咨询与建议

限定检索结果

文献类型

  • 1,184 篇 会议
  • 835 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,289 篇 工学
    • 1,039 篇 计算机科学与技术...
    • 852 篇 软件工程
    • 259 篇 信息与通信工程
    • 177 篇 控制科学与工程
    • 164 篇 生物工程
    • 127 篇 电气工程
    • 108 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 68 篇 机械工程
    • 68 篇 电子科学与技术(可...
    • 56 篇 安全科学与工程
    • 56 篇 网络空间安全
    • 48 篇 交通运输工程
    • 47 篇 动力工程及工程热...
    • 46 篇 仪器科学与技术
  • 598 篇 理学
    • 331 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 47 篇 化学
  • 390 篇 管理学
    • 265 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 133 篇 工商管理
  • 120 篇 医学
    • 111 篇 临床医学
    • 101 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 53 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 6 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 61 篇 machine learning
  • 51 篇 deep learning
  • 47 篇 computational mo...
  • 44 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 cloud computing
  • 41 篇 grid computing
  • 41 篇 quality of servi...
  • 38 篇 resource managem...
  • 38 篇 feature extracti...
  • 38 篇 training
  • 33 篇 computer archite...
  • 33 篇 software
  • 32 篇 security
  • 32 篇 artificial intel...
  • 30 篇 application soft...
  • 29 篇 laboratories
  • 28 篇 semantics

