咨询与建议

限定检索结果

文献类型

  • 3,313 篇 会议
  • 2,002 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,189 篇 工学
    • 1,975 篇 计算机科学与技术...
    • 1,519 篇 软件工程
    • 955 篇 信息与通信工程
    • 490 篇 电气工程
    • 485 篇 电子科学与技术(可...
    • 400 篇 控制科学与工程
    • 275 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 169 篇 仪器科学与技术
    • 150 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 116 篇 材料科学与工程(可...
    • 91 篇 核科学与技术
    • 87 篇 网络空间安全
  • 1,649 篇 理学
    • 834 篇 数学
    • 557 篇 物理学
    • 315 篇 生物学
    • 261 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 130 篇 化学
  • 720 篇 管理学
    • 478 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 234 篇 工商管理
  • 240 篇 医学
    • 196 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 87 篇 药学(可授医学、理...
  • 120 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 91 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 160 篇 computer network...
  • 137 篇 computer science
  • 116 篇 bandwidth
  • 106 篇 hadron colliders
  • 103 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 78 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 computational mo...
  • 70 篇 routing
  • 68 篇 delay
  • 67 篇 resource managem...
  • 66 篇 costs
  • 65 篇 monitoring
  • 64 篇 feature extracti...
  • 63 篇 machine learning

机构

  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 138 篇 rwth aachen univ...
  • 138 篇 department of ph...
  • 136 篇 università di to...
  • 136 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 128 篇 università di ca...
  • 127 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 4,854 篇 英文
  • 410 篇 其他
  • 81 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5352 条 记 录,以下是4171-4180 订阅
排序:
Trends in middleware abstarction for context dissemination in mobile Ad-Hoc netwok
收藏 引用
Journal of Applied Sciences 2009年 第1期9卷 1-14页
作者: Hakami, V. Dehghan, Mehdi Wireless Network Laboratory Department of IT and Computer Engineering Amirkabir University of Technology No. 424 Hafez Street Tehran Iran
Context dissemination completes the value chain of contextual information procurement and is identified as a precondition to actual context use by enlarging the visibility scope of context sources beyond the local acq... 详细信息
来源: 评论
Call capacity improvement techniques for VoIP over Wireless Mesh networks
Call capacity improvement techniques for VoIP over Wireless ...
收藏 引用
International Conference on Electrical engineering/Electronics, computer, Telecommunications and Information Technology, ECTI-CON
作者: Wason Liwlompaisan Anan Phonphoem Intelligent Wireless Network Group (IWING) Department of Computer Engineering Kasetsart University Bangkok Thailand
Due to the high overhead characteristics of wireless mesh network, the call capacity of VoIP is dramatically degraded. In the paper, the Aggregation Aware Routing with Path Separation (AAR-PS) protocol has been propos... 详细信息
来源: 评论
Handling Context in a Semantic-Based Access Control Framework
Handling Context in a Semantic-Based Access Control Framewor...
收藏 引用
International Conference on Advanced Information networking and Applications Workshops (AINAW)
作者: Moussa A. Ehsan Morteza Amini Rasool Jalili Sharif Network Security Center Department of Computer Engineering Sharif University of Technology Tehran Iran
As semantic Web grows, security concerns increase. One concern is controlling accesses to resources in this environment. In order to infer whether the access is allowed or not, different information of different entit... 详细信息
来源: 评论
Credit-based network management
Credit-based network management
收藏 引用
1st International Conference on Communication Systems and networks and Workshops, COMSNETS 2009
作者: Jilong, Wang Chiu, Dah Ming Lui, John C.S. Tsinghua National Lab. for IS and Tech Network Research Center Tsinghua University China Information Engineering Department The Chinese University of Hong Kong Hong Kong Computer Science and Eng. Department The Chinese University of Hong Kong Hong Kong
Increasingly, a computer network administrator's job is pre-occupied with user behavioral problems rather than physical failures of network and system components. A small number of malicious users can cause proble... 详细信息
来源: 评论
Optimal power allocation for minimizing visual distortion over MIMO communication systems
Optimal power allocation for minimizing visual distortion ov...
收藏 引用
2009 IEEE International Conference on Image Processing, ICIP 2009
作者: Park, Jincheol Jang, Uk Oh, Taegeun Lee, Sanghoon Bovik, Alan C. Wireless Network Lab. Center for IT Yonsei University Seoul 120-749 Korea Republic of Taejeon 305-700 Korea Republic of Department of Electrical and Computer Engineering University of Texas at Austin Austin TX United States
A recent dynamic increase in demand for wireless multimedia services has greatly accelerated the research on cross layer optimization techniques for transmitting multimedia data over wireless channel. In this paper, w... 详细信息
来源: 评论
The DCM-based web information filtering algorithm and its application
The DCM-based web information filtering algorithm and its ap...
收藏 引用
2009 International Workshop on Intelligent Systems and Applications, ISA 2009
作者: Luo, Chang-Ri Zhang, Fan Zhang, Xin-Hua School of Network Education Central China Normal University Wuhan 430079 China Information Management Department of Central China Normal University Wuhan 430079 China Computer Application and Engineering Department Wuhan Vocational College of Software and Engineerring Wuhan 430205 China
In the past few years, as the volume of junk information on the internet has grown tremendously, researchers' begun to handle this issue. In this paper, an algorithm, called DCM (Discriminative Category Matching) ... 详细信息
来源: 评论
Communication-aware target tracking using navigation functions - Centralized case
Communication-aware target tracking using navigation functio...
收藏 引用
International Conference on Robot Communication and Coordination, ROBOCOMM
作者: Alireza Ghaffarkhah Yasamin Mostofi Cooperative Network Lab Department of Electrical and Computer Engineering University of New Mexico Albuquerque NM USA
In this paper we consider a team of robots that are tasked with tracking a moving target cooperatively, while maintaining their connectivity to a base station and avoiding collision. We propose a novel extension of th... 详细信息
来源: 评论
A Novel Cloud Market Infrastructure for Trading Service
A Novel Cloud Market Infrastructure for Trading Service
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Biao Song Mohammad Mehedi Hassan Eui-Nam Huh Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University South Korea
In this paper, we present a novel combinatorial auction (CA) based trading infrastructure to enable the supply and demand of Cloud services from different Cloud providers (CP). We propose a new auction policy that con... 详细信息
来源: 评论
Profiling Node Conditions of Distributed System with Sequential Pattern Mining
Profiling Node Conditions of Distributed System with Sequent...
收藏 引用
Software Technologies for Future Dependable Distributed Systems
作者: Yu Hirate Hayato Yamana Media Network Center Waseda University Japan Department of Computer Science and Engineering Waseda University Japan
Recently, with wide-spread of distributed systems, distributed monitoring systems are needed to mange such systems. However, since monitoring architecture of distributed system faces a huge amount of log data which co... 详细信息
来源: 评论
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web
A Temporal Description Logic Based Access Control Model for ...
收藏 引用
International Workshop on Policies for Distributed Systems and networks
作者: Fathieh Faghih Morteza Amini Rasool Jalili Sharif Network Security Center (NSC) Department of Computer Engineering Sharif University of Technology Tehran Iran
An access control model for semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontol... 详细信息
来源: 评论