咨询与建议

限定检索结果

文献类型

  • 867 篇 会议
  • 199 篇 期刊文献
  • 49 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 546 篇 计算机科学与技术...
    • 454 篇 软件工程
    • 163 篇 信息与通信工程
    • 114 篇 控制科学与工程
    • 78 篇 生物工程
    • 77 篇 电气工程
    • 58 篇 生物医学工程(可授...
    • 37 篇 机械工程
    • 36 篇 光学工程
    • 35 篇 电子科学与技术(可...
    • 30 篇 交通运输工程
    • 30 篇 安全科学与工程
    • 29 篇 仪器科学与技术
    • 29 篇 动力工程及工程热...
    • 28 篇 化学工程与技术
  • 310 篇 理学
    • 179 篇 数学
    • 86 篇 生物学
    • 61 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 50 篇 系统科学
    • 29 篇 化学
  • 194 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 80 篇 工商管理
    • 73 篇 图书情报与档案管...
  • 56 篇 医学
    • 52 篇 临床医学
    • 47 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 41 篇 法学
    • 33 篇 社会学
  • 31 篇 教育学
    • 30 篇 教育学
  • 20 篇 经济学
  • 20 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 30 篇 artificial intel...
  • 29 篇 accuracy
  • 27 篇 software
  • 25 篇 software enginee...
  • 23 篇 feature extracti...
  • 22 篇 computational mo...
  • 22 篇 real-time system...
  • 21 篇 information syst...
  • 21 篇 information stor...
  • 19 篇 computer communi...
  • 18 篇 data mining
  • 17 篇 deep learning
  • 16 篇 computer science
  • 16 篇 data models
  • 16 篇 training
  • 15 篇 internet of thin...
  • 15 篇 servers
  • 15 篇 predictive model...
  • 15 篇 cloud computing
  • 14 篇 database managem...

机构

  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 dept. of technol...
  • 8 篇 university of re...
  • 7 篇 dept. of softwar...
  • 7 篇 dept. of compute...
  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 dept. of informa...
  • 5 篇 computer systems...
  • 5 篇 bcmaterials basq...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of informa...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 dept. of compute...
  • 5 篇 dept. of compute...

作者

  • 11 篇 fotiadis dimitri...
  • 9 篇 nikumani choudhu...
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 usama arshad
  • 7 篇 arshad usama
  • 7 篇 shafiur rahman
  • 7 篇 dimitrios i. fot...
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 bhattacharya pra...
  • 6 篇 cigno renato lo
  • 6 篇 buyya rajkumar
  • 6 篇 ijaz ali zeeshan

