咨询与建议

限定检索结果

文献类型

  • 746 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 752 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 557 篇 工学
    • 426 篇 计算机科学与技术...
    • 380 篇 软件工程
    • 143 篇 控制科学与工程
    • 107 篇 电气工程
    • 76 篇 信息与通信工程
    • 60 篇 电子科学与技术(可...
    • 44 篇 机械工程
    • 36 篇 动力工程及工程热...
    • 28 篇 仪器科学与技术
    • 26 篇 生物工程
    • 23 篇 土木工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 安全科学与工程
    • 17 篇 建筑学
    • 17 篇 航空宇航科学与技...
    • 16 篇 交通运输工程
    • 14 篇 化学工程与技术
    • 13 篇 环境科学与工程(可...
  • 163 篇 理学
    • 81 篇 数学
    • 37 篇 物理学
    • 28 篇 生物学
    • 26 篇 系统科学
    • 15 篇 统计学(可授理学、...
  • 135 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 50 篇 工商管理
    • 36 篇 图书情报与档案管...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 24 篇 医学
    • 24 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 13 篇 法学
  • 7 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学

主题

  • 83 篇 application soft...
  • 39 篇 computer science
  • 26 篇 costs
  • 22 篇 software systems
  • 21 篇 software enginee...
  • 21 篇 control systems
  • 21 篇 computer aided s...
  • 19 篇 real time system...
  • 17 篇 hardware
  • 16 篇 computer archite...
  • 14 篇 application prog...
  • 12 篇 software tools
  • 12 篇 protocols
  • 12 篇 software
  • 11 篇 electrical capac...
  • 11 篇 space technology
  • 11 篇 software mainten...
  • 10 篇 fault tolerance
  • 10 篇 information tech...
  • 10 篇 bandwidth

机构

  • 3 篇 beijing engineer...
  • 3 篇 beijing institut...
  • 2 篇 radio and televi...
  • 2 篇 dept. of electri...
  • 2 篇 institute of mic...
  • 2 篇 caltech jet prop...
  • 2 篇 shandong institu...
  • 2 篇 college of compu...
  • 2 篇 school of econom...
  • 2 篇 school of comput...
  • 2 篇 umist manchester...
  • 2 篇 school of astron...
  • 2 篇 southwest jiaoto...
  • 2 篇 empirical softwa...
  • 2 篇 euratom enea sul...
  • 2 篇 the national eng...
  • 2 篇 shanghai institu...
  • 2 篇 university of ma...
  • 2 篇 school of comput...
  • 2 篇 florida atlantic...

作者

  • 3 篇 khoshgoftaar tm
  • 3 篇 rahaman hafizur
  • 2 篇 crisanti f
  • 2 篇 allen eb
  • 2 篇 fang yu
  • 2 篇 de tommasi g
  • 2 篇 shulong wang
  • 2 篇 chau sn
  • 2 篇 t.m. khoshgoftaa...
  • 2 篇 ren yongchang
  • 2 篇 goodfellow s.d.
  • 2 篇 li tao
  • 2 篇 mc cullen p
  • 2 篇 quan qiang
  • 2 篇 chen xiaoji
  • 2 篇 taylor j.h.
  • 2 篇 zhao yang
  • 2 篇 tan guozhen
  • 2 篇 zhangqin huang
  • 2 篇 wang fan

