咨询与建议

限定检索结果

文献类型

  • 341 篇 会议
  • 192 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 200 篇 计算机科学与技术...
    • 172 篇 软件工程
    • 60 篇 控制科学与工程
    • 56 篇 信息与通信工程
    • 40 篇 生物工程
    • 33 篇 机械工程
    • 26 篇 生物医学工程(可授...
    • 23 篇 光学工程
    • 19 篇 土木工程
    • 19 篇 化学工程与技术
    • 18 篇 电气工程
    • 18 篇 电子科学与技术(可...
    • 14 篇 安全科学与工程
    • 13 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 12 篇 建筑学
  • 180 篇 理学
    • 79 篇 数学
    • 55 篇 生物学
    • 45 篇 系统科学
    • 26 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 16 篇 化学
  • 68 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 36 篇 医学
    • 30 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 15 篇 农学
    • 10 篇 作物学
  • 11 篇 法学
  • 8 篇 经济学
  • 8 篇 教育学
  • 4 篇 军事学
  • 3 篇 文学

主题

  • 26 篇 computer science
  • 15 篇 software enginee...
  • 13 篇 software
  • 12 篇 protocols
  • 11 篇 control systems
  • 11 篇 routing protocol...
  • 10 篇 analytical model...
  • 10 篇 machine learning
  • 10 篇 accuracy
  • 9 篇 routing
  • 9 篇 mobile ad hoc ne...
  • 9 篇 data mining
  • 9 篇 monitoring
  • 9 篇 predictive model...
  • 9 篇 robustness
  • 8 篇 educational inst...
  • 8 篇 wireless sensor ...
  • 8 篇 performance anal...
  • 8 篇 artificial intel...
  • 8 篇 testing

机构

  • 39 篇 beijing key labo...
  • 28 篇 school of electr...
  • 22 篇 seventh research...
  • 10 篇 division of rese...
  • 9 篇 lovely professio...
  • 9 篇 school of electr...
  • 8 篇 department of co...
  • 8 篇 seventh research...
  • 8 篇 division of info...
  • 7 篇 department of co...
  • 7 篇 kkr and ksr inst...
  • 6 篇 kkr and ksr inst...
  • 6 篇 division of scie...
  • 6 篇 division of info...
  • 6 篇 the seventh rese...
  • 6 篇 university of si...
  • 6 篇 department of so...
  • 5 篇 division of neph...
  • 5 篇 national enginee...
  • 5 篇 the seventh rese...

作者

  • 44 篇 yingmin jia
  • 41 篇 junping du
  • 24 篇 fashan yu
  • 16 篇 mohammad s. obai...
  • 12 篇 sanjay k. dhuran...
  • 9 篇 deyuan meng
  • 9 篇 shiying yuan
  • 8 篇 obaidat mohammad...
  • 7 篇 jun zhang
  • 7 篇 dhurandher sanja...
  • 6 篇 isaac woungang
  • 6 篇 wenling li
  • 6 篇 azka mir
  • 6 篇 pei yan
  • 6 篇 rehman attique u...
  • 6 篇 attique ur rehma...
  • 6 篇 mir azka
  • 6 篇 azzam mourad
  • 6 篇 im eul gyu
  • 5 篇 junkeun song

