咨询与建议

限定检索结果

文献类型

  • 3,314 篇 会议
  • 2,023 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,184 篇 工学
    • 1,995 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 966 篇 信息与通信工程
    • 493 篇 电气工程
    • 476 篇 电子科学与技术(可...
    • 409 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 89 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,660 篇 理学
    • 831 篇 数学
    • 559 篇 物理学
    • 314 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 130 篇 化学
  • 724 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 157 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 65 篇 machine learning
  • 64 篇 costs

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,066 篇 英文
  • 216 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5374 条 记 录,以下是4631-4640 订阅
排序:
Meta-Analyzer: A Web-based Environment for Analyzing Student Information Searching Behaviors
Meta-Analyzer: A Web-based Environment for Analyzing Student...
收藏 引用
International Conference on Innovative Computing, Information and Control (ICICIC)
作者: Gwo-Jen Hwang Pei-Shan Tsai Judy C. R. Tseng Chia-Ching Lin Chin-Chung Tsai Department of Information and Learning Technology National University of Tainan Taiwan Information Management Department National Chi Nan University Taiwan Department of Computer Science and Information Engineering Chung Hua University Taiwan Graduate Institute of Network Learning Technology National Central University Taiwan Graduate School of Technological and Vocational Education National Taiwan University of Science and Technology Taiwan
The rapid progress of computer and network technologies has attracted educational researchers to study the strategies and the effects of applying information technology in learning activities. Although previous resear... 详细信息
来源: 评论
A Secure Multicast Model for Peer-to-Peer and Access networks Using the Host Identity Protocol
A Secure Multicast Model for Peer-to-Peer and Access Network...
收藏 引用
4th IEEE Consumer Communications and networking Conference (CCNC 2007), vol.3
作者: Xueyong Zhu J. William Atwood Network Information Center University of Science and Technology Hefei Anhui China Department of Computer Science and Software Engineering Concordia University Montreal QUE Canada
Standard IP multicast makes no provision for authenticating or authorizing the participant hosts, nor for ensuring confidentiality of the data stream. An architecture for achieving these goals is proposed, based on th... 详细信息
来源: 评论
A Study of Alloyed Nanowires from Two Perspectives: Approximate Dispersion and Transmission
收藏 引用
AIP Conference Proceedings 2007年 第1期893卷 711-712页
作者: Gerhard Klimeck Timothy B. Boykin Mathieu Luisier Neerav Kharche Andreas Schenk 1Network for Computational Nanotechnology Purdue University West Lafayette IN 47906 2Jet Propulsion Laboratory California Institute of Technology Pasadena CA 91109 3Department of Electrical and Computer Engineering University of Alabama Huntsville AL 35899 4Integrated Systems Laboratory ETH Zürich 8092 Zürich Switzerland
Local atomic arrangement in heterostructures or disorder due to alloying, surface roughness and impurities strongly influence the bandstructure and charge transport. With decreasing diameters down to nanometer scales,...
来源: 评论
Field Validation of a Doubly Fed Induction Generator (DFIG) Model
Field Validation of a Doubly Fed Induction Generator (DFIG) ...
收藏 引用
2007 IEEE Canada Electrical Power Conference (EPC 2008)
作者: Soubhik Auddy Rajiv K. Varma Michael Dang Electrical & Computer Engineering Department University of Western Ontario London ONT Canada Department System Investment Division Hydro One Network Inc.orporation Toronto ONT Canada
With the increased penetration of wind power it is important to carefully asses the impact of grid integration of wind turbine generators. Accurate wind turbine generator models are required for this purpose. Variable... 详细信息
来源: 评论
Low-Complexity Bit-Parallel Multiplier over GF(2^m) Using Dual Basis Representation
收藏 引用
Journal of computer Science & Technology 2006年 第6期21卷 887-892页
作者: 李秋莹 洪振雄 周义昌 Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taoyuan County 333 Dcpartment of Computer and Communication Engineering National Kaohsiung First University of Science and Technology Kaohsiung
