咨询与建议

限定检索结果

文献类型

  • 713 篇 会议
  • 189 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 424 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 126 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 75 篇 生物工程
    • 72 篇 电气工程
    • 67 篇 生物医学工程(可授...
    • 43 篇 光学工程
    • 41 篇 电子科学与技术(可...
    • 31 篇 机械工程
    • 27 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 22 篇 动力工程及工程热...
    • 19 篇 材料科学与工程(可...
  • 287 篇 理学
    • 156 篇 数学
    • 83 篇 生物学
    • 62 篇 物理学
    • 59 篇 统计学(可授理学、...
    • 43 篇 系统科学
    • 27 篇 化学
  • 148 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 57 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 59 篇 医学
    • 54 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
    • 22 篇 公共卫生与预防医...
  • 32 篇 法学
    • 27 篇 社会学
  • 22 篇 教育学
    • 21 篇 教育学
  • 16 篇 经济学
  • 16 篇 农学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 25 篇 artificial intel...
  • 22 篇 accuracy
  • 19 篇 feature extracti...
  • 18 篇 information stor...
  • 17 篇 computational mo...
  • 16 篇 information syst...
  • 16 篇 computer communi...
  • 16 篇 training
  • 15 篇 internet of thin...
  • 14 篇 software enginee...
  • 14 篇 data mining
  • 13 篇 database managem...
  • 13 篇 predictive model...
  • 13 篇 data models
  • 12 篇 computer science
  • 12 篇 servers
  • 12 篇 real-time system...
  • 12 篇 software
  • 11 篇 covid-19
  • 11 篇 deep learning

机构

  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 systems and netw...
  • 5 篇 computer systems...
  • 5 篇 dept. of compute...
  • 5 篇 school of inform...
  • 5 篇 department of el...
  • 4 篇 division of info...
  • 4 篇 magna design net...
  • 4 篇 dept. informatio...
  • 4 篇 dept. of informa...
  • 4 篇 computer science...
  • 4 篇 school of comput...
  • 4 篇 dept. of compute...
  • 4 篇 department of co...
  • 4 篇 dept. of informa...
  • 4 篇 ntis - new techn...
  • 4 篇 institute for hi...
  • 4 篇 centre for stati...
  • 4 篇 school of inform...

作者

  • 13 篇 fotiadis dimitri...
  • 10 篇 lenc ladislav
  • 9 篇 nikumani choudhu...
  • 8 篇 král pavel
  • 6 篇 segata michele
  • 6 篇 jian-jhih kuo
  • 6 篇 dressler falko
  • 6 篇 sommer christoph
  • 6 篇 cigno renato lo
  • 5 篇 glocker ben
  • 5 篇 bhattacharya pra...
  • 5 篇 michele segata
  • 5 篇 yu-wen chen
  • 5 篇 albert y. zomaya
  • 5 篇 felner ariel
  • 5 篇 dimitrios i. fot...
  • 5 篇 joerer stefan
  • 4 篇 doukas charalamp...
  • 4 篇 bakas spyridon
  • 4 篇 galdran adrian

