X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (1991) 1991
Patent (419) 419
Magazine Article (94) 94
Conference Proceeding (93) 93
Dissertation (57) 57
Book / eBook (17) 17
Web Resource (7) 7
Book Chapter (6) 6
Publication (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
physics (123) 123
computer science, information systems (85) 85
performing operations (85) 85
transporting (85) 85
engineering, electrical & electronic (75) 75
fixed constructions (68) 68
algorithms (66) 66
electricity (59) 59
telecommunications (59) 59
mechanical engineering (56) 56
blasting (54) 54
heating (54) 54
lighting (54) 54
weapons (54) 54
cloud computing (51) 51
computer science (51) 51
calculating (50) 50
computing (50) 50
counting (50) 50
watermarking (50) 50
human necessities (47) 47
chemistry (46) 46
metallurgy (46) 46
analysis (45) 45
humans (42) 42
steganography (42) 42
testing (42) 42
general tagging of cross-sectional technologies spanning over several sections of the ipc (39) 39
general tagging of new technological developments (39) 39
measuring (39) 39
technical subjects covered by former uspc cross-reference art collections [xracs] and digests (39) 39
technologies or applications for mitigation or adaptation againstclimate change (39) 39
computer science, theory & methods (34) 34
mining (34) 34
electric digital data processing (33) 33
earth drilling (31) 31
authentication (30) 30
feature extraction (30) 30
security (30) 30
computer communication networks (28) 28
information science (28) 28
cryptography (27) 27
computer science, software engineering (26) 26
encryption (26) 26
agriculture (25) 25
electric communication technique (25) 25
animal husbandry (24) 24
fishing (24) 24
forestry (24) 24
hunting (24) 24
optics (24) 24
trapping (24) 24
earth drilling, e.g. deep drilling (23) 23
obtaining oil, gas, water, soluble or meltable materials or aslurry of minerals from wells (23) 23
oncology (23) 23
privacy (23) 23
robustness (22) 22
basic electric elements (21) 21
computer security (20) 20
engineering elements and units (20) 20
general measures for producing and maintaining effectivefunctioning of machines or installations (20) 20
steganalysis (20) 20
thermal insulation in general (20) 20
wireless sensor networks (20) 20
image data processing or generation, in general (19) 19
research (19) 19
sensors (19) 19
animals (18) 18
building (18) 18
data encryption (18) 18
information hiding (18) 18
studies (18) 18
护理 (18) 18
computer science, artificial intelligence (17) 17
data structures, cryptology and information theory (17) 17
information systems (17) 17
phosphorylation (17) 17
usage (17) 17
应用 (17) 17
algorithm (16) 16
digital watermarking (16) 16
information systems applications (16) 16
metastasis (16) 16
searchable encryption (16) 16
姓名 (16) 16
application software (15) 15
cell line, tumor (15) 15
computer communication systems (15) 15
computer networks (15) 15
image processing (15) 15
methods (15) 15
prostate cancer (15) 15
servers (15) 15
special purpose and application-based systems (15) 15
survival (15) 15
technologies for adaptation to climate change (15) 15
fingerprint liveness detection (14) 14
investigating or analysing materials by determining theirchemical or physical properties (14) 14
male (14) 14
measuring electric variables (14) 14
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


中国通信:英文版, ISSN 1673-5447, 2016, Volume 13, Issue 7, pp. 16 - 23
Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in... 
整数线性规划 | K覆盖 | 多传感器 | 无线传感器网络 | 区域检测 | ILP | 系数矩阵 | 覆盖算法 | Algorithm design and analysis | Wireless sensor networks | Computational modeling | Mobile communication | Linear programming | Sensors | Mathematical model | k-barrier coverage | linear programming | wireless sensor networks | TELECOMMUNICATIONS
Journal Article
中国通信:英文版, ISSN 1673-5447, 2016, Volume 13, Issue 7, pp. 60 - 65
Journal Article
IEEE transactions on information forensics and security, ISSN 1556-6021, 2016, Volume 11, Issue 12, pp. 2706 - 2716
Keyword-based search over encrypted outsourced data has become an important tool in the current cloud computing scenario. The majority of the existing... 
Cats | fuzzy search | Outsourcing security | multi-keyword search | Search problems | Data models | Cryptography | Servers | Indexes | searchable encryption | privacy-preserving | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Keywords
Journal Article
Security and Communication Networks, ISSN 1939-0114, 08/2014, Volume 7, Issue 8, pp. 1283 - 1291
Journal Article
Journal Article
IEEE transactions on parallel and distributed systems, ISSN 1045-9219, 2016, Volume 27, Issue 2, pp. 340 - 352
Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and... 
