咨询与建议

限定检索结果

文献类型

  • 3,312 篇 会议
  • 2,013 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,362 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,174 篇 工学
    • 1,991 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 960 篇 信息与通信工程
    • 487 篇 电气工程
    • 475 篇 电子科学与技术(可...
    • 405 篇 控制科学与工程
    • 275 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 194 篇 光学工程
    • 172 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 99 篇 材料科学与工程(可...
    • 88 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,659 篇 理学
    • 831 篇 数学
    • 558 篇 物理学
    • 315 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 129 篇 化学
  • 725 篇 管理学
    • 483 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 158 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 103 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 78 篇 wireless communi...
  • 77 篇 computer archite...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 69 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 64 篇 costs
  • 64 篇 machine learning

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,062 篇 英文
  • 208 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5362 条 记 录,以下是4261-4270 订阅
排序:
EMP-DSR: An Enhanced Multi-path Dynamic Source Routing Algorithm for MANETs Based on Ant Colony Optimization
EMP-DSR: An Enhanced Multi-path Dynamic Source Routing Algor...
收藏 引用
Asia International Conference on Modeling & Simulation
作者: Ehsan Khosrowshahi Asl Morteza Damanafshan Maghsoud Abbaspour Majid Noorhosseini Kamran Shekoufandeh Computer Engineering and IT Department Amirkabir University of Technology슠 Tehran Iran IPM Network Department Tehran Iran Institute for Research in Fundamental Sciences Tehran Tehran IR
Routing in MANETs becomes a more sophisticated issue especially when a certain QoS requirement is to be satisfied. One of the most important QoS metrics is end-to-end reliability. Multi-path routing can be considered ... 详细信息
来源: 评论
Efficient Schnorr Type Identity-Based Blind Signatures from Bilinear Pairings
Efficient Schnorr Type Identity-Based Blind Signatures from ...
收藏 引用
computer Science and Information engineering, CSIE, WRI World Congress on FLAGGED
作者: Zhenjie Huang Qunshan Chen Rufen Huang Xuanzhi Lin Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Computer Science and Engineering Zhangzhou Normal University Zhengzhou China
Identity-based cryptosystem has a property that a user's public key can be easily calculated from his identity by a publicly available function, and can be hence a good alternative for certificate-based public key... 详细信息
来源: 评论
A Hybrid Algorithm for Partner Selection in Market Oriented Cloud Computing
A Hybrid Algorithm for Partner Selection in Market Oriented ...
收藏 引用
International Conference on Management and Service Science, MASS
作者: Biao Song M. M. Hassan Eui-Nam Huh Chang-Woo Yoon Hyun-Woo Lee Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University South Korea Electronics and Telecommunications Research Institute South Korea
In our previous paper, we proposed a novel combinatorial auction (CA) based cloud market model for trading services that allows cloud providers (CPs) to make groups and submit their bids collaboratively as a single bi... 详细信息
来源: 评论
An improved Outlier Detection Method in high-dimension Based on Weighted Hypergraph  2nd
An improved Outlier Detection Method in high-dimension Based...
收藏 引用
Second International Symposium on Electronic Commerce and Security(第二届电子商务与安全国际研究大会)(ISECS 2009)
作者: ChangZhen Hu YinZhao Li Di Wu JiaDong Ren Lab of Computer Network Defense Technology Beijing Institute of Technology Beijing 100081 China Department of Information and Electronic Engineering Hebei University of Engineering Handan 056038 College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China School o
Outlier detection in high-dimensional space is a hot topic in data mining, the main goal is to find out a small quantity of data objects with abnormal behavior in data set. In this paper, the concepts of the feature v... 详细信息
来源: 评论
Lightwave measurement and characterization in passive optical network (PON)
Lightwave measurement and characterization in passive optica...
收藏 引用
International Conference on Space Science and Communication (IconSpace)
作者: Ng Boon Chuan Mohammad Syuhaimi Ab-Rahman Spectrum Technology Research Division Computer and Network Security Research Group Department of Electrical Electronics and Systems Engineering Faculty of Engineering and Built Environment Universiti Kebangsaan Malaysia Bangi Selangor Darul Ehsan Malaysia
