咨询与建议

限定检索结果

文献类型

  • 235 篇 会议
  • 21 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 263 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 211 篇 工学
    • 179 篇 软件工程
    • 168 篇 计算机科学与技术...
    • 18 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 15 篇 电气工程
    • 5 篇 机械工程
    • 4 篇 仪器科学与技术
    • 4 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 石油与天然气工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 农业工程
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
  • 51 篇 理学
    • 39 篇 数学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 5 篇 物理学
    • 5 篇 生物学
    • 2 篇 化学
    • 2 篇 大气科学
  • 40 篇 管理学
    • 22 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
  • 2 篇 农学
    • 2 篇 作物学
  • 1 篇 法学
  • 1 篇 艺术学

主题

  • 20 篇 design
  • 19 篇 languages
  • 19 篇 software enginee...
  • 13 篇 computer program...
  • 11 篇 computer program...
  • 9 篇 object oriented ...
  • 9 篇 algorithms
  • 8 篇 java programming...
  • 7 篇 feature-oriented...
  • 7 篇 performance
  • 7 篇 programming
  • 7 篇 generic programm...
  • 7 篇 programming tech...
  • 7 篇 generative ai
  • 7 篇 principal compon...
  • 7 篇 code generation
  • 6 篇 software archite...
  • 6 篇 linear programmi...
  • 6 篇 middleware
  • 5 篇 component

机构

  • 5 篇 texas a&m univ c...
  • 3 篇 univ magdeburg d...
  • 2 篇 univ lugano luga...
  • 2 篇 university of co...
  • 2 篇 orange labs maps...
  • 2 篇 johannes kepler ...
  • 2 篇 univ southampton...
  • 2 篇 univ marburg d-3...
  • 2 篇 chuyang honors c...
  • 2 篇 kansas state uni...
  • 2 篇 johannes kepler ...
  • 2 篇 ecole polytech f...
  • 2 篇 northeastern uni...
  • 2 篇 state grid hunan...
  • 2 篇 hunan sgit techn...
  • 2 篇 orange labs maps...
  • 2 篇 signalicorp port...
  • 2 篇 mit cambridge ma...
  • 2 篇 univ potsdam ins...
  • 2 篇 univ nebraska de...

作者

  • 6 篇 apel sven
  • 6 篇 binder walter
  • 5 篇 ansaloni danilo
  • 5 篇 moret philippe
  • 4 篇 kaestner christi...
  • 4 篇 gokhale aniruddh...
  • 4 篇 batory don
  • 4 篇 moessenboeck han...
  • 3 篇 hirschfeld rober...
  • 3 篇 stefani jean-ber...
  • 3 篇 schmitt alan
  • 3 篇 marcus mat
  • 3 篇 smith jacob n.
  • 3 篇 fischer bernd
  • 2 篇 hatcliff john
  • 2 篇 babau jean-phili...
  • 2 篇 judith bishop
  • 2 篇 siek jeremy
  • 2 篇 freeman john
  • 2 篇 rinard martin c.

