咨询与建议

限定检索结果

文献类型

  • 511 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 453 篇 工学
    • 305 篇 计算机科学与技术...
    • 266 篇 软件工程
    • 91 篇 信息与通信工程
    • 65 篇 仪器科学与技术
    • 62 篇 控制科学与工程
    • 59 篇 机械工程
    • 49 篇 电子科学与技术(可...
    • 22 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 动力工程及工程热...
    • 13 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 8 篇 土木工程
    • 7 篇 航空宇航科学与技...
    • 7 篇 安全科学与工程
  • 152 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 33 篇 图书情报与档案管...
  • 119 篇 理学
    • 78 篇 数学
    • 39 篇 系统科学
    • 17 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 8 篇 物理学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 16 篇 法学
    • 9 篇 社会学
  • 10 篇 艺术学
    • 10 篇 设计学(可授艺术学...
  • 7 篇 农学
  • 7 篇 医学
  • 5 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 10 篇 web services
  • 9 篇 quality of servi...
  • 7 篇 component
  • 6 篇 internet of thin...
  • 6 篇 software design
  • 6 篇 cloud computing
  • 5 篇 ahp
  • 5 篇 data mining
  • 5 篇 security
  • 5 篇 middleware
  • 4 篇 video streaming
  • 4 篇 architecture
  • 4 篇 semantic web
  • 4 篇 software testing
  • 4 篇 qos
  • 4 篇 rfid
  • 4 篇 ontology
  • 3 篇 data warehouses
  • 3 篇 reliability
  • 3 篇 composition of s...

机构

  • 7 篇 faculty of compu...
  • 6 篇 international sc...
  • 5 篇 department of in...
  • 3 篇 research institu...
  • 3 篇 engineering inst...
  • 3 篇 department of so...
  • 2 篇 faculty of infor...
  • 2 篇 xiamen universit...
  • 2 篇 petroleum engine...
  • 2 篇 department of el...
  • 2 篇 school of comput...
  • 2 篇 department of sc...
  • 2 篇 department of in...
  • 2 篇 department of sc...
  • 2 篇 school of commun...
  • 2 篇 school of comput...
  • 2 篇 department of so...
  • 2 篇 computer and inf...
  • 2 篇 information and ...
  • 2 篇 beijing engineer...

作者

  • 27 篇 china
  • 5 篇 xu zhan
  • 5 篇 zhu quanyin
  • 4 篇 sung ho cho
  • 4 篇 li xinran
  • 4 篇 xiang chenhui
  • 3 篇 yang junkai
  • 3 篇 yuichi goto
  • 3 篇 li xiu
  • 3 篇 chen gang
  • 3 篇 sun xingping
  • 3 篇 hao wenning
  • 3 篇 yang shenglin
  • 3 篇 kang hongwei
  • 3 篇 liu dan
  • 3 篇 beijing 100876
  • 3 篇 duan qing
  • 2 篇 zhang hongjun
  • 2 篇 masayuki kawamat...
  • 2 篇 goto yuichi

