咨询与建议

限定检索结果

文献类型

  • 3,314 篇 会议
  • 2,023 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,184 篇 工学
    • 1,995 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 966 篇 信息与通信工程
    • 493 篇 电气工程
    • 476 篇 电子科学与技术(可...
    • 409 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 89 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,660 篇 理学
    • 831 篇 数学
    • 559 篇 物理学
    • 314 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 130 篇 化学
  • 724 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 157 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 65 篇 machine learning
  • 64 篇 costs

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,066 篇 英文
  • 216 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5374 条 记 录,以下是4501-4510 订阅
排序:
A Novel Quantitative Analysis Model for Information System Survivability Based on Conflict Analysis
收藏 引用
Tsinghua Science and Technology 2007年 第S1期12卷 217-222页
作者: 王健 王慧强 赵国生 Department of Computer Science and Technology Harbin Engineering University Center of Computer Network and Information Harbin Normal UniversityHarbin 150001China
This paper describes a novel quantitative analysis model for system survivability based on conflict analysis, which provides a direct-viewing survivable situation. Based on the three-dimensional state space of conflic... 详细信息
来源: 评论
Finite field polynomial multiplier with linear feedback shift register
收藏 引用
Tamkang Journal of Science and engineering 2007年 第3期10卷 253-264页
作者: Chiou, Che-Wun Lee, Chiou-Yng Lin, Jim-Min Department of Computer Science and Information Engineering Ching Yun University Chung-Li 320 Taiwan Department of Computer Information and Network Engineering Lung Hwa University of Science and Technology Taoyuan 333 Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung 407 Taiwan
We will present an one-dimensional polynomial basis array multiplier for performing multiplications in finite field GF(2m). A linear feedback shift register is employed in our proposed multiplier for reducing space co... 详细信息
来源: 评论
A tele-emergent system for long-term ECG monitoring over wireless sensor network
收藏 引用
Biomedical engineering - Applications, Basis and Communications 2007年 第3期19卷 187-197页
作者: Hsiao, C.C. Lee, R.G. Chou, I.C. Lin, C.C. Huang, D.Y. Department of Electrical Engineering National Taiwan University Taipei Taiwan Department of Computer and Information Network Engineering Lunghwa University of Science and Technology Taoyuang Taiwan Department of Electronic Engineering National Taipei University of Technology Taipei Taiwan Department of Computer Science and Information Engineering Chang Gung University Taoyuang Taiwan
This paper presents the design and implementation of a tele-emergent system to provide constant monitoring of cardiac patients. Our system is consisted of a user integration device attached to the patient, a wireless ... 详细信息
来源: 评论
Low-complexity parallel systolic architectures for computing multiplication and squaring over GF2m
Low-complexity parallel systolic architectures for computing...
收藏 引用
21st International Conference on Advanced Information networking and ApplicationsWorkshops/Symposia, AINAW'07
作者: Lee, Chiou-Yng Chen, Yung-Hui Department of Computer Information and Network Engineering Lunghwa University Taiwan
Recently, cryptographic applications based on finite fields have attracted much interest. This paper presents a unified systolic multiplier under the method of the multiply-by-α2 and the folded technique. This circui... 详细信息
来源: 评论
RAAS: A reliable analyzer and archiver for snort intrusion detection system
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
Proceedings of the ACM Symposium on Applied Computing 2007年 259-263页
作者: Soleimani, Mahboobeh Asl, Ehsan Khosrowshahi Doroud, Mina Damanafshan, Morteza Behzadi, Akbar Abbaspour, Maghsoud Network Department IPM Tehran Iran School of Electrical and Computer Engineering Shahid Beheshti University Tehran Iran
One of the primary challenges in IDS alerts analysis is controlling and archiving the huge amount of alerts that have been triggered mainly in attack periods. We have developed a self-adaptive controlling mechanism wh... 详细信息
来源: 评论
Markov Chain Induced by Random Dynamical System on Graph
收藏 引用
Chinese Quarterly Journal of Mathematics 2008年 第2期000卷
作者: ZHENG Jie LIU Chao-yang Department of Applied Mathematics Donghua UniversityShanghai 201620China Zhengzhou Dongxifang Computer Network Engineering Limited Henan UniversityZhengzhou 450008China
In this paper,we define a model of random dynamical systems(RDS)on graphs and prove that they are actually homogeneous discrete-time Markov ***,a necessary and sufficient condition is obtained for that two state vecto... 详细信息
来源: 评论
An improved shape matching technique
收藏 引用
Tamkang Journal of Science and engineering 2007年 第3期10卷 265-274页
作者: Kao, Yang-Ta Lin, Hwei-Jen Wu, Hung-Hsuan Department of Information Network Technology Chihlee Institute of Technology Taipei 220 Taiwan Department of Computer Science and Information Engineering Tamkang University Tamsui 251 Taiwan
Shape representation and matching is a not only important but also challenging part in image retrieval. In our previous work, a shape-based image retrieval system was proposed. The Mountain Climbing Sequence (MCS) is ... 详细信息
来源: 评论
3D-chiral metamaterial with artificial magnetic response
Optics InfoBase Conference Papers
收藏 引用
Optics InfoBase Conference Papers 2008年
作者: Plum, E. Dong, J. Zhou, J. Fedotov, V.A. Koschny, T. Soukoulis, C. Zheludev, N.I. EPSRC Nanophotonics Portfolio Centre Optoelectronics Research Centre University of Southampton SO17 1BJ United Kingdom Institute of Optical Fiber Commun. and Network Tech. Ningbo University Ningbo 315211 China Ames Laboratory Department of Physics and Astronomy Iowa State University Ames IA 50011 United States Department of Electrical and Computer Engineering Microelectronics Research Center Iowa State University Ames IA 50011 United States University of Crete Greece
Artificial magnetism, negative permeability and zero refractive index are demonstrated in 3D-chiral metamaterial that shows giant polarization rotation and circular dichroism. © 2007 Optical Society of America.
来源: 评论
Enhancing role-based access control model through fuzzy relations
Enhancing role-based access control model through fuzzy rela...
收藏 引用
3rd Internationl Symposium on Information Assurance and Security, IAS 2007
作者: Takabi, Hassan Amini, Morteza Jalili, Rasool Network Security Center Computer Engineering Department Sharif University of Technology Tehran Iran
Role-Based Access Control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with well-defined privileges. However, due to the large number of users in nowadays online se... 详细信息
来源: 评论
Separation of duty in role-based access control model through fuzzy relations
Separation of duty in role-based access control model throug...
收藏 引用
3rd Internationl Symposium on Information Assurance and Security, IAS 2007
作者: Takabi, Hassan Amini, Morteza Jalili, Rasool Network Security Center Computer Engineering Department Sharif University of Technology Tehran Iran
As a security principle, separation of duty (SoD) is widely considered in computer security. In the role-based access control(RBAC) model, separation of duty constraints enforce conflict of interest policies. There ar... 详细信息
来源: 评论