咨询与建议

限定检索结果

文献类型

  • 426 篇 会议
  • 318 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 751 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 425 篇 工学
    • 257 篇 计算机科学与技术...
    • 208 篇 软件工程
    • 115 篇 信息与通信工程
    • 94 篇 电气工程
    • 83 篇 电子科学与技术(可...
    • 63 篇 控制科学与工程
    • 30 篇 光学工程
    • 28 篇 生物工程
    • 27 篇 机械工程
    • 25 篇 动力工程及工程热...
    • 23 篇 生物医学工程(可授...
    • 20 篇 仪器科学与技术
    • 18 篇 材料科学与工程(可...
    • 18 篇 化学工程与技术
    • 15 篇 航空宇航科学与技...
    • 13 篇 网络空间安全
  • 227 篇 理学
    • 108 篇 数学
    • 75 篇 物理学
    • 40 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 22 篇 化学
  • 103 篇 管理学
    • 71 篇 管理科学与工程(可...
    • 42 篇 工商管理
    • 27 篇 图书情报与档案管...
  • 48 篇 医学
    • 38 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
  • 21 篇 法学
    • 18 篇 社会学
  • 19 篇 经济学
    • 18 篇 应用经济学
  • 6 篇 教育学
  • 5 篇 农学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 23 篇 computer network...
  • 20 篇 computer science
  • 19 篇 optical fiber ne...
  • 18 篇 software enginee...
  • 17 篇 application soft...
  • 17 篇 laboratories
  • 17 篇 quality of servi...
  • 17 篇 passive optical ...
  • 16 篇 machine learning
  • 16 篇 delay
  • 15 篇 computer archite...
  • 15 篇 bandwidth
  • 15 篇 costs
  • 14 篇 performance anal...
  • 13 篇 optical fiber su...
  • 12 篇 intelligent netw...
  • 12 篇 computational mo...
  • 11 篇 wireless communi...
  • 11 篇 monitoring
  • 11 篇 optical network ...

机构

  • 20 篇 software enginee...
  • 14 篇 software enginee...
  • 9 篇 hughes network s...
  • 8 篇 health managemen...
  • 8 篇 department of el...
  • 7 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 information syst...
  • 7 篇 department of el...
  • 6 篇 department of pu...
  • 6 篇 computer network...
  • 6 篇 the edward s. ro...
  • 6 篇 julius centre fo...
  • 6 篇 vector institute...
  • 6 篇 centre for heart...
  • 5 篇 leeds institute ...
  • 5 篇 department of ph...
  • 5 篇 center for psych...
  • 5 篇 department of in...

作者

  • 23 篇 mohammad syuhaim...
  • 18 篇 kasmiran jumari
  • 13 篇 aswir premadi
  • 11 篇 ab-rahman mohamm...
  • 10 篇 p.k. mckinley
  • 10 篇 ng boon chuan
  • 8 篇 jumari kasmiran
  • 8 篇 luyao niu
  • 8 篇 andrew clark
  • 8 篇 cheng betty h. c...
  • 8 篇 yu f. richard
  • 7 篇 abu-gharbieh ema...
  • 7 篇 niu luyao
  • 7 篇 radha poovendran
  • 7 篇 clark andrew
  • 7 篇 mohamed othman
  • 6 篇 raghavan s.v.
  • 6 篇 bärnighausen til...
  • 6 篇 hong choong seon
  • 6 篇 chu dinh-toi

