咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 7 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 215 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 33 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 7 篇 电气工程
    • 3 篇 仪器科学与技术
    • 2 篇 土木工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 农业工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 16 篇 理学
    • 11 篇 数学
    • 4 篇 物理学
    • 4 篇 系统科学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 7 篇 管理学
    • 4 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 军事学

主题

  • 44 篇 computer science
  • 35 篇 information scie...
  • 16 篇 application soft...
  • 14 篇 neural networks
  • 13 篇 computer archite...
  • 12 篇 testing
  • 11 篇 bandwidth
  • 11 篇 costs
  • 11 篇 telecommunicatio...
  • 10 篇 humans
  • 10 篇 protocols
  • 9 篇 programming
  • 9 篇 internet
  • 9 篇 distributed comp...
  • 9 篇 computer network...
  • 8 篇 routing
  • 8 篇 traffic control
  • 8 篇 throughput
  • 8 篇 educational inst...
  • 8 篇 convergence

机构

  • 11 篇 dept. of comput....
  • 10 篇 department of co...
  • 10 篇 dept. of comput....
  • 8 篇 department of co...
  • 7 篇 dept. of inf. & ...
  • 6 篇 national taiwan ...
  • 6 篇 dept. of comput....
  • 6 篇 dept. of inf. & ...
  • 5 篇 dept. of comput....
  • 5 篇 dept. of inf. & ...
  • 4 篇 dept. of comput....
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 3 篇 department of el...
  • 3 篇 dept. of comput....
  • 3 篇 dept. of inf. sc...
  • 3 篇 dept. of comput....
  • 3 篇 national central...
  • 3 篇 norges teknisk-n...
  • 3 篇 department of in...

作者

  • 3 篇 k. inoue
  • 3 篇 s. usui
  • 2 篇 t. znati
  • 2 篇 p.-y. hsiao
  • 2 篇 m. murata
  • 2 篇 yuan shyan-ming
  • 2 篇 bi-cheng li
  • 2 篇 t. okumoto
  • 2 篇 lin chia-feng
  • 2 篇 y. oie
  • 2 篇 j. lee
  • 2 篇 yang ching-nung
  • 2 篇 d.d. gajski
  • 2 篇 d. towsley
  • 2 篇 m. paterakis
  • 2 篇 y. kitamura
  • 2 篇 g.-d. chen
  • 2 篇 chang yue-shan
  • 2 篇 k. torii
  • 2 篇 s. tatsumi

