咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 161 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 67 篇 工学
    • 51 篇 计算机科学与技术...
    • 45 篇 软件工程
    • 7 篇 电气工程
    • 6 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 5 篇 材料科学与工程(可...
    • 4 篇 土木工程
    • 3 篇 建筑学
    • 2 篇 动力工程及工程热...
    • 2 篇 交通运输工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 冶金工程
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 航空宇航科学与技...
  • 24 篇 理学
    • 21 篇 数学
    • 13 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
  • 17 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 68 篇 predictive model...
  • 23 篇 data models
  • 20 篇 software
  • 13 篇 analytical model...
  • 11 篇 computational mo...
  • 11 篇 time series anal...
  • 8 篇 software enginee...
  • 8 篇 data mining
  • 8 篇 machine learning
  • 8 篇 prediction algor...
  • 7 篇 artificial neura...
  • 7 篇 mathematical mod...
  • 7 篇 forecasting
  • 6 篇 costs
  • 6 篇 feature extracti...
  • 6 篇 adaptation model...
  • 5 篇 maintenance engi...
  • 5 篇 software quality
  • 5 篇 testing
  • 5 篇 accuracy

机构

  • 3 篇 school of softwa...
  • 2 篇 school of comput...
  • 2 篇 college of softw...
  • 2 篇 school of softwa...
  • 2 篇 school of softwa...
  • 2 篇 politecnico di m...
  • 1 篇 jiangsu universi...
  • 1 篇 cybersecurity an...
  • 1 篇 department of co...
  • 1 篇 univ costa rica ...
  • 1 篇 90010 belfort
  • 1 篇 brunel universit...
  • 1 篇 logic labs. the ...
  • 1 篇 software enginee...
  • 1 篇 tsinghua univ in...
  • 1 篇 univ tennessee 2...
  • 1 篇 school of comput...
  • 1 篇 ira a. fulton sc...
  • 1 篇 school of inform...
  • 1 篇 univ texas el pa...

作者

  • 3 篇 hall tracy
  • 3 篇 bowes david
  • 3 篇 shijin yuan
  • 3 篇 di penta massimi...
  • 2 篇 turhan burak
  • 2 篇 perez-palacin di...
  • 2 篇 hongyu li
  • 2 篇 minku leandro
  • 2 篇 wagner stefan
  • 2 篇 yu liu
  • 2 篇 duo li
  • 2 篇 britto ricardo
  • 2 篇 bener ayse
  • 2 篇 minku leandro l.
  • 2 篇 chao guo
  • 2 篇 mirandola raffae...
  • 2 篇 shepperd martin
  • 2 篇 shih-pang tseng
  • 1 篇 aapo nummenmaa
  • 1 篇 md. abu baker si...