语言

  • 712 篇 英文
  • 30 篇 其他
  • 9 篇 中文
检索条件"机构=Department of Computer and Network Systems Engineering"
751 条 记 录,以下是401-410 订阅
排序:
U-shaped inductively coupled feed RFID tag antenna for gain enhancement
U-shaped inductively coupled feed RFID tag antenna for gain ...
收藏 引用
2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013
作者: Alhawari, A.R.H. Ismail, A. Jalal, A.S.A. Raja Abdullah, R.S.A. Rasid, M.F.A. Centre of Excellence for Wireless and Photonics Network Department of Computer and Communication Systems Engineering Universiti Putra Malaysia Selangor Darul Ehsan Malaysia Universiti Putra Malaysia Malaysia College of Information Engineering Al-Nahrain University 10070 Al-Jadriya Complex Baghdad Iraq
An inductively coupled feed novel technique is proposed to enhance the performance of RFID tag antennas. The applied feeding concept comprises of two opposing symmetrical U-shaped structures to feed a radiating body. ... 详细信息
来源: 评论
Checkerboard LCS and the mixing characteristics of geophysical vortices  51
Checkerboard LCS and the mixing characteristics of geophysic...
收藏 引用
51st AIAA Aerospace Sciences Meeting including the New Horizons Forum and Aerospace Exposition 2013
作者: Lipinski, Doug Mohseni, Kamran Department of Mechanical and Aerospace Engineering University of Florida Gainesville FL 32611 United States Department of Electrical and Computer Engrineering University of Florida Gainesville FL 32611 United States Institute of Network Autonomous Systems University of Florida Gainesville FL 32611 United States
A checkerboard pattern formed by the intersection of attracting and repelling Lagrangian coherent structures has been observed in several geophysical vortex flows. A mechanism for tlie formation of such checkerboard p... 详细信息
来源: 评论
Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks
Energy-aware and self-adaptive anomaly detection scheme base...
收藏 引用
作者: Wang, Wei Wang, Huiran Wang, Beizhan Wang, Yaping Wang, Jiajun School of Computer Science Xi'An Polytechnic University Xi'an 710048 China Key Laboratory for Intelligent Network and Network Security Xi'An Jiaotong University Ministry of Education Xi'an 710049 China School of Software Xiamen University Xiamen 361005 China Department of Industrial and Systems Engineering Texas AandM University TX 77843 United States
Anomaly detection is indispensable for satisfying security services in mobile ad hoc network (MANET) applications. Often, however, a highly secure mechanism consumes a large amount of network resources, resulting in n... 详细信息
来源: 评论
A Dynamic Probabilistic Marking Approach with Multi-Tag for Tracing ICMP-Based DoS Attacks
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第6期18卷 484-488页
作者: CHEN Xiuzhen MA Jin LI Shenghong CHEN Ken SERHROUCHNI Ahmed State Key Laboratory for Manufacturing Systems Engineering Xi'an Jiaotong University School of Information Security Engineering Shanghai Jiao Tong University Les Laboratoires de l'Institut Galilée Université Paris 13Paris 93430 France Network and Computer Science Department Telecom ParisTech Paris 75634 France
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and refl... 详细信息
来源: 评论
Base station location optimisation in LTE using Genetic Algorithm
Base station location optimisation in LTE using Genetic Algo...
收藏 引用
International Conference on Information and Communication Technology Convergence (ICTC)
作者: Aida Al-Samawi Aduwati Sali Nor Kamariah Noordin Mohamed Othman Fazirulhisyam Hashim Dept. of Computer & Communication Systems Engineering UPM Selangor Malaysia Department of Communication Technology and Network UPM Selangor Malaysia
Long Term Evolution (LTE) is a promising technology for mobile communication. This technology is based on reducing the base stations cell size, which will lead to an increment in the number of base stations. As a resu... 详细信息
来源: 评论
Reflectance response of optical fiber sensor coated with graphene oxide towards ethanol
Reflectance response of optical fiber sensor coated with gra...
收藏 引用
2013 IEEE 4th International Conference on Photonics, ICP 2013
作者: Shabaneh, A.A. Arasu, P.T. Girei, S.H. Paiman, S. Mahdi, M.A. Yaacob, M.H. Huang, N.M. Wireless and Photonics Network Research Centre Engineering and Technology Complex University Putra Malaysia 43400 Serdang Selangor Malaysia Department of Computer and Communications Systems Engineering Faculty of Engineering University Putra Malaysia 43400 Serdang Selangor Malaysia Department of Physics Faculty of Science University Putra Malaysia 43400 Serdang Selangor Malaysia Low Dimensional Materials Research Centre Physics Department University of Malaya 50603 Kuala Lumpur Malaysia
In this paper, optical multimode fiber reflectance sensor for ethanol with different concentrations in water was developed. The sensor was coated with graphene oxide (GO) by drop-casting technique. The dynamic respons... 详细信息
来源: 评论
Performance analysis of centralized, distributed and hybrid demand load control architecture for smart power grid
Performance analysis of centralized, distributed and hybrid ...
收藏 引用
IEEE International Conference on Electro-Information Technology
作者: Sami S. Alwakeel Musaed A. Alhussein Muhammad Ammad-uddin Department of Computer Engineering King Saud University Riyadh Saudi Arabia Sensor Network and Cellular systems Center Tabuk University Saudi Arabia
Demand Response (DR) technology of future smart grid makes it possible to have two-way communication between utility service providers and home appliances inside the customer premises. This state-of-art technology is ... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Efficient Handling of Lock Hand-off in DSM Multiprocessors with Buffering Coherence Controllers
收藏 引用
Journal of computer Science & Technology 2012年 第1期27卷 75-91页
作者: Benjamín Sahelices Agustín de Dios Pablo Ibáez Víctor Vials-Yúfera José María Llabería Computer Science Department and HiPEAC European Network of Excellence University of Valladolid Valladolid Spain Computer Science and Systems Engineering Department I3A Research Institute and HiPEAC European Network of Excellence University of Zaragoza Zaragoza Spain Computer Architecture Department and HiPEAC European Network of Excellence Polytechnic University of Catalua Barcelona Spain
Synchronization in parallel programs is a major performance bottleneck in multiprocessor systems. Shared data is protected by locks and a lot of time is spent on the competition arising at the lock hand-off. In order ... 详细信息
来源: 评论
Accountable authority identity-based encryption with public traceability  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Lai, Junzuo Deng, Robert H. Zhao, Yunlei Weng, Jian School of Information Systems Singapore Management University Singapore Singapore Software School Fudan University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con... 详细信息
来源: 评论