咨询与建议

限定检索结果

文献类型

  • 3,537 篇 会议
  • 56 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 3,645 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,170 篇 工学
    • 1,675 篇 计算机科学与技术...
    • 1,147 篇 软件工程
    • 415 篇 电气工程
    • 356 篇 信息与通信工程
    • 221 篇 控制科学与工程
    • 135 篇 机械工程
    • 81 篇 电子科学与技术(可...
    • 79 篇 生物工程
    • 77 篇 动力工程及工程热...
    • 77 篇 安全科学与工程
    • 64 篇 交通运输工程
    • 62 篇 仪器科学与技术
    • 60 篇 网络空间安全
    • 58 篇 生物医学工程(可授...
    • 54 篇 建筑学
    • 51 篇 土木工程
    • 48 篇 材料科学与工程(可...
    • 48 篇 化学工程与技术
  • 503 篇 理学
    • 293 篇 数学
    • 118 篇 物理学
    • 88 篇 生物学
    • 69 篇 统计学(可授理学、...
    • 50 篇 系统科学
  • 437 篇 管理学
    • 302 篇 管理科学与工程(可...
    • 156 篇 工商管理
    • 156 篇 图书情报与档案管...
  • 85 篇 教育学
    • 84 篇 教育学
  • 76 篇 法学
    • 62 篇 社会学
  • 54 篇 医学
    • 47 篇 临床医学
  • 44 篇 经济学
    • 43 篇 应用经济学
  • 42 篇 文学
  • 13 篇 农学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 1 篇 历史学

主题

  • 419 篇 software
  • 181 篇 software enginee...
  • 171 篇 application soft...
  • 104 篇 hardware
  • 99 篇 computer archite...
  • 81 篇 computer science
  • 78 篇 testing
  • 78 篇 design methodolo...
  • 77 篇 software testing
  • 76 篇 security
  • 75 篇 software algorit...
  • 68 篇 software design
  • 65 篇 information tech...
  • 64 篇 software systems
  • 61 篇 computational mo...
  • 57 篇 data mining
  • 56 篇 costs
  • 56 篇 cloud computing
  • 54 篇 artificial intel...
  • 53 篇 education

机构

  • 21 篇 state key labora...
  • 12 篇 school of softwa...
  • 11 篇 school of softwa...
  • 11 篇 school of softwa...
  • 10 篇 school of softwa...
  • 10 篇 shandong provinc...
  • 9 篇 department of co...
  • 9 篇 peking univ sch ...
  • 8 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 anhui jiyuan sof...
  • 8 篇 institute of sof...
  • 7 篇 college of compu...
  • 7 篇 tsinghua univ sc...
  • 7 篇 beijing institut...
  • 7 篇 school of softwa...
  • 7 篇 xiamen univ soft...
  • 7 篇 univ elect sci &...
  • 7 篇 national key lab...
  • 7 篇 school of inform...

作者

  • 8 篇 althunibat ahmad
  • 6 篇 yin zhenyu
  • 6 篇 huang han
  • 6 篇 luiz alberto vie...
  • 6 篇 liu jing
  • 6 篇 cai lizhi
  • 6 篇 adilson marques ...
  • 6 篇 choi ho-jin
  • 5 篇 hu changzhen
  • 5 篇 ho-jin choi
  • 5 篇 wu zhonghai
  • 5 篇 liu wei
  • 5 篇 zhang xing
  • 5 篇 haiyang wang
  • 5 篇 jing liu
  • 5 篇 lizhen cui
  • 4 篇 sato mitsuru
  • 4 篇 zhang lin
  • 4 篇 tanosaki takao
  • 4 篇 saito minoru

