咨询与建议

限定检索结果

文献类型

  • 528 篇 会议
  • 286 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 832 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 515 篇 工学
    • 395 篇 计算机科学与技术...
    • 331 篇 软件工程
    • 92 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 53 篇 生物工程
    • 50 篇 生物医学工程(可授...
    • 41 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 33 篇 机械工程
    • 27 篇 光学工程
    • 24 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 建筑学
    • 15 篇 交通运输工程
  • 235 篇 理学
    • 127 篇 数学
    • 66 篇 物理学
    • 66 篇 生物学
    • 48 篇 统计学(可授理学、...
    • 37 篇 系统科学
    • 17 篇 化学
  • 171 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 52 篇 工商管理
  • 48 篇 医学
    • 42 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 22 篇 药学(可授医学、理...
  • 25 篇 法学
    • 20 篇 社会学
  • 13 篇 经济学
  • 11 篇 农学
  • 9 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 25 篇 deep learning
  • 24 篇 software enginee...
  • 23 篇 machine learning
  • 18 篇 artificial intel...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 16 篇 software testing
  • 12 篇 computer science
  • 12 篇 data mining
  • 12 篇 feature extracti...
  • 11 篇 computer communi...
  • 11 篇 computers
  • 11 篇 mathematical mod...
  • 10 篇 optimization
  • 10 篇 monitoring
  • 10 篇 software
  • 9 篇 internet of thin...
  • 9 篇 surveys
  • 9 篇 reliability
  • 9 篇 servers

机构

  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 11 篇 faculty of compu...
  • 10 篇 department of so...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 department of co...
  • 8 篇 dept. of technol...
  • 8 篇 itmo university ...
  • 8 篇 university of re...
  • 7 篇 faculty of infoc...
  • 6 篇 saint-petersburg...
  • 6 篇 department of ap...
  • 6 篇 gamf faculty of ...

作者

  • 19 篇 zamli kamal z.
  • 12 篇 ahmed bestoun s.
  • 12 篇 noraziah ahmad
  • 10 篇 ahmad noraziah
  • 9 篇 herawan tutut
  • 8 篇 bei zeng
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 jasni mohamad za...
  • 8 篇 zhengfeng ji
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 din fakhrud
  • 7 篇 usama arshad
  • 7 篇 omatu s.
  • 7 篇 arshad usama
  • 7 篇 sidek roslina mo...
  • 7 篇 mohamad m.s.

