咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,230 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,620 篇 计算机科学与技术...
    • 1,363 篇 软件工程
    • 386 篇 信息与通信工程
    • 318 篇 控制科学与工程
    • 226 篇 生物工程
    • 180 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 157 篇 机械工程
    • 130 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 955 篇 理学
    • 530 篇 数学
    • 250 篇 生物学
    • 238 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 70 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 187 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 110 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 52 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 66 篇 software
  • 64 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 53 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,049 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3247 条 记 录,以下是3071-3080 订阅
排序:
Agent Design Patterns Framework for MaSE/POAD Methodology
Agent Design Patterns Framework for MaSE/POAD Methodology
收藏 引用
ACS/IEEE International Conference on computer Systems and Applications
作者: R. Mohamad S. Deris H.H. Ammar Software Engineering Department Faculty of Computer Science and Information System Universiti Teknologi Malaysia Johor Malaysia Computer Science and Electrical Engineering Department West Virginia University Morgantown WV USA
来源: 评论
Simplification and analysis of transitive trust networks
收藏 引用
Web Intelligence and Agent Systems 2006年 第2期4卷 139-161页
作者: Jøsang, Audun Gray, Elizabeth Kinateder, Michael School of Software Engineering and Data Communications Queensland University of Technology Australia Computer Science Department Trinity College Dublin Ireland Institute of Parallel and Distributed Systems Faculty of Computer Science University of Stuttgart Germany
When transacting and interacting through open computer networks, traditional methods used in the physical world for establishing trust can no longer be used. Creating virtual network substitutes with which people, org... 详细信息
来源: 评论
Securing UML information flow using flowUML
Securing UML information flow using flowUML
收藏 引用
作者: Alghathbar, Khaled Farkas, Csilla Wijesekera, Duminda Information Systems Department College of Computer and Information Sciences King Saud University P.O. Box 51178 Riyadh 11543 Saudi Arabia Information Security Laboratory Dept. of Computer Science and Engineering University of South Carolina Columbia SC 29208 Dept. of Information and Software Engineering CSIS George Mason University Fairfax VA 22030 Faculty of Information Systems Kind Saud University Riyadh Saudi Arabia Department of Computer Science and Engineering University of South Carolina Columbia Department of Information and Software Engineering George Mason University Fairfax VA George Mason University
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against ... 详细信息
来源: 评论
Automatic Transformation of Electronic Documents into Reusable Learning Objects: New Approach Based on Artificial Neural Networks
Automatic Transformation of Electronic Documents into Reusab...
收藏 引用
International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA
作者: K. Ajami S. Elias V. Aarar M. Osman W. Hejazi H. Khayyat Computer Science Department Higher Institute of Applied Science and Technology (HIAST) Damascus Syria Faculty of Information Technology Software Engineering Department University of Damascus Damascus Syria
The aim of this paper is to introduce a new approach which describes an automatic transformation process of electronic flat documents (HTML document for example), into reusable learning objects. Thus, the transformed ... 详细信息
来源: 评论
New approach to complexity reduction of intra prediction in advanced multimedia compression
New approach to complexity reduction of intra prediction in ...
收藏 引用
ICCSA 2006: International Conference on Computational science and Its Applications
作者: Yu, Mei Jiang, Gangyi Li, Shiping Li, Fucui Choi, Tae-Young Faculty of Information Science and Engineering Ningbo University Ningbo 315211 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China Institute of Computer Technology Graduate School Chinese Academy of Sciences Beijing 100871 China Division of Electronics Engineering Ajou University Suwon 442-749 Korea Republic of
H.264 is the new multimedia compression standard developed by VCEG and MPEG. In order to maximize the compression performance, H.264 adopts RDO mode decision techniques at the cost of very remarkable computational com... 详细信息
来源: 评论
Multi-institutional teaching communities in computer education
Conferences in Research and Practice in Information Technolo...
