咨询与建议

限定检索结果

文献类型

  • 1,836 篇 会议
  • 275 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,311 篇 工学
    • 1,052 篇 计算机科学与技术...
    • 892 篇 软件工程
    • 300 篇 信息与通信工程
    • 174 篇 控制科学与工程
    • 136 篇 生物工程
    • 122 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 98 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 576 篇 理学
    • 339 篇 数学
    • 148 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 388 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 82 篇 医学
    • 80 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 63 篇 software
  • 62 篇 software enginee...
  • 61 篇 accuracy
  • 56 篇 machine learning
  • 49 篇 computational mo...
  • 49 篇 feature extracti...
  • 48 篇 training
  • 40 篇 deep learning
  • 40 篇 real-time system...
  • 36 篇 semantics
  • 35 篇 computer science
  • 34 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 31 篇 predictive model...
  • 30 篇 internet of thin...
  • 30 篇 data mining
  • 30 篇 data models
  • 25 篇 testing
  • 23 篇 scalability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 10 篇 an beongku
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 1,928 篇 英文
  • 211 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2153 条 记 录,以下是981-990 订阅
排序:
An anti-reverse engineering technique using native code and obfuscator-llvm for android applications  17
An anti-reverse engineering technique using native code and ...
收藏 引用
2017 International Conference on Research in Adaptive and Convergent Systems, RACS 2017
作者: Lim, Kyeonghwan Jeong, Jaemin Cho, Seong-Je Choi, Jongmoo Park, Minkyu Han, Sangchul Jhang, Seongtae Dept. of Computer Science Dankook University Yongin448-701 Korea Republic of Dept. of Software Dankook University Yongin448-701 Korea Republic of Dept. of Computer Engineering Konkuk University Chungbuk380-701 Korea Republic of Dept. of Computer Suwon University Suwon445-743 Korea Republic of
Android applications are exposed to reverse engineering attacks. In particular, the applications written in Java are more prone to reverse engineering in comparison to the applications written in native-code languages... 详细信息
来源: 评论
A security analysis and reinforcement design adopting fingerprints over drawbacks of passwords based authentication in remote home automation control system  17
A security analysis and reinforcement design adopting finger...
收藏 引用
6th International Conference on Informatics, Environment, Energy and Applications, IEEA 2017
作者: Mukundwa, Chantal Lee, Seok Won Kim, Ki Hyung Computer Engineering Ajou University Korea Republic of Depts. of Software Convergence Technology Information and Computer Engineering Ajou University Korea Republic of Dept. of Knowledge and Information Engineering Ajou University Korea Republic of
Privacy has been one of the focus in information security discussion over years and it has become an issue everyone would like to protect though sometime people end up giving up some of their privacy in exchange of ot... 详细信息
来源: 评论
Conducting Online Lab Experiments with Blockly
收藏 引用
IFAC-PapersOnLine 2017年 第1期50卷 13474-13479页
作者: Galan, Daniel Heradio, Ruben de la Torre, Luis Dormido, Sebastian Esquembre, Francisco Dept. of Computer Science and Automatic Control Universidad Nacional de Educación a Distancia Juan del Rosal 16 MadridE-28040 Spain Dept. of Software Engineering and Computer Systems Universidad Nacional de Educación a Distancia Juan del Rosal 16 MadridE-28040 Spain Dept. of Mathematics Universidad de Murcia Campus de Espinardo MurciaE-30071 Spain
Laboratory experimentation plays an essential role in control education. To reduce the high costs of maintaining apparatus in traditional labs and to support distance and blended learning, online laboratories are used... 详细信息
来源: 评论
Android Malware Detection Based on Useful API Calls and Machine Learning
Android Malware Detection Based on Useful API Calls and Mach...
收藏 引用
Artificial Intelligence and Knowledge engineering (AIKE)
作者: Jaemin Jung Hyunjin Kim Dongjin Shin Myeonggeon Lee Hyunjae Lee Seong-je Cho Kyoungwon Suh Dept. of Computer Science and Engineering Dankook University Yongin South Korea Dept. of Datascience Dankook University Yongin South Korea Dept. of Information Statistics Dankook University Yongin South Korea Dept. of Software Science Dankook University Yongin South Korea School of Information Technology Illinois State University Normal IL USA
