咨询与建议

限定检索结果

文献类型

  • 2,327 篇 会议
  • 1,964 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 4,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,724 篇 工学
    • 1,946 篇 计算机科学与技术...
    • 1,571 篇 软件工程
    • 512 篇 信息与通信工程
    • 434 篇 生物工程
    • 407 篇 控制科学与工程
    • 342 篇 生物医学工程(可授...
    • 257 篇 电气工程
    • 241 篇 光学工程
    • 211 篇 电子科学与技术(可...
    • 190 篇 机械工程
    • 111 篇 化学工程与技术
    • 111 篇 安全科学与工程
    • 108 篇 交通运输工程
    • 106 篇 动力工程及工程热...
    • 99 篇 材料科学与工程(可...
    • 98 篇 仪器科学与技术
  • 1,574 篇 理学
    • 831 篇 数学
    • 482 篇 生物学
    • 435 篇 物理学
    • 311 篇 统计学(可授理学、...
    • 177 篇 系统科学
    • 111 篇 化学
  • 744 篇 管理学
    • 433 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 240 篇 工商管理
  • 328 篇 医学
    • 288 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 124 篇 公共卫生与预防医...
  • 156 篇 法学
    • 140 篇 社会学
  • 88 篇 经济学
  • 75 篇 教育学
  • 63 篇 农学
  • 12 篇 军事学
  • 5 篇 文学
  • 5 篇 艺术学

主题

  • 102 篇 machine learning
  • 91 篇 computational mo...
  • 83 篇 semantics
  • 73 篇 deep learning
  • 67 篇 feature extracti...
  • 65 篇 artificial intel...
  • 65 篇 training
  • 60 篇 data models
  • 58 篇 visualization
  • 58 篇 accuracy
  • 57 篇 computer archite...
  • 53 篇 cloud computing
  • 47 篇 informatics
  • 47 篇 predictive model...
  • 47 篇 forecasting
  • 45 篇 internet of thin...
  • 44 篇 software
  • 43 篇 educational inst...
  • 42 篇 optimization
  • 42 篇 real-time system...

机构

  • 104 篇 school of comput...
  • 93 篇 school of comput...
  • 50 篇 school of comput...
  • 48 篇 school of comput...
  • 44 篇 school of comput...
  • 41 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 luddy school of ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 fakultät für phy...

