咨询与建议

限定检索结果

文献类型

  • 1,237 篇 会议
  • 194 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,467 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 932 篇 工学
    • 781 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 生物医学工程(可授...
    • 59 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,320 篇 英文
  • 135 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1467 条 记 录,以下是871-880 订阅
排序:
Measuring similarity of Android applications via reversing and k-gram birthmarking  13
Measuring similarity of Android applications via reversing a...
收藏 引用
2013 Research in Adaptive and Convergent Systems, RACS 2013
作者: Ko, Jeonguk Shim, Hyungjoon Kim, Dongjin Jeong, Youn-Sik Cho, Seong-Je Park, Minkyu Han, Sangchul Kim, Seong Baeg Dept. of Software Security Dankook University Yongin 448-701 Korea Republic of Dept. of Computer Science Dankook University Yongin 448-701 Korea Republic of Dept. of Computer Engineering Konkuk University Chungbuk 380-701 Korea Republic of Dept. of Computer Education Jeju National University Jeju 650-756 Korea Republic of
By measuring similarity of programs, we can determine whether someone illegally copies a program from another program or not. If the similarity is significantly high, it means that a program is a copy of the other. Th... 详细信息
来源: 评论
Using unconventional awareness mechanisms to support mobile work  13
Using unconventional awareness mechanisms to support mobile ...
收藏 引用
2013 Chilean Conference on Human - computer Interaction, ChileCHI 2013
作者: Monares, Alvaro Ochoa, Sergio F. Pino, José A. Ruiz-Lopez, Tomás Noguera, Manuel Dept. of Computer Science University of Chile Av. Blanco Encalada 2120 Santiago Chile Dept. of Software Engineering University of Granada Periodista Daniel Saucedo Aranda s/n Granada Spain
Awareness mechanisms are normally used to deliver context information to computer systems users. These mechanisms have been extensively studied as part of collaborative solutions designed for stationary scenarios, and... 详细信息
来源: 评论
Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures
Scalable Security Analysis in Hierarchical Attack Representa...
收藏 引用
Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops
作者: Jin B. Hong Dong Seong Kim Computer Science and Software Engineering Dept. University of Canterbury
Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it su... 详细信息
来源: 评论
The search for the laws of automatic random testing  13
The search for the laws of automatic random testing
收藏 引用
28th Annual ACM Symposium on Applied Computing, SAC 2013
作者: Furia, Carlo A. Meyer, Bertrand Oriol, Manuel Tikhomirov, Andrey Wei, Yi Department of Software Engineering ETH Zurich Zurich Switzerland ABB Corporate Research Industrial Software Systems Baden-Dättwil Switzerland Dept. of Computer Science University of York York United Kingdom Software Engineering Laboratory ITMO St.Petersburg Russia
Can one estimate the number of remaining faults in a software system? A credible estimation technique would be immensely useful to project managers as well as customers. It would also be of theoretical interest, as a ... 详细信息
来源: 评论
A fuzzy-based localization in range-free wireless sensor network using genetic algorithm&Sinc membership function
A fuzzy-based localization in range-free wireless sensor net...
收藏 引用
International Conference on Green Computing, Communication and Conservation of Energy (ICGCE)
作者: Ashutosh Patri Abhijit Nayak Dept. of Mining Engineering National Institute of Technology Rourkela India Dept. of Computer Science& Engineering National Institute of Technology Rourkela India
In this paper a novel localization technique is proposed using fuzzy logic and genetic algorithm to get nearly precise location of sensor nodes, in a range free localization system. This localization technique gives a... 详细信息
来源: 评论
Understanding common perceptions from online social media  25
Understanding common perceptions from online social media
收藏 引用
25th International Conference on software engineering and Knowledge engineering, SEKE 2013
作者: Doran, Derek Gokhale, Swapna S. Dagnino, Aldo Dept. of Computer Science and Engineering University of Connecticut StorrsCT06269 United States Industrial Software Systems ABB Corporate Research RaleighNC27606 United States
Modern society habitually uses online social media services to publicly share observations, thoughts, opinions, and beliefs at any time and from any location. These geotagged social media posts may provide aggregate i... 详细信息
来源: 评论
A hybrid mobility model based on social, cultural and language diversity
A hybrid mobility model based on social, cultural and langua...
收藏 引用
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, COLLABORATECOM 2013
作者: Karim, Lutful Mahmoud, Qusay H. School of Information and Communications Technology Seneca College of Applied Arts and Science Toronto ON Canada Dept. Electrical Computer and Software Engineering University of Ontario Institute of Technology Oshawa ON Canada
Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial featur... 详细信息
来源: 评论
On detection of emerging anomalous traffic patterns using GPS data
On detection of emerging anomalous traffic patterns using GP...
收藏 引用
作者: Pang, Linsey Xiaolin Chawla, Sanjay Liu, Wei Zheng, Yu School of Information Technologies University of Sydney Australia Dept. of Computer Science and Software Engineering University of Melbourne Australia Microsoft Research Asia Microsoft Research Asia Australia NICTA Sydney Australia
The increasing availability of large-scale trajectory data provides us great opportunity to explore them for knowledge discovery in transportation systems using advanced data mining techniques. Nowadays, large number ... 详细信息
来源: 评论
Scalable Attack Representation Model Using Logic Reduction Techniques
Scalable Attack Representation Model Using Logic Reduction T...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Jin Bum Hong Dong Seong Kim Tadao Takaoka Computer Science and Software Engineering Dept. University of Canterbury Christchurch New Zealand
Automated construction methods of attack graphs (AGs) and their improved attack representation models (ARMs) have been proposed, but the AG has a state space explosion when analysing the security of very large sized n... 详细信息
来源: 评论
Analyzing impact of video codec, encapsulation methods and streaming protocols on the quality of video streaming
Analyzing impact of video codec, encapsulation methods and s...
收藏 引用
International Conference on Digital Information Management (ICDIM)
作者: Afaq Iqbal Fahim Arif Nasru Minallah Dept. Computer Software Engineering National University of Science and Technology Islamabad Pakistan Dept. Computer System Engineering University of Engineering and Technology Peshawar Pakistan
There are various factors involved in the transmission of video over internet. These factors have direct impact on the quality of the transmitted video. The underlying video codec, encapsulation method and protocol ar... 详细信息
来源: 评论