机构

  • 124 篇 college of compu...
  • 55 篇 department of co...
  • 35 篇 state key labora...
  • 34 篇 department of co...
  • 30 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 college of compu...
  • 16 篇 department of in...
  • 14 篇 school of comput...
  • 14 篇 school of inform...
  • 14 篇 department of co...
  • 13 篇 artificial intel...
  • 13 篇 department of in...
  • 12 篇 school of big da...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 13 篇 materwala huned
  • 13 篇 muhammad adnan k...
  • 12 篇 niyato dusit
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 12 篇 tan kay chen
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,723 篇 英文
  • 326 篇 其他
  • 13 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2058 条 记 录,以下是1521-1530 订阅
排序:
Understanding the tradeoffs between software-managed vs. hardware-managed caches in GPUs
Understanding the tradeoffs between software-managed vs. har...
收藏 引用
IEEE International Symposium on Performance Analysis of Systems and software
作者: Chao Li Yi Yang Hongwen Dai Shengen Yan Frank Mueller Huiyang Zhou Department of Electrical and Computer Engineering North Carolina State University Department of Computing Systems Architecture NEC Laboratories America Institute of Software North Carolina State University Department of Computer Science North Carolina State University
On-chip caches are commonly used in computer systems to hide long off-chip memory access latencies. To manage on-chip caches, either software-managed or hardware-managed schemes can be employed. State-of-art accelerat... 详细信息
来源: 评论
Cloudsme: Developing a cloud computing-based platform for simulation in manufacturing and engineering
Cloudsme: Developing a cloud computing-based platform for si...
收藏 引用
2014 Operational Research Society Simulation Workshop, SW 2014
作者: Taylor, Simon J. E. Kiss, Tamas Kacsuk, Peter Terstyanszky, Gabor Nicola, Fantini Department of Information Systems and Computing Brunel University Uxbridge MiddlesexUB8 3PH United Kingdom Centre for Parallel Computing Department of Business Information Systems University of Westminster 115 New Cavendish St LondonW1W 6UW United Kingdom MTA SZTAKI Victor Hugo u. 18-22 Budapest1132 Hungary Department of Computer Science and Software Engineering Faculty of Science and Technology University of Westminster LondonW1W 6UW United Kingdom Huobstrasse 10 Pfäffikon8808 Switzerland
There is a demand from simulation users for speed, the ability to obtain quickly results from simulation runs. Cloud computing offers the potential for scalable, on-demand access to resources that can be used to speed... 详细信息
来源: 评论
Visual loop closure detection by matching binary visual features using locality sensitive hashing
Visual loop closure detection by matching binary visual feat...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Junjun Wu Hong Zhang Yisheng Guan Guangdong Food and Drug School of Software Guangzhou China Department of Computing Science University of Alberta Edmonton AB Canada School of Mechanical and Electrical Engineering Guangdong University of Technology Guangzhou China
In this paper, we present a novel approach for visual loop-closure detection in autonomous robot navigation. Our method uses locality sensitive hashing (LSH) as the basic technique for matching the binary visual featu... 详细信息
来源: 评论
Virtual-machine metadata optimization for I/O traffic reduction in mobile virtualization
Virtual-machine metadata optimization for I/O traffic reduct...
收藏 引用
IEEE Non-Volatile Memory Systems and Applications Symposium (NVMSA)
作者: Renhai Chen Yi Wang Jingtong Hu Duo Liu Zili Shao Yong Guan Department of Computing The Hong Kong Polytechnic University College of Computer Science and Software Engineering Shenzhen University School of Electrical and Computer Engineering Oklahoma State University College of Computer Science Chongqing University College of Computer and Information Management Capital Normal University
Mobile virtualization introduces extra layers in software stacks, which leads to performance degradation. Especially, each I/O operation has to pass through several software layers to reach the NAND-flash-based storag... 详细信息
来源: 评论
Resource management for cognitive cloud gaming
Resource management for cognitive cloud gaming
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Wei Cai Min Chen Conghui Zhou Victor C. M. Leung Henry C. B. Chan Department of Electrical and Computer Engineering The University of British Columbia Canada Huazhong University of Science and Technology Wuhan Hubei CN We Software Limited Hong Kong Department of Computing The Hong Kong Polytechnic University Hong Kong
In contrary to conventional gaming-on-demand solution, cognitive cloud gaming platform facilitates gaming component migration from the cloud server to the players' terminal, a novel flexible solution to provide Ga... 详细信息
来源: 评论
On RFID authentication protocols with wide-strong privacy
收藏 引用
Cryptology and Information Security Series 2013年 11卷 3-16页
作者: Li, Nan Mu, Yi Susilo, Willy Guo, Fuchun Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Department of Computing Faculty of Science Macquarie University Sydney Australia
Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, ... 详细信息
来源: 评论
Almost Optimal Channel Access in Multi-Hop Networks with Unknown Channel Variables
Almost Optimal Channel Access in Multi-Hop Networks with Unk...
收藏 引用
International Conference on Distributed computing Systems
作者: Yaqin Zhou Qiuyuan Huang Fan Li Xiang-Yang Li Min Liu Zhongcheng Li Zhiyuan Yin Institute of Computing Technology Chinese Academy of Sciences Beijing China Department of Electrical and Computer Engineering University of Florida Gainesville FL USA School of Computer Science Beijing Institute of Technology School of Software and TNLIST Tsinghua University China
We consider the problem of online dynamic channel accessing in multi-hop cognitive radio networks. Previous works on online dynamic channel accessing mainly focus on single-hop networks that assume complete conflicts ... 详细信息
来源: 评论
Resolving vulnerability identification errors using security requirements on business process models
收藏 引用
Information Management and Computer Security 2013年 第3期21卷 202-223页
作者: Taubenberger, Stefan Jürjens, Jan Yu, Yijun Nuseibeh, Bashar Computing Department Open University Milton Keynes United Kingdom Department of Computer Science Technical University Dortmund Dortmund Germany Fraunhofer Institute for Software Systems Engineering ISST Dortmund Germany Lero the Irish Software Engineering Research Centre Computing Department University of Limerick Limerick Ireland Open University Milton Keynes United Kingdom
Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified vuln... 详细信息
来源: 评论
DIV: Dynamic Integrity Validation Framework for Detecting Compromises on Virtual Machine Based Cloud Services in Real Time
收藏 引用
China Communications 2014年 第8期11卷 15-27页
作者: WANG Chunlu LIU Chuanyi LIU Bin DONG Yingfei School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 P. R. China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 P. R. China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing 100876 P. R. China Department of Electrical Engineering University of Hawaii Honolulu Hawaii U.S.
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase ***,how to monitor the integrity of cloud execution environments is still a difficult *** this paper,a real-time dynam... 详细信息
来源: 评论
A secure elliptic curve based RFID ownership transfer scheme with controlled delegation
收藏 引用
Cryptology and Information Security Series 2013年 11卷 31-43页
作者: Cheng, Shu Varadharajan, Vijay Mu, Yi Susilo, Willy Department of Computing Faculty of Scicence Macquarie University Sydney Australia Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia
In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers security and privacy... 详细信息
来源: 评论