咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 544 篇 英文
  • 20 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是351-360 订阅
排序:
An Analysis of Onion-Based Anonymous Routing for Delay Tolerant networks
An Analysis of Onion-Based Anonymous Routing for Delay Toler...
收藏 引用
International Conference on Distributed Computing systems
作者: Kazuya Sakai Min-Te Sun Wei-Shinn Ku Jie Wu Faisal S. Alanazi Dept. of Info. and Commun. Systems Tokyo Metropolitan University Hino Tokyo Japan Department of Computer Science and Information Engineering National Central University Taoyuan 320 Taiwan Department of Computer Science and Software Engineering Auburn University Auburn Alabama Department of Computer and Information Sciences Temple University Philadelphia PA Department of Electrical and Computer Engineering The Ohio State University Columbus Ohio
Delay tolerant network (DTN) routing provides a communication primitive in intermittently disconnected networks, such as battlefield communications and human-contact networks. In these applications, the anonymity pres... 详细信息
来源: 评论
Transmit antenna and relay selections for underwater MIMO-OFDM cooperative wireless networks  10
Transmit antenna and relay selections for underwater MIMO-OF...
收藏 引用
10th ACM International Conference on Underwater networks and systems, WUWNet 2015
作者: Zhang, Xi Zhu, Qixuan Networking and Information Systems Laboratory Dept. of Electrical and Computer Engineering Texas A and M University College StationTX77843 United States
The multiple-input-multiple-output (MIMO), the orthogonal frequency division multiplexing (OFDM), and the cooperative communication techniques are widely applied in and significantly improved the essential performance... 详细信息
来源: 评论
A Study on Efficient Log Visualization Using D3 Component against APT: How to Visualize security Logs Efficiently?
A Study on Efficient Log Visualization Using D3 Component ag...
收藏 引用
International Conference on Platform Technology and Service (PlatCon)
作者: Jaehee Lee Jinhyeok Jeon Changyeob Lee Junbeom Lee Jaebin Cho Kyungho Lee Department of Information Security Korea University Seoul Korea Department of Computer Science and Engineering Sogang University Seoul Korea Deparment of Convergence Secuirty Kyonggi University Seoul Korea Dept. of Inf. & Telecommun. Eng. Univ. of Suwon Seoul South Korea Department of Information and Telecommunications Engineering University of Suwon Seoul Korea
APT attack has caused chaos in society since 2006. Especially, the vulnerability of the infrastructure is exposed to the outside a lot due to the development of the IT infrastructure in Korea. In addition, APT attacks... 详细信息
来源: 评论
An efficient watermarking based integrity control system for medical images
An efficient watermarking based integrity control system for...
收藏 引用
International Conference on Control Communication & Computing India (ICCC)
作者: Anisha Joseph Deepa S S Information Security College of Engineering Trivandrum Dept. of Computer Science and Engineering College of Engineering Trivandrum
Medical image applications like Picture Archiving and communication systems (PACS) need transmission of images over insecure network. The images especially the Region of Interest (ROI) can be tampered while transmissi... 详细信息
来源: 评论
A fast exploration technique in WSN for partition recovery using mobile nodes
A fast exploration technique in WSN for partition recovery u...
收藏 引用
National Conference on Communications (NCC)
作者: V. Sreejith K.R. Anupama Lucy J Gudino R. Suriyadeepan Dept. of Computer Science and Information Systems Goa India Dept. of Electrical Electronics and Instrumentation Engineering Goa India
Area exploration in WSN is used for a multitude of applications from data collection to network maintenance. In this paper, we propose a new approach - Max-Gain approach to explore an area with obstacles by modifying ... 详细信息
来源: 评论
A Lyapunov Function Neuro-Adaptive Controller for LFC in Two-Area Power System
A Lyapunov Function Neuro-Adaptive Controller for LFC in Two...
收藏 引用
Annual Conference of the IEEE Industrial Electronics Society
作者: Muhammad Saleheen Aftab Muhammad Shafiq Fakhra Aftab Department of Electrical and Computer Engineering Sultan Qaboos University Dept. of Computer & Information Systems Engineering NED University of Engineering & Technology
Dynamic variations in real power directly affects the system frequency. Consequently, large frequency deviations in interconnected systems might cause costly power outages. In order to maintain continuous and stable p... 详细信息
来源: 评论
Effective-Capacity Based Gaming for Optimal Power and Spectrum Allocations Over Big-Data Virtual Wireless networks
Effective-Capacity Based Gaming for Optimal Power and Spectr...
收藏 引用
IEEE Global Communications Conference
作者: Qixuan Zhu Xi Zhang Networking and Information Systems Laboratory Dept. of Electrical and Computer Engineering Texas A&M University
Big data transmission on a wireless network environment focuses on sharing the large volume information data with the effective capacity guaranteed. Wireless network virtualization provides an efficient technique to i... 详细信息
来源: 评论
Game-Theory Based Buffer-Space and Transmission-Rate Allocations for Optimal Energy-Efficiency Over Wireless Virtual networks
Game-Theory Based Buffer-Space and Transmission-Rate Allocat...
收藏 引用
IEEE Global Communications Conference
作者: Qixuan Zhu Xi Zhang Networking and Information Systems Laboratory Dept. of Electrical and Computer Engineering Texas A&M University
Wireless network virtualization provides an efficient technique to reduce the cost of overall networks by allowing multiple wireless virtual networks to be mapped onto one physical substrate wireless network. One of i... 详细信息
来源: 评论
A Distributed Algorithm to Construct Multicast Trees in Wireless Multi-hop networks
A Distributed Algorithm to Construct Multicast Trees in Wire...
收藏 引用
IEEE International Conference on Communications
作者: Hongyu Gong Lutian Zhao Kainan Wang Weijie Wu Xinbing Wang Dept. of Electronic Engineering Shanghai Jiao Tong University Dept. of Mathematics Shanghai Jiao Tong University Dept. of Computer Science Shanghai Jiao Tong University School of Information Security Engineering Shanghai Jiao Tong University
The minimum-length multicast tree can achieve efficient multicast transmissions and can be formulated as a Steiner Tree. Its construction is non-trivial and has been proven to be NP-hard. In this paper, we combine the... 详细信息
来源: 评论
Face recognition by classification using radial basis function
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2015年 第5期10卷 33-40页
作者: Mandhala, Venkata Naresh Bhattacharyya, Debnath Kim, Tai-Hoon Dept. of Information Technology VFSTR University Vadlamudi Guntur India Dept. of Computer Science and Engineering VFSTR University Vadlamudi India Dept. of Convergence Security Sungshin Women's University 249-1 Dongseon-dong 3-ga Seoul Korea Republic of
The face recognition task involves extraction of unique features from the human face. Manifold learning methods are proposed to project the original data into a lower dimensional feature space by preserving the local ... 详细信息
来源: 评论