咨询与建议

限定检索结果

文献类型

  • 4,801 篇 会议
  • 355 册 图书
  • 80 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,233 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 3,596 篇 工学
    • 3,093 篇 计算机科学与技术...
    • 2,589 篇 软件工程
    • 586 篇 信息与通信工程
    • 437 篇 控制科学与工程
    • 343 篇 电气工程
    • 230 篇 机械工程
    • 200 篇 电子科学与技术(可...
    • 194 篇 生物工程
    • 142 篇 安全科学与工程
    • 137 篇 生物医学工程(可授...
    • 107 篇 建筑学
    • 100 篇 动力工程及工程热...
    • 94 篇 土木工程
    • 83 篇 交通运输工程
    • 82 篇 仪器科学与技术
    • 82 篇 材料科学与工程(可...
  • 994 篇 理学
    • 559 篇 数学
    • 219 篇 生物学
    • 172 篇 系统科学
    • 170 篇 物理学
    • 152 篇 统计学(可授理学、...
    • 77 篇 化学
  • 803 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 302 篇 工商管理
    • 290 篇 图书情报与档案管...
  • 143 篇 医学
    • 120 篇 临床医学
    • 110 篇 基础医学(可授医学...
  • 129 篇 教育学
    • 126 篇 教育学
  • 111 篇 经济学
    • 111 篇 应用经济学
  • 108 篇 法学
    • 79 篇 社会学
  • 41 篇 农学
  • 11 篇 军事学
  • 8 篇 文学
  • 2 篇 艺术学

主题

  • 374 篇 software enginee...
  • 224 篇 software
  • 175 篇 artificial intel...
  • 154 篇 computer archite...
  • 143 篇 information syst...
  • 143 篇 application soft...
  • 130 篇 computer communi...
  • 114 篇 computer science
  • 110 篇 software enginee...
  • 109 篇 hardware
  • 109 篇 computer softwar...
  • 102 篇 real-time system...
  • 94 篇 control systems
  • 90 篇 computer aided s...
  • 74 篇 software systems
  • 72 篇 computational mo...
  • 72 篇 software design
  • 71 篇 software archite...
  • 61 篇 software testing
  • 61 篇 logics and meani...

机构

  • 21 篇 college of compu...
  • 10 篇 school of softwa...
  • 9 篇 univ york dept c...
  • 9 篇 dublin city univ...
  • 8 篇 department of co...
  • 8 篇 state key labora...
  • 7 篇 school of comput...
  • 7 篇 faculty of compu...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 shanghai key lab...
  • 6 篇 college of compu...
  • 6 篇 university of ne...
  • 6 篇 faculty of compu...
  • 6 篇 carleton univ de...
  • 6 篇 univ haifa dept ...
  • 6 篇 school of inform...
  • 5 篇 univ chinese aca...
  • 5 篇 hebrew universit...
  • 5 篇 nanjing univ sta...

作者

  • 14 篇 kupferman orna
  • 14 篇 labiche yvan
  • 12 篇 david lo
  • 8 篇 mylopoulos john
  • 8 篇 yilmaz murat
  • 8 篇 reinhartz-berger...
  • 8 篇 xin xia
  • 8 篇 paige richard f.
  • 7 篇 o'connor rory v.
  • 7 篇 vardi moshe y.
  • 7 篇 clarke paul m.
  • 7 篇 biffl stefan
  • 7 篇 briand lionel c.
  • 7 篇 exman iaakov
  • 7 篇 sturm arnon
  • 6 篇 katz guy
  • 6 篇 maoz shahar
  • 6 篇 sulaiman shahida
  • 6 篇 lakhmi c. jain
  • 5 篇 bernady o. apduh...