语言

  • 248 篇 英文
  • 11 篇 其他
  • 4 篇 中文
检索条件"任意字段=8th International Conference on Generative Programming and Component Engineering"
263 条 记 录,以下是211-220 订阅
排序:
Building, modifying and using component generators
Building, modifying and using component generators
收藏 引用
international conference on Software engineering (ICSE)
作者: S.B. Ornburn R.J. LeBlanc Georgia Institute of Technology College of Computing Georgia Institute of Technology Atlanta GA USA
the tools used to generate implementations from component descriptions are called component generators. the protocol considered supports call processing by controlling the set-up and take-down of connections carrying ... 详细信息
来源: 评论
Fault Tolerant Controller Using Interval Type-2 TSK Logic Control Systems: Application to three Interconnected Conical Tank System
Fault Tolerant Controller Using Interval Type-2 TSK Logic Co...
收藏 引用
Joint World Congress of the international-Fuzzy-Systems-Assoc (IFSA) and the Annual conference of the North-American-Fuzzy-Information-Proc-Soc (NAFIPS) / 12th international Workshop on Constraint programming and Decision Making (CoProd)
作者: Patel, Himanshukumar R. Shah, Vipul Dharmsinh Desai Univ Nadiad 387001 Gujarat India
Type-2 fuzzy logic systems have recently been utilized in many control process due to their ability to model uncertainties. this paper proposes an inference mechanism for an interval type-2 Takagi-Sugeno-Kang fuzzy lo... 详细信息
来源: 评论
Proving deadlock freedom in component-based programming  4
收藏 引用
4th international conference on Fundamental Approaches to Software engineering, FASE 2001, Held as Part of the Joint European conferences on theory and Practice of Software, ETAPS 2001
作者: Inverardi, Paola Uchitel, Sebastian Dip. di Matematica Universit’a dell’ Aquila L’AquilaI-67010 Italy Dep. of Computing Imperial College Queen’s Gate 180 LondonSW7 2BZ United Kingdom
Emerging technologies such as commercial off-the-shelf products (COTS) and component integration frameworks such as CORBA and COM are changing the way software is produced. Distributed applications are being designed ... 详细信息
来源: 评论
Clipped RBM and DBN Based Mechanism for Optimal Classification of Brain Cancer  6th
Clipped RBM and DBN Based Mechanism for Optimal Classificati...
收藏 引用
6th international conference on Information and Communication Technology for Intelligent Systems, ICTIS 2021
作者: Ahlawat, Neha Vinod, D. Franklin Department of Computer Science and Engineering Faculty of Engineering and Technology SRM Institute of Science and Technology Delhi-NCR Campus Delhi-Meerut Road Uttar Pradesh Modinagar Ghaziabad India
In healthcare, Big Data analytics has attracted great attention among the research community. Health care records is enormous challenging not only by its volume but also the nature of diversification of data sets and ... 详细信息
来源: 评论
Research on a Model of component-based Cooperative Design of Buildings
Research on a Model of Component-based Cooperative Design of...
收藏 引用
the 8th international conference on Computer Supported Cooperative Work in Design(第八届计算机支持的协同工作设计国际会议)(CSCWD2004)
作者: Wei Cui Hong Liu Dept.of Computer Shandong Architecture and Engineering InstituteP.R.China School of Information Management Shandong Normal UniversityP.R.China
With the development of informationtechnology, there have taken big changes inworm economy from 90s. It forms a constantglobal market which is full of much *** not only lays on individual capacity, butalso closely sui... 详细信息
来源: 评论
Maximizing efficiency: building and running an AMBA APB protocol with open-source solutions
Maximizing efficiency: building and running an AMBA APB prot...
收藏 引用
8th international conference on Computing in engineering and Technology (ICCET 2023)
作者: T. Neeharika J. L. Prasanna M. R. Kumar C. Santhosh Department of Electronics and Communication Engineering Koneru Lakshmaiah Education Foundation Guntur (Dist) Andhra Pradesh - 522302 India
Advanced Peripheral Bus (APB) protocol is a key component belonging to Advanced Microcontroller Bus Architecture (AMBA) family. the APB protocol is a form of communication between the test bench and design under test ...
来源: 评论
Adding Genericity to a Plug-in Framework
收藏 引用
ACM SIGPLAN NOTICES 2011年 第2期46卷 93-102页
作者: Wolfinger, Reinhard Loeberbauer, Markus Jahn, Markus Moessenboeck, Hanspeter Johannes Kepler Univ Linz Inst Syst Software Linz Austria Johannes Kepler Univ Linz Christian Doppler Lab Automated Software Engn Linz Austria
Plug-in components are a means for making feature-rich applications customizable. Combined with plug-and-play composition, end users can assemble customized applications without programming. If plug-and-play compositi... 详细信息
来源: 评论
Barriers to modularity - An empirical study to assess the potential for modularisation of Java programs
Barriers to modularity - An empirical study to assess the po...
收藏 引用
6th international conference on the Quality of Software Architectures, QoSA 2010
作者: Dietrich, Jens McCartin, Catherine Tempero, Ewan Ali Shah, Syed M. Massey University School of Engineering and Advanced Technology Palmerston North New Zealand Department of Computer Science University of Auckland Auckland New Zealand
To deal with the challenges when building large and complex systems modularisation techniques such as component-based software engineering and aspect-oriented programming have been developed. In the Java space these i... 详细信息
来源: 评论
A component-based Run-time Evolution Infrastructure for Resource-Constrained Embedded Systems
收藏 引用
ACM SIGPLAN NOTICES 2011年 第2期46卷 73-82页
作者: Navas, Juan F. Babau, Jean-Philippe Pulou, Jacques Orange Labs MAPS Res Grp Issy Les Moulineaux France Univ Europeenne Bretagne LISyC UBO UEB Brest France Orange Labs MAPS Res Grp Grenoble France
this paper deals with embedded systems software and the modification of its architecture and behavior at execution-time. Incautious implementation of these features demands both heavy memory and performance overrun. T... 详细信息
来源: 评论
Mapping the security landscape: A role for language techniques
Mapping the security landscape: A role for language techniqu...
收藏 引用
18th international conference on Concurrency theory, CONCUR 2007
作者: Schneider, Fred B. Department of Computer Science Cornell University Ithaca NY 14558 United States
Over the last decade, programming language techniques have been applied in non-obvious ways to building secure systems. this talk will not only survey that work in language based security but show that the theoretical... 详细信息
来源: 评论