咨询与建议

限定检索结果

文献类型

  • 3,314 篇 会议
  • 2,023 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,184 篇 工学
    • 1,995 篇 计算机科学与技术...
    • 1,537 篇 软件工程
    • 966 篇 信息与通信工程
    • 493 篇 电气工程
    • 476 篇 电子科学与技术(可...
    • 409 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 192 篇 光学工程
    • 173 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 120 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 89 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,660 篇 理学
    • 831 篇 数学
    • 559 篇 物理学
    • 314 篇 生物学
    • 254 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 130 篇 化学
  • 724 篇 管理学
    • 482 篇 管理科学与工程(可...
    • 251 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 243 篇 医学
    • 198 篇 临床医学
    • 167 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 90 篇 教育学
  • 50 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 157 篇 computer network...
  • 137 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 105 篇 protocols
  • 87 篇 throughput
  • 86 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 computer archite...
  • 78 篇 wireless communi...
  • 77 篇 internet
  • 72 篇 accuracy
  • 71 篇 routing
  • 71 篇 computational mo...
  • 68 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 65 篇 feature extracti...
  • 65 篇 machine learning
  • 64 篇 costs

机构

  • 150 篇 national and kap...
  • 150 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 indian institute...
  • 144 篇 charles universi...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 department of ph...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 129 篇 università di ca...
  • 128 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,066 篇 英文
  • 216 篇 其他
  • 85 篇 中文
  • 9 篇 日文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5374 条 记 录,以下是4651-4660 订阅
排序:
COCA: A contract-based infrastructure for composing adaptive multimedia systems
COCA: A contract-based infrastructure for composing adaptive...
收藏 引用
26th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2006
作者: Zhou, Zhinan McKinley, Philip K. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
Achieving acceptable quality of service in highly dynamic computing environments requires not only adaptation and reconfiguration of individual components of the system, but also collaboration among these components. ... 详细信息
来源: 评论
Automated analysis of natural language properties for UML models
收藏 引用
MoDELS 2005 International Workshops OCLWS, MoDeVA, MARTES, AOM, MTiP, WiSME, MODAUI, NfC, MDD, WUsCAM
作者: Konrad, Sascha Cheng, Betty H. C. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
It is well known that errors introduced early in the development process are commonly the most expensive to correct. The increasingly popular model-driven architecture (MDA) exacerbates this problem by propagating the... 详细信息
来源: 评论
A survey of secure address auto-configuration in MANET
A survey of secure address auto-configuration in MANET
收藏 引用
10th IEEE Singapore International Conference on Communications Systems, ICCS 2006
作者: Taghiloo, Majid Taghiloo, Jamshid Dehghan, Mehdi Computer Engineering Department Amirkabir University of Technology Tehran Iran Network Security Department Nasr Electronics Research Center Tehran Iran Computer Engineering Department Iran University of Science and Technology Tehran Iran
Mobile ad hoc networking offers convenient infrastructure-less communication over the shared wireless channels. The major research efforts in the area of Mobile Ad hoc network (MANET) focus on developing efficient rou... 详细信息
来源: 评论
Model-based development of dynamically adaptive software  06
Model-based development of dynamically adaptive software
收藏 引用
28th International Conference on Software engineering 2006, ICSE '06
作者: Zhang, Ji Cheng, Betty H. C. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
Increasingly, software should dynamically adapt its behavior at run-time in response to changing conditions in the supporting computing and communication infrastructure, and in the surrounding physical environment. In... 详细信息
来源: 评论
An anomaly intrusion detection system based on vector quantization
An anomaly intrusion detection system based on vector quanti...
收藏 引用
作者: Zheng, Jun Hu, Mingzeng Harbin 150001 China Research Center of Computer Network and Information Security Technology Department of Computer Science and Engineering HIT China China
Machine learning and data mining algorithms are increasingly being used in the intrusion detection systems (IDS), but their performances are laggard to some extent especially applied in network based intrusion detecti... 详细信息
来源: 评论
A new efficient block-matching algorithm for motion estimation
收藏 引用
Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology 2006年 第1期42卷 21-33页
作者: Mahmoud, Hanan Goel, Sumeer Shaaban, Mohsen Bayoumi, Magdy Faculty of Engineering University of Alexandria University Buildings 9 Albert Street Semouha Alexandria 21321 Egypt Center for Advanced Computer Studies University of Louisiana at Lafayette 110 Rex Street Lafayette LA 70504 Faculty of Engineering University of Alexandria Computer Science Department Department of Computer Engineering Department of Computer Science Center for Advanced Computer Studies University of Louisiana Lafayette Technical Committee on Circuits and Systems for Communication Technical Committee on Signal Processing Design and Implementation Neural Network and the Multimedia Technology Technical Committees University of Louisiana Lafayette
This paper presents a new full-search block-matching algorithm: Multi-stage Interval-based Motion Estimation algorithm (MIME). The proposed algorithm is a block based motion estimation algorithm that utilizes successi... 详细信息
来源: 评论
Self-updating hash chains and their implementations
收藏 引用
7th International Conference on Web Information Systems engineering, WISE 2006
作者: Haojun, Zhang Yuefei, Zhu Network Engineering Department Information Engineering University Zhengzhou Henan 450002 China Computer Engineering Department Henan University of Technology No.140 SongShan South Road ZhengZhou Henan 450052 China
Hash Chains are widely used in various cryptography applications such as one-time passwords, server-supported signatures and micropayments etc. However, the finite length ('limited-link') of hash chains limits... 详细信息
来源: 评论
Appling association rule to web prediction
Appling association rule to web prediction
收藏 引用
First International Multi- Symposiums on computer and Computational Sciences, IMSCCS'06
作者: Zhang, Zhili Shi, Lei Guo, Shen Qi, Deyu Li, Fufang Computer Network Center Xuchang University Xuchang 461000 China School of Computer Science and Engineering South China University of Technology Guangzhou 510640 China Department of Computer Science and Engineering Beijing Institute of Technology Beijing 100081 China
With the rapid development of the Internet, Web log mining, which is used to find useful information about users from Web log files, has become a heat issue of research. The aim of association rule mining is to find i... 详细信息
来源: 评论
A software based approach for providing network fault tolerance in clusters with uDAPL interface: MPI level design and performance evaluation
A software based approach for providing network fault tolera...
收藏 引用
2006 ACM/IEEE Conference on Supercomputing, SC'06
作者: Vishnu, Abhinav Gupta, Prachi Mamidala, Amith R. Panda, Dhabaleswar K. Network Based Computing Laboratory Department of Computer Science and Engineering Ohio State University Columbus OH 43210 United States
In the arena of cluster computing, MPI has emerged as the de facto standard for writing parallel applications. At the same time, introduction of high speed RDMA-enabled interconnects like InfiniBand, Myrinet, Quadrics... 详细信息
来源: 评论
Application of agent negotiation in supporting adaptive learning
Application of agent negotiation in supporting adaptive lear...
收藏 引用
6th International Conference on Advanced Learning Technologies, ICALT 2006
作者: Lai, K. Robert Lan, Chung Hsien Liu, Chen Chung Department of Computer Science and Engineering Yuan Ze University Taiwan Institute of Network Learning Technology National Central University Taiwan
This study presents a negotiation-based e-learning framework to promote learning motive and enhance the interaction between learners and instructors. In terms of learning communication, a fuzzy constraint-based agent ... 详细信息
来源: 评论