咨询与建议

限定检索结果

文献类型

  • 66 篇 会议
  • 35 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 62 篇 工学
    • 53 篇 计算机科学与技术...
    • 39 篇 软件工程
    • 22 篇 信息与通信工程
    • 10 篇 电气工程
    • 9 篇 控制科学与工程
    • 8 篇 生物工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 冶金工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 2 篇 仪器科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 轻工技术与工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 25 篇 理学
    • 15 篇 数学
    • 8 篇 生物学
    • 4 篇 物理学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
    • 1 篇 地球物理学
  • 19 篇 管理学
    • 13 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 公共卫生与预防医...
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 18 篇 software enginee...
  • 15 篇 data communicati...
  • 11 篇 data mining
  • 7 篇 australia
  • 6 篇 web mining
  • 5 篇 association rule...
  • 5 篇 information retr...
  • 4 篇 access control
  • 4 篇 xml
  • 4 篇 frequency
  • 4 篇 databases
  • 4 篇 artificial intel...
  • 3 篇 deep learning
  • 3 篇 systems engineer...
  • 3 篇 ontologies
  • 3 篇 communication sy...
  • 3 篇 image denoising
  • 3 篇 control systems
  • 3 篇 humans
  • 3 篇 hardware

机构

  • 11 篇 school of softwa...
  • 9 篇 school of softwa...
  • 8 篇 school of softwa...
  • 8 篇 school of softwa...
  • 7 篇 school of softwa...
  • 4 篇 school of softwa...
  • 3 篇 school of comput...
  • 3 篇 school of softwa...
  • 3 篇 school of inform...
  • 3 篇 the national eng...
  • 3 篇 department of sy...
  • 3 篇 peng cheng labor...
  • 3 篇 school of softwa...
  • 3 篇 the school of so...
  • 3 篇 school of comput...
  • 2 篇 college of compu...
  • 2 篇 school of artifi...
  • 2 篇 department of el...
  • 2 篇 the school of co...
  • 2 篇 information secu...

作者

  • 9 篇 yuefeng li
  • 8 篇 lin chia-wen
  • 8 篇 li yuefeng
  • 7 篇 tian chunwei
  • 6 篇 yue xu
  • 5 篇 xu yue
  • 5 篇 j. sitte
  • 5 篇 zuo wangmeng
  • 4 篇 zheng menghua
  • 4 篇 geva shlomo
  • 4 篇 jøsang audun
  • 4 篇 zhang yanning
  • 3 篇 zhong ning
  • 3 篇 sheng-tang wu
  • 3 篇 zhang shichao
  • 3 篇 joaquin sitte
  • 3 篇 n. zhong
  • 3 篇 nayak richi
  • 3 篇 p. winzer
  • 3 篇 fidge colin

