咨询与建议

限定检索结果

文献类型

  • 3,609 篇 会议
  • 2,138 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,412 篇 工学
    • 2,073 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 684 篇 信息与通信工程
    • 640 篇 控制科学与工程
    • 477 篇 电气工程
    • 436 篇 电子科学与技术(可...
    • 374 篇 生物工程
    • 308 篇 机械工程
    • 303 篇 生物医学工程(可授...
    • 254 篇 光学工程
    • 232 篇 仪器科学与技术
    • 207 篇 动力工程及工程热...
    • 187 篇 化学工程与技术
    • 145 篇 交通运输工程
    • 134 篇 材料科学与工程(可...
    • 109 篇 安全科学与工程
  • 1,850 篇 理学
    • 851 篇 数学
    • 574 篇 物理学
    • 431 篇 生物学
    • 283 篇 统计学(可授理学、...
    • 227 篇 系统科学
    • 186 篇 化学
  • 908 篇 管理学
    • 612 篇 管理科学与工程(可...
    • 324 篇 图书情报与档案管...
    • 276 篇 工商管理
  • 311 篇 医学
    • 263 篇 临床医学
    • 210 篇 基础医学(可授医学...
    • 138 篇 药学(可授医学、理...
  • 142 篇 法学
    • 116 篇 社会学
  • 105 篇 经济学
    • 105 篇 应用经济学
  • 66 篇 农学
  • 54 篇 教育学
  • 20 篇 文学
  • 17 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 214 篇 computer science
  • 118 篇 deep learning
  • 110 篇 feature extracti...
  • 99 篇 computational mo...
  • 97 篇 accuracy
  • 92 篇 machine learning
  • 91 篇 systems engineer...
  • 90 篇 data mining
  • 90 篇 control systems
  • 82 篇 neural networks
  • 75 篇 artificial intel...
  • 71 篇 optimization
  • 68 篇 training
  • 67 篇 laboratories
  • 67 篇 costs
  • 66 篇 humans
  • 64 篇 hardware
  • 59 篇 testing
  • 55 篇 protocols
  • 54 篇 information syst...

机构

  • 72 篇 department of co...
  • 36 篇 national enginee...
  • 28 篇 college of compu...
  • 25 篇 department of co...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 22 篇 department of co...
  • 22 篇 key laboratory o...
  • 22 篇 department of el...
  • 22 篇 university of ch...
  • 21 篇 department of sy...
  • 21 篇 distributed mult...
  • 20 篇 frontiers scienc...
  • 20 篇 department of el...
  • 18 篇 department of el...
  • 18 篇 school of comput...
  • 18 篇 peng cheng labor...
  • 17 篇 distributed mult...
  • 17 篇 department of co...
  • 17 篇 department of co...

作者

  • 25 篇 mei-ling shyu
  • 24 篇 shu-ching chen
  • 24 篇 hai jin
  • 22 篇 yang yang
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 20 篇 dutta paramartha
  • 17 篇 wang xingjun
  • 17 篇 shyu mei-ling
  • 16 篇 paramartha dutta
  • 15 篇 han zhu
  • 14 篇 bowers john e.
  • 13 篇 mohamed k.nour
  • 13 篇 tei-wei kuo
  • 13 篇 yunhao liu
  • 13 篇 mesfer al duhayy...
  • 12 篇 kazuyuki kobayas...
  • 12 篇 hayashi eiji
  • 12 篇 liu qi
  • 12 篇 huo yuankai

