咨询与建议

限定检索结果

文献类型

  • 1,344 篇 会议
  • 213 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,011 篇 工学
    • 849 篇 计算机科学与技术...
    • 733 篇 软件工程
    • 221 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 63 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 421 篇 理学
    • 253 篇 数学
    • 115 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 55 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 internet of thin...
  • 22 篇 data mining
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,440 篇 英文
  • 144 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1596 条 记 录,以下是961-970 订阅
排序:
QoS Traffic Mapping for a Multi-Participant Session in Unified Communications Networks
QoS Traffic Mapping for a Multi-Participant Session in Unifi...
收藏 引用
IEEE Canadian Conference on Electrical and computer engineering
作者: Abdelwahab M. Elnaka Qusay H. Mahmoud School of Computer Science University of Guelph Dept. of Electrical Computer and Software Engineering University of Ontario Institute of Technology
Unified communications (UC) offers users an uninterrupted communication service regardless of the device which the user is using, the heterogeneous networks to which he might be connected, the physical and logical con... 详细信息
来源: 评论
Analyzing impact of video codec, encapsulation methods and streaming protocols on the quality of video streaming
Analyzing impact of video codec, encapsulation methods and s...
收藏 引用
International Conference on Digital Information Management (ICDIM)
作者: Afaq Iqbal Fahim Arif Nasru Minallah Dept. Computer Software Engineering National University of Science and Technology Islamabad Pakistan Dept. Computer System Engineering University of Engineering and Technology Peshawar Pakistan
There are various factors involved in the transmission of video over internet. These factors have direct impact on the quality of the transmitted video. The underlying video codec, encapsulation method and protocol ar... 详细信息
来源: 评论
Secure Aggregation and Attack Detection for Smart Grid System
Secure Aggregation and Attack Detection for Smart Grid Syste...
收藏 引用
International Conference on Network-Based Information Systems (NBIS)
作者: Inshil Doh Jiyoung Lim Kijoon Chae Dept. of Computer Science and Engineering Ewha Womans University Seoul Korea Dept. of Computer Software Korean Bible University Seoul Korea
Smart grid is a very efficient and intelligent system for managing and monitoring the electricity usage and it can be applied in many useful areas. It supports energy producers and consumers efficiently by supporting ... 详细信息
来源: 评论
Identifying barriers to the systematic literature review process
Identifying barriers to the systematic literature review pro...
收藏 引用
2013 ACM / IEEE International Symposium on Empirical software engineering and Measurement, ESEM 2013
作者: Carver, Jeffrey C. Hassler, Edgar Hernandes, Elis Kraft, Nicholas A. Dept. of Computer Science Univ. of Alabama Tuscaloosa AL United States Dept. of Information Systems Statistics and Management Science Univ. of Alabama Tuscaloosa AL United States LaPES Software Engineering Research Lab Federal Univ. of Sao Carlos Sao Carlos SP Brazil
Conducting a systematic literature review (SLR) is difficult and time-consuming for an experienced researcher, and even more so for a novice graduate student. With a better understanding of the most common difficultie... 详细信息
来源: 评论
Tablet PC in restaurant
Tablet PC in restaurant
收藏 引用
Student Conference on Research and Development (SCOReD)
作者: Ali Adil Ali Hussain Falih Mahdi Dept. of Mathematics and Computer Science Graduate School of Natural and Applied Sciences Cankaya University Ankara Turkey Computer and Software Engineering Department College of Engineering University of Diyala Iraq
The growth of wireless technology and tablet PC in this era is creating a great impact on our lives. Some early efforts have been made to combine and utilize both of these technologies in advancement of hospitality in... 详细信息
来源: 评论
On Change Detection of XML Schemas
On Change Detection of XML Schemas
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Abdullah Baqasah Eric Pardede Irena Holubova Wenny Rahayu Department of Computer Science and Computer Engineering La Trobe University Melbourne Australia Dept. of Software Eng. Charles Univ. Prague Prague Czech Republic Department of Software Engineering Charles University Prague Czech Republic
Change detection of XML data has emerged as an important research issue in the last decade, however the majority of change detection algorithms focuses on XML documents rather than schemas. This is because documents t... 详细信息
来源: 评论
LAVI: A Location Aware Virtual Infrastructure for VANETs
LAVI: A Location Aware Virtual Infrastructure for VANETs
收藏 引用
International Conference on Connected Vehicles and Expo (ICCVE)
作者: Rohan B. Golatkar Yu Chen Wei-Shinn Ku Dept. of Electrical and Computing Engineering SUNY-Binghamton Binghamton NY USA Dept. of Computer Science and Software Engineering Auburn University Auburn AL USA
Without requiring pre-fixed infrastructure, Vehicular Ad Hoc networks (VANETs) allow drivers to exchange information and access variant services in real-time manner. While achieving significant flexibility and conveni... 详细信息
来源: 评论
Towards continuous and passive authentication via touch biometrics: an experimental study on smartphones  14
Towards continuous and passive authentication via touch biom...
收藏 引用
Proceedings of the Tenth USENIX Conference on Usable Privacy and Security
作者: Hui Xu Yangfan Zhou Michael R. Lyu Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong and MoE Key Laboratory of High Confidence Software Technologies (CUHK Sub-Lab) Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute The Chinese University of Hong Kong and Dept. of Computer Science & Engineering The Chinese University of Hong Kong
Current smartphones generally cannot continuously authenticate users during runtime. This poses severe security and privacy threats: A malicious user can manipulate the phone if bypassing the screen lock. To solve thi... 详细信息
来源: 评论
Human sensing for smart cities
Human sensing for smart cities
收藏 引用
International Conference on Advances in Social Network Analysis and Mining, ASONAM
作者: Derek Doran Swapna Gokhale Aldo Dagnino Dept. of Computer Science and Engineering University of Connecticut Storrs CT Industrial Software Systems ABB Corporate Research Raleigh NC
Smart cities are powered by the ability to self-monitor and respond to signals and data feeds from heterogeneous physical sensors. These physical sensors, however, are fraught with interoperability and dependability c... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论