咨询与建议

限定检索结果

文献类型

  • 841 篇 会议
  • 453 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 1,300 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 898 篇 工学
    • 612 篇 计算机科学与技术...
    • 493 篇 软件工程
    • 178 篇 信息与通信工程
    • 155 篇 控制科学与工程
    • 91 篇 机械工程
    • 80 篇 电气工程
    • 77 篇 生物工程
    • 75 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 32 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 24 篇 交通运输工程
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 21 篇 土木工程
  • 428 篇 理学
    • 248 篇 数学
    • 83 篇 生物学
    • 78 篇 物理学
    • 78 篇 系统科学
    • 65 篇 统计学(可授理学、...
    • 35 篇 化学
  • 217 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 33 篇 医学
    • 29 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 22 篇 法学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 40 篇 feature extracti...
  • 29 篇 training
  • 24 篇 computer science
  • 22 篇 support vector m...
  • 21 篇 heuristic algori...
  • 19 篇 computational mo...
  • 18 篇 educational inst...
  • 18 篇 optimization
  • 17 篇 deep learning
  • 17 篇 image segmentati...
  • 17 篇 software enginee...
  • 17 篇 neural networks
  • 17 篇 wireless sensor ...
  • 16 篇 internet of thin...
  • 15 篇 algorithm design...
  • 14 篇 data mining
  • 14 篇 authentication
  • 14 篇 security
  • 14 篇 accuracy
  • 13 篇 monitoring

机构

  • 137 篇 school of comput...
  • 88 篇 school of comput...
  • 57 篇 school of comput...
  • 53 篇 college of compu...
  • 45 篇 school of electr...
  • 43 篇 beijing key labo...
  • 39 篇 school of comput...
  • 37 篇 department of co...
  • 28 篇 college of intel...
  • 21 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 18 篇 school of comput...
  • 17 篇 school of mechan...
  • 17 篇 tianjin key labo...
  • 16 篇 state key labora...
  • 16 篇 seventh research...
  • 16 篇 school of softwa...
  • 15 篇 school of softwa...
  • 14 篇 school of comput...

作者

  • 38 篇 yingmin jia
  • 37 篇 junping du
  • 31 篇 wu jigang
  • 29 篇 fashan yu
  • 25 篇 jigang wu
  • 16 篇 xiaofei wang
  • 16 篇 ke yongzhen
  • 14 篇 qin jing
  • 14 篇 shun-yan ren
  • 13 篇 xiuhua li
  • 13 篇 victor c. m. leu...
  • 13 篇 du junping
  • 13 篇 jia yingmin
  • 13 篇 guozhi song
  • 12 篇 hung chih-cheng
  • 12 篇 yu fashan
  • 11 篇 yongzhen ke
  • 11 篇 lianhe yang
  • 10 篇 thambipillai sri...
  • 10 篇 jin-liang wang

