咨询与建议

限定检索结果

文献类型

  • 2,327 篇 会议
  • 1,957 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 4,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,729 篇 工学
    • 1,946 篇 计算机科学与技术...
    • 1,571 篇 软件工程
    • 512 篇 信息与通信工程
    • 434 篇 生物工程
    • 407 篇 控制科学与工程
    • 342 篇 生物医学工程(可授...
    • 257 篇 电气工程
    • 241 篇 光学工程
    • 211 篇 电子科学与技术(可...
    • 190 篇 机械工程
    • 111 篇 化学工程与技术
    • 111 篇 安全科学与工程
    • 108 篇 交通运输工程
    • 106 篇 动力工程及工程热...
    • 104 篇 材料科学与工程(可...
    • 98 篇 仪器科学与技术
  • 1,574 篇 理学
    • 836 篇 数学
    • 482 篇 生物学
    • 435 篇 物理学
    • 316 篇 统计学(可授理学、...
    • 177 篇 系统科学
    • 111 篇 化学
  • 744 篇 管理学
    • 433 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 240 篇 工商管理
  • 328 篇 医学
    • 288 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 124 篇 公共卫生与预防医...
  • 156 篇 法学
    • 140 篇 社会学
  • 88 篇 经济学
  • 75 篇 教育学
  • 63 篇 农学
  • 12 篇 军事学
  • 5 篇 文学
  • 5 篇 艺术学

主题

  • 102 篇 machine learning
  • 91 篇 computational mo...
  • 83 篇 semantics
  • 73 篇 deep learning
  • 67 篇 feature extracti...
  • 65 篇 artificial intel...
  • 65 篇 training
  • 60 篇 data models
  • 58 篇 visualization
  • 58 篇 accuracy
  • 57 篇 computer archite...
  • 53 篇 cloud computing
  • 47 篇 informatics
  • 47 篇 predictive model...
  • 47 篇 forecasting
  • 45 篇 internet of thin...
  • 44 篇 software
  • 43 篇 educational inst...
  • 42 篇 optimization
  • 42 篇 real-time system...

机构

  • 104 篇 school of comput...
  • 93 篇 school of comput...
  • 51 篇 school of comput...
  • 50 篇 school of comput...
  • 45 篇 school of comput...
  • 41 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 luddy school of ...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 fakultät für phy...

