咨询与建议

限定检索结果

文献类型

  • 65 篇 会议
  • 33 篇 期刊文献

馆藏范围

  • 98 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51 篇 工学
    • 39 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 9 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 电气工程
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
  • 30 篇 理学
    • 12 篇 数学
    • 8 篇 物理学
    • 4 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
    • 2 篇 海洋科学
  • 22 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 10 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
    • 7 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 8 篇 法学
    • 8 篇 社会学
    • 2 篇 法学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 2 篇 军事学

主题

  • 4 篇 regulation
  • 4 篇 optimization
  • 3 篇 telemedicine
  • 3 篇 computer archite...
  • 3 篇 big data
  • 3 篇 law
  • 3 篇 quality of servi...
  • 3 篇 decision making
  • 3 篇 cloud computing
  • 3 篇 ip networks
  • 3 篇 vehicles
  • 3 篇 cryptography
  • 3 篇 multiobjective o...
  • 2 篇 internet of thin...
  • 2 篇 computer science
  • 2 篇 intrusion detect...
  • 2 篇 computer network...
  • 2 篇 data security
  • 2 篇 dicom
  • 2 篇 dictionaries

机构

  • 5 篇 graduate program...
  • 5 篇 state intelligen...
  • 5 篇 department of el...
  • 5 篇 universitas kris...
  • 5 篇 medical intellig...
  • 4 篇 post graduate pr...
  • 3 篇 department of ph...
  • 3 篇 health managemen...
  • 3 篇 center of comple...
  • 3 篇 department of in...
  • 3 篇 sampoerna univer...
  • 3 篇 information syst...
  • 3 篇 department of ci...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 department of in...
  • 3 篇 department of ac...
  • 3 篇 faculty of indus...
  • 3 篇 departement of: ...
  • 3 篇 department of in...

作者

  • 7 篇 mantoro teddy
  • 7 篇 teddy mantoro
  • 4 篇 taufik djatna
  • 3 篇 w sardjono
  • 3 篇 susandi armi
  • 3 篇 armi susandi
  • 3 篇 sardjono w.
  • 2 篇 abbafati cristia...
  • 2 篇 bärnighausen til...
  • 2 篇 muammar khaddafi
  • 2 篇 jorge werner
  • 2 篇 biondi antonio
  • 2 篇 béjot yannick
  • 2 篇 bhattacharyya kr...
  • 2 篇 alahdab fares
  • 2 篇 alvis-guzman nel...
  • 2 篇 nurmawati
  • 2 篇 adekanmbi victor
  • 2 篇 lusi dwi putri
  • 2 篇 dahlan abdullah

