咨询与建议

限定检索结果

文献类型

  • 477 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 564 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 343 篇 工学
    • 277 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 109 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 化学工程与技术
  • 140 篇 理学
    • 80 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 95 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 13 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 11 篇 wireless sensor ...
  • 11 篇 feature extracti...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 6 篇 nikumani choudhu...
  • 6 篇 vulfin alexey
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 549 篇 英文
  • 12 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
564 条 记 录,以下是481-490 订阅
排序:
Modeling human cognition using a transformational knowledge architecture
2008 IEEE International Conference on System of Systems Engi...
收藏 引用
2008 IEEE International Conference on System of systems engineering, SoSE 2008 2008年
作者: Rubin, Stuart H. Lee, Gordon Pedrycz, Witold Spawar, Shu-Ching Chen Systems Center 53560 Hull Street San Diego CA 92152 United States Dept. of Electrical and Computer Engineering San Diego State University 5500 Campanile Drive San Diego CA 92182 United States Dept of Electrical and Computer Engineering University of Alberta Edmonton AB T6G 2R3 Canada School of Computing and Information Sciences Florida Int'l University 11200 SW 8th St ECS 362 Miami FL 33199 United States
While much research has been devoted to learning and machine intelligence, the field is still in its infancy. In particular, a technology that will allow for heuristic exploitation of information domain regularities t... 详细信息
来源: 评论
A practical proxy device for protecting RFID tag's identifier
A practical proxy device for protecting RFID tag's identifie...
收藏 引用
2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent systems for security, BLISS 2007
作者: Yeo, Sang-Soo Sakurai, Kouichi Kwak, Jin Dept. of Computer Science and Communication Engineering Kyushu University Fukuoka Japan Dept. of Information Security Engineering Soonchunhyang University Asan-si Korea Republic of
RFID, Radio Frequency Identification, is an emerging technology in the world of automatic identification. It uses RF signal for gathering information of tags, which can be attached or embedded to goods such as consume... 详细信息
来源: 评论
Privacy-preserving two-party K-means clustering via secure approximation
Privacy-preserving two-party K-means clustering via secure a...
收藏 引用
21st International Conference on Advanced information networking and ApplicationsWorkshops/Symposia, AINAW'07
作者: Su, Chunhua Bao, Feng Zhou, Jianying Takagi, Tsuyoshi Sakurai, Kouichi Dept. of Computer Science and Communication Engineering Kyushu University Japan Systems and Security Department Institute for Infocomm. Research Singapore Singapore School of Systems Information Science Future University-Hakodate Japan
K-means clustering is a powerful and frequently used technique in data mining. However, privacy breaching is a serious problem if the k-means clustering is used without any security treatment, while privacy is a real ... 详细信息
来源: 评论
Improvements in SCADA and DCS systems security
Improvements in SCADA and DCS systems security
收藏 引用
22nd International Conference on computers and Their Applications 2007, CATA 2007
作者: Graham, James H. Mostafa, Mostafa S. Arazi, Benjamin Tantawy, Ashraf Hieb, Jeffrey Ralston, Patricia Patel, Sandip C. Computer Engineering and Computer Science Dept. Intelligent Systems Research Laboratory University of Louisville Louisville KY 40292 United States Dept. of Computer Science Western Kentucky University Bowling Green KY United States Dept. of Chemical Engineering University of Louisville Louisville KY United States Dept. of Information Science and Systems Morgan State University Baltimore MD United States
Supervisory control and data acquisition (SCADA) systems monitor, regulate, gather information from, and control the computer field units that control much of our industrial and utility infrastructure. Distributed Con... 详细信息
来源: 评论
A distributed information retrieval method in peer-to-peer network
