咨询与建议

限定检索结果

文献类型

  • 426 篇 会议
  • 318 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 751 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 425 篇 工学
    • 257 篇 计算机科学与技术...
    • 208 篇 软件工程
    • 115 篇 信息与通信工程
    • 94 篇 电气工程
    • 83 篇 电子科学与技术(可...
    • 63 篇 控制科学与工程
    • 30 篇 光学工程
    • 28 篇 生物工程
    • 27 篇 机械工程
    • 25 篇 动力工程及工程热...
    • 23 篇 生物医学工程(可授...
    • 20 篇 仪器科学与技术
    • 18 篇 材料科学与工程(可...
    • 18 篇 化学工程与技术
    • 15 篇 航空宇航科学与技...
    • 13 篇 网络空间安全
  • 227 篇 理学
    • 108 篇 数学
    • 75 篇 物理学
    • 40 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 22 篇 化学
  • 103 篇 管理学
    • 71 篇 管理科学与工程(可...
    • 42 篇 工商管理
    • 27 篇 图书情报与档案管...
  • 48 篇 医学
    • 38 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
  • 21 篇 法学
    • 18 篇 社会学
  • 19 篇 经济学
    • 18 篇 应用经济学
  • 6 篇 教育学
  • 5 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 23 篇 computer network...
  • 20 篇 computer science
  • 19 篇 optical fiber ne...
  • 18 篇 software enginee...
  • 17 篇 application soft...
  • 17 篇 laboratories
  • 17 篇 quality of servi...
  • 17 篇 passive optical ...
  • 16 篇 machine learning
  • 16 篇 delay
  • 15 篇 computer archite...
  • 15 篇 bandwidth
  • 15 篇 costs
  • 14 篇 performance anal...
  • 13 篇 optical fiber su...
  • 12 篇 intelligent netw...
  • 12 篇 computational mo...
  • 11 篇 wireless communi...
  • 11 篇 monitoring
  • 11 篇 optical network ...

机构

  • 20 篇 software enginee...
  • 14 篇 software enginee...
  • 9 篇 hughes network s...
  • 8 篇 health managemen...
  • 8 篇 department of el...
  • 7 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 information syst...
  • 7 篇 department of el...
  • 6 篇 department of pu...
  • 6 篇 computer network...
  • 6 篇 the edward s. ro...
  • 6 篇 julius centre fo...
  • 6 篇 vector institute...
  • 6 篇 centre for heart...
  • 5 篇 leeds institute ...
  • 5 篇 department of ph...
  • 5 篇 center for psych...
  • 5 篇 department of in...

作者

  • 23 篇 mohammad syuhaim...
  • 18 篇 kasmiran jumari
  • 13 篇 aswir premadi
  • 11 篇 ab-rahman mohamm...
  • 10 篇 p.k. mckinley
  • 10 篇 ng boon chuan
  • 8 篇 jumari kasmiran
  • 8 篇 luyao niu
  • 8 篇 andrew clark
  • 8 篇 cheng betty h. c...
  • 8 篇 yu f. richard
  • 7 篇 abu-gharbieh ema...
  • 7 篇 niu luyao
  • 7 篇 radha poovendran
  • 7 篇 clark andrew
  • 7 篇 mohamed othman
  • 6 篇 raghavan s.v.
  • 6 篇 bärnighausen til...
  • 6 篇 hong choong seon
  • 6 篇 chu dinh-toi

