咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 38 篇 期刊文献

馆藏范围

  • 82 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 55 篇 工学
    • 35 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 12 篇 信息与通信工程
    • 10 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 3 篇 动力工程及工程热...
    • 3 篇 土木工程
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 冶金工程
  • 33 篇 理学
    • 16 篇 数学
    • 9 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 物理学
    • 3 篇 化学
    • 2 篇 海洋科学
    • 2 篇 系统科学
  • 17 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 农学
  • 1 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 3 篇 information syst...
  • 3 篇 security of data
  • 3 篇 databases
  • 3 篇 remote sensing
  • 3 篇 machine learning
  • 2 篇 surveys
  • 2 篇 data warehouses
  • 2 篇 object detection
  • 2 篇 markov processes
  • 2 篇 face recognition
  • 2 篇 scattering
  • 2 篇 computational mo...
  • 2 篇 information secu...
  • 2 篇 artificial intel...
  • 2 篇 testing
  • 2 篇 bayesian network...
  • 1 篇 computer simulat...
  • 1 篇 sensor systems
  • 1 篇 charge coupled d...
  • 1 篇 thermodynamics

机构

  • 4 篇 electrical and c...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 3 篇 university of mi...
  • 3 篇 the department o...
  • 3 篇 early child educ...
  • 3 篇 beijing key labo...
  • 3 篇 information tech...
  • 3 篇 electrical and c...
  • 3 篇 university of so...
  • 3 篇 department of co...
  • 3 篇 computer and inf...
  • 2 篇 college of osteo...
  • 2 篇 tennessee techno...
  • 2 篇 the school of in...
  • 2 篇 decision systems...
  • 2 篇 school of inform...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 school of accoun...

作者

  • 9 篇 du qian
  • 8 篇 li wei
  • 5 篇 tao ran
  • 4 篇 kasem khalil
  • 4 篇 ahmed sherif
  • 4 篇 sherif ahmed
  • 4 篇 druzdzel marek j...
  • 4 篇 elsersy mohamed
  • 4 篇 mohamed elsersy
  • 4 篇 yuan changhe
  • 3 篇 chen-chi shing
  • 3 篇 marn-ling shing
  • 3 篇 huei lee
  • 3 篇 mohammad m. r. k...
  • 3 篇 kuo lane chen
  • 3 篇 khalil kasem
  • 2 篇 wang hanzheng
  • 2 篇 bhargava bharat ...
  • 2 篇 williams r. stan...
  • 2 篇 imam ahmad abdel...