作者

  • 35 篇 liu lantao
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 3,864 篇 英文
  • 475 篇 其他
  • 42 篇 中文
  • 4 篇 德文
  • 2 篇 日文
检索条件"机构=School of Engineering in Computing and Informatics"
4380 条 记 录,以下是4171-4180 订阅
排序:
Adaptive Delayed Channel Access for IEEE 802.11n WLANs
Adaptive Delayed Channel Access for IEEE 802.11n WLANs
收藏 引用
IEEE International Conference on Circuits and Systems for Communications (ICCSC)
作者: Dionysios Skordoulis Qiang Ni Geyong Min Kevin Borg Electronic & Computer Engineering Division School of Engineering and Design Brunei University West London UK Department of Computing School of Informatics University of Bradford Bradford UK
In this paper we investigate potential benefits that an adaptive delayed channel access algorithm can attain for the next-generation wireless LANs, the IEEE 802.11n. We show that the performance of frame aggregation i... 详细信息
来源: 评论
A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems
A Modeling Framework for Evaluating Effectiveness of Smart-I...
收藏 引用
IEEE Conference on Technologies for Homeland Security
作者: Tridib Mukherjee Sandeep K. S. Gupta Impact Laboratory Department of Computer Science and Engineering School of Computing & Informatics Arizona State University Tempe AZ USA
Crises management for smart-infrastructure - infused with sensors, actuators, and intelligent agent technologies for monitoring, access control, and crisis response - requires objective and quantitative evaluation to ... 详细信息
来源: 评论
Position Statement: Advances and Challenges of Software engineering
Position Statement: Advances and Challenges of Software Engi...
收藏 引用
IEEE Annual International Computer Software and Applications Conference (COMPSAC)
作者: Stephen S. Yau Information Assurance Center Department of Computer Science and Engineering School of Computing and Informatics Ira A. Fulton School of Engineering Arizona State University Tempe AZ USA
In this article the advances in software engineering are i) evolvement of software processes from rigid, sequential and slow processes to iterative and agile processes and standardization of process models, such as CM... 详细信息
来源: 评论
Ontology-based protein-protein interactions extraction from literature using the Hidden Vector State model
Ontology-based protein-protein interactions extraction from ...
收藏 引用
IEEE International Conference on Data Mining Workshops, ICDM Workshops 2008
作者: He, Yulan Nakata, Keiichi Zhou, Deyu School of Engineering Computing and Mathematics University of Exeter North Park Road Exeter EX4 4QF United Kingdom Informatics Research Centre University of Reading Whiteknights Reading RG6 6BX United Kingdom
This paper proposes a novel framework of incorporating protein-protein interactions (PPI) ontology knowledge into PPI extraction from biomedical literature in order to address the emerging challenges of deep natural l... 详细信息
来源: 评论
The importance of biometric sensor continuous secure monitoring
The importance of biometric sensor continuous secure monitor...
收藏 引用
3rd International Conference on Digital Information Management, ICDIM 2008
作者: Papanikolaou, Alexandros Georgiadis, Georgiadis Ilioudis, Christos Pimenidis, Elias Dept. of Computer and Communication Engineering University of Thessaly Volos Greece Dept. of Applied Informatics University of Macedonia Thessaloniki Greece Dept. of Information Technology Technical Educational Institute of Thessaloniki Greece School of Computing and Technology University of East London United Kingdom
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring tha... 详细信息
来源: 评论
Proposing a hybrid-intelligent framework to secure e-Government web applications  08
Proposing a hybrid-intelligent framework to secure e-Governm...
收藏 引用
2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV'08
作者: Moosa, Asaad Alsaffar, Eanas Muhsen Centre for Advanced Computing and Emerging Technologies School of Systems Engineering University of Reading 44 New Road Reading Berkshire RG1 5JD United Kingdom Informatics Research Group School of Systems Engineering University of Reading Whiteknights P.O. Box 217 RG6 6AH Reading Berkshire United Kingdom
One of the essential needs to implement a successful e-Government web application is security. Web application firewalls (WAF) are the most important tool to secure web applications against the increasing number of we... 详细信息
来源: 评论
Performance evaluation of IEEE 802.1x authentication methods and recommended usage
收藏 引用
WSEAS Transactions on Communications 2008年 第3期7卷 133-143页
作者: Akhlaq, Monis Aslam, Baber Khan, Muzammil A. Mellor, John Jafri, M. Noman Awan, Irfan Mobile Computing Networks and Security Research Group School of Informatics University of Bradford Bradford BD7 1DP United Kingdom Computer Science Department School of Electrical Engg. and Computer Science University of Central Florida Orlando FL 32816 United States Information Security Department College of Signals National University of Science and Technology Tamizuddin Road Rawalpindi Pakistan Electrical Engineering Department College of Signals National University of Science and Technology Tamizuddin Road Rawalpindi Pakistan
The wide spread acceptance of IEEE WLANs is a result of industrial standardization to ensure product compatibility and reliability among various manufacturers. Several WLANs solutions are available with varying charac... 详细信息
来源: 评论
Enhancing an application server to support available components
Enhancing an application server to support available compone...
收藏 引用
作者: Kistijantoro, Achmad Imam Morgan, Graham Shrivastava, Santosh K. Little, Mark C. School of Electrical Engineering and Informatics Bandung Institute of Technology ITB Ganesha 10 Bandung 40135 Indonesia School of Computing Science Newcastle University Claremont Tower NE1 7RU United Kingdom Red Hat UK Ltd. 107-111 peascod Street Windsor Berkshire SI4 1TE United Kingdom
Three-tier middleware architecture is commonly used for hosting enterprise distributed applications. Typically the application is decomposed into three layers: front-end, middle tier and back-end. Front-end ('Web ... 详细信息
来源: 评论
A Race Condition Graph for Concurrent Program Behavior
A Race Condition Graph for Concurrent Program Behavior
收藏 引用
2008 3rd International Conference on Intelligent System and Knowledge engineering(第三届智能系统与知识工程国际会议)(ISKE 2008)
作者: Yan Chen Donghui Guo Yann-Hang Lee W.Eric Wong The School of Information Science and Technology Xiamen UniversityChina. The School of Computing and Informatics Arizona State UniversityU.S.A. The School of Engineering and Computer Science University of Texas at DallasU.S.A.
There are race conditions in concurrent programsif the accesses to a sharing resource are not properlysynchronized Because the races can cause theprogram to behave in unexpected ways,detectingthem is an important aspe... 详细信息
来源: 评论
Adaptive Medium Access Control for VoIP Services in IEEE 802.11 WLANs
Adaptive Medium Access Control for VoIP Services in IEEE 802...
收藏 引用
4th International Conference on Circuits and Systems for Communications (ICCSC 2008), vol.2
作者: Mamun I. Abu-Tair Geyong Min Qiang Ni Hong Liu Department of Computing School of Informatics University of Bradford Bradford UK Electronic & Computer Engineering Division School of Engineering and Design Brunei University West London UK Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology China
Voice over Internet Protocol (VoIP) is an important service with strict Quality-of-Service (QoS) requirements in Wireless Local Area Networks (WLANs). The popular Distributed Coordination Function (DCF) of IEEE 802.11... 详细信息
来源: 评论