语言

  • 5,159 篇 英文
  • 500 篇 其他
  • 114 篇 中文
  • 14 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Department of Computer Science& System Engineering"
5783 条 记 录,以下是4371-4380 订阅
排序:
A Framework for Network Security Situation Awareness Based on Knowledge Discovery
A Framework for Network Security Situation Awareness Based o...
收藏 引用
2010 2nd International Conference on computer engineering and Technology(2010年第二届计算机工程与技术国际会议 ICCET 2010)
作者: Fang Lan Ma Guoqing Wang Chunlei Department of Network Research Institute of System Engineering Beijing China Department of Computer Science Tsinghua University Beijing China
Network security situation awareness provides the unique high level security view based upon the security alert events. But the complexities and diversities of security alert data on modern networks make such analysis... 详细信息
来源: 评论
A design method for minimum cost path of flying probe in-circuit testers
A design method for minimum cost path of flying probe in-cir...
收藏 引用
SICE Annual Conference
作者: Yuki Hiratsuka Fumihiko Katoh Katsumi Konishi Seiichi Shin Department of System Engineering University of Electro-Communications Tokyo Japan Department of Computer Science Kogakuin University Tokyo Japan
This paper focuses on X-Y type in-circuit testers, which has two flying probes. The problem of finding the ordering of inspection points that minimizes the total time of inspection is an expansion of the travelling sa... 详细信息
来源: 评论
Hiding data in video file: An overview
收藏 引用
Journal of Applied sciences 2010年 第15期10卷 1644-1649页
作者: Al-Frajat, A.K. Jalab, H.A. Kasirun, Z.M. Zaidan, A.A. Zaidan, B.B. Department of Software Engineering Faculty of Computer Science and Information Technology University Malaya 50603 Kuala Lumpur Malaysia Department of Computer System and Technology Faculty of Engineering Multimedia University Jalan Multimedia 63100 Cyberjaya Malaysia
The aim of this review is to study the methods of steganography using the video file as a cover carrier. The steganography is the art of protecting the information through embedding data in medium carrier, for instant... 详细信息
来源: 评论
Implicit detection of stealth software with a local-booted virtual machine
Implicit detection of stealth software with a local-booted v...
收藏 引用
International Conference on Information sciences and Interaction sciences (ICIS)
作者: Yan Wen Minhuan Huang Jinjing Zhao Xiaohui Kuang Beijing Institute of System Engineering Beijing CN Department of Computer Science & Technology Tsinghua University Beijing China
Resource hiding is commonly used by stealth malware to evade detection by anti-malware scanners. In this paper, we present the design, implementation, and evaluation of Libra, a new VM-based anti-stealth-malware appro... 详细信息
来源: 评论
Palacios and Kitten: New high performance operating systems for scalable virtualized and native supercomputing
Palacios and Kitten: New high performance operating systems ...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: John Lange Kevin Pedretti Trammell Hudson Peter Dinda Zheng Cui Lei Xia Patrick Bridges Andy Gocke Steven Jaconette Mike Levenhagen Ron Brightwell Department of Electrical Engineering and Computer Science Northwestern University EECS USA Scalable System Software Department Sandia National Laboratories USA Department of Computer Science University of New Mexico USA
Palacios is a new open-source VMM under development at Northwestern University and the University of New Mexico that enables applications executing in a virtualized environment to achieve scalable high performance on ... 详细信息
来源: 评论
A simultaneous design of structural and control systems using an infeasible controller sequence
A simultaneous design of structural and control systems usin...
收藏 引用
SICE Annual Conference
作者: Yasushi Kami Takeshi Terada Eitaku Nobuyama Department of Electrical and Computer Engineering Akashi National College of Technology Akashi Japan Department of the Mechanical and Electronic System Engineering Advanced Courses of Akashi National College of Technology Faculty of Computer Science and System Engineering Kyushu Institute of Technology Iizuka Japan
This paper is concerned with a simultaneous design problems of structural and reduced-order H ∞ control systems. The purpose of this paper is to propose an iterative approach to the simultaneous design problem, whic... 详细信息
来源: 评论
Validated pole assignment method based on verified numerical computation
Validated pole assignment method based on verified numerical...
收藏 引用
SICE Annual Conference
作者: Kentaro Yano Masanobu Koga Hiromasa Nakashima Department of Information and Multimedia Technology Fukuoka Institute of Technology Fukuoka Japan Faculty of Computer Science and System Engineering Kyushu Institute of Technology Fukuoka Japan Graduate School of Computer Science and System Engineering Kyushu Institute of Technology Fukuoka Japan
This paper proposes validated control system design method based on verified numerical computation. The proposed method designs a controller and validates it using verified numerical computation. We also propose a met... 详细信息
来源: 评论
Packet analysis using packet filtering and traffic monitoring techniques
Packet analysis using packet filtering and traffic monitorin...
收藏 引用
IEEE Conference on Open systems
作者: Haris, S.H.C. Ahmad, R.B. Ghani, M.A.H.A. Waleed, Ghossoon M. School of Computer and Communication Engineering Universiti Malaysia Perlis d/a Pejabat Pos Besar 01000 Kangar Perlis Malaysia Department of Management Information System College of Administrative Applied Science University P.O.Box: 5055 Manama Bahrain
Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unav... 详细信息
来源: 评论
Compensation Approaches for Distant Speaker Identification under Reverberant Environments
Compensation Approaches for Distant Speaker Identification u...
收藏 引用
Chinese Conference on Pattern Recognition (CCPR)
作者: Ye Jiang Zhen-Ming Tang Long-Biao Wang School of Computer Science and Technology Nanjing University of Science and Technology of PLA Nanjing China Department of System Engineering Shizuoka University Japan
Speech recorded in real environments by distant microphones is degraded by factor like reverberation. This degradation strongly affects the performance of the speaker identification system. Three compensation approach... 详细信息
来源: 评论
Using Captchas to Mitigate the VoIP Spam Problem
Using Captchas to Mitigate the VoIP Spam Problem
收藏 引用
International Conference on computer Research and Development (ICCRD)
作者: Ismail Ahmedy Marius Portmann Department of Computer System and Communication Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia School of Information Technology and Electrical Engineering University of Queensland QLD Australia
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. ... 详细信息
来源: 评论