咨询与建议

限定检索结果

文献类型

  • 341 篇 会议
  • 194 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 543 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 200 篇 计算机科学与技术...
    • 172 篇 软件工程
    • 60 篇 控制科学与工程
    • 56 篇 信息与通信工程
    • 40 篇 生物工程
    • 33 篇 机械工程
    • 26 篇 生物医学工程(可授...
    • 23 篇 光学工程
    • 19 篇 土木工程
    • 19 篇 化学工程与技术
    • 18 篇 电气工程
    • 18 篇 电子科学与技术(可...
    • 14 篇 安全科学与工程
    • 13 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 12 篇 建筑学
  • 180 篇 理学
    • 79 篇 数学
    • 55 篇 生物学
    • 45 篇 系统科学
    • 26 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 16 篇 化学
  • 68 篇 管理学
    • 43 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 36 篇 医学
    • 30 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 15 篇 农学
    • 10 篇 作物学
  • 11 篇 法学
  • 8 篇 经济学
  • 8 篇 教育学
  • 4 篇 军事学
  • 3 篇 文学

主题

  • 26 篇 computer science
  • 15 篇 software enginee...
  • 13 篇 software
  • 12 篇 protocols
  • 11 篇 control systems
  • 11 篇 machine learning
  • 11 篇 routing protocol...
  • 10 篇 analytical model...
  • 10 篇 accuracy
  • 9 篇 routing
  • 9 篇 mobile ad hoc ne...
  • 9 篇 data mining
  • 9 篇 monitoring
  • 9 篇 predictive model...
  • 9 篇 robustness
  • 8 篇 deep learning
  • 8 篇 educational inst...
  • 8 篇 wireless sensor ...
  • 8 篇 performance anal...
  • 8 篇 artificial intel...

机构

  • 39 篇 beijing key labo...
  • 28 篇 school of electr...
  • 22 篇 seventh research...
  • 10 篇 division of rese...
  • 9 篇 lovely professio...
  • 9 篇 school of electr...
  • 8 篇 department of co...
  • 8 篇 seventh research...
  • 8 篇 division of info...
  • 7 篇 department of co...
  • 7 篇 kkr and ksr inst...
  • 6 篇 kkr and ksr inst...
  • 6 篇 division of scie...
  • 6 篇 division of info...
  • 6 篇 the seventh rese...
  • 6 篇 university of si...
  • 6 篇 department of so...
  • 5 篇 division of neph...
  • 5 篇 national enginee...
  • 5 篇 the seventh rese...

作者

  • 44 篇 yingmin jia
  • 41 篇 junping du
  • 24 篇 fashan yu
  • 16 篇 mohammad s. obai...
  • 12 篇 sanjay k. dhuran...
  • 9 篇 deyuan meng
  • 9 篇 shiying yuan
  • 8 篇 obaidat mohammad...
  • 7 篇 jun zhang
  • 7 篇 dhurandher sanja...
  • 6 篇 isaac woungang
  • 6 篇 wenling li
  • 6 篇 azka mir
  • 6 篇 pei yan
  • 6 篇 rehman attique u...
  • 6 篇 attique ur rehma...
  • 6 篇 mir azka
  • 6 篇 azzam mourad
  • 6 篇 im eul gyu
  • 5 篇 junkeun song