语言

  • 1,219 篇 英文
  • 58 篇 其他
  • 22 篇 中文
检索条件"机构=School of Computer Science and Software Engineering Tianjin Polytechnic University"
1300 条 记 录,以下是1271-1280 订阅
排序:
Agent based intrusion detection for wireless local area network
Agent based intrusion detection for wireless local area netw...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Hong-Yu Yang Li-Xia Xie Software Base Civil Aviation University of China Tianjin China Department of Computer Science and Engineering Tianjin University Tianjin China School of Computer Science and Technology Civil Aviation University of China Tianjin China
Present attack problem to wireless local area network. Propose IDS model architecture with agents to monitor attack-related activity within a wireless local area network. And introduce the role of components in the mo... 详细信息
来源: 评论
Intrusion detection solution to WLANs
Intrusion detection solution to WLANs
收藏 引用
Proceedings of the IEEE Circuits and Systems Symposium on Emerging Technologies
作者: Hongyu Yang Lixia Xie Jizhou Sun Software Base Civil Aviation University of China Tianjin China Department of Computer Science and Engineering Tianjin University TJU Tianjin China School of Computer Science and Technology Civil Aviation University of China Tianjin China
With the increasing popularity of the wireless network, the security issue for mobile users could be even more serious than it can be expected. Here it is need to search for new architecture and mechanisms to protect ... 详细信息
来源: 评论
Intrusion detection for wireless local area network
Intrusion detection for wireless local area network
收藏 引用
Canadian Conference on Electrical and computer engineering (CCECE)
作者: Hongyu Yang Lixia Xie Jizhou Sun Software Base Civil Aviation University of China Tianjin China Department of Computer Science and Engineering Tianjin University TJU Tianjin China School of Computer Science and Technology Civil Aviation University of China China
Wireless intrusion detection systems are an important addition to the security of wireless local area networks (WLANs). We focus on intrusion detection and security consideration in wireless local area networks. We pr... 详细信息
来源: 评论
An application of decision support to network intrusion detection
An application of decision support to network intrusion dete...
收藏 引用
Canadian Conference on Electrical and computer engineering (CCECE)
作者: Hongyu Yang Lixia Xie Jizhou Sun Software Base Civil Aviation University of China Tianjin China Department of Computer Science and Engineering Tianjin University TJU Tianjin China School of Computer Science and Technology Civil Aviation University of China China
This paper describes the design of a decision support module (DSM) for an intrusion detection system, which can provide active detection and automated response support during intrusions. The primary function of the de... 详细信息
来源: 评论
The dimensions of variation in the teaching of data structures
The dimensions of variation in the teaching of data structur...
收藏 引用
ITiCSE 2004 - 9th Annual SIGCSE Conference on Innovation and Technology in computer science Education
作者: Lister, Raymond Tenenberg, Josh Box, Ilona Morrison, Brians Westbrook, D. Suzanne University of Technology Sydney Faculty of Information Technology Sydney NSW 2007 Australia University of Washington Tacoma Institute of Technology 1900 Commerce St. Tacoma WA 98402-3100 University of Western Sydney School of Computing and IT Penrith NSW 1797 Australia Southern Polytechnic State University School of Computing and Software Engineering Marietta GA 30060 University of Arizona Department of Computer Science Tucson AZ 85721
The current debate about the teaching of data structures is hampered because, as a community, we usually debate specifics about data structure implementations and libraries, when the real level of disagreement remains... 详细信息
来源: 评论
An efficient flow control algorithm for multi-rate multicast networks
An efficient flow control algorithm for multi-rate multicast...
收藏 引用
IEEE Workshop on IP Operations and Management, (IPOM)
作者: Naixue Xiong Yanxiang He Yan Yang Jiannong Cao Chuan Lin The State Key Laboratory of Software Engineering Computer School of Wuhan University Wuhan China Department of Computer Science Central China Normal University Wuhan China Department of Computing Hong Kong Polytechnic University Hong Kong China
This paper describes a novel multi-rate multicast congestion control scheme based on the well-known proportional plus integrative control technique, where the control parameters can be designed to ensure the stability... 详细信息
来源: 评论
Adaptive stabilization for cascade nonlinear systems
收藏 引用
Chinese Journal of Systems engineering and Electronics 2004年 第2期000卷
An adaptive controller of full state feedback for certain cascade nonlinear systems achieving input-to-state stability with respect to unknown bounded disturbance is designed using backstepping and control Lyapunov fu... 详细信息
来源: 评论
Characteristics of successful collaborations to produce educated software engineering professionals
收藏 引用
International Journal of Phytoremediation 2002年 第1期21卷 119-140页
作者: Ellis, Heidi J.C. Mead, Nancy R. Moreno, Ana Tanner, Cynthia D. Ramsey, Dawn Rensselaer at Hartford Hartford CT United States Software Engineering Institute Carnegie Mellon University Pittsburgh PA United States School of Computer Science Universidad Politenica de Madrid Madrid Campus de Montegancedo Boadilla del Monte Spain West Virginia University Morgantown WV United States Dept. of Continuing Education Southern Polytechnic State University Extended University Marietta GA United States
Currently, a large gap exists between the number of open software engineering positions and the number of qualified software engineers to fill those positions. The Industry/university (I/U) subgroup of the Working Gro...
来源: 评论
Cauchy - Schwarz bound on the generalized Marcum Q-function with applications
收藏 引用
Wireless Communications and Mobile Computing 2001年 第2期1卷 243-253页
作者: Annamalai, A. Tellambura, C. The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University 206 North Washington Street Suite 400 Alexandria VA 22314 U.S.A. School of Computer Science and Software Engineering Faculty of Information Technology Monash University Clayton Victoria 3168 Australia
The Cauchy-Schwarz bounding technique is used to derive useful bounds on the generalized Marcum Q-function and its complement. Three new exponential-type bounds on QM (α, β) are derived, and these are found to be ti... 详细信息
来源: 评论
software engineering education should be presented as: A. science B. engineering C. Technology D. All of the above E. None of the above, other
Software engineering education should be presented as: A. Sc...
收藏 引用
Frontiers in Education (FIE) Conference
作者: J.E. Diaz-Herrera T. Hilburn G. Hislop M. Lutz P.E. MacNeil M. McCracken School of Computing and Software Engineering Southern Polytechnic State University Marietta GA USA Computer Science Embrey-Riddle Aeronautical University Daytona Beach FL USA Drexel University Philadelphia PA USA Rochester Institute of Technology Rochester NY USA College of Engineering Mercer University Atlanta GA USA College of Computing Georgia Institute of Technology Atlanta GA USA
For many, the software engineering profession is still viewed as immature. The authors contend that a major problem has to do with the current educational model(s) for software. Most computer science graduates pursue ... 详细信息
来源: 评论