咨询与建议

限定检索结果

文献类型

  • 3,396 篇 会议
  • 133 篇 期刊文献
  • 76 册 图书

馆藏范围

  • 3,603 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 2,402 篇 工学
    • 1,899 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 418 篇 电气工程
    • 270 篇 控制科学与工程
    • 199 篇 信息与通信工程
    • 128 篇 机械工程
    • 72 篇 石油与天然气工程
    • 64 篇 生物医学工程(可授...
    • 59 篇 电子科学与技术(可...
    • 56 篇 材料科学与工程(可...
    • 56 篇 交通运输工程
    • 51 篇 生物工程
    • 45 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
    • 38 篇 土木工程
    • 35 篇 仪器科学与技术
    • 34 篇 冶金工程
  • 676 篇 理学
    • 485 篇 数学
    • 106 篇 物理学
    • 85 篇 系统科学
    • 80 篇 统计学(可授理学、...
    • 74 篇 生物学
    • 51 篇 化学
  • 403 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 149 篇 工商管理
    • 81 篇 图书情报与档案管...
  • 105 篇 教育学
    • 103 篇 教育学
  • 71 篇 医学
    • 46 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 64 篇 经济学
    • 64 篇 应用经济学
  • 40 篇 法学
  • 22 篇 文学
  • 12 篇 农学
  • 9 篇 艺术学
  • 3 篇 军事学

主题

  • 309 篇 linear programmi...
  • 251 篇 programming
  • 187 篇 dynamic programm...
  • 142 篇 computer program...
  • 119 篇 integer programm...
  • 116 篇 optimization
  • 109 篇 logic programmin...
  • 87 篇 genetic programm...
  • 82 篇 functional progr...
  • 73 篇 computational mo...
  • 68 篇 object oriented ...
  • 66 篇 programming prof...
  • 65 篇 parallel program...
  • 56 篇 software enginee...
  • 54 篇 costs
  • 49 篇 mathematical mod...
  • 48 篇 computer program...
  • 46 篇 heuristic algori...
  • 42 篇 artificial intel...
  • 41 篇 computer science

机构

  • 9 篇 univ london impe...
  • 7 篇 inesc tec porto
  • 6 篇 feup porto
  • 6 篇 russian acad sci...
  • 5 篇 c mast ubi covil...
  • 4 篇 univ leicester l...
  • 4 篇 vienna univ tech...
  • 4 篇 institute of fun...
  • 4 篇 chinese acad sci...
  • 4 篇 university of am...
  • 4 篇 univ nottingham ...
  • 4 篇 beijing universi...
  • 3 篇 weizmann inst sc...
  • 3 篇 univ nottingham ...
  • 3 篇 delft center for...
  • 3 篇 international is...
  • 3 篇 international bu...
  • 3 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 univ cyprus dept...

作者

  • 8 篇 catalao joao p. ...
  • 7 篇 musirin ismail
  • 5 篇 weiss gera
  • 5 篇 marron assaf
  • 4 篇 hirschfeld rober...
  • 4 篇 ghani n
  • 4 篇 katz guy
  • 4 篇 saraswat vijay
  • 4 篇 xiong rui
  • 4 篇 funabiki nobuo
  • 4 篇 fitiwi desta z.
  • 4 篇 shi yong
  • 4 篇 boercsoek josef
  • 4 篇 jagadeesan radha
  • 4 篇 gupta vineet
  • 4 篇 michael n. young
  • 4 篇 pesant gilles
  • 4 篇 harel david
  • 3 篇 muggleton stephe...
  • 3 篇 faisal a. aldo

