咨询与建议

限定检索结果

文献类型

  • 4,801 篇 会议
  • 355 册 图书
  • 80 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,233 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 3,596 篇 工学
    • 3,093 篇 计算机科学与技术...
    • 2,589 篇 软件工程
    • 586 篇 信息与通信工程
    • 437 篇 控制科学与工程
    • 343 篇 电气工程
    • 230 篇 机械工程
    • 200 篇 电子科学与技术(可...
    • 194 篇 生物工程
    • 142 篇 安全科学与工程
    • 137 篇 生物医学工程(可授...
    • 107 篇 建筑学
    • 100 篇 动力工程及工程热...
    • 94 篇 土木工程
    • 83 篇 交通运输工程
    • 82 篇 仪器科学与技术
    • 82 篇 材料科学与工程(可...
  • 994 篇 理学
    • 559 篇 数学
    • 219 篇 生物学
    • 172 篇 系统科学
    • 170 篇 物理学
    • 152 篇 统计学(可授理学、...
    • 77 篇 化学
  • 803 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 302 篇 工商管理
    • 290 篇 图书情报与档案管...
  • 143 篇 医学
    • 120 篇 临床医学
    • 110 篇 基础医学(可授医学...
  • 129 篇 教育学
    • 126 篇 教育学
  • 111 篇 经济学
    • 111 篇 应用经济学
  • 108 篇 法学
    • 79 篇 社会学
  • 41 篇 农学
  • 11 篇 军事学
  • 8 篇 文学
  • 2 篇 艺术学

主题

  • 374 篇 software enginee...
  • 224 篇 software
  • 175 篇 artificial intel...
  • 154 篇 computer archite...
  • 143 篇 information syst...
  • 143 篇 application soft...
  • 130 篇 computer communi...
  • 114 篇 computer science
  • 110 篇 software enginee...
  • 109 篇 hardware
  • 109 篇 computer softwar...
  • 102 篇 real-time system...
  • 94 篇 control systems
  • 90 篇 computer aided s...
  • 74 篇 software systems
  • 72 篇 computational mo...
  • 72 篇 software design
  • 71 篇 software archite...
  • 61 篇 software testing
  • 61 篇 logics and meani...

机构

  • 21 篇 college of compu...
  • 10 篇 school of softwa...
  • 9 篇 univ york dept c...
  • 9 篇 dublin city univ...
  • 8 篇 department of co...
  • 8 篇 state key labora...
  • 7 篇 school of comput...
  • 7 篇 faculty of compu...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 shanghai key lab...
  • 6 篇 college of compu...
  • 6 篇 university of ne...
  • 6 篇 faculty of compu...
  • 6 篇 carleton univ de...
  • 6 篇 univ haifa dept ...
  • 6 篇 school of inform...
  • 5 篇 univ chinese aca...
  • 5 篇 hebrew universit...
  • 5 篇 nanjing univ sta...

作者

  • 14 篇 kupferman orna
  • 14 篇 labiche yvan
  • 12 篇 david lo
  • 8 篇 mylopoulos john
  • 8 篇 yilmaz murat
  • 8 篇 reinhartz-berger...
  • 8 篇 xin xia
  • 8 篇 paige richard f.
  • 7 篇 o'connor rory v.
  • 7 篇 vardi moshe y.
  • 7 篇 clarke paul m.
  • 7 篇 biffl stefan
  • 7 篇 briand lionel c.
  • 7 篇 exman iaakov
  • 7 篇 sturm arnon
  • 6 篇 katz guy
  • 6 篇 maoz shahar
  • 6 篇 sulaiman shahida
  • 6 篇 lakhmi c. jain
  • 5 篇 bernady o. apduh...

