咨询与建议

限定检索结果

文献类型

  • 96 篇 会议
  • 72 篇 期刊文献

馆藏范围

  • 168 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 45 篇 信息与通信工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 控制科学与工程
    • 18 篇 电气工程
    • 13 篇 生物工程
    • 10 篇 网络空间安全
    • 8 篇 光学工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 机械工程
    • 6 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 航空宇航科学与技...
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
  • 52 篇 理学
    • 32 篇 数学
    • 14 篇 生物学
    • 10 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 5 篇 系统科学
  • 32 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 9 篇 图书情报与档案管...
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
  • 3 篇 法学
    • 2 篇 社会学
  • 2 篇 军事学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 6 篇 wireless sensor ...
  • 4 篇 computer archite...
  • 4 篇 gyroscopes
  • 4 篇 wireless communi...
  • 4 篇 interference
  • 4 篇 computational mo...
  • 4 篇 mathematical mod...
  • 4 篇 sensors
  • 3 篇 support vector m...
  • 3 篇 deep learning
  • 3 篇 resource managem...
  • 3 篇 convolution
  • 3 篇 quality of servi...
  • 3 篇 processor schedu...
  • 3 篇 servers
  • 3 篇 switches
  • 3 篇 middleware
  • 3 篇 virtualization
  • 3 篇 accuracy
  • 3 篇 energy efficienc...

机构

  • 9 篇 state key labora...
  • 7 篇 computer enginee...
  • 7 篇 school of comput...
  • 6 篇 complex networks...
  • 6 篇 state key labora...
  • 6 篇 xidian universit...
  • 6 篇 department of co...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 state key labora...
  • 4 篇 college of compu...
  • 4 篇 department of ra...
  • 4 篇 school of softwa...
  • 4 篇 zhibian technolo...
  • 4 篇 shenzhen univers...
  • 4 篇 jiangsu high tec...
  • 3 篇 beijing laborato...
  • 3 篇 the ministry of ...
  • 3 篇 state key labora...

作者

  • 9 篇 qian xueming
  • 6 篇 zhu li
  • 5 篇 ilya grishin
  • 5 篇 rongqing zhang
  • 5 篇 grigoriy fokin
  • 4 篇 yang yi
  • 4 篇 vladimir sevidov
  • 4 篇 haqiq abdelkrim
  • 4 篇 wei yunchao
  • 4 篇 wang yaxiong
  • 4 篇 xiang cheng
  • 4 篇 leung victor c.m...
  • 4 篇 kim dong seong
  • 4 篇 zhang haijun
  • 4 篇 grishin ilya
  • 4 篇 fokin grigoriy
  • 3 篇 liu bo
  • 3 篇 gu rentao
  • 3 篇 wuxia jin
  • 3 篇 peng chunlei