Accurate malware detection can benefit Android users significantly considering the growing number of sophisticated malwares recently. In this paper, we propose a machine learning based malware detection methodology th... 详细信息
来源: 评论
3D face recognition via discriminative keypoint selection  14
3D face recognition via discriminative keypoint selection
收藏 引用
14th International Conference on Ubiquitous Robots and Ambient Intelligence, URAI 2017
作者: Kim, Jiwhan Han, Dongyoon Hwang, Wonjun Kim, Junmo School of Electrical Engineering Korea Advanced Institute of Science and Technology Daejeon Korea Republic of Dept. of Software and Computer Engineering Ajou University Suwon Korea Republic of
In this paper, we propose a discriminative keypoint selection-based 3D face recognition method that is superior to prevalent techniques in terms of both computational complexity and performance. We use the average fac... 详细信息
来源: 评论
Behavior Recognition of a Person in a Daily Video Using Joint Position Information
Behavior Recognition of a Person in a Daily Video Using Join...
收藏 引用
Artificial Intelligence and Knowledge engineering (AIKE)
作者: Jeong-Min Seo Haanju Yoo Kimin Yun Hyunil Kim Sang-Il Choi Dept. Data Science (of Dankook University) Yongin-si South Korea Dept. Computer Science and Engineering (of Dankook University) Yongin-si South Korea Electronics and Telecommunications Research Institute (ETRI) Daejeon South Korea Dept. Software Science (of Dankook University) Yongin-si South Korea
In this paper, we propose a method to recognize people's specific behaviors in images acquired in everyday life. The poses that occur when taking a specific action are represented using the joint coordinates of th... 详细信息
来源: 评论
Considerations regarding security issues impact on systems availability
arXiv
收藏 引用
arXiv 2018年
作者: Pricop, Emil Mihalache, Sanda Florentina Paraschiv, Nicolae Fattahi, Jaouhar Zamfir, Florin Automatic Control Computers and Electronics Department Petroleum-Gas University of Ploiesti Ploiesti Romania Dept. of Computer Science and Software Engineering Université Laval QC Canada Automatic Control Computers and Electronics Dept. Petroleum-Gas University of Ploiesti Ploiesti Romania
Control systems behavior can be analyzed taking into account a large number of parameters: Performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect i... 详细信息
来源: 评论
Joint optimization of sensing period and transmission time for energy-efficient CRSNs  11
Joint optimization of sensing period and transmission time f...
收藏 引用
11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017
作者: Jin, Zilong Jinsung, Cho Kong, Fanhua Kim, Chang-Woo Na, Sangyeob School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Cho Dept. of Computer Science and Engineering Kyung Hee University Yongin17104 Korea Republic of Dept. of Electronics and Radio Engineering Kyung Hee University Yongin17104 Korea Republic of Dept. of Computer Science Namseoul University Cheonan31020 Korea Republic of
Cognitive radio technology can enable secondary users (SUs) to occupy licensed bands in a non-interference way. SUs perform spectrum sensing to determine the presence of primary user (PU). Spectrum sensing period and ... 详细信息
来源: 评论
Deep Feature Aggregation and Image Re-ranking with Heat Diffusion for Image Retrieval
arXiv
收藏 引用
arXiv 2018年
作者: Pang, Shanmin Ma, Jin Xue, Jianru Zhu, Jihua Ordonez, Vicente School of Software Engineering Xi’an Jiaotong University Xi’an710049 China Xi’an Jiaotong University Xi’an710049 China Dept. of Computer Science University of Virginia VA22904 United States
Image retrieval based on deep convolutional features has demonstrated state-of-the-art performance in popular benchmarks. In this paper, we present a unified solution to address deep convolutional feature aggregation ... 详细信息
来源: 评论
Sequential image-based attention network for inferring force estimation without haptic sensor
arXiv
收藏 引用
arXiv 2018年
作者: Shin, Hochul Hyeon, C.H.O. Dongyi, K.I.M. Ko, Dae-Kwan Lim, Soo-Chul Hwang, Wonjun Dept. of Software and Computer Engineering Ajou University San 5-1 Woncheon-dong Yeongtong-gu Suwon-si Gyeonggi-do16499 Korea Republic of Dongguk University Korea Republic of
Humans can approximately infer the force of interaction between objects using only visual information because we have learned it through experiences. Based on this idea, in this paper, we propose a method based on a r... 详细信息
来源: 评论