 1,649 篇 理学
    • 834 篇 数学
    • 557 篇 物理学
    • 315 篇 生物学
    • 261 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 130 篇 化学
  • 720 篇 管理学
    • 478 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 234 篇 工商管理
  • 240 篇 医学
    • 196 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
  • 120 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 91 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 160 篇 computer network...
  • 137 篇 computer science
  • 116 篇 bandwidth
  • 106 篇 hadron colliders
  • 103 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 78 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 computational mo...
  • 70 篇 routing
  • 68 篇 delay
  • 67 篇 resource managem...
  • 66 篇 costs
  • 65 篇 monitoring
  • 64 篇 feature extracti...
  • 63 篇 machine learning

机构

  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 138 篇 rwth aachen univ...
  • 138 篇 department of ph...
  • 136 篇 università di to...
  • 136 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 128 篇 università di ca...
  • 127 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 4,854 篇 英文
  • 410 篇 其他
  • 81 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5352 条 记 录,以下是4141-4150 订阅
排序:
Ontology-oriented SCJP learning and assessing system design
Journal of Software
收藏 引用
Journal of Software 2009年 第2期4卷 159-166页
作者: Deng, Lawrence Y. Chen, Yung-Hui Liu, Yi-Jen Chang, Yu-Chi Department Computer Science and Information Engineering St. John's University Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan Department of Computer Science and Information Engineering Tamkang University Taiwan
In this paper, we proposed an advanced Petri Net model to manage the workflow of a web-based multiple participants in virtual University. The presented approach not only can conspicuously help the developer to compreh... 详细信息
来源: 评论
Efficient Schnorr type identity-based blind signatures from bilinear pairings
Efficient Schnorr type identity-based blind signatures from ...
收藏 引用
2009 WRI World Congress on computer Science and Information engineering, CSIE 2009
作者: Zhenjie, Huang Qunshan, Chen Rufen, Huang Xuanzhi, Lin Department of Computer Science and Engineering Zhangzhou Normal University Zhangzhou 363000 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
Identity-based cryptosystem has a property that a user's public key can be easily calculated from his identity by a publicly available function, and can be hence a good alternative for certificate-based public key... 详细信息
来源: 评论
An optimized design for serial-parallel finite field multiplication over GF(2m) based on all-one polynomials
An optimized design for serial-parallel finite field multipl...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: P. K. Meher Yajun Ha Chiou-Yng Lee School of Computer Engineering Nanyang Technological University Singapore Department of Electrical & Computer Engineering National University of Singapore Singapore Department of Computer Information & Network Engineering Lunghwa University Taoyuan Taiwan
In this paper, we derive a recursive algorithm for finite field multiplication over GF(2 m ) based on irreducible all-one-polynomials (AOP), where the modular reduction of degree is achieved by cyclic-left-shift witho... 详细信息
来源: 评论
A centralized traffic control mechanism for evacuation of emergency vehicles using the DSRC protocol
A centralized traffic control mechanism for evacuation of em...
收藏 引用
2009 4th International Symposium on Wireless and Pervasive Computing, ISWPC 2009
作者: Huang, Chung-Ming Yang, Chia-Ching Tseng, Chun-Yu Chou, Chih-Hsun Laboratory of Multimedia Mobile Networking Department of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan Network and Multimedia Research Institute Institute for Information Industry Taipei Taiwan
Emergency service vehicles need safety and fluent paths to save time. In this paper, a centralized traffic control mechanism is proposed for the evacuation of vehicles that drive toward the dedicated path of the emerg... 详细信息
来源: 评论
An implementation of positioning system in indoor environment based on active RFID
An implementation of positioning system in indoor environmen...
收藏 引用
Joint Conferences on Pervasive Computing (JCPC)
作者: Ching-Sheng Wang Chun-Hong Huang Yong-Si Chen Li-Jie Zheng Department of Computer Science & Information Engineering Aletheia University Taiwan Department of Computer Information & Network Engineering Lunghwa University of Science and Technology Taiwan Department of Computer Science & Information Engineering Tamkang University Taiwan
The Radio Frequency Identification (RFID) positioning based on the signal strength is the well know and feasible method. But the researches based on signal strength only usually make unsatisfied positioning error beca... 详细信息
来源: 评论
Fault Tolerant Dual Basis Multiplier Over GF (2m)
Fault Tolerant Dual Basis Multiplier Over GF (2m)
收藏 引用
IEEE Circuits and Systems International Conference on Testing and Diagnosis, ICTD
作者: Chiou-Yng Lee Pramod Kumar Meher Department Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan Taiwan Department School of Computer Engineering Nanyang Technological University Singapore
To fight against fault based side-channel cryptanalysis, a bit-parallel systolic dual basis multiplier using a time redundancy scheme is presented. This scheme is based on the extended dual multiplication to achieve t... 详细信息
来源: 评论
Design and implementation of a new integrated e-commerce system based on AJAX
收藏 引用
Journal of Computational Information Systems 2009年 第2期5卷 755-762页
作者: Wei, Chuyuan Lv, Cheng Zhang, Mian Department of Computer Instruction and Network Information Beijing University of Civil Engineering and Architecture Beijing 100044 China
Web services and AJAX technology is an application communication standard, component model and programming language that can solve the problems with enterprises' business integration. A new business logic framewor... 详细信息
来源: 评论
Improvement of Bonding driver and application to parallel processing on commodity PC cluster
Improvement of Bonding driver and application to parallel pr...
收藏 引用
SICE Annual Conference
作者: Takafumi Fukunaga Department of Computer Network Engineering Kumamoto Prefectural College of Technology Kumamoto Japan
We have studied various methods for improving the performance of PC clusters. Most of them have used special hardware, non standard protocols, so that need special added library and complex programming, tending to rai... 详细信息
来源: 评论
An intruder avoidance vulnerable path adjustment protocol for wireless mobile sensor networks
An intruder avoidance vulnerable path adjustment protocol fo...
收藏 引用
Joint Conferences on Pervasive Computing (JCPC)
作者: Kuei-Ping Shih Chun-Chih Li Yen-Da Chen Department of Computer Science & Information Engineering Tamkang University Taipei Taiwan Department of Computer Information & Network Engineering Lunghwa University of Science and Technology Taiwan
The paper proposes a protocol to adjust the vulnerable path by using mobile sensor networks. The objective of vulnerable adjustment is to protect some important areas, named TBP (to-be-protected) areas in the paper, f... 详细信息
来源: 评论
Dissemination of Data Aggregation in Vehicular Ad Hoc networks
Dissemination of Data Aggregation in Vehicular Ad Hoc Networ...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and networks (ISPAN)
作者: Hua-Wen Tsai Tzung-Shi Chen Sheng-Kai Lin Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan Department of Computer Science and Information Engineering National University of Tainan Taiwan
Inquiring traffic information is an important issue in vehicular ad hoc networks. This paper proposes an aggregating data dissemination algorithm in vehicular ad hoc networks. This algorithm can offer the various degr... 详细信息
来源: 评论