语言

  • 156 篇 英文
  • 9 篇 其他
  • 3 篇 中文
检索条件"机构=Software Engineering and Networks Laboratory"
168 条 记 录,以下是121-130 订阅
排序:
Product image search with deep attribute mining and re-ranking  17th
Product image search with deep attribute mining and re-ranki...
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Zhou, Xin Zhang, Yuqi Bai, Xiuxiu Zhu, Jihua Zhu, Li Qian, Xueming School of Software Engineering Xi’an Jiaotong University Xi’an710049 China The Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China
With the high-growing of e-commerce, more and more users have changed to buy from websites rather than in stores. To deal with mass products, the traditional text-based product search has become incompetent to meet us... 详细信息
来源: 评论
Scale and topology preserving SIFT feature hashing  1
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Kang, Chen Zhu, Li Qian, Xueming School of Software Engineering Xi’an Jiaotong University Xi’an710049 China The Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an710049 China
Abstract. In recent years, content based image retrieval has been concerned because of practical needs on Internet services, especially methods that can improve retrieving speed and precision. Thus, we propose a hashi... 详细信息
来源: 评论
Exploring Energy Saving for Mixed-Criticality Systems on Multi-Cores
Exploring Energy Saving for Mixed-Criticality Systems on Mul...
收藏 引用
IEEE Symposium on Real-Time and Embedded Technology and Applications
作者: Sujay Narayana Pengcheng Huang Georgia Giannopoulou Lothar Thiele R. Venkatesha Prasad Embedded Software Group TU Delft The Netherlands Computer Engineering and Networks Laboratory ETH Zurich Zurich Switzerland
In this paper we study a general energy minimization problem for mixed-criticality systems on multi-cores, considering different system operation modes, and static & dynamic energy consumption. While making global... 详细信息
来源: 评论
Efficient In SAR phase noise reduction via total variation regularization
收藏 引用
Science China(Information Sciences) 2015年 第8期58卷 64-76页
作者: LUO XiaoMei WANG XiangFeng SUO ZhiYong LI ZhenFang State Key Laboratory of Integrated Services Networks Xidian University Department of Electronic Information Engineering Nanchang University Shanghai Key Laboratory of Trustworthy Computing Software Engineering InstituteEast China Normal University National Laboratory of Radar Signal Processing Xidian University
We consider the phase noise filtering problem for Interferometric Synthetic Aperture Radar(In SAR)using a total variation regularized complex linear least squares formulation. Although the original formulation is conv... 详细信息
来源: 评论
Quantifying patterns of research interest evolution
arXiv
收藏 引用
arXiv 2017年
作者: Jia, Tao Wang, Dashun Szymanski, Boleslaw K. College of Computer and Information Science Southwest University Chongqing400715 China Laboratory for Software and Knowledge Engineering Southwest University Chongqing400715 China Kellogg School of Management Northwestern University EvanstonIL60208 United States Northwestern University EvanstonIL60208 United States McCormick School of Enginnering and Applied Sciences Northwestern University EvanstonIL60208 United States Social Cognitive Networks Academic Research Center Rensselaer Polytechnic Institute TroyNY12180 United States Department of Computer Science Rensselaer Polytechnic Institute TroyNY12180 United States Spo leczna Akademia Nauk Lòdz90-113 Poland
Our quantitative understanding of how scientists choose and shift their research focus over time is highly consequential, because it affects the ways in which scientists are trained, science is funded, knowledge is or...
来源: 评论
Security modeling and analysis of an intrusion tolerant cloud data center  3
Security modeling and analysis of an intrusion tolerant clou...
收藏 引用
3rd IEEE World Conference on Complex Systems, WCCS 2015
作者: Mir, Iman El Kim, Dong Seong Haqiq, Abdelkrim Computer Networks Mobility and Modeling Laboratory FST Hassan 1 University Settat Morocco Department of Computer Science and Software Engineering University of Canterbury New Zealand E-NGN Research Group Africa and Middle East Morocco
It is important to protect a Cloud Data Center even if there are attacks by an adversary. In order to improve the security of a Cloud Data Center (CDC) in particular, system availability, a proactive approach named SC... 详细信息
来源: 评论
Security modeling and analysis of a self-cleansing intrusion tolerance technique  11
Security modeling and analysis of a self-cleansing intrusion...
收藏 引用
11th International Conference on Information Assurance and Security, IAS 2015
作者: Mir, Iman El Kim, Dong Seong Haqiq, Abdelkrim Computer Networks Mobility and Modeling Laboratory FST Hassan 1 University Settat Morocco Department of Computer Science and Software Engineering University of Canterbury New Zealand E-NGN Research Group Africa and Middle East South Africa
Since security is increasingly the principal concern in the conception and implementation of software systems, it is very important that the security mechanisms are designed so as to protect the computer systems again... 详细信息
来源: 评论
MASAT: Model-based automated security assessment tool for cloud computing  11
MASAT: Model-based automated security assessment tool for cl...
收藏 引用
11th International Conference on Information Assurance and Security, IAS 2015
作者: Mjihil, Oussama Kim, Dong Seong Haqiq, Abdelkrim Computer Networks Mobility and Modeling Laboratory FST Hassan 1st University Settat Morocco Department of Computer Science and Software Engineering University of Canterbury New Zealand E-NGN Research Group Africa and Middle East South Africa
Security assessment and mitigation have gained considerable attention over the recent years according to the information technology evolution and its broad adoption. Organizations are more aware of their data security... 详细信息
来源: 评论
Security modeling and analysis of a self-cleansing intrusion tolerance technique
Security modeling and analysis of a self-cleansing intrusion...
收藏 引用
International Symposium on Information Assurance and Security (IAS)
作者: Iman El Mir Dong Seong Kim Abdelkrim Haqiq Computer Networks Mobility and Modeling laboratory FST Hassan 1st University Settat Morocco Department of Computer Science and Software Engineering University of Canterbury New Zealand E-NGN Research Group
Since security is increasingly the principal concern in the conception and implementation of software systems, it is very important that the security mechanisms are designed so as to protect the computer systems again... 详细信息
来源: 评论
MASAT: Model-based automated security assessment tool for cloud computing
MASAT: Model-based automated security assessment tool for cl...
收藏 引用
International Symposium on Information Assurance and Security (IAS)
作者: Oussama Mjihil Dong Seong Kim Abdelkrim Haqiq Computer Networks Mobility and Modeling laboratory Hassan 1st University Settat Morocco Department of Computer Science and Software Engineering University of Canterbury New Zealand e-NGN Research Group Africa
Security assessment and mitigation have gained considerable attention over the recent years according to the information technology evolution and its broad adoption. Organizations are more aware of their data security... 详细信息
来源: 评论