咨询与建议

限定检索结果

文献类型

  • 1,182 篇 会议
  • 816 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,275 篇 工学
    • 1,026 篇 计算机科学与技术...
    • 843 篇 软件工程
    • 249 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 164 篇 生物工程
    • 118 篇 电气工程
    • 109 篇 生物医学工程(可授...
    • 71 篇 光学工程
    • 67 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 51 篇 网络空间安全
    • 47 篇 交通运输工程
    • 46 篇 仪器科学与技术
    • 46 篇 动力工程及工程热...
  • 595 篇 理学
    • 331 篇 数学
    • 180 篇 生物学
    • 119 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 46 篇 化学
  • 385 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 133 篇 工商管理
  • 118 篇 医学
    • 109 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 52 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 6 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 60 篇 machine learning
  • 46 篇 deep learning
  • 46 篇 computational mo...
  • 44 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 internet of thin...
  • 41 篇 grid computing
  • 41 篇 quality of servi...
  • 39 篇 feature extracti...
  • 38 篇 resource managem...
  • 38 篇 training
  • 33 篇 software
  • 32 篇 computer archite...
  • 30 篇 application soft...
  • 30 篇 security
  • 30 篇 artificial intel...
  • 29 篇 laboratories
  • 28 篇 semantics

机构

  • 123 篇 college of compu...
  • 55 篇 department of co...
  • 35 篇 department of co...
  • 35 篇 state key labora...
  • 29 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 21 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 state key labora...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 14 篇 department of co...
  • 13 篇 school of inform...
  • 13 篇 department of in...
  • 12 篇 college of compu...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 13 篇 materwala huned
  • 13 篇 muhammad adnan k...
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 12 篇 tan kay chen
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,784 篇 英文
  • 243 篇 其他
  • 13 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2037 条 记 录,以下是1501-1510 订阅
排序:
Visual loop closure detection by matching binary visual features using locality sensitive hashing
Visual loop closure detection by matching binary visual feat...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Junjun Wu Hong Zhang Yisheng Guan Guangdong Food and Drug School of Software Guangzhou China Department of Computing Science University of Alberta Edmonton AB Canada School of Mechanical and Electrical Engineering Guangdong University of Technology Guangzhou China
In this paper, we present a novel approach for visual loop-closure detection in autonomous robot navigation. Our method uses locality sensitive hashing (LSH) as the basic technique for matching the binary visual featu... 详细信息
来源: 评论
Virtual-machine metadata optimization for I/O traffic reduction in mobile virtualization
Virtual-machine metadata optimization for I/O traffic reduct...
收藏 引用
IEEE Non-Volatile Memory Systems and Applications Symposium (NVMSA)
作者: Renhai Chen Yi Wang Jingtong Hu Duo Liu Zili Shao Yong Guan Department of Computing The Hong Kong Polytechnic University College of Computer Science and Software Engineering Shenzhen University School of Electrical and Computer Engineering Oklahoma State University College of Computer Science Chongqing University College of Computer and Information Management Capital Normal University
Mobile virtualization introduces extra layers in software stacks, which leads to performance degradation. Especially, each I/O operation has to pass through several software layers to reach the NAND-flash-based storag... 详细信息
来源: 评论
Resource management for cognitive cloud gaming
Resource management for cognitive cloud gaming
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Wei Cai Min Chen Conghui Zhou Victor C. M. Leung Henry C. B. Chan Department of Electrical and Computer Engineering The University of British Columbia Canada Huazhong University of Science and Technology Wuhan Hubei CN We Software Limited Hong Kong Department of Computing The Hong Kong Polytechnic University Hong Kong
In contrary to conventional gaming-on-demand solution, cognitive cloud gaming platform facilitates gaming component migration from the cloud server to the players' terminal, a novel flexible solution to provide Ga... 详细信息
来源: 评论
On RFID authentication protocols with wide-strong privacy
收藏 引用
Cryptology and Information Security Series 2013年 11卷 3-16页
作者: Li, Nan Mu, Yi Susilo, Willy Guo, Fuchun Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Department of Computing Faculty of Science Macquarie University Sydney Australia
Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, ... 详细信息
来源: 评论
Almost Optimal Channel Access in Multi-Hop Networks with Unknown Channel Variables
Almost Optimal Channel Access in Multi-Hop Networks with Unk...
收藏 引用
International Conference on Distributed computing Systems
作者: Yaqin Zhou Qiuyuan Huang Fan Li Xiang-Yang Li Min Liu Zhongcheng Li Zhiyuan Yin Institute of Computing Technology Chinese Academy of Sciences Beijing China Department of Electrical and Computer Engineering University of Florida Gainesville FL USA School of Computer Science Beijing Institute of Technology School of Software and TNLIST Tsinghua University China
We consider the problem of online dynamic channel accessing in multi-hop cognitive radio networks. Previous works on online dynamic channel accessing mainly focus on single-hop networks that assume complete conflicts ... 详细信息
来源: 评论
Resolving vulnerability identification errors using security requirements on business process models
收藏 引用
Information Management and Computer Security 2013年 第3期21卷 202-223页
作者: Taubenberger, Stefan Jürjens, Jan Yu, Yijun Nuseibeh, Bashar Computing Department Open University Milton Keynes United Kingdom Department of Computer Science Technical University Dortmund Dortmund Germany Fraunhofer Institute for Software Systems Engineering ISST Dortmund Germany Lero the Irish Software Engineering Research Centre Computing Department University of Limerick Limerick Ireland Open University Milton Keynes United Kingdom
Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified vuln... 详细信息
来源: 评论
DIV: Dynamic Integrity Validation Framework for Detecting Compromises on Virtual Machine Based Cloud Services in Real Time
收藏 引用
China Communications 2014年 第8期11卷 15-27页
作者: WANG Chunlu LIU Chuanyi LIU Bin DONG Yingfei School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 P. R. China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 P. R. China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing 100876 P. R. China Department of Electrical Engineering University of Hawaii Honolulu Hawaii U.S.
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase ***,how to monitor the integrity of cloud execution environments is still a difficult *** this paper,a real-time dynam... 详细信息
来源: 评论
A secure elliptic curve based RFID ownership transfer scheme with controlled delegation
收藏 引用
Cryptology and Information Security Series 2013年 11卷 31-43页
作者: Cheng, Shu Varadharajan, Vijay Mu, Yi Susilo, Willy Department of Computing Faculty of Scicence Macquarie University Sydney Australia Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia
In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers security and privacy... 详细信息
来源: 评论
Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution
Automated Coverage-Driven Test Data Generation Using Dynamic...
收藏 引用
International Conference on Secure System Integration and Reliability Improvement, SSIRI
作者: Ting Su Geguang Pu Bin Fang Jifeng He Jun Yan Siyuan Jiang Jianjun Zhao Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China State Key Laboratory of Computer Science Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering University of Notre Dame USA School of Software Shanghai Jiao Tong University Shanghai China
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative... 详细信息
来源: 评论
Energy-aware multipath routing for data aggregation in wireless sensor networks
Energy-aware multipath routing for data aggregation in wirel...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yingyuan Xiao Xinrong Zhao Hongya Wang Ching-Hsien Hsu Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin P.R. China School of Computer Science and Technology Donghua University Shanghai P.R. China Department of Computer Science and Information Engineering Chung Hua University Hsinchu Taiwan R.O.C
Data aggregation in wireless sensor networks is widely used to collect data in an energy efficient manner to eliminate redundant data transmission so that prolong the network lifetime. To meet the data aggregation nee... 详细信息
来源: 评论