语言

  • 157 篇 英文
  • 2 篇 其他
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"任意字段=10th International Conference on Predictive Models in Software Engineering, PROMISE 2014"
161 条 记 录,以下是81-90 订阅
排序:
Early Diagnostics on Team Communication: Experience-Based Forecasts on Student software Projects
Early Diagnostics on Team Communication: Experience-Based Fo...
收藏 引用
international conference on the Quality of Information and Communications Technology (QUATIC)
作者: Fabian Kortum Jil Klünder Software Engineering Group Leibniz Universität Hannover Hannover Germany
Effective team communication is a prerequisite for software quality and project success. It implies correctly elicited customer requirements, conduction of occurring change requests and to adhere releases. Team commun... 详细信息
来源: 评论
Extending Survivability models for Global software Development with Media Synchronicity theory  10
Extending Survivability Models for Global Software Developme...
收藏 引用
10th IEEE international conference on Global software engineering (ICGSE)
作者: Avritzer, Alberto Beecham, Sarah Britto, Ricardo Kroll, Josiane Menasche, Daniel S. Noll, John Paasivaara, Maria Siemens Corp Corp Technol Princeton NJ 08540 USA Lero Irish Software Engn Res Ctr Limerick Ireland Blekinge Inst Technol Karlskrona Sweden Pontificia Univ Catolica Rio Grande do Sul Porto Alegre RS Brazil Univ Fed Rio de Janeiro BR-21941 Rio De Janeiro RJ Brazil Aalto Univ Helsinki Finland
In this paper we propose a new framework to assess survivability of software projects accounting for media capability details as introduced in Media Synchronicity theory (MST). Specifically, we add to our global engin... 详细信息
来源: 评论
Information leak detection in business process models: theory, application, and tool support
收藏 引用
INFORMATION SYSTEMS 2015年 第0期47卷 244-257页
作者: Accorsi, Rafael Lehmann, Andreas Lohmann, Niels Univ Freiburg Dept Telemat D-79098 Freiburg Germany Univ Rostock Inst Informat D-18051 Rostock Germany
Despite the correct deployment of access control mechanisms, information leaks can persist and threaten the reliability of business process execution. this paper presents an automated and effective approach for the ve... 详细信息
来源: 评论
Towards Gamification in software Traceability: Between Test and Code Artifacts  10
Towards Gamification in Software Traceability: Between Test ...
收藏 引用
10th international conference on software Technologies (ICSOFT)
作者: Parizi, Reza Meimandi Kasem, Asem Abdullah, Azween Taylors Univ Sch Comp & IT Subang Jaya 47500 Selangor Malaysia
With the ever-increasing dependence of our civil and social infrastructures to the correct functioning of software systems, the need for approaches to engineer reliable and validated software systems grows rapidly. Tr... 详细信息
来源: 评论
What is the impact of imbalance on software defect prediction performance?  15
What is the impact of imbalance on software defect predictio...
收藏 引用
11th international conference on predictive models and Data Analytics in software engineering, promise 2015
作者: Mahmood, Zaheed Bowes, David Lane, Peter C.R. Hall, Tracy School of Technology Research Institute Hatfield HertfordshireAL10 9AB United Kingdom Dept. of Computer Science Brunel University Uxbridge Middlesex LondonUB8 3PH United Kingdom
software defect prediction performance varies over a large range. Menzies suggested there is a ceiling effect of 80% Recall [8]. Most of the data sets used are highly imbalanced. this paper asks, what is the empirical... 详细信息
来源: 评论
An empirical study on predicting defect numbers  27
An empirical study on predicting defect numbers
收藏 引用
27th international conference on software engineering and Knowledge engineering, SEKE 2015
作者: Chen, Mingming Ma, Yutao State Key Laboratory of Software Engineering Wuhan University Wuhan430072 China School of Computer Wuhan University Wuhan430072 China WISET Automation Co. Ltd. Wuhan Iron and Steel Group Corporation Wuhan430080 China
Defect prediction is an important activity to make software testing processes more targeted and efficient. Many methods have been proposed to predict the defect-proneness of software components using supervised classi... 详细信息
来源: 评论
Interoperable data models for infrastructural artefacts - A novel IFC extension method using RDF vocabularies exemplified with quay wall structures for harbors
Interoperable data models for infrastructural artefacts - A ...
收藏 引用
10th European conference on Product and Process Modelling, ECPPM 2014
作者: Beetz, J. Coebergh Van Den Braak, W. Botter Eindhoven, R. Zlatanova, S. De Laat, R. University of Technology Eindhoven Netherlands Delft University of Technology Delft Netherlands Logic Labs. The Hague Netherlands
Currently, only a limited number of dedicated data models for infrastructural artefacts exist. To cover information exchange and interoperability requirements, a number of international initiatives have been started u... 详细信息
来源: 评论
Extending Survivability models for Global software Development with Media Synchronicity theory
Extending Survivability Models for Global Software Developme...
收藏 引用
international conference on Global software engineering (ICGSE)
作者: Alberto Avritzer Sarah Beecham Ricardo Britto Josiane Kroll Daniel Sadoc Menasche John Noll Maria Paasivaara Siemens Corporation Corporate Technology Princeton NJ Lero Irish Software Engineering Research Centre Limerick Ireland Blekinge Institute of Technology Karlskrona Sweden PUCRS Porto Alegre RS Brazil Federal University of Rio de Janeiro Brazil Aalto University Helsinki Finland
In this paper we propose a new framework to assess survivability of software projects accounting for media capability details as introduced in Media Synchronicity theory (MST). Specifically, we add to our global engin... 详细信息
来源: 评论
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability
Mitigating insider threats in a cloud using a knowledgebase ...
收藏 引用
international conference for Internet Technology and Secured Transactions (ICITST)
作者: Qutaibah Althebyan Rami Mohawesh Qussai Yaseen Yaser Jararweh Software Engineering Department Jordan University of Science and Technology Irbid Jordan Computer Department Science Jordan University of Science and Technology Irbid Jordan Jordan University of Science and Technology Irbid Jordan
Most security related research for cloud computing focuses on attacks generated outside the cloud system. However, insider attackers are more challenging and can cause severe impacts on the cloud system stability and ... 详细信息
来源: 评论
Mining Shoppers Data Streams to Predict Customers Loyalty
Mining Shoppers Data Streams to Predict Customers Loyalty
收藏 引用
international conference on Intelligent System and Knowledge engineering, ISKE
作者: Vladimir Nikulin Tian-Hsiang Huang Jian-De Lu Department of Mathematical Methods in Economy Vyatka State University Kirov Russia Cloud Computing Research Center National Sun Yat-Sen University Kaohsiung City Taiwan Department of Business Management National Sun Yat-Sen University Kaohsiung City Taiwan
For a consumer brand, the most valuable customers are those who return after this purchase. therefore, we want to know if it is possible to predict which shoppers will buy a new item with enough purchase history. Fort... 详细信息
来源: 评论