语言

  • 712 篇 英文
  • 30 篇 其他
  • 9 篇 中文
检索条件"机构=Department of Computer Systems and Network Engineering"
751 条 记 录,以下是641-650 订阅
排序:
Grouping verifiable content for selective disclosure
Grouping verifiable content for selective disclosure
收藏 引用
8th Australasian Conference on Information Security and Privacy, ACISP 2003
作者: Bull, Laurence Squire, David McG. Newmarch, Jan Zheng, Yuliang School of Computer Science and Software Engineering Monash University Caulfield East 3145 Australia School of Network Computing Monash University Frankston 3199 Australia Department of Software and Information Systems University of North Carolina at Charlotte Charlotte NC 28223 United States
This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more complex structure that encodes a richer, more f... 详细信息
来源: 评论
A computationally efficient and secure time scheme for wireless applications
A computationally efficient and secure time scheme for wirel...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: C.A. Barnett K.J. Ray Liu Hughes Network Systems Germantown MD USA Electrical and Computer Engineering Department University of Maryland College Park USA
Wireless mobile computing devices are used extensively to access the Internet for critical applications and services, which must be secured by computationally efficient algorithms and schemes. Computationally efficien... 详细信息
来源: 评论
Developing a heterogeneous intrusion tolerant CORBA system
Developing a heterogeneous intrusion tolerant CORBA system
收藏 引用
Foundations of Intrusion Tolerant systems, OASIS 2003
作者: Sames, David Matt, Brian Niebuhr, Brian Tally, Gregg Whitmore, Brent Bakken, David Distributed Systems Security Department NAI Labs. - Network Associates Inc. 3060 Washington Road GlenwoodMD21738 United States School of Electrical Engineering and Computer Science Washington State University PO Box 642752 PullmanWA99164-2752 United States
Intrusion Tolerant systems provide high-integrity and high-availability services to their clients in the face of successful attacks from an adversary. The Intrusion Tolerant Distributed Object systems (ITDOS) research... 详细信息
来源: 评论
Length reduction of evanescent-mode ridge waveguide bandpass filters
收藏 引用
Progress in Electromagnetics Research 2003年 40卷 71-90页
作者: Shen, T. Zaki, K.A. Advanced Development Group Hughes Network Systems Germantown MD 20876 United States Department of Electrical and Computer Engineering University of Maryland College Park MD 20742 United States
Length reduction of evanescent-mode ridge waveguide bandpass filters is investigated extensively. Based on the conventional filter configuration, two new filter configurations are proposed: one is the generalized filt... 详细信息
来源: 评论
Software configuration management related to the management of distributed systems and service-oriented architectures
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2003年 2649卷 54-69页
作者: Tosic, Vladimir Mennie, David Pagurek, Bernard Network Management and Artificial Intelligence Lab. Department of Systems and Computer Engineering Carleton University 1125 Colonel By Drive Ottawa Ont. K1S 5B6 Canada
We summarize our three research projects related to software configuration management and discuss three challenges for the future research in software configuration management. The three projects that we discuss are d... 详细信息
来源: 评论
Developing a heterogeneous intrusion tolerant CORBA system
Developing a heterogeneous intrusion tolerant CORBA system
收藏 引用
Foundations of Intrusion Tolerant systems
作者: D. Sames B. Matt B. Niebuhr G. Tally B. Whitmore D. Bakken Distributed Systems Security Department NAI Laboratories-Network Associates Inc. Glenwood MD USA School of Electrical Engineering and Computer Science Washington State University Pullman WA USA
来源: 评论
Efficient Approach for Face Detection in Video Surveillance
收藏 引用
Journal of Donghua University(English Edition) 2003年 第4期20卷 52-55页
作者: 宋红 石峰 Department of Computer Science and Engineering Beijing Institute of Technology Beijing 100081 China Department of Computer Science and Engineering Beijing Institute of Technology Beijing 100081 Chinaecurity access control systems and automatic video surveillance systems are becoming increasingly important recently and detecting human faces is one of the indispensable processes. In this paper an approach is presented to detect faces in video surveillance. Firstly both the skin-color and motion components are applied to extract skin-like regions. The skin-color segmentation algorithm is based on the BPNN (back-error-propagation neural network) and the motion component is obtained with frame difference algorithm. Secondly the image is clustered into separated face candidates by using the region growing technique. Finally the face candidates are further verified by the rule-based algorithm. Experiment results demonstrate that both the accuracy and processing speed are very promising and the approach can be applied for the practical use.
Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable *** this paper,an approach is presented to de... 详细信息
来源: 评论
A Novel, User-Level, Security-On-Demand Paradigm for ATM networks: Modeling, Simulation, and Performance Analysis
收藏 引用
Journal of Interconnection networks 2003年 第4期4卷 429-461页
作者: H. J. (Jerry) Schumacher Tony Lee Sumit Ghosh Department of EE & CS US Military Academy West Point New York 10996 USA Vitria Technology 945 Stewart Drive Sunnyvvale CA 94086 USA Secure Network Systems Design Lab. Department of Electrical & Computer Engineering Stevens Institute of Technology Hoboken NJ07030 USA
With networks increasingly moving into virtually every aspect of our daily life, security is gaining importance, not only from the traditional perspective of communication but the network's growing role in modern ... 详细信息
来源: 评论
Automatically detecting and visualising errors in UML diagrams
收藏 引用
Requirements engineering 2002年 第4期7卷 264-287页
作者: Campbell, Laura A. Cheng, Betty H. C. McUmber, William E. Stirewalt, R.E.K. Department of Computer Science and Engineering Michigan State University East Lansing MI United States Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
UML has become the de facto standard for object-oriented modelling. Currently, UML comprises several different notations with no formal semantics attached to the individual diagrams or their integration, thus preventi... 详细信息
来源: 评论
Symbol-by-symbol and trellis-based equalization with widely linear processing for space-time block-coded transmission over frequency-selective fading channels
Symbol-by-symbol and trellis-based equalization with widely ...
收藏 引用
IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM)
作者: W.H. Gerstacker F. Obernosterer R. Schober A. Lehmann A. Lampe P. Gunreben Universitat Erlangen-Niimb Germany Lucent Technologies Network Systems GmbH Nürnberg Department of Electrical and Computer Engineering University of Toronto Canada Department of Electrical and Computer Engineering Lucent Technologies Network Systems GmbH Nürnberg Germany
In this paper, we develop receiver concepts for transmission with space-time block codes (STBC) over frequency-selective fading channels. The focus lies on Alamouti's STBC, but the results may be generalized to re... 详细信息
来源: 评论