咨询与建议

限定检索结果

文献类型

  • 3,314 篇 会议
  • 2,023 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,184 篇 工学
    • 1,995 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 966 篇 信息与通信工程
    • 493 篇 电气工程
    • 476 篇 电子科学与技术(可...
    • 409 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 89 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,660 篇 理学
    • 831 篇 数学
    • 559 篇 物理学
    • 314 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 130 篇 化学
  • 724 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 157 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 65 篇 machine learning
  • 64 篇 costs

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,066 篇 英文
  • 216 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5374 条 记 录,以下是4401-4410 订阅
排序:
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Se...
收藏 引用
International Conference on networking (ICN)
作者: Sanjeev Kumar Einar Petana Network Research Laboratory Department of Electrical/Computer Engineering University of Texas-PanAmerican Edinburgh TX UK
TCP-SYN attack is one of the commonly used DDoS attacks aimed at bringing down a computer system connected to Internet. There has been an increased targeting of Windows end-users and servers. The attackers and intrude... 详细信息
来源: 评论
Adaptive route maintenance strategy for dynamic source routing protocol
Adaptive route maintenance strategy for dynamic source routi...
收藏 引用
IFIP International Conference on Wireless and Optical Communications networks (WOCN)
作者: Muhammad Farhan Sjaugi Mohamed Othman Mohd. Fadlee A. Rasid Department of Communication Technology and Network Faculty of Computer Science and Information Technology Malaysia Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia Selangor Darul Ehsan Malaysia
Dynamic Source Routing (DSR) [1,2], which is an on-demand routing protocol, becomes the most popular source routing protocol for MANET. Each mobile node is required to maintain route caches that contain the source rou... 详细信息
来源: 评论
Behavior analysis of spam botnets
Behavior analysis of spam botnets
收藏 引用
International Conference on Communication Systems Software and Middleware (COMSWARE)
作者: Husain Husna Santi Phithakkitnukoon Srikanth Palla Ram Dantu Network Security Laboratory Department of Computer Science and Engineering University of North Texas Denton TX USA
Compromised computers, known as bots, are the major source of spamming and their detection helps greatly improve control of unwanted traffic. In this work we investigate the behavior patterns of spammers based on thei... 详细信息
来源: 评论
Research on the Solving Scheme of E-Commerce System Based on Web Services
Research on the Solving Scheme of E-Commerce System Based on...
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Ying Hao Cheng Lv Department of Computer Instruction&Network Information Beijing University of Civil Engineering and Architecture Beijing China
The problems and drawbacks of existing e-commerce systems are discussed in this paper. A new solving scheme for modern e-commerce system framework is presented. And then, the solution of sharing function and data for ... 详细信息
来源: 评论
Analysis of Offline Fair Exchange Protocols in Strand Spaces
Analysis of Offline Fair Exchange Protocols in Strand Spaces
收藏 引用
International Conference on Computational Intelligence and Security
作者: Xiangdong Li Qingpu Guo Qingxian Wang Department of Network Engineering Information and Engineering University Zhengzhou Henan China Computer Center Henan University of Finance and Economics Zhengzhou Henan China
Formal and efficient protocol analysis by pen and paper is highly desired when informal and model-checking methods are not trusted in proving correctness of complicated e-commerce protocols. Based on strand spaces, th... 详细信息
来源: 评论
Cartoon repairing via color segmentation and Bézier curves
Cartoon repairing via color segmentation and Bézier curves
收藏 引用
IEEE International Conference on Ubi-Media Computing
作者: Chun-Hong Huang Jason C. Hung Nick C. Tang Ta-jen Chen Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan Department of Information Technology Overseas Chinese Institute of Technology China Department of Computer Science and Information Engineering Tamkang University Taiwan
In this paper, we propose a new inpainting algorithm based on color segmentation to preserve the structure of image. We use color segmentation to construct contour lines, and estimate the slope of contour lines and ho... 详细信息
来源: 评论
Geographic convergecast in wireless sensor networks
Geographic convergecast in wireless sensor networks
收藏 引用
IFIP Wireless Days, WD
作者: Tzung-Shi Chen Hua-Wen Tsai Yu-Hsin Chang Department of Computer Science and Information Engineering National University of Tainan Tainan Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan Taiwan Graduate Institute of Communication Engineering National University of Tainan Tainan Taiwan
This paper presents a novel Virtual Circle Combined Straight Routing (VCCSR) algorithm for a mobile sink to collect data in wireless sensor networks. Tree-based routing is a common scheme to collect data from sensors ... 详细信息
来源: 评论
Programmable Numerical Function Generators for Two-Variable Functions
Programmable Numerical Function Generators for Two-Variable ...
收藏 引用
Euromicro Symposium on Digital System Design
作者: Shinobu Nagayama Jon T. Butler Tsutomu Sasao Department of Computer and Network Engineering Hiroshima City University Hiroshima Japan Department of Electrical and Electronics Engineering Naval Postgraduate School CA USA Department of Computer Science and Electronics Kyushu Institute of Technology Iizuka Japan
This paper proposes a design method and programmable architectures for numerical function generators (NFGs) of two-variable functions. To realize a two-variable function in hardware, we partition a given domain of the... 详细信息
来源: 评论
Efficient one-copy MPI shared memory communication in Virtual Machines
Efficient one-copy MPI shared memory communication in Virtua...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Wei Huang Matthew J. Koop Dhabaleswar K. Panda Network-Based Computing Laboratory Department of Computer Science and Engineering Ohio State Uinversity Colombus OH USA
Efficient intra-node shared memory communication is important for high performance computing (HPC), especially with the emergence of multi-core architectures. As clusters continue to grow in size and complexity, the u... 详细信息
来源: 评论
End-User IPTV Traffic Measurement of Residential Broadband Access networks
End-User IPTV Traffic Measurement of Residential Broadband A...
收藏 引用
IEEE network Operations and Management Symposium Workshops (NOMS Workshops)
作者: Young J. Won Mi-Jung Choi Byung-Chul Park James W. Hong Hee-Won Lee Chan-Kyu Hwang Jae-Hyoung Yoo Department of Computer Science & Engineering POSTECH Pohang South Korea Network Technology Laboratory Daejeon South Korea
Offering IPTV to broadband access subscribers is a key challenge as well as a prospective revenue source for ISPs. Despite of its growing interest, no comprehensive study has presented the traffic details of real-worl... 详细信息
来源: 评论