咨询与建议

限定检索结果

文献类型

  • 3,314 篇 会议
  • 2,023 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,184 篇 工学
    • 1,995 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 966 篇 信息与通信工程
    • 493 篇 电气工程
    • 476 篇 电子科学与技术(可...
    • 409 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 89 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,660 篇 理学
    • 831 篇 数学
    • 559 篇 物理学
    • 314 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 130 篇 化学
  • 724 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 157 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 65 篇 machine learning
  • 64 篇 costs

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,066 篇 英文
  • 216 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5374 条 记 录,以下是4541-4550 订阅
排序:
Implementing a database-driven solution for nominations and elections of faculty governance committees
Implementing a database-driven solution for nominations and ...
收藏 引用
114th Annual ASEE Conference and Exposition, 2007
作者: Acheson, Douglas Acheson, Lingma Indiana University Purdue University-Indianapolis United States Department of Computer Graphics Technology Purdue School of Engineering and Technology Indianapolis IN United States Computer Network Center Purdue School of Engineering and Technology Indianapolis United States School of Liberal Arts Butler University United States School of Science Purdue University Indianapolis United States
Institutions of higher education are self-governing bodies of which participating members must serve on various committees from time to time. To this end, nominations and elections of schoolwide committees are the vit... 详细信息
来源: 评论
Towards Re-engineering Legacy Systems for Assured Dynamic Adaptation
Towards Re-engineering Legacy Systems for Assured Dynamic Ad...
收藏 引用
International Workshop on Modeling in Software engineering (MISE)
作者: Ji Zhang Betty H.C. Cheng Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Increasingly, software must adapt its behavior in response to changes in the supporting computing, communication infrastructure, and in the surrounding physical environment. Since most existing software was not design... 详细信息
来源: 评论
Authentication in Reprogramming of Sensor networks for Mote Class Adversaries
Authentication in Reprogramming of Sensor Networks for Mote ...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to... 详细信息
来源: 评论
Efficient Identity Authentication Protocol and Its Formal Analysis
Efficient Identity Authentication Protocol and Its Formal An...
收藏 引用
International Conference on Computational Intelligence and Security Workshops (CISW)
作者: Li Chen Guixiang Zhang Xiangdong Li Computer Center Henan University of Finance and Economics China Department of Network Engineering Information and Engineering University Zhengzhou Henan China
The paper proposes an efficient identity authentication protocol for mobile commerce based on token. The proposed protocol needs fewer messages to authenticate identities of mobile users called as important entities i... 详细信息
来源: 评论
QUANTUM SIMULATIONS OF DUAL GATE MOSFET DEVICES: BUILDING AND DEPLOYING COMMUNITY NANOTECHNOLOGY SOFTWARE TOOLS ON ***
收藏 引用
International Journal of High Speed Electronics and Systems 2007年 第3期17卷 485-494页
作者: SHAIKH AHMED GERHARD KLIMECK DERRICK KEARNEY MICHAEL MCLENNAN M. P. ANANTRAM Network for Computational Nanotechnology Purdue University West Lafayette IN 4790 USA Department of Electrical and Computer Engineering University of Waterloo Ontario Canada
Undesirable short-channel effects associated with the relentless downscaling of conventional CMOS devices have led to the emergence of new classes of MOSFETs. This has led to new and unprecedented challenges in comput... 详细信息
来源: 评论
Image authentication for low complexity applications
Image authentication for low complexity applications
收藏 引用
2007 IEEE Region 5 Technical Conference, TPS
作者: Adi, W. Dawood, A. Mabrouk, A. Musa, Sarhan M. Institute of Computer and Communication Network Engineering Technical University of Braunschweig Hans-Sommer-Straße 66 38106 Braunschweig Germany Communication Engineering Department Etisalat University College P. O. Box 573 Sharjah United Arab Emirates Lufthansa Systems AS D-65451 Kelsterbach Germany Engineering Technology Department Prairie View AandM University Prairie View TX 77446 United States
Hand-held mobile devices are having a wide spectrum of applications. Such devices which incorporate sending images of relevant legal significance require certifying the source of the image. Hand-held devices inherentl... 详细信息
来源: 评论
Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet
Smurf-based Distributed Denial of Service (DDoS) Attack Ampl...
收藏 引用
International Conference on Internet Monitoring and Protection, ICIMP
作者: Sanjeev Kumar Network Research Lab Department of Electrical/Computer Engineering University of Texas-PanAmerican Edinburgh TX UK
The Smurf-based distributed denial of service (DDoS) attack is an amplification attack where the attacker uses unprotected intermediate networks to amplify the attack traffic load and direct it to the victim computer.... 详细信息
来源: 评论
Middleware based inpatient healthcare information system
Middleware based inpatient healthcare information system
收藏 引用
7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE
作者: Hsieh, S.H. Hsieh, S.L. Weng, Y.C. Yang, T.H. Lai, Feipei Cheng, P.H. Ping, X.O. Jan, M.Y. Lin, J.C. Peng, C.H. Huang, K.H. Ko, L.F. Chen, C.H. Hsu, K.P. Information Systems Office National Taiwan University Hospital Taipei Taiwan Department of Computer Science and Information Engineering National Taiwan University Taipei Taiwan Department of Electrical Engineering National Taiwan University Taipei Taiwan Network and Computer Centre National Chiao Tung University Hsin Chu Taiwan Graduate Institute of Biomedical Electronics and Bioinformatics National Taiwan University Taiwan Department of Information Management National Taiwan University Taipei Taiwan
The paper presents a multi-tier, integrated, distributed, Inpatient Healthcare Information System based on Service Oriented Architecture (SOA) .NET environment in National Taiwan University Hospital (NTUH). The archit... 详细信息
来源: 评论
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Enhancing security performance with parallel crypto operatio...
收藏 引用
IEEE International Conference on Telecommunications and Malaysia Communications (ICT-MICC)
作者: Hashem Mohammed Alaidaros Mohd Fadlee A. Rasid Mohamed Othman Raja Syamsul Azmir Raja Abdullah Department of Computer and Communication Systems Engineering Faculty of Engineering Universiti Putra Malaysia Malaysia Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Malaysia
Information security, including integrity and privacy, is an important concern among today's computer users due to increased connectivity. Despite a number of secure algorithms that have been proposed, the trade-o... 详细信息
来源: 评论
DiffArchViz: A Tool to Visualize Correspondence Between Multiple Representations of a Software Architecture
DiffArchViz: A Tool to Visualize Correspondence Between Mult...
收藏 引用
IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT)
作者: Amit P. Sawant Naveen Bali Department of Computer Science North Carolina State University Performance Engineering Group Network Appliance Inc
This paper describes a technique to visualize the software architecture of the network Appliance Data ONTAPreg7G (ONTAP) storage server operating system. We integrate the Multi-Dimensional Scaling (MDS) algorithm into... 详细信息
来源: 评论