咨询与建议

限定检索结果

文献类型

  • 2,317 篇 会议
  • 648 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,972 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,626 篇 工学
    • 1,110 篇 计算机科学与技术...
    • 853 篇 软件工程
    • 718 篇 信息与通信工程
    • 251 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 电气工程
    • 147 篇 生物工程
    • 119 篇 动力工程及工程热...
    • 107 篇 仪器科学与技术
    • 93 篇 生物医学工程(可授...
    • 88 篇 机械工程
    • 81 篇 光学工程
    • 65 篇 安全科学与工程
    • 50 篇 交通运输工程
    • 48 篇 建筑学
    • 46 篇 化学工程与技术
  • 708 篇 理学
    • 423 篇 数学
    • 164 篇 生物学
    • 148 篇 统计学(可授理学、...
    • 140 篇 物理学
    • 103 篇 系统科学
    • 53 篇 化学
  • 384 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 164 篇 工商管理
    • 117 篇 图书情报与档案管...
  • 83 篇 医学
    • 70 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 44 篇 药学(可授医学、理...
  • 74 篇 法学
    • 59 篇 社会学
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 40 篇 农学
  • 20 篇 教育学
  • 17 篇 军事学
  • 11 篇 文学
  • 3 篇 艺术学

主题

  • 165 篇 bandwidth
  • 159 篇 quality of servi...
  • 157 篇 computer science
  • 156 篇 wireless sensor ...
  • 151 篇 wireless network...
  • 139 篇 throughput
  • 127 篇 computer network...
  • 121 篇 delay
  • 119 篇 wireless communi...
  • 97 篇 intelligent netw...
  • 95 篇 protocols
  • 91 篇 telecommunicatio...
  • 88 篇 routing
  • 83 篇 laboratories
  • 77 篇 interference
  • 75 篇 energy consumpti...
  • 75 篇 mobile computing
  • 72 篇 resource managem...
  • 70 篇 costs
  • 69 篇 fading

机构

  • 190 篇 department of co...
  • 160 篇 graduate institu...
  • 111 篇 state key labora...
  • 68 篇 department of co...
  • 47 篇 networking and i...
  • 43 篇 institute of inf...
  • 38 篇 wireless network...
  • 33 篇 the state key la...
  • 28 篇 laboratory of mu...
  • 27 篇 department of co...
  • 26 篇 graduate institu...
  • 25 篇 advanced network...
  • 25 篇 department of ne...
  • 24 篇 wireless network...
  • 23 篇 department of co...
  • 22 篇 networking proto...
  • 22 篇 research center ...
  • 21 篇 department of co...
  • 20 篇 beijing universi...
  • 20 篇 department of el...

作者

  • 87 篇 xi zhang
  • 48 篇 s.k. das
  • 40 篇 tei-wei kuo
  • 35 篇 kuo tei-wei
  • 34 篇 nirwan ansari
  • 32 篇 zhang xi
  • 30 篇 wu ja-ling
  • 29 篇 robert w. heath
  • 28 篇 niyato dusit
  • 27 篇 sajal k. das
  • 26 篇 pang ai-chun
  • 25 篇 andrews jeffrey ...
  • 25 篇 chung-ming huang
  • 25 篇 heath jr. robert...
  • 24 篇 ai-chun pang
  • 24 篇 liu pangfeng
  • 24 篇 hung yi-ping
  • 23 篇 n. ansari
  • 23 篇 chi-sheng shih
  • 23 篇 han zhu