语言

  • 519 篇 英文
  • 18 篇 其他
  • 5 篇 中文
  • 1 篇 日文
检索条件"机构=Division of Computer Science and Software Engineering"
543 条 记 录,以下是381-390 订阅
排序:
The design of real-time adaptive forensically sound secure critical infrastructure
The design of real-time adaptive forensically sound secure c...
收藏 引用
International Conference on Network and System Security
作者: Hunt, Ray Slay, Jill Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand Department of Research Division IT Engineering and the Environment University of South Australia Australia
Network security design has seen significant advances in recent years. This has been demonstrated by a growing number of new encryption algorithms, more intelligent firewall and intrusion detection techniques, new dev... 详细信息
来源: 评论
Minimizing the operational cost of chemical sensor networks
Minimizing the operational cost of chemical sensor networks
收藏 引用
2010 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010
作者: Karunasekera, Shanika Skvortsov, Alex Gunatilaka, Ajith Department of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia HPP Division Defence Science and Technology Organisation 506 Lorimer Street Fishermans Bend VIC 3207 Australia
Minimizing the sensing activity during the pre-attack phase while meeting the performance requirements is critical for reducing the operational costs of chemical sensor networks. In this paper, we present a formal pro... 详细信息
来源: 评论
The effect of correlation of chemical tracers on chemical sensor network performance
The effect of correlation of chemical tracers on chemical se...
收藏 引用
2010 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010
作者: Mendis, Champake Gunatilaka, Ajith Skvortsov, Alex Karunasekera, Shanika Department of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia HPP Division Defence Science and Technology Organisation 506 Lorimer Street Fishermans Bend VIC 3207 Australia
Chemical sensor networks are used to detect the presence of hazardous chemicals released intentionally or accidentally into the atmosphere. Although many performance attributes of chemical sensor networks, such as ene... 详细信息
来源: 评论
An efficient and secure routing protocol for wireless sensor networks using multicasting
An efficient and secure routing protocol for wireless sensor...
收藏 引用
IEEE International Conference on Green Computing and Communications
作者: Dhurandher, Sanjay K. Obaidat, Mohammad S. Jain, Gaurav Ganesh, Isha Mani Shashidhar, Vinay Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science and Software Engineering Monmouth University NJ United States Division of Computer Engineering Netaji Subhas Institute of Technology University of Delhi New Delhi India
Recent technological advancements in the field of nanotechnology have increased the computation power of the wireless nodes while adhering to the energy constraints. This has made the use of the Wireless Sensor Networ... 详细信息
来源: 评论
Putting the software radio on a low-calorie diet
Putting the software radio on a low-calorie diet
收藏 引用
9th ACM SIGCOMM Workshop on Hot Topics in Networks, HotNets-9
作者: Dutta, Prabal Kuo, Ye-Sheng Ledeczi, Akos Schmid, Thomas Volgyesi, Peter Computer Science and Engineering Division University of Michigan Ann Arbor MI 48109 United States Institute for Software Integrated Systems Vanderbilt University Nashville TN 37235 United States
Modern software-defined radios are large, expensive, and power-hungry devices and this, we argue, hampers their more widespread deployment and use, particularly in low-power, size-constrained application settings like... 详细信息
来源: 评论
A decentralized dynamic sensor activation protocol for chemical sensor networks
A decentralized dynamic sensor activation protocol for chemi...
收藏 引用
2010 9th IEEE International Symposium on Network Computing and Applications, NCA 2010
作者: Karunasekera, Shanika Mendis, Champake Skvortsov, Alex Gunatilaka, Ajith Department of Computer Science and Software Engineering University of Melbourne Melbourne VIC 3010 Australia Human Protection and Performance Division Defence Science and Technology Organisation Fishermans Bend 506 Lorimer Street VIC 3207 Australia
Due to the significant amount of energy consumed by chemical sensors for sensing, reducing sensing activity is critical for improving the lifespan of chemical sensor networks. In this paper, we consider a simple decen... 详细信息
来源: 评论
A distributed eResearch tool for evaluating source backtracking algorithms
A distributed eResearch tool for evaluating source backtrack...
收藏 引用
2010 6th IEEE International Conference on e-science, escience 2010
作者: Karunasekera, Shanika Beaton, John Dimech, Adrian Skvortsov, Alex Gunatilaka, Ajith Department of Computer Science and Software Engineering University of Melbourne Melbourne VIC 3010 Australia Human Protection and Performance Division Defence Science and Technology Organisation 506 Lorimer Street Fishermans Bend VIC 3207 Australia
This paper presents an eResearch tool for evaluating and comparing Chemical, Biological, Radiological and Nuclear (CBRN) source-backtracking algorithms. The tool enables users to define a CBRN threat scenario to be si... 详细信息
来源: 评论
Alerts analysis and visualization in network-based intrusion detection systems
Alerts analysis and visualization in network-based intrusion...
收藏 引用
IEEE International Conference on Social Computing
作者: Yang, Li Gasior, Wade Katipally, Rajeshwar Cui, Xiaohui Department of Computer Science and Engineering Univeristy of Tennessee at Chattanooga Chattanooga TN 37403 United States Applied Software Engineering Research Group Computational Sciences and Engineering Division Oak Ridge National Laboratory Oak Ridge TN 37831 United States
The alerts produced by network-based intrusion detection systems, e.g. Snort, can be difficult for network administrators to efficiently review and respond to due to the enormous number of alerts generated in a short ... 详细信息
来源: 评论
Feedback iterative learning control for time-delay systems based on 2D analysis approach
收藏 引用
控制理论与应用(英文版) 2010年 第4期8卷 457-463页
作者: Deyuan MENG Yingmin JIA Junping DU Shiying YUAN The Seventh Research Division Beihang University Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan 454000 China
This paper deals with the iterative learning control (ILC) design for multiple-input multiple-output (MIMO),time-delay systems (TDS).Two feedback ILC schemes are considered using the so-called two-dimensional ... 详细信息
来源: 评论
Network layer based secure routing protocol for wireless ad hoc sensor networks in urban environments
Network layer based secure routing protocol for wireless ad ...
收藏 引用
作者: Dhurandher, Sanjay K. Obaidat, Mohammad S. Gupta, Deepank Gupta, Nidhi Asthana, Anupriya Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science and Software Engineering Monmouth University NJ United States
Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages.... 详细信息
来源: 评论