语言

  • 517 篇 英文
  • 18 篇 其他
  • 5 篇 中文
  • 1 篇 日文
检索条件"机构=Division of Computer Science and Software Engineering"
541 条 记 录,以下是311-320 订阅
排序:
MOCLO: A Cloud Framework for Mobile Devices
MOCLO: A Cloud Framework for Mobile Devices
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Akash Gangil Sanjay K. Dhurandher Mohammad S. Obaidat Vijit Singh Sushant Bhatia Department of Computer Engineering University of Delhi New Delhi India Division of Information Technology University of Delhi New Delhi India Department of Computer Science & Software Engineering Monmouth University NJ USA
With the advent of smartphones, mobile-devices have evolved as powerful mini-computers. However, they still suffer from two intrinsic shortcomings, namely limited battery-power and inferior processors compared to thei... 详细信息
来源: 评论
EDITORIAL
收藏 引用
INTELLIGENT BUILDINGS INTERNATIONAL 2013年 第2期5卷 67-68页
作者: Clements-Croome, Derek Computer Science Department Escuela Politecnica Superior Universidad Autonoma de Madrid C/Francisco Tomás y Valiente 28049 Madrid Spain Software Engineering Department Faculty of Automatics Computers and Electronics University of Craiova Bvd. Decebal 107 200440 Craiova Romania Applied Research Laboratory Information Science and Technology Division Pennsylvania State University 204 V Applied Science Building University Park PA 16802 United States Systems Engineering Section Faculty of Technology Policy and Management Delft University of Technology Jaffalaan 5 2628BX Delft Netherlands
Click to increase image sizeClick to decrease image size
来源: 评论
Trust-based Security Protocol against blackhole attacks in opportunistic networks
Trust-based Security Protocol against blackhole attacks in o...
收藏 引用
IEEE International Conference on Wireless and Mobile Computing, Networking And Communications (WiMob)
作者: Sahil Gupta Sanjay Kumar Dhurandher Isaac Woungang Arun Kumar Mohammed S. Obaidat Division of Computer Engineering University of Delhi Delhi India Department of Computer Science Ryerson University Toronto Ontario Canada CAITFS University of Delhi Delhi India Department of Computer Science and Software Engineering Monmouth University W. L. Branch NJ USA
Opportunistic networks (Oppnets) are a kind of wireless networks that provide the opportunity to have social interaction and obtain data that can be used for message passing decision. The increase observed in the numb... 详细信息
来源: 评论
Creating a program and research a cryptosystem on the basis of Cardan grille
Creating a program and research a cryptosystem on the basis ...
收藏 引用
International Conference on Informatics & Applications (ICIA)
作者: Irbulat Utepbergenov Janna Kuandykova Tamerlan Mussin Sholpan Sagyndykova Department of Computer Science and Information Systems Kazakh Academy of Transport and Communications Almaty Kazakhstan Department of Computer and Software Engineering Turan University Almaty Kazakhstan Division of Research and Cooperation Caspian University of Technologies and Engineering Aktay Kazakhstan
Considered cryptosystems such as Cardano square lattices are characterized by the high-speed encryption in use today Enhanced Programming computers. This is because the number of different variants rapidly increases w... 详细信息
来源: 评论
Reduced-Complexity Adaptive Multi-Channel Assignment for Shared Access Points in Over-Loaded Small-Cell Networks
Reduced-Complexity Adaptive Multi-Channel Assignment for Sha...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Redha M. Radaydeh Khalid A. Qaraqe Mohamed-Slim Alouini Department of Electrical and Software Engineering Alfaisal University Riyadh Kingdom of Saudi Arabia Department of Electrical and Computer Engineering Education City Doha Qatar Division of Computer King Abdullah University of Science and Technology (KAUST) Thuwal Makkah Province Kingdom of Saudi Arabia
This paper proposes a reduced-complexity downlink multi-channel assignment scheme when feedback links are capacity-limited. The system model treats the case when multiple access points are allocated to serve scheduled... 详细信息
来源: 评论
An agent-based simulation study of a complex adaptive collaboration network  13
An agent-based simulation study of a complex adaptive collab...
收藏 引用
Simulation Winter Conference
作者: Özgür Özmen Jeffrey Smith Levent Yilmaz Computational Sciences and Engineering Division Oak Ridge National Laboratory Oak Ridge TN USA Industrial and Systems Engineering Auburn University Auburn AL USA Computer Science and Software Engineering Auburn University Auburn AL USA
One of the most significant problems in organizational scholarship is to discern how social collectives govern, organize, and coordinate the actions of individuals to achieve collective outcomes. The collectives are u... 详细信息
来源: 评论
Of Massive Static Analysis Data
Of Massive Static Analysis Data
收藏 引用
IEEE International Conference on software Security and Reliability Companion
作者: Aurelien Delaitre Vadim Okun Elizabeth Fong Dept. of Computer Science and Electrical Engineering West Virginia University Morgantown WV 26506 USA Software and Systems Division IT Laboratory National Institute of Standards and Technology Gaithersburg MD 20899 USA
The software Assurance Metrics and Tool Evaluation (SAMATE) project at the National Institute of Standards and Technology (NIST) has organized four Static Analysis Tool Expositions (SATE). SATE is designed to advance ... 详细信息
来源: 评论
A light-weight defect classification scheme for embedded automotive software and its initial evaluation
A light-weight defect classification scheme for embedded aut...
收藏 引用
2012 IEEE 23rd International Symposium on software Reliability engineering, ISSRE 2012
作者: Mellegård, Niklas Staron, Miroslaw Törner, Fredrik Software Engineering Division Department of Computer Science and Engineering Chalmers University of Technology Sweden Software Engineering Division Department of Computer Science and Engineering University of Gothenburg Sweden Volvo Car Corporation Sweden
Objective: Defect classification is an essential part of software development process models as a means of early identification of patterns in defect inflow profiles. Such classification, however, may often be a tedio... 详细信息
来源: 评论
An implementation of a multi-site virtual cluster cloud
An implementation of a multi-site virtual cluster cloud
收藏 引用
International Joint Conference on computer science and software engineering (JCSSE)
作者: Pongsakorn U-chupala Putchong Uthayopas Kohei Ichikawa Susumu Date Hirotake Abe High Performance Computing and Networking Center Department of Computer Engineering Faculty of Engineering Kasetsart University Bangkok Thailand Software Design & Analysis Laboratory Graduate School of Information Science NAIST Nara Japan Cybermedia Center Osaka University Osaka Japan Division of Information Science Graduate School of Systems and Information Engineering University of Tsukuba Ibaragi Japan
The use of virtual cluster for High Performance Computing (HPC) work has a great benefit of hiding the complexity of physical infrastructure while providing a familiar HPC environment for users. Nevertheless, setting ... 详细信息
来源: 评论
SIM: A smartphone-based identity management framework and its application to Arkansas trauma image repository
SIM: A smartphone-based identity management framework and it...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Mengjun Xie Umit Topaloglu Thomas Powell Chao Peng Jiang Bian Department of Computer Science University of Arkansas at Little Rock Little Rock AR USA Division of Biomedical Informatics University of Arkansas for Medical Sciences Little Rock AR USA Software Engineering Institute East China Normal University Shanghai China
Secure and convenient user identity management is particularly important to the success of EMR, EHR, and PHR systems. Unfortunately, widely-used identity management mechanisms that solely rely on username/password are... 详细信息
来源: 评论