咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 60 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 207 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 114 篇 工学
    • 95 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 23 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 machine learning
  • 9 篇 deep learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...
  • 4 篇 jordan universit...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 194 篇 英文
  • 13 篇 其他
检索条件"机构=Information Security and Applied Computing"
207 条 记 录,以下是201-210 订阅
排序:
A context-related vocabulary trainer in the integrated intelligent computer-assisted language learning (iiCALL) environment
A context-related vocabulary trainer in the integrated intel...
收藏 引用
14th International Conference on information Integration and Web-Based Applications and Services, iiWAS 2012
作者: Wahl, Harald Winiwarter, Werner University of Applied Sciences Technikum Wien Dept. of Information Engineering and Security Höchstädtplatz 5 1200 Vienna Austria University of Vienna Research Group Data Analytics and Computing Währinger Straße 29 1090 Vienna Austria
The Integrated Intelligent Computer-Assisted Language Learning (iiCALL) environment is a Web-based e-learning platform that enables language learning in common working environments like Web browsers or email clients. ... 详细信息
来源: 评论
The Intelligent Integrated Computer-Assisted Language Learning (iiCALL) environment: Work in progress
The Intelligent Integrated Computer-Assisted Language Learni...
收藏 引用
13th International Conference on information Integration and Web-Based Applications and Services, iiWAS2011
作者: Wahl, Harald Winiwarter, Werner University of Applied Sciences Technikum Wien Dept. of Information Engineering and Security Höchstädtplatz 5 1200 Vienna Austria University of Vienna Research Group Data Analytics and Computing Universitätsstraße 5 1010 Vienna Austria
The Intelligent Integrated Computer-Assisted Language Learning (iiCALL) environment is a Web-based platform that provides language learning being integrated in common working environments like Web browsers, Email clie... 详细信息
来源: 评论
Deep web integrated systems: Current achievements and open issues
Deep web integrated systems: Current achievements and open i...
收藏 引用
13th International Conference on information Integration and Web-Based Applications and Services, iiWAS2011
作者: El-Gamil, Boutros R. Winiwarter, Werner Božić, Bojan Wahl, Harald University of Vienna Research Group Data Analytics and Computing Universitätsstraße 5 1010 Vienna Austria Austrian Institute of Technology Dept. of Safety and Security Donau-City-Straße 1 Vienna Austria University of Applied Sciences Technikum Wien Dept. of Information Engineering and Security Höchstädtplatz 5 1200 Vienna Austria
The problem of extracting data that resides in the deep Web has become the center of many research efforts in the recent few years. The challenges in this research area are spanning from online databases discovery and... 详细信息
来源: 评论
Achieving compelling student comprehension of complex information structures for both on-site and on-line courses
Achieving compelling student comprehension of complex inform...
收藏 引用
2008 ASEE Annual Conference and Exposition
作者: Uhlig, Ronald Farahani, Alireza Viswanathan, Shekar Evans, Howard Sotelo, Mark National University Department of Computer Science and Information Systems School of Engineering and Technology National University Wireless Communications for the Master ot Science in Wireless Communications Program International Telecommunications Academy School of Engineering and Technology Department of Applied Engineering Lead Faculty for Engineering Management and Homeland Security and Safety Engineering Academic Computing for National University
Teaching engineering and technology subjects involves conveying understanding of abstract information structures and processes such as complex telecommunications protocols, complex mathematical concepts, and data stru... 详细信息
来源: 评论
Reappraising Business Resumption
收藏 引用
EDPACS 2006年 第11期29卷 5-16页
作者: Belden Menkus The editor of EDPACS and the consulting editor of the Auerbach Information Management Service on EDP Auditing. He is a principal in Menkus Associates consultants in IT auditing security and quality of Manchester Tennessee. Menkus co-developed the basic computing disaster recovery response methodology in 1964 under contract to what was at the time a component of the U.S. Department of Defense. This methodology has been applied in many different settings in subsequent years. Menkus can be reached by e-mail at bmenkus@***.
The September 2001 attacks on New York City's World Trade Center and the Pentagon in Arlington, Virginia, call for a reap-praisal of the assumptions and practices of business resump-tion efforts (sometimes referre...
来源: 评论
Experimenting with faults, lattices and the DSA
Experimenting with faults, lattices and the DSA
收藏 引用
8th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2005
作者: Naccache, David Nguye˜n, Phong Q. Tunstall, Michael Whelan, Claire Gemplus Card International Applied Research and Security Centre 34 rue Guynemer Issy-les-Moulineaux F-92447 France University of London Information Security Group Royal Holloway Egham Surrey TW20 0EX United Kingdom CNRS/École Normale Supérieure Département d'Informatique 45 rue d'Ulm F-75230 Paris Cedex 05 France Gemplus Card International Applied Research and Security Centre Avenue des Jujubiers La Ciotat F-13705 France School of Computing Dublin City University Ballymun Dublin 9 Ireland
We present an attack on DSA smart-cards which combines physical fault injection and lattice reduction techniques. This seems to be the first (publicly reported) physical experiment allowing to concretely pull-out DSA ... 详细信息
来源: 评论
Accessing Multilingual information Repositories  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Carol Peters Fredric C. Gey Julio Gonzalo Henning Müller Gareth J. F. Jones Michael Kluck Bernardo Magnini Maarten Rijke
The sixth campaign of the Cross Language Evaluation Forum (CLEF) for European languages was held from January to September 2005. CLEF is by now an established international evaluation initiative and 74 groups from all... 详细信息
来源: 评论