咨询与建议

限定检索结果

文献类型

  • 511 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 453 篇 工学
    • 305 篇 计算机科学与技术...
    • 266 篇 软件工程
    • 91 篇 信息与通信工程
    • 65 篇 仪器科学与技术
    • 62 篇 控制科学与工程
    • 59 篇 机械工程
    • 49 篇 电子科学与技术(可...
    • 22 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 动力工程及工程热...
    • 13 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 8 篇 土木工程
    • 7 篇 航空宇航科学与技...
    • 7 篇 安全科学与工程
  • 152 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 33 篇 图书情报与档案管...
  • 119 篇 理学
    • 78 篇 数学
    • 39 篇 系统科学
    • 17 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 8 篇 物理学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 16 篇 法学
    • 9 篇 社会学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 7 篇 农学
  • 7 篇 医学
  • 5 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 10 篇 web services
  • 9 篇 quality of servi...
  • 7 篇 component
  • 6 篇 internet of thin...
  • 6 篇 software design
  • 6 篇 cloud computing
  • 5 篇 ahp
  • 5 篇 data mining
  • 5 篇 security
  • 5 篇 middleware
  • 4 篇 video streaming
  • 4 篇 architecture
  • 4 篇 semantic web
  • 4 篇 software testing
  • 4 篇 qos
  • 4 篇 rfid
  • 4 篇 ontology
  • 3 篇 data warehouses
  • 3 篇 reliability
  • 3 篇 composition of s...

机构

  • 7 篇 faculty of compu...
  • 6 篇 international sc...
  • 5 篇 department of in...
  • 3 篇 research institu...
  • 3 篇 engineering inst...
  • 3 篇 department of so...
  • 2 篇 faculty of infor...
  • 2 篇 xiamen universit...
  • 2 篇 petroleum engine...
  • 2 篇 department of el...
  • 2 篇 school of comput...
  • 2 篇 department of sc...
  • 2 篇 department of in...
  • 2 篇 department of sc...
  • 2 篇 school of commun...
  • 2 篇 school of comput...
  • 2 篇 department of so...
  • 2 篇 computer and inf...
  • 2 篇 information and ...
  • 2 篇 beijing engineer...

作者

  • 27 篇 china
  • 5 篇 xu zhan
  • 5 篇 zhu quanyin
  • 4 篇 sung ho cho
  • 4 篇 li xinran
  • 4 篇 xiang chenhui
  • 3 篇 yang junkai
  • 3 篇 yuichi goto
  • 3 篇 li xiu
  • 3 篇 chen gang
  • 3 篇 sun xingping
  • 3 篇 hao wenning
  • 3 篇 yang shenglin
  • 3 篇 kang hongwei
  • 3 篇 liu dan
  • 3 篇 beijing 100876
  • 3 篇 duan qing
  • 2 篇 zhang hongjun
  • 2 篇 masayuki kawamat...
  • 2 篇 goto yuichi

