咨询与建议

限定检索结果

文献类型

  • 43 篇 会议
  • 24 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 71 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 40 篇 工学
    • 33 篇 计算机科学与技术...
    • 22 篇 软件工程
    • 9 篇 信息与通信工程
    • 6 篇 生物工程
    • 5 篇 电气工程
    • 5 篇 控制科学与工程
    • 3 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
  • 24 篇 理学
    • 8 篇 物理学
    • 7 篇 数学
    • 6 篇 生物学
    • 3 篇 化学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 大气科学
  • 13 篇 管理学
    • 9 篇 图书情报与档案管...
    • 4 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 文学
    • 2 篇 中国语言文学
    • 2 篇 外国语言文学
    • 1 篇 新闻传播学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 2 篇 农学
    • 2 篇 作物学

主题

  • 4 篇 information syst...
  • 4 篇 information stor...
  • 3 篇 computer science
  • 3 篇 bandwidth
  • 3 篇 computational li...
  • 3 篇 internet
  • 2 篇 earth sciences, ...
  • 2 篇 information syst...
  • 2 篇 network servers
  • 2 篇 sun
  • 2 篇 data mining and ...
  • 2 篇 physiology
  • 2 篇 database managem...
  • 2 篇 servers
  • 2 篇 information filt...
  • 2 篇 pattern recognit...
  • 2 篇 information filt...
  • 2 篇 costs
  • 2 篇 algorithm design...
  • 2 篇 benchmarking

机构

  • 7 篇 department of co...
  • 7 篇 school of electr...
  • 6 篇 shanghai key lab...
  • 6 篇 key laboratory o...
  • 3 篇 school of inform...
  • 3 篇 web computing la...
  • 3 篇 big data researc...
  • 2 篇 prhlt research c...
  • 2 篇 baichuan intelli...
  • 2 篇 school of comput...
  • 2 篇 microsoft resear...
  • 2 篇 department of el...
  • 2 篇 xilnex web bytes...
  • 2 篇 data analytics o...
  • 2 篇 department of co...
  • 2 篇 web computing la...
  • 2 篇 department of in...
  • 2 篇 web technology a...
  • 2 篇 college of zhiyu...
  • 2 篇 school of electr...

作者

  • 7 篇 zhang zhuosheng
  • 7 篇 zhao hai
  • 6 篇 hsing mei
  • 4 篇 ma xinbei
  • 3 篇 mei hsing
  • 2 篇 meng wang
  • 2 篇 ju younghyun
  • 2 篇 mihui kim
  • 2 篇 hwang inseok
  • 2 篇 yallamelli akhil...
  • 2 篇 stein benno
  • 2 篇 ju tianjie
  • 2 篇 nicu sebe
  • 2 篇 richang hong
  • 2 篇 shipeng li
  • 2 篇 cathal gurrin
  • 2 篇 abdulmotaleb sad...
  • 2 篇 tao mei
  • 2 篇 stamatatos efsta...
  • 2 篇 ying-cheng lai

