咨询与建议

限定检索结果

文献类型

  • 335 篇 会议
  • 24 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 360 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 137 篇 工学
    • 104 篇 计算机科学与技术...
    • 84 篇 软件工程
    • 24 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 19 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 8 篇 机械工程
    • 6 篇 生物工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 光学工程
    • 4 篇 动力工程及工程热...
    • 3 篇 仪器科学与技术
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 安全科学与工程
    • 2 篇 交通运输工程
    • 2 篇 农业工程
  • 56 篇 理学
    • 39 篇 数学
    • 11 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 系统科学
    • 6 篇 生物学
    • 3 篇 化学
  • 25 篇 管理学
    • 14 篇 图书情报与档案管...
    • 13 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 农学
  • 2 篇 医学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 55 篇 computer science
  • 35 篇 information scie...
  • 17 篇 application soft...
  • 15 篇 testing
  • 14 篇 neural networks
  • 12 篇 computer archite...
  • 12 篇 computational mo...
  • 12 篇 costs
  • 11 篇 bandwidth
  • 11 篇 humans
  • 11 篇 protocols
  • 10 篇 educational inst...
  • 9 篇 programming
  • 9 篇 informatics
  • 9 篇 data mining
  • 9 篇 switches
  • 9 篇 internet
  • 9 篇 software
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...

机构

  • 11 篇 department of co...
  • 10 篇 dept. of comput....
  • 10 篇 dept. of comput....
  • 8 篇 oxford-man insti...
  • 8 篇 department of co...
  • 6 篇 national taiwan ...
  • 6 篇 dept. of inf. & ...
  • 5 篇 dept. of comput....
  • 5 篇 dept. of comput....
  • 5 篇 dept. of compute...
  • 5 篇 dept. of compute...
  • 4 篇 dept. of comput....
  • 4 篇 dept. of comput....
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 dept. of cs and ...
  • 3 篇 department of co...
  • 3 篇 dept. of inf. sc...

作者

  • 7 篇 calì andrea
  • 5 篇 mylopoulos john
  • 4 篇 taufer michela
  • 4 篇 tsutomu kawabata
  • 4 篇 xie min
  • 4 篇 wood peter t.
  • 4 篇 memon nasir
  • 3 篇 hirose keikichi
  • 3 篇 pieris andreas
  • 3 篇 nazih hajri
  • 3 篇 felix dobslaw
  • 3 篇 frosini riccardo
  • 3 篇 yamazaki yoichi
  • 3 篇 lakshmanan laks ...
  • 3 篇 minematsu nobuak...
  • 2 篇 hemaspaandra edi...
  • 2 篇 néji youssef
  • 2 篇 swersky kevin
  • 2 篇 preitl stefan
  • 2 篇 keller jörg