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2007年 第6期14卷 846-849页
作者: 刘飞 邹福泰 马范援 李明禄 Dept. of Computer Science and Engineering Shanghai Jiaotong University School of Information Security Engineering Shanghai Jiaotong University
To avoid the scalability of the existing systems that employed centralized indexing,index flooding or query flooding,we proposed an efficient peer-to-peer information retrieval system SPIRS (Semantic P2P-based Informa... 详细信息
来源: 评论
Cost-balancing tolls for atomic network congestion games
收藏 引用
3rd International Workshop on Internet and network Economics, WINE 2007
作者: Fotakis, Dimitris Spirakis, Paul G. Dept. of Information and Communication Systems Engineering University of the Aegean 83200 Samos Greece Research Academic Computer Technology Institute N. Kazantzaki Str. Rion 26500 Patras Greece
We investigate the existence of optimal tolls for atomic symmetric network congestion games with unsplittable traffic and arbitrary non-negative and non-decreasing latency functions. We focus on pure Nash equilibria a... 详细信息
来源: 评论
E-mail Clustering Based on Profile and Multi-attribute Values
E-mail Clustering Based on Profile and Multi-attribute Value...
收藏 引用
International Conference on Advanced Language Processing and Web information Technology (ALPIT)
作者: Samuel Sangkon Lee Masami Shishibori Kazuaki Ando Dept. of Computer Science and Engineering Jeonju University Wansan Gu Chonbuk Jeonju Republic of Korea Dept. of Information Science and Intelligent Systems Tokushima University Tokushima Japan Dept. of Reliability-based Information Systems Engineering Kagawa University Kagawa Japan
Although modern day people gather many data from the network, the users want only the information needed. Using this technology, the users can extract on the data that satisfy the query. As the previous studies use th... 详细信息
来源: 评论
Integration of school mapping modelling for an Educational Decision Support System: Jordan case study
Modelling, Measurement and Control C
收藏 引用
Modelling, Measurement and Control C 2007年 第3-4期68卷 13-34页
作者: Al-Hanbali, N. Al-Kharouf, R. Al-Zoubi, M.B. Surveying and Geomatics Engineering Dept. Al-Balqa Applied University Salt Jordan GIS Section Decision support Dept. and Planning Ministry of Education Amman Jordan Computer Information Systems Dept. University of Jordan Amman Jordan
Building a suitable GIS data-model for school mapping planning is an evolving trend in education, where all schools linked with attribute data will be available for problem solving and decision-making in Education. Th... 详细信息
来源: 评论
Distributed information retrieval method in peer-to-peer network
收藏 引用
Journal of Harbin Institute of Technology (New Series) 2007年 第6期14卷 846-849页
作者: Liu, Fei Zou, Fu-Tai Ma, Fan-Yuan Li, Ming-Lu Dept. of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200030 China School of Information Security Engineering Shanghai Jiaotong University Shanghai 200030 China
To avoid the scalability of the existing systems that employed centralized indexing, index flooding or query flooding, we proposed an efficient peer-to-peer information retrieval system SPIRS (Semantic P2P-based Infor... 详细信息
来源: 评论
Experiments of E-Mail Filtering Method Based on Sender, Sentence Type, Existence of Time Expression, and Subject of Mail Contents
Experiments of E-Mail Filtering Method Based on Sender, Sent...
收藏 引用
IEEE International Conference on Natural Language Processing and Knowledge engineering (NLP-KE)
作者: Samuel Sangkon Lee Masami Shishibori Kazuaki Ando Dept. of Computer Science and Engineering Jeonju University Jeonju Chonbuk Wansan Gu Republic of Korea Department of Reliability-based Information Systems Engineering Faculty of Engineering Kagawa University Takamatsu Kagawa Japan Dept. of Information Science and Intelligent Systems Tokushima University Tokushima Japan Department of Information Science and Intel-light Systems University of Tokushima Tokushima Japan Dept. of Reliability-based Information Systems Engineering Kagawa University Kagawa Japan
Filtering is a method of attaining only the wanted data and blocking the unwanted ones. Using this technology, the users can extract on the data that satisfy the query. As the previous studies use the single data, fre... 详细信息
来源: 评论