语言

  • 3,494 篇 英文
  • 82 篇 其他
  • 26 篇 中文
  • 5 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 西班牙文
检索条件"任意字段=7th International Conference on Functional Programming"
3605 条 记 录,以下是1611-1620 订阅
排序:
A Metamodel Family for Role-Based Modeling and programming Languages
A Metamodel Family for Role-Based Modeling and Programming L...
收藏 引用
7th international conference on Software Language Engineering (SLE)
作者: Kuehn, thomas Leuthaeuser, Max Goetz, Sebastian Seidl, Christoph Assmann, Uwe Tech Univ Dresden Software Technol Grp D-01062 Dresden Germany
Role-based modeling has been proposed almost 40 years ago as a means to model complex and dynamic domains, because roles are able to capture both context-dependent and collaborative behavior of objects. Unfortunately,... 详细信息
来源: 评论
Automated multi-platform testing and code coverage analysis of the CP2K application
Automated multi-platform testing and code coverage analysis ...
收藏 引用
7th IEEE international conference on Software Testing, Verification and Validation (ICST)
作者: Misic, Marko Tomasevic, Milo Bethune, Iain Univ Belgrade Sch Elect Engn Belgrade Serbia Univ Edinburgh Edinburgh Parallel Comp Ctr Edinburgh Midlothian Scotland
CP2K is a widely used application for atomistic simulation that can execute on a range of architectures. Consisting of more than one million lines of Fortran 95 code, the application is tested for correctness with a s... 详细信息
来源: 评论
Distribution Center's Decisions in E-commerce with the Consideration of Delivery Time  7
Distribution Center's Decisions in E-commerce with the Consi...
收藏 引用
7th international Joint conference on Computational Sciences and Optimization (CSO)
作者: Tao, Zhang Li, Xin Huang, Bo Macau Univ Sci & Technol Sch Business Taipa Macau Peoples R China Jilin Univ Zhuhai Coll Dept Logist & Informat Management Zhuhai Peoples R China
the aim of this paper is to present a mathematical approach to support the decision making of distribution center location. We use the LP model to decide the (distribution center) DC's capacity and location with t... 详细信息
来源: 评论
Proceedings of the 2014 international C conference on Computer Science and Software Engineering, C3S2E 2014
Proceedings of the 2014 International C Conference on Comput...
收藏 引用
2014 7th international C conference on Computer Science and Software Engineering, C3S2E 2014
the proceedings contain 27 papers. the topics discussed include: label-bag based graph anonymization via edge addition;verification and code generation for timed transitions in pCharts;software specification and autom...
来源: 评论
Proving Termination and Memory Safety for Programs with Pointer Arithmetic
收藏 引用
7th international Joint conference on Automated Reasoning (IJCAR) Held as Part of theVienna Summer of Logic (VSL)
作者: Stroeder, thomas Giesl, Juergen Brockschmidt, Marc Frohn, Florian Fuhs, Carsten Hensel, Jera Schneider-Kamp, Peter Rhein Westfal TH Aachen LuFG Informat 2 Aachen Germany Microsoft Res Cambridge Cambridge England UCL Dept Comp Sci London England Univ So Denmark IMADA Odense Denmark
Proving termination automatically for programs with explicit pointer arithmetic is still an open problem. To close this gap, we introduce a novel abstract domain that can track allocated memory in detail. We use it to... 详细信息
来源: 评论
Chinese Named Entity Recognition Using Improved Bi-gram Model Based on Dynamic programming
Chinese Named Entity Recognition Using Improved Bi-gram Mode...
收藏 引用
7th international conference on Intelligent Systems and Knowledge Engineering, ISKE 2012
作者: Le, Juan Niu, ZhenDong College of Computer Science Beijing Institute of Technology Beijing China
this paper proposes a bi-gram model based on dynamic programming to Chinese person named entity recognition. By studying the previous work, we concluded that we can improve the precision of NER by improving the recall... 详细信息
来源: 评论
Implementation of an adaptive traffic-aware firewall  14
Implementation of an adaptive traffic-aware firewall
收藏 引用
7th international conference on Security of Information and Networks, SIN 2014
作者: Sairam, Ashok Singh Kumar, Rahul Biswas, Pratima Department of CSE IIT Patna Bihar India
Firewall is an integral part of security management. Network speed may vary depending on the efficiency of the firewall. So firewall optimization plays a dominant role in network flow. In this paper, we propose a way ... 详细信息
来源: 评论
7th international Workshop on functional Nanomaterials and Devices
7th International Workshop on Functional Nanomaterials and D...
收藏 引用
7th international Workshop on functional Nanomaterials and Devices
the proceedings contain 21 papers. the special focus in this conference is on functional Nanomaterials and Devices. the topics include: Transport and photoelectric effects in structures with Ge and SiGe nanoclusters g...
来源: 评论
A linear programming based interactive method for multiobjective programming problems involving fuzzy coefficients and random variable coefficients
A linear programming based interactive method for multiobjec...
收藏 引用
international Symposium on Soft Computing and Intelligent Systems (SCIS)
作者: Hitoshi Yano School of Humanities and Social Sciences Nagoya City University Nagoya Japan
In this paper, we propose a linear programming based interactive method for multiobjective linear programming problems, in which fuzzy coefficients and random variable coefficients are involved in the objective functi... 详细信息
来源: 评论
7th international conference on Information Security and Cryptology, Inscrypt 2011
7th International Conference on Information Security and Cry...
收藏 引用
7th international conference on Information Security and Cryptology, Inscrypt 2011
the proceedings contain 27 papers. the special focus in this conference is on Information security and cryptology. the topics include: Adaptively secure forward-secure non-interactive threshold cryptosystems;cryptanal...
来源: 评论