咨询与建议

限定检索结果

文献类型

  • 66 篇 会议
  • 35 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 62 篇 工学
    • 53 篇 计算机科学与技术...
    • 39 篇 软件工程
    • 22 篇 信息与通信工程
    • 10 篇 电气工程
    • 9 篇 控制科学与工程
    • 8 篇 生物工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 冶金工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 2 篇 仪器科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 25 篇 理学
    • 15 篇 数学
    • 8 篇 生物学
    • 4 篇 物理学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
  • 19 篇 管理学
    • 13 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 公共卫生与预防医...
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 18 篇 software enginee...
  • 15 篇 data communicati...
  • 11 篇 data mining
  • 7 篇 australia
  • 6 篇 web mining
  • 5 篇 association rule...
  • 5 篇 information retr...
  • 4 篇 access control
  • 4 篇 xml
  • 4 篇 frequency
  • 4 篇 databases
  • 4 篇 artificial intel...
  • 3 篇 deep learning
  • 3 篇 systems engineer...
  • 3 篇 ontologies
  • 3 篇 communication sy...
  • 3 篇 image denoising
  • 3 篇 control systems
  • 3 篇 humans
  • 3 篇 hardware

机构

  • 11 篇 school of softwa...
  • 9 篇 school of softwa...
  • 8 篇 school of softwa...
  • 8 篇 school of softwa...
  • 7 篇 school of softwa...
  • 4 篇 school of softwa...
  • 3 篇 school of comput...
  • 3 篇 school of softwa...
  • 3 篇 school of inform...
  • 3 篇 the national eng...
  • 3 篇 department of sy...
  • 3 篇 peng cheng labor...
  • 3 篇 school of softwa...
  • 3 篇 the school of so...
  • 3 篇 school of comput...
  • 2 篇 college of compu...
  • 2 篇 school of artifi...
  • 2 篇 department of el...
  • 2 篇 the school of co...
  • 2 篇 information secu...

作者

  • 9 篇 yuefeng li
  • 8 篇 lin chia-wen
  • 8 篇 li yuefeng
  • 7 篇 tian chunwei
  • 6 篇 yue xu
  • 5 篇 xu yue
  • 5 篇 j. sitte
  • 5 篇 zuo wangmeng
  • 4 篇 zheng menghua
  • 4 篇 geva shlomo
  • 4 篇 jøsang audun
  • 4 篇 zhang yanning
  • 3 篇 zhong ning
  • 3 篇 sheng-tang wu
  • 3 篇 zhang shichao
  • 3 篇 joaquin sitte
  • 3 篇 n. zhong
  • 3 篇 nayak richi
  • 3 篇 p. winzer
  • 3 篇 fidge colin

