咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 544 篇 英文
  • 20 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是321-330 订阅
排序:
Topology and survivability analysis for flight flow networks: Case studies of three China airline companies  11
Topology and survivability analysis for flight flow networks...
收藏 引用
11th International Conference on Ubiquitous information Management and Communication, IMCOM 2017
作者: Gao, Xiaofeng Dang, Yaru Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab of Scalable Computing and Systems Dept. of Computer Science Shanghai Jiao Tong University Shanghai China Civil Aviation SandT Educational Evaluation Research Center Civil Aviation University of China Tianjin China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
In this paper we study the survivability feature of airline networks. To measure survivability, we comprehensively consider the network structure measures such as degree distribution, average path length, clustering c... 详细信息
来源: 评论
From retweet to believability: Utilizing trust to identify rumor spreaders on twitter  9
From retweet to believability: Utilizing trust to identify r...
收藏 引用
9th IEEE/ACM International Conference on Advances in Social networks Analysis and Mining, ASONAM 2017
作者: Rath, Bhavtosh Gao, Wei Ma, Jing Srivastava, Jaideep Dept. Of Computer Science and Engineering University of Minnesota Twin CitiesMN United States School of Information Management Victoria University of Wellington Wellington New Zealand Dept. Of Systems Engineering and Engineering Management Chinese University of Hong Kong Hong Kong Qatar Computing Research Institute Doha Qatar
Ubiquitous use of social media such as microblog-ging platforms brings about ample opportunities for the false information to diffuse online. It is very important not just to determine the veracity of information but ... 详细信息
来源: 评论
Web-Based Application to Collect and Analyze Users Data for Keystroke Biometric Authentication
Web-Based Application to Collect and Analyze Users Data for ...
收藏 引用
IEEE Ukraine Conference on Electrical and computer engineering
作者: Alieksieiev Vasyl Elena Sharapova Olena Ivanova Gorelov Denis Synytsia Yuliia Computer Radio Engineering and Systems of Technical Security of Information dept.(CRESTSI) Kharkiv National University of Radioelectronics (KNURE) Software Engineering Dept. Marvell Semiconductor Inc.
Keystroke dynamics is rapidly developing and promising field of the research. User authentication systems based on this approach is not require the installation of additional equipment. It makes them flexible and sign... 详细信息
来源: 评论
Abstracts
收藏 引用
JOURNAL OF SPINAL CORD MEDICINE 2021年 第SUPPL 1期44卷 S278-S324页
作者: [Anonymous] Department of Medicine Division of Physical Medicine and Rehabilitation University of Toronto Toronto ON CA KITE - Toronto Rehabilitation Institute University Health Network Toronto ON CA Institute for Health Policy Management and Evaluation University of Toronto Toronto ON CA Rehabilitation Sciences Institute University of Toronto Toronto ON CA Institute of Medical Sciences University of Toronto Toronto ON CA. Rehabilitation Sciences Institute University of Toronto ON CA KITE Research Institute-Toronto Rehab-University Health Network Toronto ON CA Physical Therapy Department University of Toronto ON CA Praxis Spinal Cord Institute Vancouver BC Université de Montréal (École de réadaptation) Montreal QC CA Institut de réadaptation Gingras-Linsay-de-Montréal Montreal QC CA Division of Physical Medicine & Rehabilitation Department of Medicine Faculty of Medicine & Dentistry University of Alberta Edmonton AB CA University of Calgary Calgary AB CA Alberta Health Services Centre for Family Medicine Kitchener ON CA McMaster University Department of Family Medicine Hamilton ON CA Dept. of Physical Therapy University of Toronto Toronto ON CA KITE-University Health Network Toronto ON CA Praxis Spinal Cord Institute Vancouver BC CA Center for Interdisciplinary Research in Rehabilitation and Social Integration (CIRRIS) Quebec City QC CA Dept. of Rehabilitation Laval University Quebec City QC CA Institute of Health Policy Management and Evaluation University of Toronto Toronto ON CA School of Rehabilitation Science University of Saskatchewan Saskatoon SK CA Ontario Neurotrauma Foundation Toronto ON CA Canadian Spinal Research Organization Toronto ON CA CIUSSS du Centre-Sud-de-l ‘Île-de-Montréal (Installation Gingras-Lindsay) Montréal QC CA École de réadaptation Université de Montréal Montréal QC CA First Steps Wellness Centre Regina SK CA Stan Cassidy Centre for Rehabilitation Horizon Health Network Fredericton NB CA Departmen
来源: 评论
A joint network/control design for cooperative automatic driving
A joint network/control design for cooperative automatic dri...