语言

  • 909 篇 英文
  • 27 篇 其他
  • 4 篇 日文
  • 4 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Information Technologies and Systems. Computer Science and Engineering"
945 条 记 录,以下是621-630 订阅
排序:
Keystroke dynamics for user authentication
Keystroke dynamics for user authentication
收藏 引用
2012 IEEE computer Society Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2012
作者: Zhong, Yu Deng, Yunbin Jain, Anil K. Advanced Information and Technology BAE Systems 6 New England Executive Park Burlington MA 01803 United States Dept. Computer Science and Engineering Michigan State University 3115 Engineering Building E. Lasing MI 48824 United States
In this paper we investigate the problem of user authentication using keystroke biometrics. A new distance metric that is effective in dealing with the challenges intrinsic to keystroke dynamics data, i.e., scale vari... 详细信息
来源: 评论
Predicting optimal solution cost with bidirectional stratified sampling
Predicting optimal solution cost with bidirectional stratifi...
收藏 引用
22nd International Conference on Automated Planning and Scheduling, ICAPS 2012
作者: Lelis, Levi Stern, Roni Felner, Ariel Zilles, Sandra Holte, Robert C. Computing Science Dept. University of Alberta Edmonton AB T6G 2E8 Canada Information Systems Engineering Ben Gurion University Beer-Sheva 85104 Israel Computer Science Dept. University of Regina Regina SK S4S 0A2 Canada
Optimal planning and heuristic search systems.solve state-space search problems by finding a least-cost path from start to goal. As a byproduct of having an optimal path they also determine the optimal solution cost. ... 详细信息
来源: 评论
Poster abstracts
收藏 引用
Sleep and Biological Rhythms 2016年 第1期5卷 A1-A189页
作者: J. Ferrie M. Shipley F. Cappuccio E. Brunner M. Miller M. Kumari M. Marmot A. Coenen J. L. Castillo F. Araya G. Bustamante L. Montecino C. Torres S. Oporto J. Gronli E. Fiske R. Murison B. Bjorvatn E. Sorensen R. Ursin C. M. Portas S. Rajaraman A. Gribok N. Wesensten T. Balkin J. Reifman N. Dursunoglu S. Ozkurt S. Baser O. Delen S. Sarikaya P. Sadler P. Mitchell D. Françon M. Decobert B. Herve A. Richard G. Griebel P. Avenet B. Scatton G. L. Fur D. Eckert A. Jordan A. Wellman S. Smith A. Malhotra D. White D. Bruck I. Thomas A. Kritikos W. Oertel K. Stiasny-Kolster D. Garcia-Borreguero W. Poewe B. Hoegl R. Kohnen E. Schollmayer J. Keffel C. Trenkwalder A. Valle S. Roizenblatt F. Fregni P. Boggio S. Tufik K. Ward L. Robertson L. Palmer P. Eastwood D. Hillman J. Lee S. Mukherjee V. de Padova G. Barbato G. Ficca I. Zilli P. Salzarulo M. Veldi T. Hion V. Vasar M. Kull L. Nowak J. Davis Y. Latzer O. Tzischinsky S. Crowley M. Carskadon M. Anca-Herschkovitsch D. Frey J. Ortega C. Wiseman C. Farley K. Wright A. Campbell A. Neill K. Spiegel R. Leproult E. Tasali N. Scherberg E. van Cauter A. T. Noradina N. A. Karim I. Norlinah A. A. Raymond R. Sahathevan B. Hamidon E. Werth R. Poryazova R. Khatami C. Bassetti R. G. Beran L. Ainley G. Holand J. Duncan H. Kinney B. Davis B. Hood S. Frey C. Schmidt M. Hofstetter P. Peigneux C. Cajochen W.-P. Hu J.-D. Li C. Zhang L. Boehmer J. Siegel Q.-Y. Zhou Y. Sagawa H. Kondo T. Takemura H. Kanayama Y. Kaneko M. Sato T. Kanbayashi Y. Hishikawa T. Shimizu A. Viola L. James L. Schlangen D.-J. Dijk R. Andretic Y.-C. Kim K.-A. Han F. Jones R. Greenspan L. Sanford L. Yang X. Tang K. Dieter E. Uta H. Sven M. Richard N. Oyane S. Pallesen F. Holsten Y. Inoue M. Fujita N. Emura K. Kuroda N. Uchimura A. Johnston J. Astbury G. Kennedy K. Hoedlmoser M. Schabus T. Pecherstorfer S. Moser G. Gruber P. Anderer W. Klimesch N. Naidoo M. Ferber A. Pack D. Neu O. Mairesse G. Hoffmann A. Dris L. Lambrecht P. Linkowski P. Verbanck O. Le Bon N. Matsuura M. Yamao N. Adachi R. Aritomi Y. Komada H. Tanaka S. Shirak University College London London UK University College London London USA Warwick Medical School London UK Warwick Medical School Coventry USA Radboud University Nijmegen Nijmegen Netherlands Department of Neurology University of Chile Santiago Chile Neurology Service Hospital del Salvador Santiago Chile Family Health Center Juan Pablo II Santiago Chile Department of Biomedicine Section on Physiology Univeristy of Bergen Bergen Norway Department of Public Health and Primary Health Care Univeristy of Bergen Bergen Norway Department of Public Health and Primary Health Care University of Bergen Bergen Norway Norwegian Competence Center for Sleep Disorders Haukeland University Hospital Bergen Norway Department of Child and Adolescent Psychiatry Haukeland University Hospital Univeristy of Bergen Bergen Norway Department of Biomedicine University of Bergen Bergen Norway US Army Medical Research and Materiel Command Fort Detrick Frederick USA Walter Reed Army Institute of Research Silver Spring USA Department of Behavioral Biology Walter Reed Army Institute of Research Silver Spring USA Faculty Department of Pulmonology Pamukkale University Medical Denizli Turkey University of Ballarat Ballarat Australia Sanofi-Aventis Recherche et Developpement Paris France Brigham and Women’s Hospital Harvard Medical School Boston USA The University of Queensland Adelaide Australia School of Psychology University of Queensland Brisbane Australia The University of Queensland Brisbane Australia Victoria University Melbourne Australia Department of Psychology Victoria University Melbourne Australia School of Psychology Victoria University Melbourne Australia Philips-Universität Marburg Germany Philips-Universitaet-Marburg Marburg Germany Instituto de Investigaciones del Sueno Madrid Spain Universitätsklinik für Neurologie Innsbruck Austria Universitaetsklinik fuer Neurologie Innsbruck Austria IMEREM GmbH Nuernberg Germany Schwarz Pharma AG Monheim Germany