语言

  • 741 篇 英文
  • 11 篇 其他
检索条件"任意字段=3rd IEEE Symposium on Application-Specific Systems and Software Engineering Technology"
752 条 记 录,以下是51-60 订阅
排序:
The application of Tuxedo middleware in the banking system
The application of Tuxedo middleware in the banking system
收藏 引用
2011 ieee 3rd International Conference on Communication software and Networks, ICCSN 2011
作者: Wen, Yin Jingsha, He School of Software Engineering Beijing University of Technology Beijing 100124 China
Along with the development of middleware technology, middleware has been widely used in many applications, especially in banking systems in which a three-layer structure model based on Tuxedo can be used. This model p... 详细信息
来源: 评论
A fast multilevel method for matching stereo images  3
A fast multilevel method for matching stereo images
收藏 引用
3rd ieee International symposium on Signal Processing and Information technology
作者: Hariti, M Ruichek, Y Koukam, A Univ Technol Belfort Montbeliard Lab Syst & Transports F-90010 Belfort France
This paper presents a method, which performs edge stereo matching at different levels, from significant edges to less significant ones. At each level, the process starts by selecting significant edges with respect to ... 详细信息
来源: 评论
Dynamic Evolution of Web-based systems
Dynamic Evolution of Web-based Systems
收藏 引用
3rd International symposium on Intelligent Information technology application
作者: Xu Hongzhen Zeng Guosun Tongji Univ Dept Comp Sci & Technol Shanghai 201804 Peoples R China
software evolution techniques have been traditionally concentrated on the code level. However, recent researches have shifted the focus of evolution from the code level to the architectural level. In this paper, we pr... 详细信息
来源: 评论
An experiment to observe the impact of UML diagrams on the effectiveness of software requirements inspections  09
An experiment to observe the impact of UML diagrams on the e...
收藏 引用
2009 3rd International symposium on Empirical software engineering and Measurement, ESEM 2009
作者: Albayrak, Özlem Computer Technology and Information Systems Bilkent University Ankara Turkey
software inspections aim to find defects early in the development process and studies have found them to be effective. However, there is almost no data available regarding the impact of UML diagram utilization in soft... 详细信息
来源: 评论
Proceedings - 3rd ieee International High-Assurance systems engineering symposium, HASE 1998
Proceedings - 3rd IEEE International High-Assurance Systems ...
收藏 引用
3rd ieee International High-Assurance systems engineering symposium, HASE 1998
The proceedings contain 39 papers. The topics discussed include: a perspective from the field on high assurance systems;checking modification tolerance;formal specification in collaborative design of critical software...
来源: 评论
Code Based software Security Vulnerability Analyzing and Detecting Based on Similar Characteristic
Code Based Software Security Vulnerability Analyzing and Det...
收藏 引用
3rd International Conference on Intelligent System and Knowledge engineering
作者: An, Xifeng Li, Weihua Pan, Wei College of Computer Science Northwestern Polytechnical University China
Through comprehensive analysis of software security vulnerability, a novel vulnerability detecting method based on similar characteristic is proposed in this paper. The method aims at C Code security detection. Based ... 详细信息
来源: 评论
Porting legacy engineering applications onto distributed NT systems.  3
Porting legacy engineering applications onto distributed NT ...
收藏 引用
3rd USENIX Windows NT symposium
作者: Allsopp, NK Cooper, TP Ftakas, P Macey, PC Parallel Applicat Ctr Southampton SO16 7NP Hants England
In this paper we present our experiences developing two distributed computing applications on NT. In both examples a legacy application is ported from Unix to NT and is then further developed to be a distributed appli... 详细信息
来源: 评论
Idea: Simulation Based Security Requirement Verification for Transaction Level Models
Idea: Simulation Based Security Requirement Verification for...
收藏 引用
3rd International symposium on engineering Secure software and systems, ESSoS 2011
作者: Loinig, Johannes Steger, Christian Weiss, Reinhold Haselsteiner, Ernst Graz Univ Technol Inst Tech Informat Graz Austria NXP Semicond Austria GmbH Grazumgebung Austria
Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hardware/software codesign flow. In such a case the system's modules and components ... 详细信息
来源: 评论
For a product-in-a-process approach to software reliability evaluation  3
For a product-in-a-process approach to software reliability ...
收藏 引用
3rd International symposium on software Reliability engineering, ISSRE 1992
作者: Laprie, Jean-Claude LAAS-CNRS 7 Avenue Colonel Roche Toulouse31077 France
Current techniques for reliability evaluation are based purely upon the single software product itself, and their capability falls beneath most reliability requirements. It is proposed to augment these techniques by e... 详细信息
来源: 评论
Research of the Metal Detector Based on Finite Element Analysis  3
Research of the Metal Detector Based on Finite Element Analy...
收藏 引用
2017 3rd ieee International Conference on Control Science and systems engineering (ICCSSE)
作者: Lv Yilin Wei Dong School of Electronic and Information Engineering University Of Science And Technology Liaoning
The transport type metal detector balanced differential transmission coil to detect metal particles. In the process of industrial production, other metal production equipment, transmission belt of steel and other exte... 详细信息
来源: 评论