语言

  • 1,072 篇 英文
  • 30 篇 其他
  • 6 篇 中文
  • 5 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Dept. of Computer Science and Information and Software Systems Engineering"
1115 条 记 录,以下是911-920 订阅
排序:
Uncontrollable privacy - The right that every attacker desires
Uncontrollable privacy - The right that every attacker desir...
收藏 引用
4th Australian information Security Management Conference, AISM
作者: Antoniou, Giannakis Gritzalis, Stefanos Dept. of Computer Science and Software Engineering University of Melbourne Australia Dept. of Information and Communication Systems Engineering University of the Aegean Samos 83200 Greece
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs... 详细信息
来源: 评论
Network Forensics and Privacy Enhancing Technologies "living" together in harmony
Network Forensics and Privacy Enhancing Technologies "living...
收藏 引用
4th Australian information Security Management Conference, AISM
作者: Antoniou, Giannakis Gritzalis, Stefanos Dept. of Computer Science and Software Engineering University of Melbourne Australia Dept. of Information and Communication Systems Engineering University of the Aegean Samos 83200 Greece
Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who p... 详细信息
来源: 评论
ShapeShop: Sketch-based solid modeling with BlobTrees  06
ShapeShop: Sketch-based solid modeling with BlobTrees
收藏 引用
2006 ACM SIGGRAPH Courses, SIGGRAPH 2006
作者: Schmidt, R. Wyvill, B. Sousa, M.C. Jorge, J.A. Dept. Computer Science University of Calgary Canada Dept. Information Systems and Computer Engineering TU Lisbon Portugal
Various systems have explored the idea of inferring 3D models from sketched 2D outlines. In all of these systems the underlying modeling methodology limits the complexity of models that can be created interactively. T... 详细信息
来源: 评论
Classifying noisy data streams
收藏 引用
3rd International Conference on Fuzzy systems and Knowledge Discovery
作者: Wang, Yong Li, Zhanhuai Zhang, Yang Dept. Computer Science and Software Northwestern Polytechnical University China School of Information Engineering Northwest A and F University China
The two main challenges associated with mining data streams are concept drifting and data noise. Current algorithms mainly depend on the robust of the base classifier or learning ensembles, and have no active mechanis... 详细信息
来源: 评论
Towards better understanding of agile values in global software development
Towards better understanding of agile values in global softw...
收藏 引用
11th International Workshop on Exploring Modeling Methods for systems Analysis and Design, EMMSAD 2006 - Held in Conjunction with the 18th Conference on Advanced information systems, CAiSE 2006
作者: Ågerfalk, Pär J. Lero - The Irish Software Engineering Research Centre Dept. of Computer Science and Information Systems University of Limerick Ireland Örebro University SE-701 82 Örebro Sweden
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systems engineering. While agile methods seem to cope well with increasingly changing business env... 详细信息
来源: 评论
Profiling self-propagating worms via behavioral footprinting
Profiling self-propagating worms via behavioral footprinting
收藏 引用
4th ACM Workshop on Recurring Malcode, WORM'06. Co-located with the 13th ACM Conference on computer and Communications Security, CCS'06
作者: Jiang, Xuxian Xu, Dongyan Dept. of Information and Software Engineering George Mason University Fairfax VA 22030 CERIAS Dept. of Computer Science Purdue University West Lafayette IN 47907
This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm's infection session contains a number of steps (e.g., for probing, exploitation, and replicat... 详细信息
来源: 评论
information trustworthiness evaluation based on trust combination  06
Information trustworthiness evaluation based on trust combin...
收藏 引用
2006 ACM Symposium on Applied Computing
作者: Zuo, Yanjun Panda, Brajendra Dept. of Information Systems and Business Education University of North Dakota Grand Forks United States Dept. of Computer Science and Computer Engineering University of Arkansas Fayetteville United States
Publishing information in a virtual organization (VO) has become too easy due to low barriers;hence development of novel mechanisms to assess the quality of collected information has become a necessity. An evaluator m... 详细信息
来源: 评论
Securing UML information flow using flowUML
Securing UML information flow using flowUML
收藏 引用
作者: Alghathbar, Khaled Farkas, Csilla Wijesekera, Duminda Information Systems Department College of Computer and Information Sciences King Saud University P.O. Box 51178 Riyadh 11543 Saudi Arabia Information Security Laboratory Dept. of Computer Science and Engineering University of South Carolina Columbia SC 29208 Dept. of Information and Software Engineering CSIS George Mason University Fairfax VA 22030 Faculty of Information Systems Kind Saud University Riyadh Saudi Arabia Department of Computer Science and Engineering University of South Carolina Columbia Department of Information and Software Engineering George Mason University Fairfax VA George Mason University
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against ... 详细信息
来源: 评论
Achieving efficient pathname LOOKUP in file server group
Achieving efficient pathname LOOKUP in file server group
收藏 引用
9th Joint Conference on information sciences, JCIS 2006
作者: Liu, Feng-Jung Yang, Chu-Sing Lee, Yao-Kuei Dept. of Management Information Systems Tajen University 907 Pingtung Taiwan Dept. of Computer Science and Information Engineering National Cheng Kung University Tainan 701 Taiwan Dept. of Marketing and Distribution Management Tajen University 907 Pingtung Taiwan
With the increasing growth of Internet users and the Web contents, it has led to much attention on scalability and availability of file system. Hence the ways to improve the reliability and availability of system, to ... 详细信息
来源: 评论
Interaction comparison between traditional classroom and cyber classroom using transactional distance
Interaction comparison between traditional classroom and cyb...
收藏 引用
6th International Conference on Advanced Learning Technologies, ICALT 2006
作者: Chen, Nian-Shing Kinshuk Hsieh, Sheng-Wen Yang, Stephen J. H. Department of Information Management National Sun Yat-sen University Taiwan Department of Information Systems Massey University New Zealand Dept. of Computer Science and Information Engineering National Central University Taiwan
Blended learning (BL) is a hybrid of classroom learning and online learning that includes the conveniences of online courses without the complete loss of face-to-face (F2F) contact. Advancements in communication techn... 详细信息
来源: 评论