咨询与建议

限定检索结果

文献类型

  • 1,182 篇 会议
  • 820 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,275 篇 工学
    • 1,026 篇 计算机科学与技术...
    • 843 篇 软件工程
    • 250 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 164 篇 生物工程
    • 117 篇 电气工程
    • 108 篇 生物医学工程(可授...
    • 72 篇 光学工程
    • 67 篇 机械工程
    • 66 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 52 篇 网络空间安全
    • 47 篇 交通运输工程
    • 46 篇 仪器科学与技术
    • 46 篇 动力工程及工程热...
  • 594 篇 理学
    • 330 篇 数学
    • 180 篇 生物学
    • 119 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 46 篇 化学
  • 386 篇 管理学
    • 264 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 133 篇 工商管理
  • 118 篇 医学
    • 109 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 52 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 6 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 60 篇 machine learning
  • 47 篇 deep learning
  • 46 篇 computational mo...
  • 44 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 cloud computing
  • 41 篇 grid computing
  • 41 篇 quality of servi...
  • 38 篇 resource managem...
  • 38 篇 feature extracti...
  • 38 篇 training
  • 33 篇 software
  • 32 篇 computer archite...
  • 31 篇 artificial intel...
  • 30 篇 application soft...
  • 30 篇 security
  • 29 篇 laboratories
  • 28 篇 semantics