语言

  • 211 篇 英文
  • 4 篇 其他
检索条件"机构=Dept. of Computer Sci. and Inf. Engineering"
215 条 记 录,以下是1-10 订阅
排序:
Enhanced Reversible Data Hiding in Encrypted Images by Pixel Shifting  16
Enhanced Reversible Data Hiding in Encrypted Images by Pixel...
收藏 引用
2024 16th International Conference on Graphics and Image Processing, ICGIP 2024
作者: Yang, Ching-Nung Lu, Yu-Quan Liu, Shu-Yu Xiong, Lizhi Dept. of Computer Sci. and Inf. Engineering National Dong Hwa University Hualien Taiwan School of Computer and Software Nanjing University of Inf. Sci. & Technology Nanjing China
Reversible data hiding (RDH) is one special type of data hiding, and is widely used for many intended applications. Moreover, to protect the cover image, RDH in encrypted image (RDHEI) is accordingly proposed. With th... 详细信息
来源: 评论
A DUAL-PULSE SCANNING ELECTRON-BEAM ANNEALER
收藏 引用
JOURNAL OF PHYSICS E-sci.NTIFIC INSTRUMENTS 1987年 第7期20卷 901-905页
作者: HART, MJ EVANS, AGR BARTLETT, NK Dept. of Electron. Computer Sci. & Inf. Eng. Southampton Univ. UK
Improvements to a scanning electron beam annealer are reported which allow high temperature anneals on semiconductor samples to be carried out in less than one second. These improvements will allow the study of fast a... 详细信息
来源: 评论
Using database technologies in building learning community to improve knowledge exchange
Using database technologies in building learning community t...
收藏 引用
3rd IEEE International Conference on Advanced Learning Technologies
作者: Lee, LY Liu, CC Hsu, CC Chen, GD Dept. of Comput. Sci. and Inf. Eng. NCU Taiwan Department of Computer Science and Information Engineering YZU Taiwan
utilize web and database technology to construct a Journal-Based Portfolios Assessment system to realize a Legitimate Peripheral Participation (LPP)[1] learning community. In this system, we divide system to three lay... 详细信息
来源: 评论
Upgrading links for performance
收藏 引用
inf.rmatica 1996年 第4期7卷 455-468页
作者: Lim, Andrew Chee, Yeow-Meng Hsu, Wynne Information Technology Institute Dept. of Inf. Sci. and Computer Sci. Singapore 0511 11 Science Park Road Singapore Dept. of Computer Science University of Waterloo Canada Dept. of Inf. Sci. and Computer Sci. Singapore 0511 Singapore University of Minnesota Information Technology Institute Dept. of Info. Sci. and Comp. Sci. University of Waterloo Defence Science Organization National Computer Board (Singapore) Purdue University Dept. of Info. Sci. and Comp. Sci. National University of Singapore
The performance of a computer network is commonly measured by the maximum minimum time required to move a certain amount of data between any 2 nodes in the network. Due to the advances in technology, certain links in ... 详细信息
来源: 评论
On the analysis of k-secure t-conference key distribution scheme  2017
On the analysis of k-secure t-conference key distribution sc...
收藏 引用
7th International Conference on Communication and Network Security, ICCNS 2017
作者: Yang, Ching-Nung Li, Jian-Ming Chou, Yung-Shun Dept. of Computer Sci. and Inf. Eng. National Dong Hwa University Hualien Taiwan
The k-Secure t-Conference key distribution scheme (kStC-KDS) provides dynamic conferences in wireless sensor networks, which any group of t sensor nodes can derive a conference key using only its pre-distributed piece... 详细信息
来源: 评论
SPECIFICATION OF REAL-TIME DISTRIBUTED DATABASE-SYSTEMS  6
SPECIFICATION OF REAL-TIME DISTRIBUTED DATABASE-SYSTEMS
收藏 引用
1992 ANNUAL INTERNATIONAL computer CONF IN EUROPE : computer SYSTEMS AND SOFTWARE engineering ( COMPEURO 92 )
作者: RAMANATHAN, G ALAGAR, VS Dept. of Comput. Sci. and Inf. Process. Brock Univ. St. Catharines ON Canada Dept. of Computer Science Concordia University Montreal Canada
A unified framework is given for the specification of external consistency constraints, integrity constraints, and temporal consistency constraints of a real-time distributed database system. The formalism is event ba... 详细信息
来源: 评论
Research on simulation model of Petri net about maintaining process with fuzzy duration
Research on simulation model of Petri net about maintaining ...
收藏 引用
International Conference on Future computer and Communication
作者: Yang, Yuan Li, Fang Hou, Chongyuan Dept. of Management Sci. Naval Univ. of Engineering Wuhan China Col. of Elc. and Inf. Engineering Naval Univ. of Engineering Wuhan China
In view of the time uncertainty of maintaining activities and fuzzy mathematical rules with complexity and difference in traditional fuzzy Petri net, the simulation model is proposed based on fuzzy simulation and Colo... 详细信息
来源: 评论
A Perfect Recovery for Fragile Watermarking by Hamming Code on Distributed Pixels  18
A Perfect Recovery for Fragile Watermarking by Hamming Code ...
收藏 引用
18th International ISC Conference on inf.rmation Security and Cryptology, Isci.C 2021
作者: Rasouli, Faeze Taheri, Mohammad School of Elec. Comp. Eng. Shiraz University Computer Sci. Eng. Inf. Tech. Dept. Shiraz Iran
Fragile watermarking is the task of embedding a watermark in an image such that even small changes, called tamper, in the image can be detected or even recovered to preserve unauthorized alteration. A well-known type ... 详细信息
来源: 评论
The design and evaluation of GPU based memory database
The design and evaluation of GPU based memory database
收藏 引用
5th International Conference on Genetic and Evolutionary Computing, ICGEC2011
作者: Lin, Chia-Feng Yuan, Shyan-Ming Dept. of Computer Science National Chiao Tung University Hsinchu City Taiwan Dept. of Comp. Sci. and Inf. Eng. Providence University Taichung City Taiwan
In recent years, NVIDIA proposed a developing platform for GPGPU. They also extended C language to parallel computing language, CUDA. In the meanwhile, the growth of memory capacity inside a computer enhances the feas... 详细信息
来源: 评论
CardS4: Modal theorem proving on java smartcards
收藏 引用
International Conference on Research in Smart Cards, E-smart 2001
作者: Goré, Rajeev Prabhakar Nguyên, Phuong Thê Automated Reasoning Group Computer Sciences Laboratory Res. Sch. of Inf. Sci. and Eng Institute of Advanced Studies Australian National University Australia Formal Methods Group Dept. of Computer Science Inf. Tech Australian National University Australia
We describe a successful implementation of a theorem prover for modal logic S4 that runs on a Java smart card with only 512 KBytes of RAM and 32KBytes of EEPROM. Since proof search in S4 can lead to inf.nite branches,... 详细信息
来源: 评论