语言

  • 64 篇 英文
  • 7 篇 其他
检索条件"机构=Department of Computer and Web Information Engineering"
71 条 记 录,以下是1-10 订阅
排序:
Internet of Things (IoT): survey of most important security risks  3
Internet of Things (IoT): survey of most important security ...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer engineering, MI-STA 2023
作者: Alaskri, Ahmed Salem Ahmed, Nuredin Ali Shaari, Hala Collage of Computer Technology Software Engineering Dep. Tripoli Libya Faculty of Engineering Computer Engineering Department Tripoli Libya Faculty of Information Web Technologies Department Tripoli Libya
The Internet of things (IoT) is getting more and more intrusive into our lives until the day comes when everything becomes connected to the Internet. Due to the limited resources and heterogeneous Internet of Things (... 详细信息
来源: 评论
SmartDetect: Safe Driving by Detecting Steering-Wheel Handling With a Single Smartwatch
收藏 引用
IEEE Sensors Journal 2024年 第10期24卷 16325-16335页
作者: Mardi Putri, Rekyan Regasari Chang, Chin-Chun Putra, Aditya Fitri Hananta Pamungkas, Setyan Liang, Deron National Central University Department of Computer Science and Information Engineering Taoyuan City32001 Taiwan Brawijaya University Department of Informatics Engineering Malang65145 Indonesia National Taiwan Ocean University Department of Computer Science and Engineering Keelung City20224 Taiwan Astral Web Taipei City234-011 Taiwan Pahamify Bogor16128 Indonesia Nomura Research Institute Indonesia Jakarta10220 Indonesia
Holding the steering wheel with both hands is essential for safe driving. This article proposes a novel approach using only one off-the-shelf smartwatch to determine whether the driver is holding the steering wheel wi... 详细信息
来源: 评论
GDPR-Compliant Personal Health Record Sharing Mechanism with Redactable Blockchain and Revocable IPFS
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第4期21卷 3342-3356页
作者: Yeh, Lo-Yao Hsu, Wan-Hsin Shen, Chih-Ya National Central University Department of Information Management Taoyuan320 Taiwan National Yang Ming Chiao Tung University Institute of Computer Science and Engineering Hsinchu30010 Taiwan Amber Group Web3 Security Team Singapore National Tsing Hua University Department of Computer Science Hsinchu300 Taiwan
The use of IoT technology in collecting personal health records (PHR) within the eHealth environment is a growing trend. However, data integrity is a concern as cloud service providers (CSPs) often cannot guarantee it... 详细信息
来源: 评论
Enhancing Explainable Matrix Factorization with Tags for Multi-Style Explanations  15
Enhancing Explainable Matrix Factorization with Tags for Mul...
收藏 引用
15th International Conference on Knowledge Discovery and information Retrieval, KDIR 2023 as part of the 15th International Joint Conference on Knowledge Discovery, Knowledge engineering and Knowledge Management, IC3K 2023
作者: Seton, Olurotimi Haghighi, Pegah Sagheb Alshammari, Mohammed Nasraoui, Olfa Knowledge Discovery and Web Mining Lab Computer Science and Engineering Dept University of Louisville United States Department of Computer Science Faculty of Computing and Information Technology Northern Border University Arar Saudi Arabia
Black-box AI models tend to be more accurate but less transparent and scrutable than white-box models. This poses a limitation for recommender systems that rely on black-box models, such as Matrix Factorization (MF). ... 详细信息
来源: 评论
Explorotron: An IDE Extension for Guided and Independent Code Exploration and Learning (Discussion Paper)  23
Explorotron: An IDE Extension for Guided and Independent Cod...
收藏 引用
Proceedings of the 23rd Koli Calling International Conference on Computing Education Research
作者: Yoshi Malaise Beat Signer Department of Computer Science / Web & Information Systems Engineering lab Vrije Universiteit Brussel Belgium
We introduce the Explorotron Visual Studio Code extension for guided and independent code exploration and learning. Explorotron is a continuation of earlier work to explore how we can enable small organisations with l... 详细信息
来源: 评论
Enhancing Cloud Security Implementing AI-Based Intrusion Detection Systems  1
Enhancing Cloud Security Implementing AI-Based Intrusion Det...
收藏 引用
1st International Conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Santharam, Vinoth Thoguluva Yallamelli, Akhil Raj Gaius Altemimi, Mohammed Alaa H. Arunachalam, Mahesh Prabu Rudrank, Shukla Ghule, Gauri Data Analytics Organization-Comcast Chennai India Amazon Web Services Inc Seattle United States Al-Khwarizmi College of Engineering The University of Baghdad Department of Information and Communication Engineering Baghdad Iraq Department of Information Technology and Computer Science AustinTX United States Kalasalingam Academy of Research and Education Deemed to be University Tamilnadu India Department of E and TC Pune India
The increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthori... 详细信息
来源: 评论
Technology acceptance model (TAM) for mobile durian plantation apps(Pro Durian);The analysis for Malaysian farmers  5
Technology acceptance model (TAM) for mobile durian plantati...
收藏 引用
5th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2023
作者: Kamarudin, Noraziahtulhidayu Yusoff, Aiman Basari, Abd Samad Hasan Safar, Noor Zuraidin Bin Mohd Hussin, Mohd Hatta Universiti Tun Hussein Onn Multimedia and Signal Processing Focus Group Faculty of Computer Science and Information Department of Multimedia Malaysia Universiti Tun Hussein Onn Faculty of Computer Science and Information Department of Multimedia Malaysia Universiti Tun Hussein Onn Faculty of Computer Science and Information Technology Department of Software Engineering Malaysia Universiti Tun Hussein Onn Faculty of Computer Science and Information Department of Information Security and Web Technology Malaysia Pertubuhan Peladang Senggarang Johor Darul Takzim Malaysia
During the application development process, it is important for a developer to analyze user requirements. This is crucial to the success of interactive systems and is an essential component of the design of informatio... 详细信息
来源: 评论
Visual Traits-Based Recommendation System for Proactive Retailing in Physical Store Environment
Visual Traits-Based Recommendation System for Proactive Reta...
收藏 引用
2023 International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023
作者: Kh'ng, Xin Yi Ooi, Boon Yaik Teoh, Sheng Kang Ooi, Boon Sheng Chen, Yen-Lin Universiti Tunku Abdul Rahman Department of Computer Science Kampar Malaysia Xilnex Web Bytes Sdn. Bhd. Penang Malaysia National Taipei University of Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
A comprehensive visual traits-based recommendation system is designed for proactive retailing in a physical store environment. The proposed system utilizes computer vision algorithms to analyze various visual traits o... 详细信息
来源: 评论
Hybrid Autoregressive Integrated Moving Average and Bi-directional Gated Recurrent Unit for Time Series Forecasting  2
Hybrid Autoregressive Integrated Moving Average and Bi-direc...
收藏 引用
2nd IEEE International Conference on Data Science and Network Security, ICDSNS 2024
作者: Nelson, S. Yallamelli, Akhil Raj Gaius Alkhayyat, Ahmad Saranya, N. Naga Sowmya, M. V.S.B. Engineering College Department of Information Technology Karur India Amazon Web Services Inc Seattle United States College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Najaf Iraq Saveetha College of Liberal Arts & Science Simats Department of Computer Applications Chennai India Nitte Meenakshi Institute of Technology Department of Ai & Ds Bengaluru India
Forecasting in time series is given special attention in manufacturing, containing sophisticated systems in which patterns of behavior are being recorded through time series data. But it has to be mentioned that the n... 详细信息
来源: 评论
Internet of Things (IoT): survey of most important security risks
Internet of Things (IoT): survey of most important security ...
收藏 引用
Sciences and Techniques of Automatic Control and computer engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Ahmed Alaskri Nuredin Ali Salem Ahmed Hala Shaari Software Engineering Dep. Collage of Computer Technology Tripoli Libya Computer Engineering Department Faculty of Engineering Tripoli Libya Web Technologies Department Faculty of Information Tripoli Libya
The Internet of things (IoT) is getting more and more intrusive into our lives until the day comes when everything becomes connected to the Internet. Due to the limited resources and heterogeneous Internet of Things (...
来源: 评论