语言

  • 513 篇 英文
检索条件"任意字段=2012 IEEE 3rd International Conference on Software Engineering and Service Science, ICSESS 2012"
513 条 记 录,以下是161-170 订阅
排序:
The analysis and design for single sign-on in the mobile Application Data Center
The analysis and design for single sign-on in the mobile App...
收藏 引用
2012 3rd international conference on System science, engineering Design and Manufacturing Informatization, ICSEM 2012
作者: Yulin, Tao Feng, Zhou College of Computer Science and Technology Guizhou University Guiyang 550025 China
Application Data Center (ADC) is a kind of application information service based on the mobile terminal system and it is provided by China Mobile to meet the demand of the group customers. By its different content, ap... 详细信息
来源: 评论
An ontology framework for evolution of plain text
An ontology framework for evolution of plain text
收藏 引用
2012 3rd international conference on System science, engineering Design and Manufacturing Informatization, ICSEM 2012
作者: Tang, Deyou Xu, Yang School of Software South China University of Technology Guangzhou 510006 China
Data evolution is the process of semantics change for data product, in which data product has intrinsic semantics as well as extension semantics. This paper presents an ontology framework for evolution of plain text. ... 详细信息
来源: 评论
QoS Architecture for Cloud-based Media Computing
QoS Architecture for Cloud-based Media Computing
收藏 引用
2012 ieee 3rd international conference on software engineering and service science(第三届ieee软件工程与服务科学国际会议 icsess2010)
作者: Hongli Luo Aaron Egbert Timothy Stahlhut Department of Computer Electricaland Information Technology Indiana University Purdue University F Department of Computer Electrical and Information Technology Indiana University Purdue University
Cloud computing is the current significant technology trend because of its potential to reduce the cost and increase the productivity. Virtualization is the key enabling technology in cloud computing which maximiz... 详细信息
来源: 评论
Directional fracture blasting numerical simulation and experimental study
Directional fracture blasting numerical simulation and exper...
收藏 引用
2012 3rd international conference on System science, engineering Design and Manufacturing Informatization, ICSEM 2012
作者: Xie, Hua-Gang Ruan, Huai-Ning Department of Civil Engineering Tongling University Tongling City China Geotechnical Engineering Research Institute Hohai University Nanjing China
Using the theories of explosive mechanics and rock fracture dynamics mechanics, obtains that explosive pressure and stress intensity factors of the complex slotted seam cartridge respectively is about 8.17,10 times th... 详细信息
来源: 评论
Spatially adaptive threshold for image denoisng based on nonsubsampled contourlet transform
Spatially adaptive threshold for image denoisng based on non...
收藏 引用
2012 3rd ieee international conference on Network Infrastructure and Digital Content, IC-NIDC 2012
作者: Sun, Xiangda Du, Junping Zhou, Yipeng Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer and Information Engineering Beijing Technology and Business University Beijing 102401 China
In recent years, the threshold for removing noise based on wavelet transform has been very widely used because of its effectiveness and simplicity. Thus, there has been threshold based on a variety of frequency-domain... 详细信息
来源: 评论
A Mapping from TVPCCS into BPEL
A Mapping from TVPCCS into BPEL
收藏 引用
2012 ieee 3rd international conference on software engineering and service science(第三届ieee软件工程与服务科学国际会议 icsess2010)
作者: Mohammed Lamine Beggar Liao Lejian Beijing Engineering Research Centre of High Volume Language Information Processing & Cloud Computing Applications Beijing Key Laboratory of Intelligent Information TechnologySchool of Computer ScienceBeijing Institute of Technology Beijing 100081China
The Web services Business Process Execution Language (BPEL) is a language used to specify compositions of web services. In the last few years, a considerable amount of work has been done on modeling (parts of) BPE... 详细信息
来源: 评论
ISEC: An Information Security engineering Cloud
ISEC: An Information Security Engineering Cloud
收藏 引用
2012 ieee 3rd international conference on software engineering and service science(第三届ieee软件工程与服务科学国际会议 icsess2010)
作者: Yuichi Goto Liqing Xu Kai Shi Jingde Cheng Department of Information and Computer Sciences Saitama UniversitySaitama 333-8570Japan Department of Information and Computer Sciences Saitama UniversitySaitama 333-8570Japan School of
ISEE was proposed as an information security engineering environment that supports continuous and consistent design, development, management and maintenance of security facilities of target systems, based on ISO/I... 详细信息
来源: 评论
Formalization and Verification of Exception Handling Logic in service-Oriented software
Formalization and Verification of Exception Handling Logic i...
收藏 引用
3rd international conference on Manufacturing science and engineering (ICMSE 2012)
作者: Qing, Wu Wuhan Univ Coll Educ Sci Wuhan 430072 Peoples R China
The dynamic and uncertainty in service-oriented software(SOS) running environment, together with the autonomy and loose coupling of service resources, lead to higher workload and more complexity of exception handling.... 详细信息
来源: 评论
Model-driven agent generation approach for adaptable and resource-aware sensor node
Model-driven agent generation approach for adaptable and res...
收藏 引用
2012 3rd international Workshop on software engineering for Sensor Network Applications, SESENA 2012
作者: Di Marco, Antinisca Pace, Stefano Marchesani, Stefano Pomante, Luigi Computer Science Dept. University of l'Aquila Italy DEWS University of l'Aquila Italy
A Wireless Sensor Network (WSN) is a versatile sensing system whose hardware resources are scarce and have to be carefully used and hence adapted to face with their context and resources changing. Moreover, WSN could ... 详细信息
来源: 评论
A Novel Multi-Threaded K-Means Clustering Approach for Intrusion Detection
A Novel Multi-Threaded K-Means Clustering Approach for Intru...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Vidit Pathak AnanthanarayanaV.S. Information Technology Dept.NITK Surathkal KarnatakaIndia Information TechnologyDept.NITK Surathkal KarnatakaIndia Dr.
Due to the proliferation of high-speed internet access,more and more organizations are becoming vulnerable to potential *** intrusion is defined as any set of actions that compromise the integrity,confidentiality or a... 详细信息
来源: 评论