来源: 评论
A new energy prediction approach for intrusion detection in cluster-based wireless sensor networks
A new energy prediction approach for intrusion detection in ...
收藏 引用
1st ICST International Conference on Green Communications and Networking, GreeNets 2011
作者: Shen, Wen Han, Guangjie Shu, Lei Rodrigues, Joel J. P. C. Chilamkurti, Naveen Department of Information and Communication Systems Hohai University China Changzhou Key Laboratory of Sensor Networks and Environmental Sensing China Department of Multimedia Engineering Osaka University Japan Instituto de Telecomunicações University of Beira Interior Portugal Dept. of Computer Science and Computer Engineering La Trobe University Australia
Wireless Sensor Networks (WSNs) require an efficient intrusion detection scheme to identify malicious attackers. Traditional detection schemes are not well suited for WSNs due to their higher false detection rate. In ... 详细信息
来源: 评论
Enabling data protection through PKI encryption in IoT m-Health devices
Enabling data protection through PKI encryption in IoT m-Hea...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Charalampos Doukas Ilias Maglogiannis Vassiliki Koufi Flora Malamateniou George Vassilacopoulos Dept. of Information and Communication Systems Engineering University of Aegean Dept. of Computer Science and Biomedical Informatics University of Central Greece Dept. of Digital Systems University of Piraeus Greece
Ambient Assisted Living (AAL) aims at providing unobtrusive support to frail and elderly people for their daily life based on their context and situation. To this end, systems.and services are required which are user-... 详细信息
来源: 评论
Development of memorizing system with action selection based on consciousness and behavior of animal on robot systems
Development of memorizing system with action selection based...
收藏 引用
2012 21st IEEE International Symposium on Robot and Human Interactive Communication, RO-MAN 2012
作者: Jitviriya, Wisanu Yoshida, Motoki Tanaka, Kyoko Hayashi, Eiji Graduated School of Electrical Engineering King Mongkut's University of Technology North Bangkok 10800 Thailand Graduated School of Computer Science and Systems Engineering Kyushu Institute of Technology 820-8502 Kyushu Japan Dept. of Mechanical Information Science and Technology Kyushu Institute of Technology 820-8502 Kyushu Japan
This paper focuses on the development of interaction between humans and robots, we decided to give the robotic arm has a consciousness and an emotional behavior in the same way as humans and animals. Thus, we have dev... 详细信息
来源: 评论
Supporting collaboration for smarter city planning
Supporting collaboration for smarter city planning
收藏 引用
6th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2012
作者: Frez, Jonathan Baloian, Nelson Zurita, Gustavo School of Informatics and Telecommunication Engineering Universidad Diego Portales Manuel Rodriguez Sur 415 RM Santiago Chile Department of Computer Science Universidad de Chile Santiago Chile Information Systems and Management Dept. Universidad de Chile Santiago Chile
computer-based collaborative tools have been proven to be effective in supporting inhabitants of cities to participate more activeley in the decisions about the development of their cities and environment. These tools... 详细信息
来源: 评论
Selective opening chosen ciphertext security directly from the DDH assumption
Selective opening chosen ciphertext security directly from t...
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Liu, Shengli Zhang, Fangguo Chen, Kefei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t... 详细信息
来源: 评论
A generic approach for providing revocation support in secret handshake
A generic approach for providing revocation support in secre...
收藏 引用
14th International Conference on information and Communications Security, ICICS 2012
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Ding, Xuhua Zhou, Jianying Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China School of Information Systems Singapore Management University Singapore Singapore
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared... 详细信息
来源: 评论
Visualizing timelines: Evolutionary summarization via iterative reinforcement between text and image streams  12
Visualizing timelines: Evolutionary summarization via iterat...
收藏 引用
21st ACM International Conference on information and Knowledge Management, CIKM 2012
作者: Yan, Rui Wan, Xiaojun Lapata, Mirella Zhao, Wayne Xin Cheng, Pu-Jen Li, Xiaoming Dept. of Computer Science and Information Engineering National Taiwan University Taipei 10617 Taiwan Institute of Computer Science and Technology Peking University Beijing 100871 China Institute for Language Cognition and Computation University of Edinburgh Edinburgh EH8 9AB United Kingdom Dept. of Computer Science and Technology Peking University Beijing 10087 China State Key Lab. of Virtual Reality Tech. and Systems Beihang University Beijing 100083 China
We present a novel graph-based framework for timeline summarization, the task of creating different summaries for different timestamps but for the same topic. Our work extends timeline summarization to a multimodal se... 详细信息
来源: 评论