语言

  • 353 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"机构=Dept. of Inf. Engineering and Computer Science"
360 条 记 录,以下是161-170 订阅
排序:
The transmission capacity of hierarchical mobile ad hoc networks
The transmission capacity of hierarchical mobile ad hoc netw...
收藏 引用
IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, ICWMMN 2006
作者: Genjian, Yu Baoyu, Zheng Xiaocong, Qian Dept. of Commun. and Inf. Eng. Nanjing Univ. of Posts and Telecommun. Nanjing 210003 China Department of Mathematics and Computer Science Fuzhou University Fuzhou 350002 China
In this paper, we study some transmission capacity theories of hierarchical wireless mobile ad hoc networks (H-MANET). Firstly, we present the structural protocol model, node's mobility tracking model of H-MANET. ... 详细信息
来源: 评论
Learning generalized weighted relevance aggregation operators using levenberg-marquardt method
Learning generalized weighted relevance aggregation operator...
收藏 引用
6th International Conference on Hybrid Intelligent Systems and 4th Conference on Neuro-Computing and Evolving Intelligence, HIS-NCEI 2006
作者: Mendis, B.S.U. Gedeon, T.D. Kóczy, L.T. Dept. of Computer Science Australian National University Canberra ACT 0200 Australia Dept. of Computer Science Australian National University Canberra Australia Dept. of Telec. and Media Informatics Budapest University of Tech. and Econ. Budapest Hungary Institute of Inf. Tech. and Elec. Eng. Széchenyi István University Gyor Hungary
We previously introduced the generalized Weighted Relevance Aggregation Operators (WRAO) for hierarchical fuzzy signatures. WRAO enhances the ability of the fuzzy signature model to adapt to different applications and... 详细信息
来源: 评论
Reasoning about obfuscated private inf.rmation - Who have lied and how to lie
Reasoning about obfuscated private information - Who have li...
收藏 引用
5th ACM Workshop on Privacy in Electronic Society, WPES 2006, Co-located with the 13th ACM Conference on computer and Communications Security, CCS 2006
作者: An, Xiangdong Jutla, Dawn Cercone, Nick Dept. of Finance Inf. Syst. and Manage. Sci. Saint Mary's University Halifax NS B3H 3C3 Canada Faculty of Computer Science Dalhousie University Halifax NS B3H 1W5 Canada
In ubiquitous environments, context sharing among agents should be made privacy-conscious. Privacy preferences are generally specified to govern the context exchanging among agents. Besides who has rights to see what ... 详细信息
来源: 评论
A NEW SOLUTION BASED ON MONTE CARLO TO WIRELESS SENSOR NETWORK DENSITY CONTROL PROBLEM
A NEW SOLUTION BASED ON MONTE CARLO TO WIRELESS SENSOR NETWO...
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: Jiafu Yufu Dong Tianlin Dept. of Electron. & Inf. Eng. Hangzhou Univ. of Sci. & Technol. Department of Electronics and Information Engineering Huazhong University of Science and Technology China
An effective approach for energy conservation in wireless sensor networks is to schedule sleep intervals for extraneous nodes, while the remaining nodes stay active to provide continuous service. In this paper, we pro... 详细信息
来源: 评论
A multilayer topic-group based P2P network
A multilayer topic-group based P2P network
收藏 引用
International Conference on Advanced inf.rmation Networking and Applications (AINA)
作者: SyuYang Chen Wen-Hsien Tseng Hsing Mei Department of Computer Science and Information Engineering Fu Jen Catholic University Taiwan Fu Jen Catholic University College of Medicine New Taipei City New Taipei City TW Dept. of Comput. Sci. & Inf. Eng. Fu Jen Catholic Univ. Taiwan
Considering that large and various contents are shared over thousands of peers across a P2P network, one challenging problem is to locate the target content in such a large and unorganized environment. Hence, a P2P sy... 详细信息
来源: 评论
Towards strong mobility in the shared source CLI
Concurrent Systems Engineering Series
收藏 引用
Concurrent Systems engineering Series 2005年 63卷 363-373页
作者: Stewart, Johnston Nixon, Paddy Walsh, Tim Ferguson, Ian SmartLab. Dept. of Comp. and Inf. Sciences University of Strathclyde Glasgow Computer Science Department University College Dublin Dublin 4 Ireland Department of Computer Science University of Dublin Trinity College Dublin Ireland
Migrating a thread while preserving its state is a useful mechanism to have in situations where load balancing within applications with intensive data processing is required. Strong mobility systems, however, are rare... 详细信息
来源: 评论
PSteg: Steganographic embedding through patching
PSteg: Steganographic embedding through patching
收藏 引用
2005 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP '05
作者: Petrowski, Kyle Kharrazi, Mehdi Sencar, Husrev T. Memon, Nasir Dept. of Electrical and Computer Eng. Polytechnic University Brooklyn NY United States Dept. of Comp. and Inf. Science Polytechnic University Brooklyn NY United States
In this paper we propose a novel approach to image steganography in which embedding is done without making explicit modifications to the image;that is, the embedding distortion introduced to the cover image is both pe... 详细信息
来源: 评论
Steganalysis of halftone images
Steganalysis of halftone images
收藏 引用
2005 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP '05
作者: Jiang, Ming Wong, Edward K. Memon, Nasir Wu, Xiaolin Dept. of Computer and Inf. Science Polytechnic University Brooklyn NY 11201 Dept. of Electrical and Comp. E. McMaster University Hamilton Ont. L8G 4K1
In this paper, we present a novel steganalysis technique for halftone images without knowledge of the original cover image. We first convert halftone images into grayscale-like images by low-pass filtering. The low-pa... 详细信息
来源: 评论
Steganalysis of degraded document images
Steganalysis of degraded document images
收藏 引用
2005 IEEE 7th Workshop on Multimedia Signal Processing, MMSP 2005
作者: Jiang, Ming Wong, Edward K. Memon, Nasir Wu, Xiaolin Dept. of Computer and Inf. Science Polytechnic University Brooklyn NY 11201 United States Dept. of Electrical and Comp. E. McMaster University Hamilton Ont. L8G 4K1 Canada
In this paper, a steganalysis technique using compression bit rate as a distinguishing statistic is presented to detect secret messages embedded in document images that are degraded in quality by printing, photocopyin... 详细信息
来源: 评论
Reasoning about software architecture-based regression testing through a case study
Reasoning about software architecture-based regression testi...
收藏 引用
29th Annual International computer Software and Applications Conference, COMPSAC 2005
作者: Muccini, Henry Dias, Marcio Richardson, Debra J. Dipartimento di Informatica University of l'Aquila L'Aquila Italy Dept. of Computer Science e-Science Research Institute University of Durham Durham United Kingdom Donald Bren School of Inf. and Computer Sciences University of California Irvine Irvine CA United States
Two main issues need to be covered when dealing with the dependability of component-based systems: quality assurance of reusable software components and quality assurance of the assembled component-based system. By fo... 详细信息
来源: 评论