咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 544 篇 英文
  • 20 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是381-390 订阅
排序:
IPv6 operations and deployment scenarios over SDN
IPv6 operations and deployment scenarios over SDN
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Chia-Wei Tseng Sheue-Ji Chen Yao-Tsung Yang Li-Der Chou Ce-Kuen Shieh Sheng-Wei Huang Dept. of Computer Science and Information Engineering National Central University Taoyuan Taiwan Broadband Network Laboratory Chunghwa Telecom Laboratories Taoyuan Taiwan Narional Center for High-performance Computing Hsinchu Taiwan Dept. of Electrical Engineering National Cheng Kung University Tainan Taiwan
IPv6 is a technology that provides enormous address space and end-to-end communication, features that are required in the context of the device automation integration for future network. The transition to IPv6 holds t... 详细信息
来源: 评论
Resource allocation and power control scheme for interference avoidance in an LTE-advanced cellular networks with device-to-device communication
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2013年 第1期6卷 181-190页
作者: Kim, Tae-Sub Lee, Kwang-Hyung Ryu, Seungwan Cho, Choong-Ho Dept. of Computer and Information Science Korea University Chungnam Korea Republic of Dept. of Information Systems Chung-Ang University Gyeonggi Korea Republic of Dept. of Bio and Brain Engineering KAIST Daejeon Korea Republic of
In this paper, we propose a resource allocation and Tx power control scheme, called resource allocation and power control (RAPC) in an LTE-Advanced device-to-device (D2D) network. In the proposed scheme, the macro bas... 详细信息
来源: 评论
OpenNet: A simulator for software-defined wireless local area network
OpenNet: A simulator for software-defined wireless local are...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Min-Cheng Chan Chien Chen Jun-Xian Huang Ted Kuo Li-Hsing Yen Chien-Chao Tseng Dept. Computer Science National Chiao Tung University Hsinchu Taiwan R.O.C. Global Strategy Office D-Link Systems Inc. Santa Clara California U.S.A Dept. Computer Science and Information Engineering National University of Kaohsiung Kaohsiung Taiwan R.O.C
This study is motivated by a plan to install a software-defined wireless local area network (SDWLAN) on campus, which possesses a desired property that both data flow and device behaviors can be software-definable. Be... 详细信息
来源: 评论
Design and implementation of the network electronic identity management system
收藏 引用
2nd International Conference on Opto-Electronics engineering and Materials Research, OEMR 2013
作者: Zou, Xiang Chen, Bing The 3rd research institute of ministry of public security Key laboratory of information network security Ministry of Public Security Shanghai China Dept. of computer engineering Tongji University Shanghai China
With the prompt evolution of Internet, network identity management is getting more and more basilica. Personal network electronic identity associated in reality has been the significant and urgent task when online lif... 详细信息
来源: 评论
A study of vulnerabilities of wireless sensor network
A study of vulnerabilities of wireless sensor network
收藏 引用
作者: Lee, Young-Keun Lee, Malrey Hwang, Suchul Jeong, Gisung Department of Orthopedic Surgery Dason Orthopaedic Clinic Deock Jin Gu InhuDong Jeonju561-756 Korea Republic of Center for Advanced Image and Information Technology School of Electronics and Information Engineering ChonBuk National University 664-14 1Ga Deokjin-Dong Jeonju Chon Buk561-756 Korea Republic of Dept. of Computer Systems and Engineering Inha Technical College 100INHA-RO Nam-Gu Inchon402-752 Korea Republic of Department of Fire Service Administration WonKwang University 460 Iksandae-ro Iksan Jeonbuk570-749 Korea Republic of
The low computing power of sensors and especially their limited energy are obstacles to the deployment of advanced techniques, and many of the researchers are still searching for better solutions, which can accommodat... 详细信息
来源: 评论
Trustworthy selection of cloud providers based on security and privacy requirements: Justifying trust assumptions
Trustworthy selection of cloud providers based on security a...
收藏 引用
10th International Conference on Trust, Privacy and security in Digital Business, TrustBus 2013
作者: Pavlidis, Michalis Mouratidis, Haralambos Kalloniatis, Christos Islam, Shareeful Gritzalis, Stefanos School of Architecture Computing and Engineering University of East London United Kingdom Cultural Informatics Laboratory Dept. of Cultural Technology and Communication University of the Aegean Greece Laboratory of Information and Communication Systems Security Dept. of Information and Communications Systems Engineering University of the Aegean Greece
Cloud computing is a new paradigm with a promising potential. However, issues of security, privacy, and trust raise concerns and discourage its adoption. In previous work we presented a framework for the selection of ... 详细信息
来源: 评论
Expressing Best Practices in (Risk) Analysis and Testing of Safety-Critical systems Using Patterns
Expressing Best Practices in (Risk) Analysis and Testing of ...
收藏 引用
IEEE International Conference on Software Reliability engineering Workshops (ISSRE Wksp)
作者: Wolfgang Herzner Sven Sieverding Omar Kacimi Eckard Böde Thomas Bauer Brian Nielsen Safety & Security Department AIT Austrian Institute of Technology Vienna Austria Transp. Dept. OFFIS - Inst. for Inf. Technol. Oldenburg Germany Transportation Department OFFIS - Institute for Information Technology Oldenburg Germany Dep. of Embedded Systems Quality Assurance Fraunhofer IESE Kaiserslautern Germany Department of Computer Science Aalborg University Denmark
The continuing pervasion of our society with safety-critical cyber-physical systems not only demands for adequate (risk) analysis, testing and verification techniques, it also generates growing experience on their use... 详细信息
来源: 评论
Structured coprime factorizations description of linear and time-invariant networks
Structured coprime factorizations description of linear and ...
收藏 引用
52nd IEEE Conference on Decision and Control, CDC 2013
作者: SabǍu, Şerban OarǍ, Cristian Warnick, Sean Jadbabaie, Ali Electrical and Computer Engineering Dept. Stevens Institute of Technology United States Faculty of Automatic Control Dept. University Politehnica Bucharest Romania Faculty of Computer Science Department Information and Decision Algorithms Laboratories Brigham Young University United States Faculty of Electrical and Systems Engineering Dept. University of Pennsylvannia United States
In this paper we study state-space realizations of Linear and Time-Invariant (LTI) systems. Motivated by biochemical reaction networks, Gonçalves and Warnick have recently introduced the notion of a Dynamical Str... 详细信息
来源: 评论
A framework for crowd-sourced data collection and context-aware services in Hajj and Umrah
A framework for crowd-sourced data collection and context-aw...
收藏 引用
ACS/IEEE International Conference on computer systems and Applications
作者: Akhlaq Ahmad Md. Abdur Rahman Faizan Ur Rehman Ahmed Lbath Imad Afyouni Abdelmajid Khelil Syed Osama Hussain Bilal Sadiq Mohamed Ridza Wahiddin College of Engineering and Islamic Architecture Umm Al Qura University Makkah Saudi Arabia Kulliyyah of Information and Communication Technology International Islamic University Malaysia College of Computer and Information Systems Umm Al-Qura University Makkah Saudi Arabia Science and Technology Unit Umm Al-Qura University Makkah Saudi Arabia Dept. of Computer Science University of Grenoble Alpes France Umm Al-Qura University Makkah SA TU Darmstadt Germany
We propose a context aware framework that offers a set of cloud-based services to support a very large Hajj and Umrah crowd by capturing their contexts using smartphones. The proposed framework captures the individual... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论