咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 27 篇 期刊文献

馆藏范围

  • 104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 76 篇 工学
    • 43 篇 计算机科学与技术...
    • 31 篇 软件工程
    • 26 篇 信息与通信工程
    • 20 篇 电子科学与技术(可...
    • 17 篇 电气工程
    • 10 篇 光学工程
    • 10 篇 控制科学与工程
    • 8 篇 机械工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 生物工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 力学(可授工学、理...
    • 4 篇 建筑学
    • 4 篇 土木工程
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 船舶与海洋工程
  • 40 篇 理学
    • 22 篇 数学
    • 18 篇 物理学
    • 10 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 5 篇 化学
  • 13 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
    • 4 篇 药学(可授医学、理...
    • 3 篇 公共卫生与预防医...
  • 3 篇 法学
  • 2 篇 文学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 5 篇 frequency
  • 3 篇 transmitting ant...
  • 2 篇 relays
  • 2 篇 human computer i...
  • 2 篇 application soft...
  • 2 篇 three-dimensiona...
  • 2 篇 antenna radiatio...
  • 2 篇 security of data
  • 2 篇 random access st...
  • 2 篇 telecommunicatio...
  • 2 篇 antenna phased a...
  • 2 篇 data mining
  • 2 篇 computer graphic...
  • 2 篇 wireless sensor ...
  • 2 篇 decoding
  • 2 篇 protocols
  • 2 篇 mobile communica...
  • 2 篇 multiaccess comm...
  • 2 篇 malware
  • 2 篇 interpolation

机构

  • 4 篇 div. of computer...
  • 3 篇 div. of systems ...
  • 3 篇 dept. of electro...
  • 2 篇 mobile developme...
  • 2 篇 dept. of mechani...
  • 2 篇 div. of electron...
  • 2 篇 department of co...
  • 2 篇 mobile telecommu...
  • 2 篇 eislab dept. of ...
  • 2 篇 interdisciplinar...
  • 2 篇 transport soluti...
  • 2 篇 dept. of electro...
  • 2 篇 div. of human me...
  • 2 篇 electrical engin...
  • 2 篇 crrc dalian co. ...
  • 2 篇 rolling-stock el...
  • 2 篇 fuchu operations...
  • 1 篇 energy res grp o...
  • 1 篇 departments of n...
  • 1 篇 div. of informat...

作者

  • 4 篇 carlson johan e.
  • 4 篇 kim soohan
  • 4 篇 shin dongil
  • 4 篇 im eul gyu
  • 4 篇 shin dongkyoo
  • 2 篇 cho dong-ho
  • 2 篇 lee s.h.
  • 2 篇 park j.h.
  • 2 篇 jeong h.s.
  • 2 篇 hwang y.n.
  • 2 篇 kim kinam
  • 2 篇 oh j.h.
  • 2 篇 kim taehyun
  • 2 篇 kim y.t.
  • 2 篇 jiang biao
  • 2 篇 ryoo k.c.
  • 2 篇 l. gastaldi
  • 2 篇 maier-hein lena
  • 2 篇 ahn s.j.
  • 2 篇 chung wan-young

