咨询与建议

限定检索结果

文献类型

  • 348 篇 会议

馆藏范围

  • 348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 304 篇 工学
    • 227 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 41 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 38 篇 仪器科学与技术
    • 35 篇 机械工程
    • 24 篇 电子科学与技术(可...
    • 19 篇 网络空间安全
    • 9 篇 电气工程
    • 7 篇 交通运输工程
    • 6 篇 动力工程及工程热...
    • 6 篇 建筑学
    • 6 篇 生物工程
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 冶金工程
    • 4 篇 航空宇航科学与技...
    • 4 篇 环境科学与工程(可...
    • 4 篇 安全科学与工程
  • 117 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 38 篇 工商管理
    • 24 篇 图书情报与档案管...
  • 69 篇 理学
    • 52 篇 数学
    • 16 篇 系统科学
    • 15 篇 统计学(可授理学、...
    • 7 篇 生物学
    • 4 篇 物理学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 11 篇 法学
    • 7 篇 社会学
  • 9 篇 艺术学
    • 9 篇 设计学(可授艺术学...
  • 4 篇 医学
  • 3 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 7 篇 component
  • 7 篇 web services
  • 6 篇 internet of thin...
  • 5 篇 quality of servi...
  • 4 篇 ahp
  • 4 篇 semantic web
  • 4 篇 software design
  • 4 篇 middleware
  • 4 篇 cloud computing
  • 3 篇 composition of s...
  • 3 篇 video streaming
  • 3 篇 xml
  • 3 篇 data mining
  • 3 篇 software service...
  • 3 篇 weighting of sec...
  • 3 篇 software testing
  • 3 篇 security policie...
  • 3 篇 qos
  • 3 篇 virtualization
  • 3 篇 rfid

机构

  • 7 篇 faculty of compu...
  • 6 篇 international sc...
  • 5 篇 department of in...
  • 3 篇 research institu...
  • 3 篇 engineering inst...
  • 3 篇 department of so...
  • 2 篇 faculty of infor...
  • 2 篇 petroleum engine...
  • 2 篇 school of comput...
  • 2 篇 department of sc...
  • 2 篇 department of in...
  • 2 篇 department of sc...
  • 2 篇 school of commun...
  • 2 篇 school of comput...
  • 2 篇 computer and inf...
  • 2 篇 information and ...
  • 2 篇 beijing engineer...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 electrical engin...

作者

  • 23 篇 china
  • 5 篇 xu zhan
  • 5 篇 zhu quanyin
  • 4 篇 li xinran
  • 4 篇 xiang chenhui
  • 3 篇 yang junkai
  • 3 篇 yuichi goto
  • 3 篇 li xiu
  • 3 篇 chen gang
  • 3 篇 hao wenning
  • 3 篇 liu dan
  • 2 篇 zhang hongjun
  • 2 篇 goto yuichi
  • 2 篇 wu lifang
  • 2 篇 nisar hundewale
  • 2 篇 lieskovsky anton
  • 2 篇 huang chuanhui
  • 2 篇 sun xingping
  • 2 篇 dong chi
  • 2 篇 zhou hua