语言

  • 2,879 篇 英文
  • 67 篇 其他
  • 27 篇 中文
检索条件"机构=Department of Computer and Networking Engineering"
2972 条 记 录,以下是111-120 订阅
排序:
Evaluation of a Novel Intelligent Firewall Simulator for Dynamic Cyber Attack Lab  9th
Evaluation of a Novel Intelligent Firewall Simulator for Dyn...
收藏 引用
9th computer Science On-line Conference, CSOC 2020
作者: Syamsuddin, Irfan Nur, Rini Olivya, Meylanie Irmawati Saharuna, Zawiah Department of Computer and Networking Engineering Politeknik Negeri Ujung Pandang Makassar Indonesia
Firewall administration is an important topic in network security courses. However, most teaching aids of the topic commonly deal with static firewall analyses that does not adequately covers current dynamic and varie... 详细信息
来源: 评论
The Impact of CyRIS in Ascertaining Accurate Implementation of Projects  14
The Impact of CyRIS in Ascertaining Accurate Implementation ...
收藏 引用
14th International Conference on Computing Communication and networking Technologies, ICCCNT 2023
作者: Sharifi, Ahma Zia Walid, Md. Abul Ala Zia, Ghezal Ahmad Jan Salehin, Md. Nazmus Safi, Ihsan Ul Haq Al Islam, Iqbal Faculty of Computer Science Nangarhar Univeristy Department of Networking and Communication Afghanistan Department of Computer Science and Engineering Khulna9203 Bangladesh Berlin Germany Department of Computer Science and Engineering Natore Bangladesh Nangarhar University Department of Networking and Communication Faculty of Computer Science Afghanistan Department of Computer Science & Engineering Savar Dhaka Bangladesh
This systematic review seeks to evaluate the impact of CyRIS in ascertaining accurate implementation of projects with a primary focus on the merits of its functionalities. Core to the study is the view that CyRIS-driv... 详细信息
来源: 评论
Online reranking via ordinal informative concepts for context fusion in concept detection and video search
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2009年 第12期19卷 1880-1890页
作者: Yang, Yi-Hsuan Hsu, Winston H. Chen, Homer H. Graduate Institute of Communication Engineering National Taiwan University Taipei 10617 Taiwan Graduate Institute of Networking and Multimedia Department of Computer Science and Information Engineering National Taiwan University Taipei 10617 Taiwan Graduate Institute of Communication Engineering Graduate Institute of Networking and Multimedia Department of Electrical Engineering Taipei 10617 Taiwan
To exploit the co-occurrence patterns of semantic concepts while keeping the simplicity of context fusion, a novel reranking approach is proposed in this paper. The approach, called ordinal reranking, adjusts the rank... 详细信息
来源: 评论
DKSCNN: Deep Kronecker Siamese Convolutional Neural Network enabled speaker identification
收藏 引用
Expert Systems with Applications 2025年 288卷
作者: Karthikeyan Chinnasamy Rajesh Kumar Thevasigamani Rajiv Vincent Sam Kumar Gopalsamy Venkatesan Deepa Thilak Kanniyappan Kalaiselvi Kaliannan Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamil Nadu 602105 India School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Tamil Nadu 600127 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur Andhra Pradesh 522502 India Department of Networking and Communications Faculty of Engineering & Technology SRM Institute of Science and Technology Kattankulathur Tamil Nadu 603203 India
Speaker identification refers to the process of discerning between different voices within audio recordings or streams. Various factors contribute to the complexity of this task, including differences in frameworks, o...
来源: 评论
Optimal deep learning based vehicle detection and classification using chaotic equilibrium optimization algorithm in remote sensing imagery
收藏 引用
Scientific reports 2025年 第1期15卷 17921页
作者: Youseef Alotaibi Krishnaraj Nagappan Tamilvizhi Thanarajan Surendran Rajendran Department of Software Engineering College of Computing Umm Al-Qura University Makkah 21955 Saudi Arabia. Department of Networking and Communications School of Computing SRM Institute of Science and Technology Kattankulathur Tamil Nadu 603203 India. Department of Computer Science and Engineering Panimalar Engineering College Chennai 600123 India. tamilvizhi.phd.it@***. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai 602105 India.
Remote sensing images (RSI), such as aerial or satellite images, produce a large-scale view of the Earth's surface, which gets them used to track and monitor vehicles from several settings, like border control, di... 详细信息
来源: 评论
Primitives towards verifiable computation: a survey
收藏 引用
Frontiers of computer Science 2018年 第3期12卷 451-478页
作者: Haseeb AHMAD Licheng WANG Haibo HONG Jing LI Hassan DAWOOD Manzoor AHMED Yixian YANG State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Information Engineering Zhejiang Gongshang University Hangzhou 310018 China Department of Computer Engineering University of Engineering and Technology Taxila 47050 Pakistan Future Internet & Communication Lab Department of Electronic Engineering Tsinghua University Beijing 100084 China
Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations ... 详细信息
来源: 评论
On the TCP minimum retransmission timeout in a high-speed cellular network  11
On the TCP minimum retransmission timeout in a high-speed ce...
收藏 引用
11th European Wireless Conference on Next Generation Wireless and Mobile Communications and Services, European Wireless 2005
作者: Folke, Mats Landström, Sara Bodin, Ulf Division of Computer Science and Networking Department of Computer Science and Electrical Engineering Luleå University of Technology Sweden
HS-DSCH is a high-speed shared radio channel extension for WCDMA which is used for cellular mobile telephony. The algorithm for distributing the channel resources together with the characteristics of the radio medium ... 详细信息
来源: 评论
A robust and energy efficient routing scheme for wireless sensor networks
A robust and energy efficient routing scheme for wireless se...
收藏 引用
26th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS 2006
作者: Wang, Haiguang Kong, Peng-Yong Guan, Winston Seah Khoon Networking Department Institute for Infocomm Research Electrical and Computer Engineering Department National University of Singapore
In a wireless sensor network, energy efficient transmissions are important because each node has a limited battery. On the other hand, the energy limitation should not compromise the robustness in end-to-end packet de... 详细信息
来源: 评论
Modeling key caching for mobile IP authentication, authorization, and accounting (AAA) services
收藏 引用
IEEE Transactions on Vehicular Technology 2009年 第7期58卷 3596-3608页
作者: Lin, Phone Cheng, Shin-Ming Liao, Wanjiun Department of Computer Science and Information Engineering Graduate Institute of Networking and Multimedia National Taiwan University Taipei 106 Taiwan Department of Electrical Engineering National Taiwan University Taipei 106 Taiwan
The Mobile IP Authentication, Authorization, and Accounting (AAA) framework architecture is designed to protect signaling messages from eavesdropping by malicious attackers. The message exchanges for AAA incur heavy s... 详细信息
来源: 评论
A model checking-based security analysis framework for IoT systems
收藏 引用
High-Confidence Computing 2021年 第1期1卷 24-34页
作者: Zheng Fang Hao Fua Tianbo Gu Zhiyun Qian Trent Jaeger Pengfei Hu Prasant Mohapatra Department of Computer Science University of CaliforniaDavisUnited States Azure Networking team MicrosoftUnited States Computer Science and Engineering department University of CaliforniaRiversideUnited States School of Computer Science and Technology Shandong UniversityChina Computer Science and Engineering department Pennsylvania State UniversityUnited States
IoT systems are revolutionizing our life by providing ubiquitous computing,inter-connectivity,and automated ***,the increasing system complexity poses huge challenges for security as IoT devices are dis-tributed,highl... 详细信息
来源: 评论