咨询与建议

限定检索结果

文献类型

  • 477 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 564 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 343 篇 工学
    • 277 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 109 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 化学工程与技术
  • 140 篇 理学
    • 80 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 95 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 13 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 11 篇 wireless sensor ...
  • 11 篇 feature extracti...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 6 篇 nikumani choudhu...
  • 6 篇 vulfin alexey
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 549 篇 英文
  • 12 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
564 条 记 录,以下是441-450 订阅
排序:
A secure solution for USB flash drives using FAT file system structure
A secure solution for USB flash drives using FAT file system...
收藏 引用
International Conference on network-Based information systems
作者: Lee, Sun-Ho Yim, Kang-Bin Lee, Im-Yeong Division of Computer Science Soonchunhyang Univ. Asan City Korea Republic of Dept. of Information Security Engineering Soonchunhyang Univ. Asan City Korea Republic of
The portable storage market environment is rapidly changing due to the emergence of USB memory. USB memory is used as a portable storage device by many users. However, due to the high portability of USB memory, USB st... 详细信息
来源: 评论
An energy-efficient chain-based routing protocol in Wireless Sensor network
An energy-efficient chain-based routing protocol in Wireless...
收藏 引用
2010 International Conference on computer Application and System Modeling, ICCASM 2010
作者: Yu, Yongchang Song, Yichang Data Communication Research Dept. Guangzhou Research Institute China Telecom Co. Ltd. Guangzhou China Guangzhou Branch Computer Network and Information Security Center of China Guangzhou China
Nodes in Wireless Sensor network (WSN) are energy-constrained and have limited bandwidth. PEGASIS (Power-Efficient Gathering in Sensor information systems) presented in [1] is an excellent solution on energy efficienc... 详细信息
来源: 评论
An agent-based cooperative communication method in wireless sensor network for port logistics
An agent-based cooperative communication method in wireless ...
收藏 引用
2010 13th International Conference on computer and information Technology, ICCIT 2010
作者: Gou, Haosong Uddin, Md. Kafil Hossen, Muhammad Kamal Department of Computer Engineering Pusan National University Busan 609-735 Korea Republic of College of Computer Science and Information Systems Najran University Najran-1988 Saudi Arabia Dept. of Computer Science and Engineering Chittagong Univ. of Engineering and Technology Chittagong-4349 Bangladesh
Cooperative communication has been considered as a promising method for benefiting the advantages from MIMO (multiple-input multiple-output) system for single antenna mobiles in the wireless network, and many importan... 详细信息
来源: 评论
Performance analysis of PingPong-128 keystream generator for wireless sensor networks
Performance analysis of PingPong-128 keystream generator for...
收藏 引用
5th International Conference on computer Sciences and Convergence information Technology, ICCIT 2010
作者: Kumar, Pardeep Salam, Md. Iftekhar Reza, Ahmed Galib Lim, Hyo Taek Lee, Hoon Jae Dept. of U- IT Graduate School of Design and IT Dongseo University Busan Korea Republic of Division of Computer and Information Network Engg. School of Internet Engineering Dongseo University Busan 617-716 Korea Republic of
In this paper, we quantify the performance analysis of PingPong-128 keystream generator for wireless sensor networks. Although, PingPong-128 is not a standard stream cipher but still PingPong-128 keystream generator i... 详细信息
来源: 评论
Voice communications over 802.11 Ad Hoc networks: Modeling, optimization and call admission control
Voice communications over 802.11 Ad Hoc networks: Modeling, ...
收藏 引用
作者: Xu, Changchun Xu, Yanyi Liu, Gan Liu, Kezhong Computer Network Center Naval University of Engineering China Wuhan Natl. Lab. Optoelect. Dept. of Electronics and Information Engineering Huazhong University of Science and Technology Wuhan 430074 China School of Navigation Wuhan University of Technology China
Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MA... 详细信息
来源: 评论
Fine-grained data access control systems with user accountability in cloud computing
Fine-grained data access control systems with user accountab...
收藏 引用
2nd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2010
作者: Li, Jin Zhao, Gansen Chen, Xiaofeng Xie, Dongqing Rong, Chunming Li, Wenjun Tang, Lianzhang Tang, Yong School of Computer Science and Educational Software Guangzhou University China School of Computer Science South China Normal University China Key Laboratory of Computer Networks and Information Security Xidian University China Dept. of Electrical Engineering and Computer Science Stavenger University Norway School of Software Sun Yat-sen University China
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for data security a... 详细信息
来源: 评论
Fluctuated peer selection policy and its performance in large-scale multi-agent systems
收藏 引用
Web Intelligence and Agent systems 2010年 第3期8卷 255-268页
作者: Sugawara, Toshiharu Fukuda, Kensuke Hirotsu, Toshio Sato, Shin-Ya Akashi, Osamu Kurihara, Satoshi Dept. of Computer Science and Engineering Waseda University Shinjuku Tokyo 169-8555 Japan National Institute of Informatics Chiyoda Tokyo 101-8430 Japan NTT Network Innovation Laboratories Musashino Tokyo 180-8585 Japan Faculty of Information Science Hosei University Koganei Tokyo 184-8584 Japan Institute of Scientific and Industrial Research Osaka University Osaka 567-0047 Japan
This paper describes how, in large-scale multi-agent systems, each agent's adaptive selection of peer agents for collaborative tasks affects the overall performance and how this performance varies with the workloa... 详细信息
来源: 评论
On the use of compressed DFAs for packet classification
On the use of compressed DFAs for packet classification
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and networks, CAMAD
作者: Gianni Antichi Andrea Di Pietro Stefano Giordano Gregorio Procissi Domenico Ficaray Fabio Vitucci Dept. of Information Engineering Univ. of Pisa Italy Cisco Systems International srl Switzerland Wireless Integrated Network srl Italy
The process of categorizing packets into flows in an Internet router is called packet classification. All packets belonging to the same flow obey a predefined rule and are processed in a similar manner by the router i... 详细信息
来源: 评论
Optimizing pervasive sensor data acquisition utilizing missing values substitution  10
Optimizing pervasive sensor data acquisition utilizing missi...
收藏 引用
3rd International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2010
作者: Michalopoulos, M. Maglogiannis, Ilias Anagnostopoulos, C. Doukas, Charalampos Hadjiefthymiades, S. Faculty of Informatics Hellenic Open University Greece University of Central Greece Dep. of Computer Science and Bioinformatics Lamia Greece Dept. of Informatics and Telecommunications University of Athens Ilissia Athens Greece University of the Aegean Dep. of Information and Communication Systems Engineering Samos Greece
Acquisition of pervasive sensor data can be often unsuccessful due to power outage at nodes, time synchronization issues, interference, network transmission failures or sensor hardware issues. Such failures can lead t... 详细信息
来源: 评论
Research on language model of long-distance dependency
Research on language model of long-distance dependency
收藏 引用
2010 International Conference on Advances in Energy engineering, ICAEE 2010
作者: Xu, Zhi Hai Xie, Jian Ge, Wei Hu, Chun Network Center Nan Chang University Nan Chang 330031 China Dept. of Information Engineering Jiangxi Vocational and Technical College of Electricity Nang Chang 330032 China Computer Science Department Jiang Xi Radio and Television University Nang Chang 330046 China Network Center Jiangxi Science and Technology Normal University Nan Chang 330013 China
In this paper, we discussed current situation and problems of the statistical language models. And then the development and realization methods of the long-distance dependency language model simply introduced At last ... 详细信息
来源: 评论