语言

  • 348 篇 英文
检索条件"任意字段=2012 IEEE 3rd International Conference on Software Engineering and Service Science(ICSESS 2012)"
348 条 记 录,以下是71-80 订阅
排序:
Analysis and improvement for MDS localization algorithm
Analysis and improvement for MDS localization algorithm
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Huang, Chuanhui Xu, Zhan Li, Xiu Research Institute of Electronic Science and Technology University of Electronic Science and Technology of China Chengdu China
Wireless sensor networks(WSNs), which is utilized in a broad region, is able to monitor and collect various information of different objects. location plays a critical role in WSNs. Currently, many localization algori... 详细信息
来源: 评论
An improved LSI dimension reduction algorithm based on Vector Space Modal
An improved LSI dimension reduction algorithm based on Vecto...
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Zhan, Donghui Zhang, Hongjun Hao, Wenning Chen, Gang Jin, Dawei Engineering Institute of Corps of Engineers PLA University of Science and Technology Nanjing 210007 China
there is not a good method to find k value when using LSI to reduce dimension of Vector Space Modal. to solve the problem above, an improved LSI dimension reduction algorithm called Dimension Reduction Parameter Produ... 详细信息
来源: 评论
Research on vertical relation arrangement of aviation fuel supply chain
Research on vertical relation arrangement of aviation fuel s...
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Ding, Yong Wang, Guankai Li, Lei School of Economics and Management Civil Aviation University of China Tianjin China Institute for International Economics of Nankai University School of Economics Nankai University Nankai University Tianjin China
According to the China's aviation fuel market, the article constructs a supply chain model including three upstream firms and three downstream firms to solve China's aviation fuel security. Then, we analyze th... 详细信息
来源: 评论
Research of a scheduling and load balancing scheme based on large-scale distributed systems
Research of a scheduling and load balancing scheme based on ...
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Yan, Zhenbin Li, Wenzheng School of Software Engineering Beijing University of Technology Beijing China
Load-balancing is an important technology for improving performance of distributed system. We are based on the analysis of distributed process communication protocol, then we design a load balancing solution for the a... 详细信息
来源: 评论
Handling requirements using FlexREQ model
Handling requirements using FlexREQ model
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Butt, Saad Masood Ahmad, Wan Fatimah Wan Computer and Information Sciences Department Universiti Teknologi PETRONAS Tronoh Perak Malaysia
Requirements engineering (RE) is one of the important disciplines of software development. With the passage of time, software development process changed from traditional approaches to agile approaches. RE techniques ... 详细信息
来源: 评论
Action type based access control model for XML documents
Action type based access control model for XML documents
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Yang, Xinfeng Liu, Kecheng School of Computer and Information Engineering Nanyang Institute of Technology Nanyang Henan Province China
With the rapid increase of XML application, XML is becoming the standard of Semi-structured information exchange on Internet. The existed access control becomes more complicated for each operation as a new operation i... 详细信息
来源: 评论
Design of ground monitor and control system for UAV remote sensing based on World Wind
Design of ground monitor and control system for UAV remote s...
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Zhang, Jianxia Yu, Tao Chen, Jiping Hou, Liying Diao, Jingjing Zhang, Yumeng School of Surveying and Land Information Engineering Henan Polytechnic University Jiaozuo 454000 China State Key Laboratory of Remote Sensing Science Institute of Remote Sensing Applications CAS Beijing 100101 China
In recent years, with the wide application of UAV, as an important component of the UAV system, ground monitor and control system for UAV is also in constant updates. In order to satisfy people with higher requirement... 详细信息
来源: 评论
Distribute localization for wireless sensor networks using particle swarm optimization
Distribute localization for wireless sensor networks using p...
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Lv, Jialiang Cui, Huanqing Yang, Ming Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center 250014 China
Localization is one the key technologies of wireless sensor networks, and the problem of localization is always formulate as an optimization problem. Particle swarm optimization (PSO) is easy to implement and requires... 详细信息
来源: 评论
Commodity quality authentication protocol on the good faith cloud platform
Commodity quality authentication protocol on the good faith ...
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Wang, Chang Xue, Sujing Department of Information Engineering North China Institute of Water Conservancy and Hydroelectric Power Zhengzhou Henan province China
The quality of the general commodities can be measured by three indicators: whether commodity production enterprises have the authenticated production capacity;whether the goods could be tested as qualified by the tru... 详细信息
来源: 评论
A behavior statistic based secure system in social networks
A behavior statistic based secure system in social networks
收藏 引用
2012 ieee 3rd international conference on software engineering and service science, icsess 2012
作者: Li, Shan Yu, Xiang Deng, Xuesong School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
In order to protect the normal operation of social networks from the influence of malicious communication, we established a system to help evaluate information and users. On one hand, based on behavior recognition tec... 详细信息
来源: 评论