语言

  • 513 篇 英文
检索条件"任意字段=2012 IEEE 3rd International Conference on Software Engineering and Service Science, ICSESS 2012"
513 条 记 录,以下是251-260 订阅
排序:
The Research of Dynamic Multi-application Smart Card Segment Storage Management Model
The Research of Dynamic Multi-application Smart Card Segment...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Xiaohui Cheng College of Information science and engineering Guilin University of Technology Guilin,ChinaMengmeng Dou College of Information science and engineering Guilin University of Technology Guilin,China
The multi-application smart card has a crucial problem that how to keep the management safety of some applications in the multi-application card,preventing one of application illegal visit to the other *** connection ... 详细信息
来源: 评论
Role Analysis of IT in Business Process Reengineering
Role Analysis of IT in Business Process Reengineering
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Wu Xiaosong and Li Yijing Faculty of Management & Economics Kunming University of science and Technology Wen Chang Lane,68,Kunming,ChinaX. Wu Information School Yunnan University of Finance & Economic Long Quan Road,237,Kunming,China
Business Process Reengineering,BPR is that radical rethinking and redesign on business process and BPR give firm a new idea for management and dealing in its business also,it is important role for IT to act on Busines... 详细信息
来源: 评论
Fault Localization via Behavioral Models
Fault Localization via Behavioral Models
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Xiaomin Wan,Xiaoguang Mao,Ziying Dai Department of Computer science National University of Defense Technology Changsha,China
software errors significantly impact software quality,and improvement of fault localization can reduce the expense of *** is promising approach and have received a lot of attention due to its simplicity and ***,there ... 详细信息
来源: 评论
The Study of Dual Rate 10G-EPON System for Coexistence with 1G-EPON
The Study of Dual Rate 10G-EPON System for Coexistence with ...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Zheng Qin College of Mathematics & Computer science,Wuhan Textile University Wuhan Textile University Wuhan ChinaCheng Chuanqing College of Mathematics & Computer science,Wuhan Textile University Wuhan Textile University Wuhan China
In this paper,the dual rate 1G/10G-EPON system is presented and some key technical problem such as light wave-length allocation,FEC technology and dual rate receiver are described and analyzed in *** the end,1G-EPON s... 详细信息
来源: 评论
Multi-media Data Mining Technology for the Systematic Framework
Multi-media Data Mining Technology for the Systematic Framew...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Wanliang Fu Internatioal School Beijing University Of Post and Telecommnunication Changping Beijing China
the paper makes an analysis for the requirement of the multimedia technology in today's information environment.A common process for systematic framework,general organization and the mining process for the multi-m... 详细信息
来源: 评论
The Study on Campus Network Security Evaluation based on Fuzzy Membership
The Study on Campus Network Security Evaluation based on Fuz...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Yan shi Mudanjiang Medical University Helongjiang,China
Evaluation of campus network security is a complicated systematic *** paper analyzes the reasons of the questions,obtains the solving method,and at last builds the M(1,2,3) model without the interference of redundant ... 详细信息
来源: 评论
The Scheme of Public Key Infrastructure for Improving Wireless Sensor Networks Security
The Scheme of Public Key Infrastructure for Improving Wirele...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Zhang Yu Department of software engineering Cheng Du Polytechnic Chengdu,Sichuan Province,China
In this paper we have presented a Public Key Infrastructure for wireless sensor *** scheme tries to solve the problem of security in WSN by the use of public key cryptography as a tool for ensuring the authenticity of... 详细信息
来源: 评论
Union Economic Order Quantity of Two-level Inventory-delivery System
Union Economic Order Quantity of Two-level Inventory-deliver...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Li Hongguang,Liu Yile,Wang Shengde Department of Technological Support engineering Academy of Armored Force engineering,Beijing 100072,China
A two-level inventory control and delivery system is established to describe the equipment supply chain,which is composed of multi-region warehouse and a headquarters *** the minimum charge of the system as constrain,... 详细信息
来源: 评论
A cloud architecture with an efficient scheduling technique
A cloud architecture with an efficient scheduling technique
收藏 引用
3rd international conference on Information Computing and Applications, ICICA 2012
作者: Khan, Nawsher Noraziah, A. Herawan, Tutut Faculty of Computer Systems and Software Engineering University Malaysia Pahang Lebuh Raya Tun Razak 26300 Gambang Kuantan Pahang Malaysia
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud scheduling system, the main purpose of which is to execute jobs optimally, i... 详细信息
来源: 评论
Remote Authentication of software Based on Machine's Fingerprint
Remote Authentication of Software Based on Machine's Fingerp...
收藏 引用
2012 ieee 3rd international conference on software engineering and service scienceicsess 2012
作者: Dinghua He Department of Computer Wuhan Polytechnic Wuhan,430074,China
Machine's fingerprint and encryption technique could be used to conduct remote register authentication of software to prevent unauthorized *** of all,as fingerprint of machine fulfills the goal of one code for one... 详细信息
来源: 评论