语言

  • 3,594 篇 英文
  • 28 篇 其他
  • 13 篇 中文
  • 7 篇 俄文
  • 3 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 乌克兰文
检索条件"任意字段=11th International Conference on Algebraic Methodology and Software Technology"
3645 条 记 录,以下是71-80 订阅
排序:
Stepwise refinement process with modularity: an algebraic approach
Stepwise refinement process with modularity: an algebraic ap...
收藏 引用
Proceedings: 11th international conference on software Engineering
作者: Nakagawa, Ataru T. Futatsugi, Kokichi Electrotech Lab Tsukuba Jpn
the authors provide a formal scheme incorporating these two methods, based on an order-sorted algebraic specification language, that incorporates stepwise refinement and modularization. their emphasis is both on rigor... 详细信息
来源: 评论
Code Smells in Infrastructure as Code  11
Code Smells in Infrastructure as Code
收藏 引用
11th international conference on the Quality of Information and Communications technology (QUATIC)
作者: Schwarz, Julian Steffens, Andreas Lichter, Horst Rhein Westfal TH Aachen Aachen Germany Rhein Westfal TH Aachen Res Grp Software Construct Aachen Germany
Ensuring high quality in software systems is a wellknown and big challenge. Infrastructure as Code (IaC) gathered increasing popularity in recent years, but there is only little research done in terms of quality of th... 详细信息
来源: 评论
Malware's Double Anti Analysis (DAA) Analysis methodology  11
Malware's Double Anti Analysis (DAA) Analysis Methodology
收藏 引用
11th international conference on Electronics, Computers and Artificial Intelligence (ECAI)
作者: Beqqali, Yanis Sadik, Hamza Es Herrmann, Francine Sabatier, Fabrice Univ Lorraine UFR MIM Metz France Univ Lorraine LCOMS Metz France LORIA Secur Lab Nancy Nancy France
Most modern malware use anti-analyze techniques to escape existing detection and analysis solutions. We designed a new methodology DAA to analyze malwares even when they use this predisposition. To this end, we have a... 详细信息
来源: 评论
Research on Function Test Method of Assistant Design software Based on Cloud Computing  11
Research on Function Test Method of Assistant Design Softwar...
收藏 引用
11th international conference on Measuring technology and Mechatronics Automation (ICMTMA)
作者: Wei Yunhua Wuhan City Vocat Coll Wuhan 430070 Peoples R China
In order to solve the problems of complicated steps and low accuracy in traditional software function testing, a cloud computing-based software function testing method for aided design is proposed. the software functi... 详细信息
来源: 评论
Extending ISO/IEC 29110 Basic Profile with Privacy-by-Design Approach: a Case Study in the Health Care Sector  11
Extending ISO/IEC 29110 Basic Profile with Privacy-by-Design...
收藏 引用
11th international conference on the Quality of Information and Communications technology (QUATIC)
作者: Morales-Trujillo, Miguel Ehecatl Alberto Garcia-Mireles, Gabriel Univ Canterbury Christchurch New Zealand Univ Sonora Dept Matemat Hermosillo Sonora Mexico
Privacy related elements have become an essential part of any information system. Previous studies reveal a scarcity of research on privacy in software processes, few engineering practices and a lack of methodological... 详细信息
来源: 评论
Evaluation of Asana, Odoo, and ProjectLibre Project Management Tools using the OSSpal methodology  11
Evaluation of Asana, Odoo, and ProjectLibre Project Manageme...
收藏 引用
11th international Joint conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K) / 11th international conference on Knowledge Engineering and Ontology Development (KEOD)
作者: Marques, Joana Ferreira Bernardino, Jorge Polytech Coimbra ISEC Rua Pedro Nunes P-3030199 Coimbra Portugal Univ Coimbra CISUC Ctr Informat & Syst P-3030290 Coimbra Portugal
In order to successfully complete projects it is essential for companies to acquire a project management tool that assists in their planning, cost and resource management. Currently, there are several open source proj... 详细信息
来源: 评论
Microwave distribution systems simulation with the use of ⟪Serenade⟫ software  11
Microwave distribution systems simulation with the use of ⟪...
收藏 引用
11th international conference on Microwave and Telecommunication technology
作者: Kravchuk, SA Sakhno, YI Res Inst Telecomm NTUU KPI UA-03056 Kiev Ukraine
the paper presents the possibility of simulation of microwave distribution systems using the "Serenade" software (Ansoft Corp.) Described are the models of channels for digital streams interchange between th...
来源: 评论
software for wireless broadband system design  11
Software for wireless broadband system design
收藏 引用
11th international conference on Microwave and Telecommunication technology
作者: Shelkovnikov, BN Shelkovnikov, AB Budimir, D Natl Tech Univ Ukraine KPI UA-252056 Kiev Ukraine
the paper observes software of leading companies in the field of wireless broadband systems development. the basic characteristics of appropriate software and design systems are shown including the most typical exampl... 详细信息
来源: 评论
Many Cores and Still Delays - Simulating Multi-Core Communication software Execution  19
Many Cores and Still Delays - Simulating Multi-Core Communic...
收藏 引用
11th international conference on Computer Modeling and Simulation (ICCMS) / 8th international conference on Intelligent Computing and Applications (ICICA)
作者: Dale, Oystein Kristiansen, Stein Plagemann, thomas Peter Volnes, Espen Univ Oslo Dept Informat Oslo Norway
the effects of software execution are typically ignored in network simulators. this leads to inaccurate simulation results for new and emerging network technologies where packet processing in software has a significan... 详细信息
来源: 评论
Using Intrusive Microservices to Enable Deep Customization of Multi-Tenant SaaS  11
Using Intrusive Microservices to Enable Deep Customization o...
收藏 引用
11th international conference on the Quality of Information and Communications technology (QUATIC)
作者: Chauvel, Franck Solberg, Arnor SINTEF Trondheim Norway
Enterprise software applications need to be customized in order to meet special requirements from customers. When the customization requirements are beyond the prediction of vendors, deep customization is needed, and ... 详细信息
来源: 评论