语言

  • 102 篇 英文
  • 2 篇 其他
检索条件"机构=School of Software Engineering and Data Communications"
104 条 记 录,以下是11-20 订阅
排序:
Constrained circular hidden Markov models for recognizing deformed shapes
Constrained circular hidden Markov models for recognizing de...
收藏 引用
CIMCA 2006: International Conference on Computational Intelligence for Modelling, Control and Automation, Jointly with IAWTIC 2006: International Conference on Intelligent Agents Web Technologies and International Commerce
作者: Cai, Jinhai School of Software Engineering and Data Communications Queensland University of Technology Brisbane QLD 4001 Australia
In this paper, we analyse the properties of the standard circular hidden Markov model (HMM) on 2D shape recognition. We point out the limitations of the circular HMMs and further propose to impose the constraint on th... 详细信息
来源: 评论
Access control requirements for processing electronic health records
Access control requirements for processing electronic health...
收藏 引用
5th International Conference on Business Process Management
作者: Alhaqbani, Bandar Fidge, Colin Information Security Institute Queensland University of Technology Brisbane Australia School of Software Engineering and Data Communications Queensland University of Technology Brisbane Australia
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency. A number of countries are developing... 详细信息
来源: 评论
Tracing secure information flow through mode changes
Tracing secure information flow through mode changes
收藏 引用
29th Australasian Computer Science Conference, ACSC 2006
作者: Fidge, Colin McComb, Tim School of Software Engineering and Data Communications Queensland University of Technology Australia School of Information Technology and Electrical Engineering University of Queensland Australia
communications devices intended for use in security-critical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing the flow of classified information thr... 详细信息
来源: 评论
Pocket RikWik: A mobile wiki supporting online and offline collaboration
Pocket RikWik: A mobile wiki supporting online and offline c...
收藏 引用
12th Australasian World Wide Web Conference, AusWeb 2006
作者: Huang, Wei-Che Roe, Paul Wong, On School of Software Engineering and Data Communications Faculty of Information Technology Queensland University Of Technology Brisbane 4000 Australia
Wikis are a popular collaboration technology. They support the collaborative editing of web pages through a simple mark-up language. The wikipedia site is perhaps the best example of how wikis can be used. There are l... 详细信息
来源: 评论
Trust network analysis with subjective logic
Trust network analysis with subjective logic
收藏 引用
29th Australasian Computer Science Conference, ACSC 2006
作者: Jøsang, Audun Hayward, Ross Pope, Simon School of Software Engineering and Data Communications Queensland University of Technology Brisbane Australia University of Queensland Brisbane Australia
Trust networks consist of transitive trust relationships between people, organisations and software agents connected through a medium for communication and interaction. By formalising trust relationships, e.g. as repu... 详细信息
来源: 评论
Multiple Choice Questions Not Considered Harmful
Multiple Choice Questions Not Considered Harmful
收藏 引用
7th Australasian Computing Education Conference, ACE 2005
作者: Woodford, Karyn Bancroft, Peter School of Software Engineering and Data Communications Queensland University of Technology George Street Brisbane QLD 4000 Australia
Increasingly, academics are confronted with issues associated with assessment in large classes, arising from a combination of factors including higher student enrolments and the introduction of a trimester of study in... 详细信息
来源: 评论
Modelling fish behaviour  03
Modelling fish behaviour
收藏 引用
1st International Conference on Computer Graphics and Interactive Techniques in Australasia and South East Asia, GRAPHITE '03
作者: Stephens, Kingsley Pham, Binh Wardhani, Aster School of Software Engineering and Data Communications Queensland University of Technology 2 George St Brisbane QLD 4001 Australia
This paper studies the problem of creating artificial fish for real-time interactive virtual worlds aimed at desktop environments with hardware 3D support. The artificial fish developed have the ability to move, sense... 详细信息
来源: 评论
Tight Spirals and Industry Clients: The Modern SE Education Experience
Tight Spirals and Industry Clients: The Modern SE Education ...
收藏 引用
7th Australasian Computing Education Conference, ACE 2005
作者: Hogan, James M. Smith, Glenn Thomas, Richard School of Software Engineering and Data Communications Queensland University Technology GPO Box 2434 Brisbane QLD 4001 Australia
Modern software engineering education is driven by an expectation that industry best practice and state of the art software technologies should not wait until graduation, but should appear early in the undergraduate c... 详细信息
来源: 评论
A secure anonymous authorisation architecture for E-commerce
A secure anonymous authorisation architecture for E-commerce
收藏 引用
2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE-05
作者: Au, Wai-Ki Richard Choo, Kim-Kwang Raymond Looi, Mark Information Security Research Centre School of Software Engineering and Data Communications Queensland University of Technology QLD 4001 Australia
We propose a new authorisation architecture based on the extension to the anonymous authorisation framework proposed by Au et al., whereby a new entity, trustee, and a new concept, Key Binding Certificate (KBC), are i... 详细信息
来源: 评论
Cross-layer verification of type flaw attacks on security protocols
Cross-layer verification of type flaw attacks on security pr...
收藏 引用
30th Australasian Computer Science Conference, ACSC 2007
作者: Long, Benjamin W. Fidge, Colin J. Carrington, David A. School of Information Technology and Electrical Engineering University of Queensland Brisbane Australia School of Software Engineering and Data Communications Queensland University of Technology Brisbane Australia
Security protocols are often specified at the application layer;however, application layer specifications give little detail regarding message data structures at the presentation layer upon which some implementation-d... 详细信息
来源: 评论