语言

  • 96 篇 英文
  • 2 篇 中文
检索条件"机构=Post-graduate Program in Computer Science"
98 条 记 录,以下是31-40 订阅
排序:
CLM-TCP: TCP Congestion Control Mechanism Using Cross Layer for Wireless Mesh Networks
CLM-TCP: TCP Congestion Control Mechanism Using Cross Layer ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Vagner Nascimento Carlos Gomes Waldir Moreira Antonio Abelém Post Graduate Program in Computer Science Federal University of Para Belem Para Brazil
The Transmission Control Protocol - TCP has been widely researched in many different networking technologies such as wireless, optical, satellite, sensor, and wired since it is the most used protocol on the Internet. ... 详细信息
来源: 评论
Improvements in the model for interoperability of intrusion detection responses compatible with the IDWG model
收藏 引用
International Journal of Network Management 2007年 第4期17卷 287-294页
作者: Da Silva, Paulo Fernando Westphall, Carlos Becker Network and Management Laboratory Post-Graduate Program in Computer Science Federal University of Santa Catarina Florianópolis Brazil
This paper presents a model for response interoperability between intruder detection systems (IDSs), compatible with the model for alert interoperability developed by the Intrusion Detection Working Group (IDWG). Alte... 详细信息
来源: 评论
vSDNEmul: A software-defined network emulator based on container virtualization
arXiv
收藏 引用
arXiv 2019年
作者: Farias, Fernando N.N. Antônio de, O. da Costa, Leonardo B. Pinheiro, Billy A. Abelém, Antônio J.G. Post-Graduate Program in Computer Science Federal Unversity of Pará - UFPA Belém Brazil
The main issue related to Software-Defined Network emulators is how to replicate real behavior in experiments. Mininet and others SDN emulators have an architecture that limits both the scope of experiments and the fi... 详细信息
来源: 评论
A workflow-based environment to manage software-testing process executions
A workflow-based environment to manage software-testing proc...
收藏 引用
作者: Ruiz, Duncan Dubugras A. Becker, Karin Copstein, Bernardo De Oliveira, Flavio Moreira De Oliveira, Angelina Torres Forgiarini, Gustavo Rossarolla Meneguzzi, Cristiano Rech Carvalho, Rafaela Lisboa Computer Science Post-Graduate Program Faculty of Informatics Pontifical Catholic University of RS Av. Ipiranga 6681 Predio 16 Sala 106-FACIN Porto Alegre - RS Brazil
This work describes a workflow-based environment that manages the execution of software-testing processes. Testing processes require that human and computer resources be handled as dedicated resources, previously sche... 详细信息
来源: 评论
Multi-agent Architecture for Passive Rootkit Detection with Data Enrichment
Multi-agent Architecture for Passive Rootkit Detection with...
收藏 引用
International Conference on computer science, Electronics, and Industrial Engineering, CSEI 2022
作者: Trinks, Maickel Gondim, João Albuquerque, Robson Professional Post-Graduate Program in Electrical Engineering - PPEE - Department of Electrical Engineering University of Brasília DF Brasília Brazil Department of Computer Science Universidade de Brasília DF Brasília Brazil
The added value of the information transmitted in a cybernetic environment has resulted in a sophisticated malicious actions scenario aimed at data exfiltration. In situations with advanced actors, like APTs, such act... 详细信息
来源: 评论
Disaster recovery plan implementation evaluation model at the corporation  7
Disaster recovery plan implementation evaluation model at th...
收藏 引用
7th Information Systems International Conference, ISICO 2023
作者: Sardjono, Wahyu Perdana, Widhilaga Gia Putra, Gustian Rama Information Systems Management Department BINUS Graduate Program - Master of Information Systems Management Bina Nusantara University Jakarta11480 Indonesia Post Graduate Program of Management Science State University of Jakarta Jl. R.Mangun Muka Raya No.11 Jakarta Timur Jakarta13220 Indonesia Computer Science Study Program Faculty of Mathematics & Natural Sciences Pakuan University Bogor Indonesia
The application of information technology in addition to making internal business processes more effective and efficient, is also to improve customer service. This role is important for companies to maintain the susta... 详细信息
来源: 评论
A model for identity management with privacy in the cloud
A model for identity management with privacy in the cloud
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Jorge Werner Carla Merkle Westphall Post-graduate Program in Computer Science Federal University of Santa Catarina Florianópolis SC Brazil
Cloud computing has been a great ally in the development of products and services with highly scalable, flexible, on-demand, providing big data to users in different administrative domains services. In this context, f... 详细信息
来源: 评论
A reliable approach for applying DICOM structured reporting in a large-scale telemedicine network
A reliable approach for applying DICOM structured reporting ...
收藏 引用
Annual IEEE Symposium on computer-Based Medical Systems
作者: Cloves Langendorf Barcellos Aldo von Wangenheim Rafael Andrade Post-Graduate Program in Computer Science (PPGCC) UFSC Brazil National Institute of Digital Convergence (INCoD)
The need for procedures and methodologies used in clinical information standardization is continuous, requiring the current telemedicine networks to evolve and adapt by using mature standards and guidelines as the bas... 详细信息
来源: 评论
Industrial revolution 4.0 on big data adoption factors on social media users and popularity brands  2
Industrial revolution 4.0 on big data adoption factors on so...
收藏 引用
2nd International Conference on Lesson Study of science Technology Engineering and Mathematics 2020, ICOLSSTEM 2020
作者: Sardjono, W. Rama Putra, G. Selviyanti, E. Cholidin, A. Salim, G. Information Systems Management Department Binus Graduate Program-Master of Information Systems Management Bina Nusantara University Jakarta11480 Indonesia Computer Science Study Program Faculty of Mathematics and Natural Sciences Pakuan University Bogor Indonesia Health Department Politeknik Negeri Jember Jember Jawa Timur68124 Indonesia Law Studi Program Faculty of Law University of Muhammadiyah Jakarta Indonesia Post Graduate Program Faculty of Economic Science University of Trisakti Jakarta Indonesia
The purpose of writing this paper is to look at how factors of big data adoption affect the users of social media and brand popularity. The method used in the writing of this paper is by using path analysis and also b... 详细信息
来源: 评论
Historical Study of the Development of the Misuse of Biological Weapons Technology  8
Historical Study of the Development of the Misuse of Biologi...
收藏 引用
8th IEEE International Conference on Computing, Engineering and Design, ICCED 2022
作者: Agustin, Dian Mantoro, Teddy Yulivan, Ivan State Intelligence College Medical Intelligence Post-graduate Program Bogor Indonesia Sampoerna University and State Intelligence College Media-Tech Lab Department of Computer Science Jakarta Indonesia Indonesia Defence University Department of Information Systems Jakarta Indonesia
Technology will continue to be an important thing in life, technological developments can be found in everyday life. In medical intelligence technology, to identify bio-Terrorism actions, and aspects that can threaten... 详细信息
来源: 评论