收藏 引用
Conferences in Research and Practice in Information Technology Series 2006年 52卷 7-10页
作者: Fincher, Sally Lister, Raymond Pears, Arnold Sheard, Judy Tenenberg, Josh Young, Alison Computing Laboratory University of Kent United Kingdom Faculty of Information Technology University of Technology Sydney Australia Dept of Information Technology Uppsala University Sweden School of Computer Science and Software Engineering Monash University Australia Computing and Software Systems Institute of Technology University of Washington United States Computing and Information Technology Unitec Auckland New Zealand
来源: 评论
Evaluation of handoff algorithms using a call quality measure with signal based penalties
Evaluation of handoff algorithms using a call quality measur...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: M.N. Halgamuge K. Ramamohanarao H.L. Vu M. Zukerman Department of Electrical and Electronic Engineering Australia Department of Computer Science and Software Engineering RC Special Research Centre for Ultra-Broadband Information Networks University of Melbourne VIC Australia Centre for Advanced Internet Architectures Faculty of I.C.T Swinburne University of Technology VIC Australia
This paper proposes a new call quality measure based on mobile signal strength measurements to evaluate performance of handoff algorithms in wireless cellular networks. The proposed measure allows the quantification o... 详细信息
来源: 评论
Multi-institutional teaching communities in computer education  06
Multi-institutional teaching communities in computer educati...
收藏 引用
ACM SIGCSE-SIGCUE Technical Symposium on computer science and Education
作者: Sally Fincher Raymond Lister Arnold Pears Judy Sheard Josh Tenenberg Alison Young Computing Laboratory University of Kent United Kingdom Faculty of Information Technology University of Technology Sydney Australia Dept of Information Technology Uppsala University Sweden School of Computer Science and Software Engineering Monash University Australia Computing and Software Systems Institute of Technology University of Washington United States of America Computing and Information Technology Unitec Auckland New Zealand
来源: 评论
Visualization of cluster changes by comparing self-organizing maps
收藏 引用
9th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2005
作者: Denny Squire, David McG. Faculty of Computer Science University of Indonesia Indonesia School of Computer Science and Software Engineering Faculty of Information Technology Monash University Australia
In this paper we introduce Self-Organizing Map-based techniques that can reveal structural cluster changes in two related data sets from different time periods in a way that can explain the new result in relation to t... 详细信息
来源: 评论
Meeting the Information Assurance Crisis in the U.S. Now
收藏 引用
EDPACS 2006年 第6期28卷 1-14页
作者: Corey Schou Deborah Frincke Charles Reynolds James Frost The Associate Dean of Information Systems Programs at Idaho State University (ISU) in Pocatello and the director of the Center for Decision Support. Currently he serves as the Chair of the National Colloquium on Information System Security Education. Schou also directs the ISU National Center of Excellence in Information Assurance Education and the ISU Technology Innovation Center. Contact Corey Schou one of the authors of this article and the Chair of the NCISSE by email at Schou@*** for help in finding additional ways to address the issues raised in this article. A member of the University of Idaho College of Engineering faculty. She graduated from the University of California at Davis. Frincke is the co-director and co-founder of the university's Center for Secure and Dependable Software (CSDS). She was the program chair for the 2nd International Workshop on Recent Advances in Intrusion Detection (RAID). A professor of Computer Science at the College of Integrated Science and Technology at James Madison University in Harrisonburg Virginia. He holds a Ph.D. in computer science from the University of Texas at Austin and a BA in philosophy from the University of Houston. Reynolds is the Director of Information System Security Education at James Madison University. Since 1997 Reynolds has led the development of the first remote Internet-based curriculum that leads to an M.S. degree in computer science with a concentration in information security. Thus far 160 students have completed this program. A professor of computer information systems at Idaho State University and the manager of its Simplot Decision Support Center.
T he only difference etween evolution and revolution is the speed at which each occurs.
来源: 评论