咨询与建议

限定检索结果

文献类型

  • 3,299 篇 会议
  • 2,007 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,343 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,159 篇 工学
    • 1,977 篇 计算机科学与技术...
    • 1,527 篇 软件工程
    • 955 篇 信息与通信工程
    • 485 篇 电气工程
    • 472 篇 电子科学与技术(可...
    • 400 篇 控制科学与工程
    • 275 篇 生物工程
    • 215 篇 生物医学工程(可授...
    • 190 篇 光学工程
    • 171 篇 机械工程
    • 168 篇 仪器科学与技术
    • 151 篇 动力工程及工程热...
    • 119 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 87 篇 网络空间安全
    • 84 篇 安全科学与工程
  • 1,648 篇 理学
    • 825 篇 数学
    • 556 篇 物理学
    • 314 篇 生物学
    • 251 篇 统计学(可授理学、...
    • 172 篇 系统科学
    • 129 篇 化学
  • 724 篇 管理学
    • 483 篇 管理科学与工程(可...
    • 249 篇 图书情报与档案管...
    • 236 篇 工商管理
  • 242 篇 医学
    • 196 篇 临床医学
    • 164 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 122 篇 法学
    • 89 篇 社会学
  • 91 篇 经济学
    • 90 篇 应用经济学
  • 91 篇 教育学
  • 49 篇 农学
  • 22 篇 文学
  • 19 篇 军事学
  • 11 篇 艺术学

主题

  • 160 篇 computer network...
  • 138 篇 computer science
  • 115 篇 bandwidth
  • 106 篇 hadron colliders
  • 104 篇 protocols
  • 87 篇 throughput
  • 87 篇 wireless sensor ...
  • 83 篇 quality of servi...
  • 79 篇 wireless communi...
  • 78 篇 computer archite...
  • 77 篇 internet
  • 71 篇 routing
  • 71 篇 computational mo...
  • 71 篇 accuracy
  • 69 篇 delay
  • 67 篇 resource managem...
  • 65 篇 monitoring
  • 64 篇 costs
  • 64 篇 machine learning
  • 63 篇 feature extracti...