收藏 引用
2017 IEEE Vehicular networking Conference, VNC 2017
作者: Giordano, Giulia Segata, Michele Blanchini, Franco Cigno, Renato Lo Delft Center for Systems and Control Delft University of Technology Netherlands Dipartimento di Matematica e Informatica University of Udine Italy Dept. of Information Engineering and Computer Science University of Trento Italy
Cooperative automatic driving, or platooning, is a promising solution to improve traffic safety, while reducing congestion and pollution. The design of a control system for this application is a challenging, multi-dis... 详细信息
来源: 评论
Baggage detection and classification using human body parameter & boosting technique
Baggage detection and classification using human body parame...
收藏 引用
Conference on Human System Interactions, HSI
作者: Tahmina Khanam Kaushik Deb Kang-Hyun Jo Dept. of Computer Science & Engineering Chittagong University of Engineering & Technology Chittagong Bangladesh Dept. of EE and Information Systems University of Ulsan Ulsan Korea
Automatic Video Surveillance System (AVSS) has become important to computer vision researchers as crime in public places has increased in the twenty first century. As a new branch of AVSS, baggage detection and classi... 详细信息
来源: 评论
Heterogeneity of human brain tumor with lesion identification, localization, and analysis from MRI
收藏 引用
Informatics in Medicine Unlocked 2019年 16卷
作者: Sudipta Roy Debnath Bhattacharyya Samir Kumar Bandyopadhyay Tai-Hoon Kim Washington University in St. Louis Dept. of Comp. Sc. & Engg. Saint Louis Missouri 63110 USA Department of Computer Science and Engineering Vignan's Institute of Information Technology Visakhapatnam 530049 India Department of Computer Science and Engineering Calcutta University Technology Campus Kolkata 700098 India Department of Convergence Security Sungshin Women's University Seoul 136-742 South Korea
Objective Accurate identification of brain tumors and their heterogeneity is a critical task in planning for proper therapy. A reliable fully automatic detection and analysis method for the brain tumor is necessary fo... 详细信息
来源: 评论
LigeroAV: A light-weight, signature-based antivirus for mobile environment
LigeroAV: A light-weight, signature-based antivirus for mobi...
收藏 引用
作者: Lee, Jaehwan Jo, Min Jae Shin, Ji Sun Dept. of Electronics and Information Engineering Korea Aerospace University Goyang-city10540 Korea Republic of Dept. of Computer and Information Security Sejong University Seoul05006 Korea Republic of
Current signature-based antivirus solutions have three limitations such as the large volume of signature database, privacy preservation, and computation overheads of signature matching. In this paper, we propose Liger... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论
A framework for OpenFlow-like Policy-based routing in hybrid software defined networks  11
A framework for OpenFlow-like Policy-based routing in hybrid...
收藏 引用
11th International network Conference, INC 2016
作者: Mishra, Anshuman Bansod, Deven Haribabu, K. Dept. of Electrical and Electronics Engineering Birla Institute of Technology and Science Pilani India Dept. of Computer Science and Information Systems Birla Institute of Technology and Science Pilani India
Software Defined networks (SDNs) provide a centralized view and allow extensive programmability of the network. They separate the control and data planes opening up immense scope in developing low cost control and man... 详细信息
来源: 评论