语言

  • 5,054 篇 英文
  • 155 篇 其他
  • 40 篇 中文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 西班牙文
检索条件"任意字段=5th Israel Conference on Computer Systems and Software Engineering"
5237 条 记 录,以下是4211-4220 订阅
排序:
Architectural level risk assessment tool based on UML specifications
Architectural level risk assessment tool based on UML specif...
收藏 引用
25th International conference on software engineering (ICSE 2003)
作者: Wang, T Hassan, A Guedem, A Abdelmoez, W Goseva-Popstojanova, K Ammar, H W Virginia Univ Lane Dept Comp Sci & Elect Engn Morgantown WV 26506 USA
Recent evidences indicate that most faults in software systems are found in only a few of a system's components [1]. the early identification of these components allows an organization to focus on defect detection... 详细信息
来源: 评论
Analysis of inconsistency in graph-based viewpoints: A category-theoretic approach  03
Analysis of inconsistency in graph-based viewpoints: A categ...
收藏 引用
18th IEEE International conference on Automated software engineering
作者: Sabetzadeh, M Easterbrook, S Univ Toronto Dept Comp Sci Toronto ON M5S 3G4 Canada
Eliciting the requirements for a proposed system typically involves different stakeholders with different expertise, responsibilities, and perspectives. Viewpoints-based approaches have been proposed as a way to manag... 详细信息
来源: 评论
Visual Constraint Diagrams: Runtime conformance checking of UML object models versus implementations  03
Visual Constraint Diagrams: Runtime conformance checking of ...
收藏 引用
18th IEEE International conference on Automated software engineering
作者: Turner, CJ Graham, TCN Wolfe, C Ball, J Holman, D Stewart, HD Ryman, AG Queens Univ Sch Comp Kingston ON K7L 4L5 Canada
this paper presents Visual Constraint Diagrams (VCD's), an extension to UML object diagrams for expressing constraints over object models. VCD's allow designers to express well-formedness constraints that cann... 详细信息
来源: 评论
Using metaphors in eXtreme programming projects  4th
收藏 引用
4th International conference on Extreme Programming and Agile Processes in software engineering, XP 2003
作者: Dubinsky, Yael Hazzan, Orit Department of Computer Science Technion Israel Department of Education in Technology and Science Technion Israel
Metaphor is one of the twelve practices of Extreme Programming (XP), and definitely among the more difficult ones to teach and use. We present our experience with the use of metaphors and conclude with suggested guide... 详细信息
来源: 评论
Agent oriented software development  9th
收藏 引用
9th International conference on Object-Oriented Information systems
作者: Mylopoulos, J Univ Toronto Dept Comp Sci Toronto ON M5S 1A4 Canada
Next generation software engineering will have to support open, dynamic architectures where components can accomplish tasks in a variety of operating environments. Consider application areas such as eBusiness, applica...
来源: 评论
Case-based ranking for decision support systems  5th
收藏 引用
5th International conference on Case-Base Reasoning (ICCBR 2003)
作者: Avesani, P Ferrari, S Susi, A IRST ITC I-38050 Trento Italy
Very often a planning problem can be formulated as a ranking problem: i.e. to find an order relation over a set of alternatives. the ranking of a finite set of alternatives can be designed as a preference elicitation ... 详细信息
来源: 评论
Providing secrecy in key management protocols for large wireless sensors networks
收藏 引用
Ad Hoc Networks 2003年 第4期1卷 455-468页
作者: Pietro, Roberto Di Mancini, Luigi V. Jajodia, Sushil Dipartimento di Informatica Univ. di Roma La Sapienza Via Salaria 113 00198 Roma Italy Ctr. for Secure Information Systems George Mason University University Drive VA 22030 United States
this paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. the KeEs protocol assures forward and backward secrecy of the session key, so that if... 详细信息
来源: 评论
Optimal case-based refinement of adaptation rule bases for engineering design  5th
收藏 引用
5th International conference on Case-Based Reasoning, ICCBR 2003
作者: Kelbassa, Hans-Werner
Rule-based systems have been successfully applied for adaptation. But the rule-based adaptation knowledge for engineering design has no static characteristic. therefore the adaptation problem emerges also as a validat... 详细信息
来源: 评论
Basis cad power electrical systems
Basis cad power electrical systems
收藏 引用
15th IEEE Canadian conference on Electrical and computer engineering
作者: Shaydurov, A McGill Univ RRP Montreal PQ H3A 2T5 Canada
CAD Power Electrical systems (PES) was considered as development of the knowledge base with a hierarchical subject area. the structure of CAD PES is submitted by three levels: element - objects;structural - basic topo... 详细信息
来源: 评论
Approximate inference and protein-folding  15
Approximate inference and protein-folding
收藏 引用
16th Annual Neural Information Processing systems conference, NIPS 2002
作者: Yanover, Chen Weiss, Yair School of Computer Science and Engineering Hebrew University of Jerusalem 91904 Jerusalem Israel
Side-chain prediction is an important subtask in the protein-folding problem. We show that finding a minimal energy side-chain configuration is equivalent to performing inference in an undirected graphical model. the ... 详细信息
来源: 评论