语言

  • 79 篇 英文
  • 3 篇 其他
检索条件"机构=MS in Computer Information Systems"
82 条 记 录,以下是41-50 订阅
排序:
Attaining program affordability through integration of logistical operations and health maintenance
Attaining program affordability through integration of logis...
收藏 引用
1st Space Exploration Conference: Continuing the Voyage of Discovery
作者: Goforth, Andre Karsai, Gabor Orosz, Michael Neches, Robert Szekely, Pedro Ashish, Naveen NASA Ames Research Center Moffett Field CA 94035-1000 United States Vanderbilt University Institute for Software Integrated Systems Nashville TN 37235 United States University of Southern California Information Sciences Institute Marina del Rey CA 90292 United States USRA Research Institute for Advanced Computer Science NASA Ames Research Center Moffett Field CA 94035 United States Code TC MS269-4 United States Department of Electrical and Computer Engineering Distributed Scalable Systems Division
Program affordability needs to be built-in at the initial concept formulation stage. For NASA's space exploration vision this is critical for long range sustainability of human presence in space. What is often ove... 详细信息
来源: 评论
Fault mitigation schemes for future spaceflight multicore processors
Fault mitigation schemes for future spaceflight multicore pr...
收藏 引用
AIAA Infotech at Aerospace Conference and Exhibit 2012
作者: Alexander, James W. Clement, Bradley J. Gostelow, Kim P. Lai, John Y. Jet Propulsion Laboratory California Institute of Technology GN and C Hardware and Testbed Development Group 4800 Oak Grove Drive MS 198-235 Pasadena CA 91109 United States Jet Propulsion Laboratory California Institute of Technology Cyber Defense and Information Architecture Group 4800 Oak Grove Drive MS 301-285 Pasadena CA 91109 United States Jet Propulsion Laboratory California Institute of Technology Advanced Computer Systems and Technologies Group 4800 Oak Grove Drive MS 321-151 Pasadena CA 91109 United States
Future planetary exploration missions demand significant advances in on-board computing capabilities over current avionics architectures based on a single-core processing element. The state-of-the-art multi-core proce... 详细信息
来源: 评论
Vision based Injector Spray pattern Testing system
Vision based Injector Spray pattern Testing system
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Priyanka Desai Sreela Sasi Manoj Kumar Prabhakaran Completed MS degree in Computer and Information Science Gannon University Erie PA USA Gannon University Erie PA USA General Electric Transportation Systems Erie PA USA
In a diesel engine any malfunction of the injector degrades engine performance. Currently, the testing of injectors is done using Volumetric Testing, Illuminated spray test tube with high intensity LED or ITU-101 Comm... 详细信息
来源: 评论
Web-it-man: A web-based integrated tool for manufacturing environment
Web-it-man: A web-based integrated tool for manufacturing en...
收藏 引用
ASME 1998 Design Engineering Technical Conferences, DETC 1998
作者: Karne, Ramesh K. Dandekar, Swati V. Poluri, Sridhar Chen, Gang Baras, John S. Nau, Dana S. Ball, Michael O. Lin, Edward Trichur, Vinai S. Williams, James T. Towson University Department of Computer and Information Sciences Stephens Hall TowsonMD21252 United States Isr A.V.Williams Building University of Maryland College ParkMD20742 United States Northrop Grumman Electronic Sensors and Systems Division P.O.Box 746 MS 709 BaltimoreMD21203 United States
Exponential growth in Internet applications and the need for a global access for future manufacturing demands webbased tools that operate seamlessly in heterogeneous environments. We present a Web-based Integrated Too... 详细信息
来源: 评论
SOFTWARE FAILURE DATA ANALYSIS USING THE LEAST SQUARES APPROACH AND THE TIME PER FAILURE CONCEPT
收藏 引用
International Journal of Reliability, Quality and Safety Engineering 1995年 第2期2卷 161-176页
作者: G.J. KNAFL J.A. MORGAN R.L. FOLLENWEIDER R.M. KARCICH School of Computer Science Telecommunications and Information Systems DePaul University 243 South Wabash Ave. Chicago IL 60604–2302 USA Systems Reliability Engineering Department Storage Technology Corporation MS 4232 2270 South 88th Street Louisville CO 80028 USA
We adapt data analytic techniques to the software reliability setting. We develop an evaluation procedure based on scatterplots of transformed data, crossvalidation using the predicted residual sum of squares (PRESS) ... 详细信息
来源: 评论
Hybrid powertrain design using a domain-specific modeling environment
Hybrid powertrain design using a domain-specific modeling en...
收藏 引用
IEEE Conference on Vehicle Power and Propulsion (VPPC)
作者: W. Gao S. Neema J. Gray J. Picone S. Porandla S. Musunuri J. Mathews Center for Advanced Vehicular Systems Mississippi State University Starkville MS USA Institute of Software Integrated Systems Vanderbilt University Nashville TN USA Department of Computer and Information Sciences University of Alabama Birmingham Birmingham AL USA
State of the art design tools in automotive engineering still lack the power, sophistication, and automation of design tools that are used in the electronics industry. Widely accepted automotive powertrain design tool... 详细信息
来源: 评论
Validating a Two Category Secured Access Database Model
Validating a Two Category Secured Access Database Model
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Marn-Ling Shing Chen-chi Shing Kuo Lane Chen Huei Lee Early Child Education Department and Institute of Child Development Taipei Municipal University of Education Taipei Taiwan Information Technology Department Radford University Radford VA USA School of Accountancy and Information Systems University of Southern Mississippi Hattiesburg MS USA Department of Computer Information Systems Eastern Michigan University Ypsilanti MI USA
Unauthorized attempts to access database and data warehouse in a data mining system are unavoidable. The privileged group and the public group are involved in a secured data mining system. The privileged group may tak... 详细信息
来源: 评论
Modeling Confidentiality in a Simplified Database Access
Modeling Confidentiality in a Simplified Database Access
收藏 引用
International Joint Conference on Bioinformatics, systems Biology and Intelligent Computing, IJCBS
作者: Chen-chi Shing Marn-Ling Shing Kuo Lane Chen Huei Lee Early Child Education Department and Institute of Child Development Taipei Municipal University of Education Taipei Taiwan Information Technology Department Radford University Radford VA USA School of Accountancy and Information Systems University of Southern Mississippi Hattiesburg MS USA Department of Computer Information Systems Eastern Michigan University Ypsilanti MI USA
In a simplified secured database access model, privileged group and public group can access data with any distribution. In order to secure the database, the confidentiality policy must be applied. Often, the managemen... 详细信息
来源: 评论
Enhanced and Explainable Deep Learning-Based Intrusion Detection in IoT Networks
Enhanced and Explainable Deep Learning-Based Intrusion Detec...
收藏 引用
MILCOM, Military Communications Conference
作者: Sohan Gyawali Kamran Sartipi Benjamin Van Ravesteyn Jiaqi Huang Yili Jiang Department of Technology Systems East Carolina University NC USA Department of Computer Science East Carolina University NC USA Department of Computer Science and Cybersecurity University of Central Missouri MO USA Department of Computer and Information Science University of Mississippi MS USA
The proliferation of IoT networks has significantly increased the potential for cyber attacks. Deep learning models have shown effectiveness in detecting complex attacks; however, they face challenges related to imbal...
来源: 评论
Federated Learning Model for Early Detection of Dementia Using Blood Biosamples
Federated Learning Model for Early Detection of Dementia Usi...
收藏 引用
Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), IEEE International Conference on
作者: Mohamed Elsersy Ahmed Sherif Ahmad Abdel-Aliem Imam Mohammad M. R. Khan Mamun Kasem Khalil Mohamed Haitham Computer and Information Systems Dept. Higher Colleges of Technology Abu Dhabi UAE School of Computing Sciences and Computer Engineering University of Southern Mississippi MS USA College of Osteopathic Medicine William Carey University Mississippi MS USA Electrical and Computer Engineering Department Tennessee Technological University TN USA Electrical and Computer Engineering Department University of Mississippi MS USA University of Prince Edward Island (UPEI) Cairo Egypt
Alzheimer’s disease (AD) is a serious, long-term health problem that causes much pain and loss for the person with it and their family. Its early and accurate detection might result in a substantial reduction of the ...
来源: 评论