机构

  • 123 篇 college of compu...
  • 55 篇 department of co...
  • 35 篇 state key labora...
  • 34 篇 department of co...
  • 30 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 department of in...
  • 15 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 school of inform...
  • 14 篇 department of co...
  • 13 篇 department of in...
  • 12 篇 college of compu...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 13 篇 materwala huned
  • 13 篇 muhammad adnan k...
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 12 篇 tan kay chen
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,788 篇 英文
  • 243 篇 其他
  • 13 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2041 条 记 录,以下是1451-1460 订阅
排序:
Privacy-Preserving authorized RFID authentication protocols
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8651卷 108-122页
作者: Li, Nan Mu, Yi Susilo, Willy Guo, Fuchun Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Department of Computing Macquarie University Sydney Australia
Radio Frequency Identification (RFID) has been widely ad-opted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system... 详细信息
来源: 评论
An efficient privacy-preserving compressive data gathering scheme in WSNs  1
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Xie, Kun Ning, Xueping Wang, Xin Wen, Jigang Liu, Xiaoxiao He, Shiming Zhang, Daqiang College of Computer Science and Electronics Engineering Hunan University Changsha410082 China The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommmunications Beijing100876 China Department of Electrical and Computer Engineering State University of New York at Stony Brook New York11790 United States Institute of Computing Technology Chinese Academy of Sciences Beijing100080 China State Grid HuNan Electric Power Company Research Insitute Changsha410000 China School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China School of Software Engineering Tongji University Shanghai201804 China
Due to the strict energy limitation and the common vulnerability of WSNs, providing efficient and security data gathering in WSNs becomes an essential problem. Compressive data gathering, which is based on the recent ... 详细信息
来源: 评论
Two squares canonical factorization  18
Two squares canonical factorization
收藏 引用
18th Prague Stringology Conference, PSC 2014
作者: Bai, Haoyue Franek, Frantisek Smyth, William F. Department of Computing and Software McMaster University HamiltonON Canada School of Computer Science and Software Engineering University of Western Australia Australia
We present a new combinatorial structure in a string: a canonical factorization for any two squares that occur at the same position and satisfy some size restrictions. We believe that this canonical factorization will... 详细信息
来源: 评论
Cross-project build co-change prediction
Cross-project build co-change prediction
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Xin Xia David Lo Shane McIntosh Emad Shihab Ahmed E. Hassan College of Computer Science and Technology Zhejiang University Hangzhou China School of Information Systems Singapore Management University Singapore School of Computing Queen's University Kingston Canada Department of Computer Science and Software Engineering Concordia University Montreal Canada
Build systems orchestrate how human-readable source code is translated into executable programs. In a software project, source code changes can induce changes in the build system (aka. build co-changes). It is difficu... 详细信息
来源: 评论
Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization
Virtual Machine Image Content Aware I/O Optimization for Mob...
收藏 引用
IEEE International Symposium on Cyberspace Safety and Security
作者: Renhai Chen Yi Wang Jingtong Hu Duo Liu Zili Shao Yong Guan Embedded Systems and CPS Laboratory Department of Computing The Hong Kong Polytechnic University College of Computer Science and Software Engineering Shenzhen University School of Electrical and Computer Engineering Oklahoma State University College of Computer Science Chongqing University College of Computer and Information Management Capital Normal University
Mobile virtualization introduces extra layers in software stacks, which leads to performance degradation. Especially, each I/O operation has to pass through several software layers to reach the NAND-flash-based storag... 详细信息
来源: 评论
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Wireshark window authentication based packet captureing sche...
收藏 引用
IEEE International Conference on software engineering and Service sciences (ICSESS)
作者: Waqar Ali Jun Sang Hamad Naeem Rashid Naeem Ali Raza School of Software Engineering Chongqing University Chongqing China Ministry of Education Key Laboratory of Dependable Service Computing in Cyber Physical Society Chongqing China Department of computer science International Islamic University Kuala lumpur Malaysia
DoS (Denial of Service) attack forces a cloud network node to handle few unauthorized access that employ unwanted computing cycle. As a result, the cloud node response is slow as usual and resource on cloud network be... 详细信息
来源: 评论
Cover Image, Volume 84, Issue 7
收藏 引用
Proteins: Structure, Function, and Bioinformatics 2016年 第7期84卷
作者: Wei Wang Juan Liu Lin Sun Department of Computer Science and Technology College of Computer and Information Engineering Henan Normal University Xinxiang 453007 China Laboratory of Computation Intelligence and Information Processing Engineering Technology Research Center for Computing Intelligence and Data Mining Henan Province China Institute of Computer Software School of Computer Wuhan University Wuhan 430072 China
来源: 评论
Emotion recognition from thermal infrared images using deep Boltzmann machine
收藏 引用
Frontiers of Computer science 2014年 第4期8卷 609-618页
作者: Shangfei WANG Menghua HE Zhen GAO Shan HE Qiang JI School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Key Lab of Computing and Communicating Software of Anhui Province Hefei 230027 China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY 12180-3590 USA
Facial expression and emotion recognition from thermal infrared images has attracted more and more attentions in recent years. However, the features adopted in current work are either temperature statistical parameter... 详细信息
来源: 评论
RFID cardinality estimation with blocker tags
RFID cardinality estimation with blocker tags
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Xiulong Liu Bin Xiao Keqiu Li Jie Wu Alex X. Liu Heng Qi Xin Xie Department of Computing The Hong Kong Polytechnic University Hong Kong School of Computer Science and Technology Dalian University of Technology China Department of Computer and Information Sciences Temple University USA National Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Engineering Michigan State University USA
The widely used RFID tags impose serious privacy concerns as a tag responds to queries from readers no matter they are authorized or not. The common solution is to use a commercially available blocker tag which behave... 详细信息
来源: 评论
Cluster analysis based on opinion mining
Cluster analysis based on opinion mining
收藏 引用
IEEE International Conference on Ubi-Media computing
作者: Xiaoye Wang Xiaorui Chai Ching-Hsien Hsu Yingyuan Xiao Yukun Li Ministry of Education Tianjin University of Technology Tianjin China Department of Computer Science and Information Engineering Chung Hua University Hsinchu Taiwan Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
Mining based on opinions can extract useful information from users' comments. After doing cluster and analysis on the information, users can get a detailed understanding of the commodity, then determine to buy the... 详细信息
来源: 评论