The objective of this study is to determine and troubleshoot the problems of using handheld optical power meter and optical time domain reflectometer (OTDR) for monitoring and troubleshooting a conventional passive op... 详细信息
来源: 评论
Portable network Monitoring System for Passive Optical network (PON)
Portable Network Monitoring System for Passive Optical Netwo...
收藏 引用
International Conference on computer Technology and Development (ICCTD)
作者: Boonchuan Ng Mohammad Syuhaimi Ab-Rahman Aswir Premadi Kasmiran Jumari Spectrum Technology Research Division Computer and Network Security Research Group Department of Electrical Electronics and Systems Engineering Faculty of Engineering and Built Environment Universiti Kebangsaan Malaysia Bangi Selangor Darul Ehsan Malaysia
A real-time optical network monitoring system named Smart Access network _ Testing, Analyzing and Database (SANTAD) that combined remote controlling, centralized monitoring and troubleshooting, fault detection, optica... 详细信息
来源: 评论
Application of SANTAD in network monitoring and fault detection of FTTH-PON
Application of SANTAD in network monitoring and fault detect...
收藏 引用
International Conference on Electrical engineering and Informatics, ICEEI
作者: Ng Boon Chuan Mohammad Syuhaimi Ab-Rahman Aswir Premadi Kasmiran Jumari Spectrum Technology Research Division Computer and Network Security Research Group Department of Electrical Electronics and Systems Engineering Faculty of Engineering and Built Environment Universiti Kebangsaan Malaysia Bangi Selangor Darul Ehsan Malaysia
This paper presented a new approach to monitor the network performance and detect any occurrence of fault in fiber-to-the-home passive optical network (FTTH-PON) using an efficient monitoring system named Smart Access... 详细信息
来源: 评论
A Role and Task-Based Workflow Dynamic Authorization Modeling and Enforcement Mechanism
A Role and Task-Based Workflow Dynamic Authorization Modelin...
收藏 引用
International Conference on Information Science and engineering (ICISE)
作者: Xiangrong Zu Lianzhong Liu Yan Bai Computer Science & Technology Department North China electric power university Beijing China Key Laboratory of Beijing network technology School of computer Science & engineering Beihang University Beijing China Automation Science & engineering Department North China electric power university Beijing China
Current workflow products can support more complex modeling of business processes, workflow engine mechanism is well researched, but the link between organizational elements and process activities is less well underst... 详细信息
来源: 评论
network intrusion detection and classification with Decision Tree and rule based approaches
Network intrusion detection and classification with Decision...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Thanvarat Komviriyavut Phurivit Sangkatsanee Naruemon Wattanapongsakorn Chalermpol Charnsripinyo Department of Computer Engineering King Mongkut's University of Technology Thonburi Bangkok Thailand Network Technology Laboratory National Electronics and Computer Technology Center Klong Luang Pathum Thani Thailand
Together with the extensive deployment of computer networks, the number of network attacks is greatly increasing. These attacks affect to availability and quality of services of the networks as well as confidentiality... 详细信息
来源: 评论
Access point evaluation using packet transfer ratio in multihop wireless networks
Access point evaluation using packet transfer ratio in multi...
收藏 引用
International Conference on Information networking
作者: Daiki Nobayashi Yutaka Nakamura Takeshi Ikenaga Yoshiaki Hori Katsuichi Nakamura Hiroshi Ishinishi Syuuji Kaizaki Department of Electrical Electronic and Computer Engineering Kyushu Institute of Technology Fukuoka Japan Information Science Center Kyushu Institute of Technology Fukuoka Japan Department of Computer Science and Communication Engineering Kyushu University Fukuoka Japan Network Application Engineering Laboratories Limited Fukuoka Japan Kyushu Electric Power Company Inc. Fukuoka Japan
In a multihop wireless network (MWN), access points (APs) in an MWN should provide high reliability to improve network availability. However, APs do not always work well. An AP may stop functioning due to a power outa... 详细信息
来源: 评论