语言

  • 102 篇 英文
  • 2 篇 其他
检索条件"机构=School of Software Engineering and Data Communications"
104 条 记 录,以下是51-60 订阅
排序:
Applying transformation-based error-driven learning to structured natural language queries
Applying transformation-based error-driven learning to struc...
收藏 引用
International Conference on Cyberworlds
作者: A. Woodley S. Geva School of Software Engineering and Data Communications Faculty of Information Technology Queensland University of Technology Australia
XML information retrieval (XML-IR) systems aim to provide users with highly exhaustive and highly specific results. To interact with XML-IR systems, users must express both their content and structural requirement, in... 详细信息
来源: 评论
Agent-based privilege negotiation for E-commerce on World Wide Web
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2003年 2722卷 68-71页
作者: Au, Richard Yao, Ming Looi, Mark Information Security Research Centre School of Software Engineering and Data Communications Queensland University of Technology Brisbane QLD 4001 Australia
来源: 评论
A method for access authorisation through delegation networks
Conferences in Research and Practice in Information Technolo...
收藏 引用
Conferences in Research and Practice in Information Technology Series 2006年 54卷 165-174页
作者: Jøsang, Audun Gollmann, Dieter Au, Richard School of Software Engineering and Data Communications QUT Brisbane Australia Distributed Systems Security Group Hamburg University of Technology Germany
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for enforcing that only authorised parties ... 详细信息
来源: 评论
Formally analysing a security protocol for replay attacks
Formally analysing a security protocol for replay attacks
收藏 引用
Australian Conference on software engineering
作者: B.W. Long C.J. Fidge School of Information Technology and Electrical Engineering University of Queensland Australia School of Software Engineering and Data Communications Queensland University of Technology Australia
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we suspected a replay attack was possibl... 详细信息
来源: 评论
A secure anonymous authorisation architecture for e-commerce
A secure anonymous authorisation architecture for e-commerce
收藏 引用
IEEE International Conference on e-Technology, e-Commerce and e-Service
作者: W.-K.R. Au K.-K.R. Choo M. Looi Information Security Research Centre School of Software Engineering and Data Communications Queensland University of Technology QLD Australia
We propose a new authorisation architecture based on the extension to the anonymous authorisation framework proposed by Au et al., whereby a new entity, trustee, and a new concept, key binding certificate (KBC), are i... 详细信息
来源: 评论
Privilege negotiation agents for distributed authorisation on World Wide Web
Privilege negotiation agents for distributed authorisation o...
收藏 引用
IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT)
作者: R. Au Ming Yao M. Looi Information Security Research Centre School of Software Engineering and Data Communications Queensland University of Technology QLD Australia
Privilege negotiation agents migrate from the security servers of different administrative domains on the Internet to the user's secure client agent environment. They work cooperatively for trust establishment and... 详细信息
来源: 评论
Gray-scale transformation for traffic classification: leveraging local and global features in flow data  3
Gray-scale transformation for traffic classification: levera...
收藏 引用
3rd International Conference on Electronic Information engineering, Big data, and Computer Technology, EIBDCT 2024
作者: Xia, Yuchao Xue, Mutian Li, Wei Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China University of Electronic Science and Technology of China Chengdu China Sichuan University of Media and Communications Chengdu China
The rapid expansion and diversification of internet traffic pose a pressing demand for accurate classification of diverse application streams in network management and security monitoring. This paper introduces a deep... 详细信息
来源: 评论
Model checking interrupt-dependent software
Model checking interrupt-dependent software
收藏 引用
Asia-Pacific Conference on software engineering
作者: C. Fidge P. Cook School of Software Engineering and Data Communications Queensland University of Technology QLD Australia School of Information Technology and Electrical Engineering University of Queensland QLD Australia
Embedded control programs are hard to analyse because their behaviour depends on how they interact with hardware devices. In particular, embedded code typically uses interrupts to respond to external events in a timel... 详细信息
来源: 评论
Capturing Evolving Patterns for Ontology-based Web Mining  04
Capturing Evolving Patterns for Ontology-based Web Mining
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Yuefeng Li Ning Zhong School of Software Engineering and Data Communications Queensland University of Technology Australia Department of Systems and Information Engineering Maebashi Institute of Technology Japan
An ontology-based Web mining model tends to extract an ontology from user feedback and use it to search the right data from the Web to answer what users want. It is indubitable that we can obtain numerous discovered p... 详细信息
来源: 评论
Automatic Pattern-Taxonomy Extraction for Web Mining  04
Automatic Pattern-Taxonomy Extraction for Web Mining
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Sheng-Tang Wu Yuefeng Li Yue Xu Binh Pham Phoebe Chen School of Software Engineering and Data Communications Queensland University of Technology QLD Australia School of Information Technology Deakin University VIC Australia
In this paper, we propose a model for discovering frequent sequential patterns, phrases, which can be used as profile descriptors of documents. It is indubitable that we can obtain numerous phrases using data mining a... 详细信息
来源: 评论