语言

  • 799 篇 英文
  • 26 篇 其他
  • 5 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Systems Itmo University"
832 条 记 录,以下是641-650 订阅
排序:
Multi-level controlled signature  13th
Multi-level controlled signature
收藏 引用
13th International Workshop on Information Security Applications, WISA 2012
作者: Thorncharoensri, Pairat Susilo, Willy Mu, Yi School of Computer Science & Software Engineering University of Wollongong Australia Department of Information Systems Faculty of Business City University of Hong Kong Hong Kong
In this work, we present and establish a new primitive called Multi-level Controlled Signature. This primitive allows a signer to specify a security level to limit the verifiability of the signature. This primitive wo... 详细信息
来源: 评论
Editorial
收藏 引用
International Journal of Bio-Inspired Computation 2013年 第4期5卷 197-198页
作者: Camacho, David Badica, Costin Bein, Doina Warnier, Martijn Computer Science Department Escuela Politecnica Superior Universidad Autonoma de Madrid C/Francisco Tomás y Valiente 28049 Madrid Spain Software Engineering Department Faculty of Automatics Computers and Electronics University of Craiova Bvd. Decebal 107 200440 Craiova Romania Applied Research Laboratory Information Science and Technology Division Pennsylvania State University 204 V Applied Science Building University Park PA 16802 United States Systems Engineering Section Faculty of Technology Policy and Management Delft University of Technology Jaffalaan 5 2628BX Delft Netherlands
来源: 评论
Intrusion Detection System Based on SVM for WLAN
收藏 引用
Procedia Technology 2012年 1卷 313-317页
作者: Muamer N. Mohammed Norrozila Sulaiman Faculty of Computer Systems and Software Engineering University Malaysia Pahang 26300 Kuantan Malaysia
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion sys... 详细信息
来源: 评论
An Improved Parameter less Data Clustering Technique based on Maximum Distance of Data and Lioyd k-means Algorithm
收藏 引用
Procedia Technology 2012年 1卷 367-371页
作者: Wan Maseri Binti Wan Mohd A.H. Beg Tutut Herawan K.F. Rabbi Faculty of Computer Systems and Software Engineering University Malaysia Pahang Gabnang-26300 Pahang Malaysia
K-means algorithm is very well-known in large data sets of clustering. This algorithm is popular and more widely used for its easy implementation and fast working. However, it is well known that in the k-means algorit... 详细信息
来源: 评论
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
DFP-growth: An efficient algorithm for mining frequent patte...
收藏 引用
3rd International Conference on Information Computing and Applications, ICICA 2012
作者: Abdullah, Zailani Herawan, Tutut Noraziah, A. Deris, Mustafa Mat Department of Computer Science University Malaysia Terengganu 21030 Kuala Terengganu Terengganu Malaysia Faculty of Computer Systems and Software Engineering University Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang Malaysia Faculty of Computer Science and Information Technology University Tun Hussein Onn Malaysia Parit Raja Batu Pahat 86400 Johor Malaysia
Mining frequent patterns in a large database is still an important and relevant topic in data mining. Nowadays, FP-Growth is one of the famous and benchmarked algorithms to mine the frequent patterns from FP-Tree data... 详细信息
来源: 评论
Cloud Computing: Architecture for Efficient Provision of Services
Cloud Computing: Architecture for Efficient Provision of Ser...
收藏 引用
International Conference on Network-Based Information systems (NBIS)
作者: Nawsher Khan A. Noraziah Tutut Herawan Elrasheed Ismail Zakira Inayat Faculty of Computer Systems and Software Engineering University Malaysia Pahang Kuantan Pahang Malaysia
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud Scheduling System, the main purpose of which is to execute jobs optimally, i... 详细信息
来源: 评论
CBARS: Cluster Based Classification for Activity Recognition systems
CBARS: Cluster Based Classification for Activity Recognition...
收藏 引用
作者: Abdallah, Zahraa Said Gaber, Mohamed Medhat Srinivasan, Bala Krishnaswamy, Shonali Centre for Distributed Systems and Software Engineering Monash University Melbourne Australia School of Computing University of Portsmouth Portsmouth Hampshire PO1 3HE United Kingdom Singapore Faculty of Computer and Information Science Ain Shams University Cairo Egypt
Activity recognition focuses on inferring current user activities by leveraging sensory data available on today's sensor rich environment. Supervised learning has been applied pervasively for activity recognition.... 详细信息
来源: 评论
A Case Analysis of IEEE 802.11 CSMA/CA Protocol via Sequence Diagrams
A Case Analysis of IEEE 802.11 CSMA/CA Protocol via Sequence...
收藏 引用
International Conference on Computational Intelligence, Modelling and Simulation (CSSIM)
作者: Mohamed Ariff Ameedeen Behzad Bordbar Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Pahang Malaysia School of Computer Science University of Birmingham Birmingham United Kingdom
Unified Modelling Language (UML) has been conferred as the de facto standard in modeling by majority in the software system development community. Among the various types of diagrams that exist under the umbrella of U... 详细信息
来源: 评论
Evaluation of dynamic conflict avoidance algorithm
Evaluation of dynamic conflict avoidance algorithm
收藏 引用
International Conference on computer Sciences and Convergence Information Technology (ICCIT)
作者: Abdehamid Abdelhadi Mansor Wan M. N. Wan Kadir Toni Anwar Hidayah Elias Department of Computer Science Faculty of Mathematical Sciences University of Khartoum Khartoum Sudan Department of Software Engineering Faculty of Computer Science & Information Systems Universiti Teknologi Malaysia Johor Malaysia
Dynamic system management may involve interaction between independent decision-making components which can lead to conflicts. Policy-based Managers Coordination (PobMC) was proposed as an adaptive framework that may h... 详细信息
来源: 评论
Threshold concepts and threshold skills in computing  12
Threshold concepts and threshold skills in computing
收藏 引用
9th Annual International Conference on International Computing Education Research, ICER 2012
作者: Sanders, Kate Boustedt, Jonas Eckerdal, Anna Mccartney, Robert Moström, Jan Erik Thomas, Lynda Zander, Carol Mathematics and Computer Science Department Rhode Island College Providence RI United States Faculty of Engineering and Sustainable Development University of Gävle Gävle Sweden Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT United States Department of Computing Science Umeå University 901 87 Umeå Sweden Department of Computer Science Aberystwyth University Aberystwyth United Kingdom Computing and Software Systems University of Washington Bothell WA United States
Threshold concepts can be used to both organize disciplinary knowledge and explain why students have difficulties at certain points in the curriculum. Threshold concepts transform a student's view of the disciplin... 详细信息
来源: 评论