语言

  • 101 篇 英文
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Div. of Computer and Electronics Systems Engineering"
104 条 记 录,以下是31-40 订阅
排序:
Evaluation of ultrasonic vibration energy for copper-to-copper bonding by flip-chip bonding technology
Evaluation of ultrasonic vibration energy for copper-to-copp...
收藏 引用
International Conference on electronics Packaging
作者: Yoshiyuki Arai Yoshinori Miyamoto Masatsugu Nimura Hajime Tomokage Research and Development Div. Toray Engineering Co.Ltd. Department of Electronics Engineering and Computer Science Fukuoka University
The ultrasonic vibration energy for Cu-Cu bonding by flip-chip bonding technology was evaluated in ambient air. Transmissibility of ultrasonic vibration is assumed to be different in bump structure with height or low ... 详细信息
来源: 评论
Bosf: By-owner script filtering  3
Bosf: By-owner script filtering
收藏 引用
3rd International Conference on Digital Information Processing and Communications, ICDIPC 2013
作者: Kim, Jungtae Han, Kyoung-Soo Jiang, Biao Im, Eul Gyu Dept. of Electronics and Computer Engineering Hanyang University Seoul Korea Republic of Div. of Computer Science and Engineering Hanyang University Seoul Korea Republic of
Cross-Site Scripting (XSS) attacks are one of the most prevalent security threats all over the world. Although various defense methods have been proposed, most of them lack usability. Motivated by this reason, we pres... 详细信息
来源: 评论
How to violate android's permission system without violating it  3
How to violate android's permission system without violating...
收藏 引用
3rd International Conference on Digital Information Processing and Communications, ICDIPC 2013
作者: Han, Kyoung Soo Lee, Yeoreum Jiang, Biao Im, Eul Gyu Dept. of Electronics and Computer Engineering Hanyang University Seoul Korea Republic of Div. of Computer Science and Engineering Hanyang University Seoul Korea Republic of
Android uses permissions for application security management. Android also allows inter-application communication (IAC) which enables cooperation between different applications to perform complex tasks and is a major ... 详细信息
来源: 评论
Design of a self-tuning PID controller for multivariable coupled processes using a discrete inversed decoupler
IEEJ Transactions on Electronics, Information and Systems
收藏 引用
IEEJ Transactions on electronics, Information and systems 2014年 第9期134卷 1235-1240页
作者: Tsubata, Hajime Wakitani, Shin Nakamoto, Masayoshi Yamamoto, Toru Dept.of System Cybernetics Graduate School of Engineering Hiroshima University 1-4-1 Kagamiyama Higashi-Hiroshima739-8527 Japan Department of Electrical and Electronics Engineering Tokyo University of Agriculture and Technology 2-24-16 Nakacho Koganei-shi Tokyo184-8588 Japan Div. of Electrical Systems and Mathematical Engineering Hiroshima University 1-4-1 Kagamiyama Higashi-Hiroshima739-8527 Japan
In many industrial systems, the multivariable system which has mutual interference has to be dealt with. Therefore, decoupling the multivariable system is an important issue to construct a control system. Although var... 详细信息
来源: 评论
A classifier algorithm exploiting user's environmental context and bio-signal for U-home services
收藏 引用
8th International Conference on Grid and Pervasive Computing, GPC 2013
作者: Lee, HyunJu Shin, DongIl Shin, Dongkyoo Kim, SooHan Department of Computer Engineering Sejong University Seoul Korea Republic of Visual Display Div. R and D Team SAMSUNG Electronics Co. HQ Suwon Korea Republic of
U-Home is a home-service through an interaction between human and object. Smart-home-middle-wear provides its users with services needed through interactions between users and home equipment. In this study, users'... 详细信息
来源: 评论
Malware classification method via binary content comparison  12
Malware classification method via binary content comparison
收藏 引用
2012 ACM Research in Applied Computation Symposium, RACS 2012
作者: Kang, Boojoong Kim, Taekeun Kwon, Heejun Choi, Yangseo Im, Eul Gyu Dept. of Electronics and Computer Engineering Hanyang University Seoul Korea Republic of Cyber Convergence Security Research Division ETRI Daejeon Korea Republic of Div. of Computer Science and Engineering Hanyang University Seoul Korea Republic of
With the wide spread uses of the Internet, the number of Internet attacks keeps increasing, and malware is the main cause of most Internet attacks. Malware is used by attackers to infect normal users' computers an... 详细信息
来源: 评论
Genetic regulatory network identification using monotone functions decomposition
Genetic regulatory network identification using monotone fun...
收藏 引用
作者: Julius, A. Agung Belta, Calin Dept. Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute Troy NY United States Dept. Mechanical Engineering Div. Systems Engineering Boston University Boston MA United States
We present a method for identification of gene regulatory network topology using a time series of gene expression data. The underlying assumption in our method is that the functions that describe regulatory relations ... 详细信息
来源: 评论
Detecting the vulnerability of software with cyclic behavior using Sulley
Detecting the vulnerability of software with cyclic behavior...
收藏 引用
7th International Conference on Information Processing and Management, ICIPM 2011
作者: Lee, Hye-Ryun Shin, Seung-Hun Choi, Kyung-Hee Chung, Ki-Hyun Park, Seung-Kyu Choi, Jun-Yong Dept. of Computer Engineering Ajou University Korea Republic of Div. of Information and Computer Engineering Ajou University Korea Republic of Dept. of Electronics Engineering Ajou University Korea Republic of RandD Department National Security Research Institute Cyber Technology Korea Republic of
Sulley, one of fuzzing tools can describe Software Under Test (SUT) more easily than other tools and provides with the libraries which can create the variety of test cases. But it has a weak point of difficulty to ver... 详细信息
来源: 评论
All-fiber common-path Fourier-domain optical coherence tomography moving 2-axis based on active surface tracking algorithm
All-fiber common-path Fourier-domain optical coherence tomog...
收藏 引用
2011 3rd International Conference on Awareness Science and Technology, iCAST 2011
作者: Song, C.G. Kim, K.S. Kim, M.H. Ryu, S.H. Seo, J.H. Kang, J.U. Div. of Electronics Eng. Chonbuk Natl. Univ. Korea Republic of Dept. of Rehabilitation Med. Chonbuk Natl. Univ. Hospital Korea Republic of Dept. of Electrical and Computer Engineering Johns Hopkins Univ. United States
Conventional optical coherence tomography (OCT) systems generally have a limited imaging range within a depth of only 1-2 mm and suffers from unwanted noise such as speckle, ghost or mirror noise. To overcome these li... 详细信息
来源: 评论
Design and implementation of smart driving system using context recognition system
Design and implementation of smart driving system using cont...
收藏 引用
IEEE Symposium on computers and Informatics
作者: Shin, Dongil Kim, Taehyun Kim, Soohan Shin, Dongkyoo Department of Computer Engineering Sejong University Korea 98 Kunja-Dong Kwanjin-Gu 143-747 Seoul Korea Republic of Div. Internet Infra Planning Team Samsung Electronics CO. LTD NW 416 Metan-3 dong Yeongtong-gu Suwon-city Korea Republic of
In this paper, we develop a context recognition system that is based on multimodal biometric signals and applicable to smart driving system. The context recognition system includes a biometric analysis module that ana... 详细信息
来源: 评论