语言

  • 5,054 篇 英文
  • 155 篇 其他
  • 40 篇 中文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 西班牙文
检索条件"任意字段=5th Israel Conference on Computer Systems and Software Engineering"
5237 条 记 录,以下是4341-4350 订阅
排序:
Using the SPARK toolset for showing the absence of run-time errors in safety-critical software  6th
收藏 引用
6th Ada-Europe International conference on Reliable software Technologies, Ada-Europe 2001
作者: Foulger, Darren King, Steve BAE SYSTEMS Brough East Yorkshire United Kingdom Department of Computer Science University of York Heslington YorkYO10 5DD United Kingdom
this paper reports the results of a study into the effectiveness of the SPARK toolset for showing the absence of run-time errors in safety-critical Ada software. In particular, the toolset is examined to determine how... 详细信息
来源: 评论
Real time cryptanalysis of A5/1 on a PC  7th
Real time cryptanalysis of A5/1 on a PC
收藏 引用
7th International Workshop on Fast software Encryption, FSE 2000
作者: Biryukov, Alex Shamir, Adi Wagner, David Computer Science department The Weizmann Institute Rehovot76100 Israel Computer Science department University of California BerkeleyCA94720 United States
A5/1 is the strong version of the encryption algorithm used by about 130 million GSM customers in Europe to protect the over- the-air privacy of their cellular voice and data communication. the best published attacks ... 详细信息
来源: 评论
Personal secure booting  1
收藏 引用
6th Australasian conference on Information Security and Privacy, ACISP 2001
作者: Itoi, Naomaru Arbaugh, William A. Pollack, Samuela J. Reeves, Daniel M. Center for Information Technology Integration University of Michigan United States Department of Computer Science University of Maryland College Park United States Electrical Engineering and Computer Science Department University of Michigan United States
With the majority of security breaches coming from inside of organizations, and with the number of public computing sites, where users do not know the system administrators, increasing, it is dangerous to blindly trus... 详细信息
来源: 评论
Coverage metrics for temporal logic model checking
收藏 引用
7th International conference on Tools and Algorithms for the Construction and Analysis of systems, TACAS 2001 Held as Part of the Joint European conferences on theory and Practice of software, ETAPS 2001
作者: Chockler, Hana Kupferman, Orna Vardi, Moshe Y. Hebrew University School of Engineering and Computer Science Jerusalem91904 Israel Rice University Department of Computer Science HoustonTX77251-1892 United States
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete the specification is, and whether it ... 详细信息
来源: 评论
Shared virtual memory clusters with next-generation interconnection networks and wide compute nodes  8th
收藏 引用
8th International conference on High Performance Computing, HiPC 2001
作者: Gibson, Courtney R. Bilas, Angelos Department of Electrical and Computer Engineering University of Toronto TorontoONM5S 3G4 Canada
Recently much effort has been spent on providing a shared address space abstraction on clusters of small-scale symmetric multiprocessors. However, advances in technology will soon make it possible to construct these c... 详细信息
来源: 评论
A UML-based approach to system testing  4th
收藏 引用
4th International conference on Unified Modeling Language, UML 2001
作者: Briand, Lionel Labiche, Yvan Software Quality Engineering Laboratory Systems and Computer Engineering Department Carleton University 125 Colonel By Drive OttawaK1S 5B6 Canada
System testing is concerned with testing an entire system based on its specifications. In the context of object-oriented, UML development, this means that system test requirements are derived from UML analysis artifac... 详细信息
来源: 评论
Branch, cut, and price: Sequential and parallel  5th
收藏 引用
5th International conference on Mobile Agents, MA 2001
作者: Ladányi, Laszlo Ralphs, Ted K. Trotter, Leslie E. Department of Mathematical Sciences IBM T. J. Watson Research Center Yorktown HeightsNY10598 United States Department of Industrial and Manufacturing Systems Engineering Lehigh University BethlehemPA18017 United States School of OR and IE Cornell University IthacaNY14853 United States
Branch, cut, and price (BCP) is an LP-based branch and bound technique for solving large-scale discrete optimization problems (DOPs). In BCP, both cuts and variables can be generated dynamically throughout the search ... 详细信息
来源: 评论
An application of genetic algorithms to course scheduling at the United States army war college  14th
收藏 引用
14th International conference on Industrial and engineering Applications of Artificial Intelligence and Expert systems, IEA/AIE 2001
作者: Donlon, James J. Knowledge Engineering Group United States Army War College 650 Wright Avenue CarlislePA17013 United States
Genetic algorithms can be applied with great success on a wide range of problems, including scheduling problems. this paper presents an application of genetic algorithms to a complex scheduling problem, wherein studen... 详细信息
来源: 评论
Renewal of the causes by observed effects by means of fuzzy relations matrix and genetic algorithm
Renewal of the causes by observed effects by means of fuzzy ...
收藏 引用
conference of the North American Fuzzy Information Processing Society - NAFIPS
作者: A. Rotshtein H. Rakytyanska Industrial Engineering and Management Department Jerusalem College of Technology Jerusalem Israel Applied Mathematics and Computerized Systems Department Vinnitsa State Technical University Vinnitsa Ukraine
Application of inverse logical inference in diagnostic expert systems is considered. Diagnosis decision finding requires fuzzy logical equation system solutions. the genetic algorithm for optimization based on crossov... 详细信息
来源: 评论
Agent-enhanced dynamic service level agreement in future network environments  4th
Agent-enhanced dynamic service level agreement in future net...
收藏 引用
4th IFIP/IEEE International conference on Management of Multimedia Networks and Services, MMNS 2001
作者: Chieng, David Marshall, Alan Ho, Ivan Parr, Gerard Advanced Telecommunication Systems Laboratory School of Electrical and Electronic Engineering The Queen’s University of Belfast Ashby Bld Stranmillis Road BelfastBT9 5AH United Kingdom Telecommunication and Distributed Systems Group School of Information and Software Engineering University of Ulster at Coleraine ColeraineBT52 1SA United Kingdom
Current network infrastructures are experiencing rapid transformation from providing mere connectivity, to a wider range of flexible network services with Quality of Service (QoS). We propose an agent-enhanced system ... 详细信息
来源: 评论