Recently, cryptographic applications based on finite fields have attracted much attention. The most demanding finite field arithmetic operation is multiplication. This investigation proposes a new multiplication algor... 详细信息
来源: 评论
Developing Ontology for Intelligent Home Service Framework
Developing Ontology for Intelligent Home Service Framework
收藏 引用
2007 IEEE International Symposium on Consumer Electronics (ISCE 2007), vol.2
作者: Inbong Joo Jongyoul Park Euihyun Paik Computer Software and Engineering Department University of Science and Technology Daejeon South Korea Home Network Research Group Electronics and Telecommunications Research Institute Daejeon South Korea
Home services are all kind of services which are provided in home environment. Legacy Researches was focused on controlling home devices and appliances. And recent works focus on the multimedia services. In the future... 详细信息
来源: 评论
Concurrent error detection in Montgomery multiplication over GF(2m)
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND computer SCIENCES 2006年 第2期E89A卷 566-574页
作者: Chiou, CW Lee, CY Deng, AW Lin, JM Department of Computer Science and Information Engineering Ching Yun University Taiwan Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan Taiwan Department of Information Management Ching Yun University Taiwan Taiwan Department of Information Engineering and Computer Science Feng Chia University Taiwan Taiwan Department of Computer Science and Information Engineering Taiwan Division of Continuing Education Ching Yun University Taiwan Department of Computer Information and Network Engineering Lunghwa University of Science and Technology Taiwan IEEE Taiwan Phi Tao Phi Taiwan Department of Information Management Ching Yun University Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung City Taiwan
Because fault-based attacks on cryptosystems have been proven effective, fault diagnosis and tolerance in cryptography have started a new surge of research and development activity in the field of applied cryptography... 详细信息
来源: 评论
A Dynamic GTS Allocation Algorithm in IEEE 802.15.4 for QoS guaranteed Real-time Applications
A Dynamic GTS Allocation Algorithm in IEEE 802.15.4 for QoS ...
收藏 引用
2007 IEEE International Symposium on Consumer Electronics (ISCE 2007), vol.2
作者: JunKeun Song Jeong-dong Ryoo SangCheol Kim JinWon Kim HaeYong Kim PyeongSoo Mah Computer Software and Engineering Department University of Science and Technology Daejeon South Korea Sensor Network OS Research Lab Embedded S/W Division Electronics and Telecommunications Research Institute Daejeon South Korea Carrier Ethernet Research Lab Broadband Convergence Network Division Electronics and Telecommunications Research Institute Daejeon South Korea
In this paper, we propose a novel QoS guaranteed algorithm for real-time applications in IEEE 802.15.4 protocol. The IEEE 802.15.4 standard provides a Guaranteed Time Slot (GTS) mechanism to allocate a specific durati... 详细信息
来源: 评论
Using bidirectional links to improve peer-to-peer lookup performance
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & engineering) 2006年 第6期7卷 945-951页
作者: JIANG Jun-jie TANG Fei-long PAN Feng WANG Wei-nong Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200030 China Network Center Shanghai Jiao Tong University Shanghai 200030 China
Efficient lookup is essential for peer-to-peer networks and Chord is a representative peer-to-peer lookup scheme based on distributed hash table (DHT). In peer-to-peer networks, each node maintains several unidirectio... 详细信息
来源: 评论
An access control model for protecting Semantic Web resources
An access control model for protecting Semantic Web resource...
收藏 引用
2nd International Semantic Web Policy Workshop, SWPW 2006, Held in Conjunction with the 5th International Semantic Web Conference, ISWC 2006
作者: Javanmardi, Sara Amini, Morteza Jalili, Rasool Network Security Center Computer Engineering Department Sharif University of Technology Tehran Iran
Semantic Web is a vision for future of the current Web which aims at automation, integration and reuse of data among different Web applications. Access to resources on the Semantic Web can not be controlled in a safe ... 详细信息
来源: 评论