Clouds | Keyword search | Vectors | multi-keyword ranked search | dynamic update | Encryption | Indexes | Servers | cloud computing | Searchable encryption | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Cloud computing | Usage | Algorithms | Research | Keywords | Query processing | Searching | Mathematical analysis | Deletion | Insertion | Mathematical models | Vectors (mathematics)
Journal Article
IEEE transactions on parallel and distributed systems, ISSN 1045-9219, 2016, Volume 27, Issue 9, pp. 2546 - 2559
Journal Article
IEEE transactions on information forensics and security, ISSN 1556-6021, 2015, Volume 10, Issue 3, pp. 507 - 518
In this paper, we propose a scheme to detect the copy-move forgery in an image, mainly by extracting the keypoints for comparison. The main difference to the... 
Image segmentation | Accuracy | Estimation | Transforms | Educational institutions | segmentation | Forgery | Robustness | image forensics | Copy-move forgery detection | ENERGY MANAGEMENT | ROBUST | COMPUTER SCIENCE, THEORY & METHODS | FEATURES | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Consumer Electronics, ISSN 0098-3063, 02/2014, Volume 60, Issue 1, pp. 164 - 172
In recent years, consumer-centric cloud computing paradigm has emerged as the development of smart electronic devices combined with the emerging cloud... 
Cloud computing | Frequency modulation | Keyword search | Vectors | consumer-centric cloud | ranked search | Cryptography | Indexes | Servers | keyword search | PRIVACY | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Fuzzy logic | Usage | Query processing | Innovations | Fuzzy algorithms | Mathematical optimization | Fuzzy systems | Web sites | Email | Searching | Fuzzy set theory | Outsourcing | Fuzzy
Journal Article
Energy (Oxford), ISSN 0360-5442, 2019, Volume 169, pp. 637 - 645
With the shale gas revolution and the maturity of new energy technologies, the global oil-based energy pattern began to be remodeled worldwide. From the... 
New energy stocks | Divisia energy price index | VAR model | CLEAN ENERGY | THERMODYNAMICS | EMISSIONS | ENERGY & FUELS | REVOLUTION | OIL PRICES | Fluctuations | Autoregressive models | Shale | Fossil fuels | Fuels | Energy industry | Shale gas | Stock prices | Prices | Oil | Energy technology | Energy | Natural gas
Journal Article
Scientific reports, ISSN 2045-2322, 2019, Volume 9, Issue 1, pp. 2541 - 11
... Jiang1, Xingming sun1, Haiyang Chen1, Jin Li1, Weilan piao2, Xiaoyang Zhu1, Zhanying Zhang1, Hongliang Zhang1, Zichao Li 1 and Jinjie Li1 Higher chlorophyll content... 
BIOGENESIS | BIOSYNTHESIS | MULTIDISCIPLINARY SCIENCES | HARVESTING COMPLEX-II | MUTATION | AGRONOMIC TRAITS | DEGRADATION | REDUCTASE | Haplotypes | Chlorophyll | Plant breeding | Efficiency | Positive selection | Genes | Alleles | Genomes | Single-nucleotide polymorphism
Journal Article
International Journal of Distributed Sensor Networks, ISSN 1550-1329, 2/2017, Volume 13, Issue 2, p. 155014771769417
Currently, a huge amount of visual data such as digital images and videos have been collected by visual sensor nodes, that is, camera nodes, and distributed on... 
Visual sensor networks | COPY DETECTION | SEARCH | SERVICES | COMPUTER SCIENCE, INFORMATION SYSTEMS | near-duplicate image elimination | TELECOMMUNICATIONS | Internet of Things | near-duplicate detection | image copy detection | FEATURES
Journal Article
IEEE transactions on information forensics and security, ISSN 1556-6021, 2016, Volume 11, Issue 11, pp. 2594 - 2608
With the increasing importance of images in people's daily life, content-based image retrieval (CBIR) has been widely studied. Compared with text documents,... 
secure kNN | Cloud computing | watermark | Watermarking | copy deterrence | Encryption | Outsourcing | Servers | content-based image retrieval | Searchable encryption | WATERMARKING | KEYWORD RANKED SEARCH | COMPUTER SCIENCE, THEORY & METHODS | EFFICIENT | ENGINEERING, ELECTRICAL & ELECTRONIC | Image retrieval | Retrieval | Query processing | Efficiency | Images | Security
Journal Article
Journal of biomedical science, ISSN 1423-0127, 2018, Volume 25, Issue 1, pp. 23 - 7
Journal Article