作者

  • 35 篇 liu lantao
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 3,871 篇 英文
  • 475 篇 其他
  • 42 篇 中文
  • 4 篇 德文
  • 2 篇 日文
检索条件"机构=School of Engineering in Computing and Informatics"
4387 条 记 录,以下是4041-4050 订阅
排序:
Parameterized Maximum and Average Degree Approximation in Topic-based Publish-Subscribe Overlay Network Design
Parameterized Maximum and Average Degree Approximation in To...
收藏 引用
IEEE International Conference on Distributed computing Systems
作者: Melih Onus Andrea W. Richa Department of Computer Engineering TOBB University of Economics and Technology Computer Science and Engineering School of Computing Informatics and Decision Systems Engineering Arizona State University
Publish/subscribe communication systems where nodes subscribe to many different topics of interest are becoming increasingly more common. Designing overlay networks that connect the nodes subscribed to each distinct t... 详细信息
来源: 评论
A User-Centric Approach to Assessing Confidentiality and Integrity of Service-Based Workflows
A User-Centric Approach to Assessing Confidentiality and Int...
收藏 引用
International Conference on Human-Centric computing (HumanCom)
作者: Stephen S. Yau Jing Huang Information Assurance Center and School of Computing Informatics and Decision System Engineering Arizona State University Tempe AZ USA
In service-based systems (SBS), workflows are composed of loosely coupled services. The quality of service (QoS) of composite service-based workflows needs to be considered. In doing so, various aspects of the QoS of ... 详细信息
来源: 评论
computing the cutwidth of bipartite permutation graphs in linear time  1
收藏 引用
36th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2010
作者: Heggernes, Pinar Van 't Hof, Pim Lokshtanov, Daniel Nederlof, Jesper Department of Informatics University of Bergen P.O. Box 7803 N-5020 Bergen Norway School of Engineering and Computing Sciences Durham University Science Laboratories South Road Durham DH1 3LE United Kingdom
The problem of determining the cutwidth of a graph is a notoriously hard problem which remains NP-complete under severe restrictions on input graphs. Until recently, non-trivial polynomial-time cutwidth algorithms wer... 详细信息
来源: 评论
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
Malicious Hubs: Detecting Abnormally Malicious Autonomous Sy...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Andrew J. Kalafut Craig A. Shue Minaxi Gupta School of Informatics and Computing Indiana University of Bloomington USA Computational Sciences and Engineering Oak Ridge National Laboratory USA
While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this ... 详细信息
来源: 评论
Comparative performance analysis of MPEG4, FLV and 3GP multimedia file formats using wireless network parameters
Comparative performance analysis of MPEG4, FLV and 3GP multi...
收藏 引用
International Conference on Computer and Information Technology (ICCIT)
作者: Mohammad A. R. Mustafa Mohammad Mamun Elahi M. Alamgir Hossain Mohammad Mahfuzul Islam School of Computing Informatics and Media University of Bradford Bradford UK Department of CSE Bangladesh University of Engineering and Technology Dhaka Bangladesh
Many recommendations are proposed for accommodating multimedia content into wireless media with lower bandwidth. These formats of the content have been developed with different objectives. Now it has become really cha... 详细信息
来源: 评论
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Hiding in Plain Sight: Exploiting Broadcast for Practical Ho...
收藏 引用
Annual Hawaii International Conference on System Sciences (HICSS)
作者: Craig A. Shue Minaxi Gupta Computational Sciences and Engineering Division Oak Ridge National Laboratory USA School of Informatics and Computing Indiana University Bloomington USA
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong an... 详细信息
来源: 评论
Impact of Web 2.0 and Cloud computing Platform on Software engineering
Impact of Web 2.0 and Cloud Computing Platform on Software E...
收藏 引用
International Symposium on Electronic System Design (ISED)
作者: Radha Guha David Al-Dabass Department of Engineering Mathematics and Science Texas A and M International University TX USA School of Computing and Informatics Nottingham Trent University UK
Current era of Web 2.0 is enabling new business models for using the semantic web. One such business model is leasing out computing platform of hardware and software over the internet to the tenants and is dubbed as C... 详细信息
来源: 评论
Real-Time Service-Oriented Cloud computing
Real-Time Service-Oriented Cloud Computing
收藏 引用
IEEE World Congress on Services (SERVICES)
作者: Wei-Tek Tsai Qihong Shao Xin Sun Jay Elston Computer Science and Technology Tsinghua University Beijing China School of Computing Informatics and Decision Systems Engineering Arizona State University USA
Cloud computing has received significant attention recently. This paper presents real-time issues related to cloud computing, such as multi-tenancy architecture, scheduling, paralleled computing and proposes a framewo... 详细信息
来源: 评论
Two-Tier Multi-tenancy Scaling and Load Balancing
Two-Tier Multi-tenancy Scaling and Load Balancing
收藏 引用
IEEE International Conference on e-Business engineering (ICEBE)
作者: Wei-Tek Tsai Xin Sun Qihong Shao Guanqiu Qi Computer Science and Technology Tsinghua University Beijing China School of Computing Informatics and Decision Systems Engineering Arizona State University USA
Cloud computing often uses the multi-tenancy architecture where tenants share system software. To support dynamically increasing demands from multi-tenants, the cloud service providers have to duplicate computing reso... 详细信息
来源: 评论
Prioritizing Service Requests on Cloud with Multi-tenancy
Prioritizing Service Requests on Cloud with Multi-tenancy
收藏 引用
IEEE International Conference on e-Business engineering (ICEBE)
作者: Wei-Tek Tsai Qihong Shao Jay Elston Department of Computer Science and Technology Tsinghua University China School of Computing Informatics and Decision Systems Engineering Arizona State University USA
Cloud computing often uses a multi-tenant architecture where tenants share application and system software. Request prioritization presents a challenge in this architecture. Tenant may have individual (local) prioriti... 详细信息
来源: 评论