机构

  • 151 篇 national and kap...
  • 151 篇 centro brasileir...
  • 150 篇 istanbul technic...
  • 149 篇 yerevan physics ...
  • 148 篇 universidad iber...
  • 148 篇 university of sp...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 146 篇 indian institute...
  • 146 篇 charles universi...
  • 143 篇 university of de...
  • 141 篇 rwth aachen univ...
  • 141 篇 department of ph...
  • 139 篇 università di to...
  • 139 篇 imperial college...
  • 136 篇 infn sezione di ...
  • 135 篇 zhejiang univers...
  • 132 篇 department of ph...
  • 131 篇 università di ca...
  • 131 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 5,102 篇 英文
  • 149 篇 其他
  • 84 篇 中文
  • 9 篇 日文
检索条件"机构=Department of Computer Engineering and Network Engineering"
5343 条 记 录,以下是4841-4850 订阅
排序:
Multicast based and fast handover scheme in mobile IPv6 wireless network
Multicast based and fast handover scheme in mobile IPv6 wire...
收藏 引用
International Workshop on Antenna Technology: Small Antennas and Novel Metamaterials, iWAT
作者: Yong Chu Eu S. Khatun B.M. Ali M. Othman Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia Serdang Selangor Darul Ehsan Malaysia Department of Computer and Communication System Engineering Faculty of Engineering University of Putra Malaysia Serdang Selangor Darul Ehsan Malaysia Department of Communication Technology and Network Faculty of Science Computer Universiti Putra Malaysia Serdang Selangor Darul Ehsan Malaysia
The main goal of mobile IPv6 is that a mobile node is always addressable by its home address, whether it is currently attached to its home link or is away from home. Mobile IPv6 enables applications running on an Inte... 详细信息
来源: 评论
Fully decentralized DHT based approach to grid service discovery using overlay networks
Fully decentralized DHT based approach to grid service disco...
收藏 引用
International Conference on computer and Information Technology (CIT)
作者: Qi Xia Ruijun Yang Weinong Wang De Yang Department of Computer Science and Engineering Network Information Center Shanghai Jiaotong University Shanghai China School of Information Science and Engineering Central South University Changsha China
Distributed hash table (DHT) is widely used in peer-to-peer networks for its scalability, adaptability, and fault-tolerance in large and dynamic environments. In this paper, we study on the application of DHT for grid... 详细信息
来源: 评论
Development of ground penetration radar using impulse technology
Development of ground penetration radar using impulse techno...
收藏 引用
Asia-Pacific Microwave Conference
作者: Jeong, Young-Kyung Lee, Moon-Que Park, Young-Jin Kim, Kwan-Ho Youn, Dong-Gi Rhee, Young-Chul KEES South Korea IEEE Department of Electrical and Computer Engineering University of Seoul Seoul South Korea RF-CMOS MMIC Power Telecommunication Network Korea Eleotrotechnology Research Institude(KERI) Euiwang City kyunggi-do South Korea Ultra Technology Co. Ltd Seoul South Korea Division of Information and Communication Engineering KyungNam University Mansn-City GyeongsangNam-do South Korea
We developed ultra-wideband impulse type ground penetrating radar(UWB-GPR) system with 100 similar to 300MHz frequency band at -10dB bandwidth. The prototype of the system was tested in real environment and 2-D visual... 详细信息
来源: 评论
Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics
Detecting incoming and outgoing DDoS attacks at the edge usi...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: C. Siaterlis V. Maglaris Network Management and Optimal Design (NETMODE) Lab Department of Electrical and Computer Engineering National and Technical University of Athens Athens Greece
Detection of distributed denial of service attacks should ideally take place near their sources, at edge networks, where countermeasures are most effective. DDoS detection by monitoring an over-provisioned backbone li... 详细信息
来源: 评论
An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification
An enhanced dynamic framed slotted ALOHA algorithm for RFID ...
收藏 引用
International Conference on Mobile and Ubiquitous Systems: networking and Services (MobiQuitous)
作者: Su-Ryun Lee Sung-Don Joo Chae-Woo Lee Department of Electrical and Computer Engineering Ajou University Suwon South Korea LG Electronics Network Laboratory Anyang South Korea
In RFID system, one of the problems that we must solve is the collision between tags which lowers the efficiency of the RFID system. One of the popular anti-collision algorithms is ALOHA-type algorithms, which are sim... 详细信息
来源: 评论
Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc networks
Secure Protocols Enhancement Based on Radio-propagation Rela...
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Ruijun Yang Qi Xia Weinong Wang Qunhua Pan Xinli Huang Minglu Li Network Information Center Shanghai Jiaotong University Department of Computer Science and Engineering Shanghai Jiaotong University China Network Information Center Shanghai Jiaotong University China
The paper presents secure protocols and new secure challenges based on looser radio propagation assumptions. According to these, a new secure enhancement mechanism for secure protocols is proposed. Then we exemplify t... 详细信息
来源: 评论
Web prediction using online support vector machine
Web prediction using online support vector machine
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Zhili Zhang Changgeng Guo Shu Yu DeYu Qi Songqian Long Computer Network Center Xuchang University Xuchang China College of Computer Science and Engineering Technology South China University of Technology Guangzhou China Department of Information Engineering Vocational and Technical College of Communications Xuchang China
In this paper, a SVM-based online learning algorithm is proposed and applied to the problem of Web prediction. A method to construct an online LS-SVM multi-class learning model has been presented. This method is able ... 详细信息
来源: 评论
Design of a thin multi-aperture infrared imager
Design of a thin multi-aperture infrared imager
收藏 引用
Frontiers in Optics, FiO 2005
作者: Gibbons, Robert C. Gilstrap, Jeff A. Mait, Joseph N. Prather, Dennis W. Guo, Junpeng Brady, David J. Raytheon Company Network Centric Systems/Combat Systems 2501 West University Drive McKinney Texas 75071 United States US Army Research Laboratory AMSRD-ARL-SE-R 2800 Powder Mill Road Adelphi MD 20783-1197 United States Department of Electrical and Computer Engineering University of Delaware 140 Evans Hall Newark DE 19716 United States Electrical and Computer Engineering Department Duke University Durham North Carolina 27708 United States
We have designed a thin, multiplexed infrared imaging system that uses a diffractive element for generating shift-encoded images in each aperture. We present preliminary experimental results that demonstrate imager pe... 详细信息
来源: 评论
Hardware cryptography for ubiquitous computing
Hardware cryptography for ubiquitous computing
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: M. Fukase R. Akaoka Liu Lei Cheng Tong Shu T. Sato Department of Electronic and Information Systems Engineering Hirosaki University Hirosaki Japan Computer and Network Systems Center Hirosaki University Hirosaki Japan
Progressive ubiquitous networks have impressed us with alternative features, diversity or security. When the diversity from small devices to large machines is in normal states, ubiquitous networks are functional and u... 详细信息
来源: 评论
Handheld devices with large shared display groupware: tools to facilitate group communication in one-to-one collaborative learning activities
Handheld devices with large shared display groupware: tools ...
收藏 引用
IEEE International Workshop on Wireless, Mobile and Ubiquitous Technology in Education (WMUTE)
作者: Chen-Chung Liu Lin-Chuan Kao Graduate Institute of Network Learning Technology National Central University Taiwan Department of Computer Science and Engineering Yuan-Ze University Taiwan
One-to-one computing environments change and improve classroom dynamics since individual students can bring handheld devices fitted with wireless communication capabilities into the classrooms. However, the screens of... 详细信息
来源: 评论