咨询与建议

限定检索结果

文献类型

  • 83 篇 会议
  • 3 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 87 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 69 篇 工学
    • 63 篇 计算机科学与技术...
    • 59 篇 软件工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 化学工程与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 信息与通信工程
    • 2 篇 土木工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 冶金工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 水利工程
    • 1 篇 交通运输工程
  • 16 篇 理学
    • 12 篇 数学
    • 6 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 10 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 5 篇 法学
    • 3 篇 社会学
    • 2 篇 法学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 5 篇 model transforma...
  • 5 篇 model-driven dev...
  • 4 篇 software enginee...
  • 4 篇 model-driven eng...
  • 4 篇 domain-specific ...
  • 3 篇 uml
  • 3 篇 requirement engi...
  • 3 篇 software testing
  • 3 篇 software design
  • 3 篇 artificial intel...
  • 2 篇 production syste...
  • 2 篇 self-adaptive sy...
  • 2 篇 model-driven sof...
  • 2 篇 requirements eng...
  • 2 篇 syntactics
  • 2 篇 software quality
  • 2 篇 model driven eng...
  • 2 篇 requirement mode...
  • 2 篇 requirement repr...
  • 2 篇 unified modeling...

机构

  • 2 篇 monash univ info...
  • 2 篇 tu wien cdl secu...
  • 2 篇 univ bayreuth ch...
  • 2 篇 software and sol...
  • 2 篇 univ veracruzana...
  • 1 篇 univ veracruzana...
  • 1 篇 college of compu...
  • 1 篇 dfki gmbh cyber ...
  • 1 篇 univ appl sci co...
  • 1 篇 department of in...
  • 1 篇 simula res lab d...
  • 1 篇 cetic res ctr ch...
  • 1 篇 paderborn univ s...
  • 1 篇 systems and soft...
  • 1 篇 school of comput...
  • 1 篇 school of inform...
  • 1 篇 school of cybers...
  • 1 篇 dundalk inst tec...
  • 1 篇 univ fed ceara d...
  • 1 篇 faculty of eemcs...

作者

  • 4 篇 biffl stefan
  • 4 篇 rinker felix
  • 4 篇 winkler dietmar
  • 3 篇 meixner kristof
  • 3 篇 slimane hammoudi
  • 3 篇 waltersdorfer la...
  • 3 篇 luís ferreira pi...
  • 2 篇 hammer maximilia...
  • 2 篇 zaki-ismail aya
  • 2 篇 abdelrazek moham...
  • 2 篇 buchmann thomas
  • 2 篇 philippe desfray
  • 2 篇 osama mohamed
  • 2 篇 bedini francesco
  • 2 篇 grundy john
  • 2 篇 lueder arndt
  • 2 篇 maschotta ralph
  • 2 篇 bran selic
  • 2 篇 jungebloud tino
  • 2 篇 wichmann alexand...

语言

  • 87 篇 英文
检索条件"任意字段=9th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2021"
87 条 记 录,以下是41-50 订阅
排序:
An Empirical Study on Employment Competence of engineering Students Based on Structural model  9
An Empirical Study on Employment Competence of Engineering S...
收藏 引用
9th IEEE international conference on Computer Science and Network Technology, ICCSNT 2021
作者: Wang, Ningjun Liu, Junxia School of Cyberspace Security Northwestern Polytechnical University Xi'an China School of Business Xi'An Fanyi University Xi'an China
Based on the statistical software SPSS 18.0 and structural equation software Liserel 8.5, this paper conducted the analysis of exploratory and confirmatory factors on engineering students9; employment competence. T... 详细信息
来源: 评论
Simplified model and Simulation Analysis of Ferrite Hollow Bead Coating Based on Computer Aided Design Method  9
Simplified Model and Simulation Analysis of Ferrite Hollow B...
收藏 引用
9th international conference on Advanced Manufacturing Technology and Materials Science, AMTMS 2021
作者: Hou, Yong-Shen Xi'an University of Technology Mechanical Engineering College Xi'an710048 China
When ferrite hollow beads were made into coating materials, because ferrite hollow beads had hollow internal structure and conductive and magnetic ball wall, ferrite hollow beads have typical resonant ball characteris... 详细信息
来源: 评论
Research on the Dynamic Response of Gravity Dam under Blasting Vibration  9
Research on the Dynamic Response of Gravity Dam under Blasti...
收藏 引用
9th Annual international conference on Material Science and Environmental engineering, MSEE 2021
作者: Zhuang, Jinzhao Li, Chang Zhang, Bingzhe Ren, Yanlong Lü, Mingzhe College of Water Resources and Civil Engineering China Agricultural University Beijing100083 China School of Mechanics and Civil Engineering China University of Mining and Technology Xuzhou221116 China
With the continuous development of blasting technology, it has been widely used in various construction projects. While bringing convenience to construction, it also has a series of negative effects on surrounding bui... 详细信息
来源: 评论
development Process for Self-adaptive Applications of the Internet of Health things based on Movement Patterns  9
Development Process for Self-adaptive Applications of the In...
收藏 引用
9th IEEE international conference on Healthcare Informatics (IEEE ICHI)
作者: Costa Junior, Evilasio De Castro Andrade, Rossana Maria Rocha, Leonardo Sampaio Univ Fed Ceara Comp Sci Fortaleza Ceara Brazil Univ Fed Ceara Dept Comp Fortaleza Ceara Brazil Univ Estadual Ceara Dept Comp Fortaleza Ceara Brazil
this study proposes a development process for self-adaptive IoHT applications based on movement pattern data for mobile devices. the proposed process adapts the component reuse-oriented development process by adding e... 详细信息
来源: 评论
development of Health software using Behaviour driven development - BDD  8th
Development of Health Software using Behaviour Driven Develo...
收藏 引用
8th international conference on model-driven engineering and software development (modelsward)
作者: Anjum, Mohamma Z. Mahon, Silvana Togneri Mac McCaffery, Fergal Dundalk Inst Technol Regulated Software Res Ctr Dundalk Co Louth Ireland Dublin City Univ Sch Comp Dublin 9 Ireland
the health software industry is facing an immense challenge of managing quality and preventing software failures. Poorly defined requirements are one of the significant cause of health software failures. Agile practic... 详细信息
来源: 评论
DIEF: An Autopsy Module for Distributed Identification of E-mail Files from Disk Images  9
DIEF: An Autopsy Module for Distributed Identification of E-...
收藏 引用
9th IEEE international conference on Smart City and Informatization (iSCI) / 15th IEEE international conference on Big Data Science and engineering (BigDataSE)
作者: Ozcan, Selim Astekin, Merve Glisson, William Bradley Choo, Kim-Kwang Raymond Sam Houston State Univ Dept Comp Sci Cyber Forens Intelligence Ctr Dept Hunstville TX 77340 USA Simula Res Lab Data Driven Software Engn Dept Fornebu Norway Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA
Hard drives are a predominant source of residual data in today9;s digital environments. However, the increasing size of hard disks compounds the challenge of digital forensics, particularly in time-poor and resourc... 详细信息
来源: 评论
Identification of Nonfunctional Requirement Conflicts: Machine Learning Approach  9th
Identification of Nonfunctional Requirement Conflicts: Machi...
收藏 引用
9th EAI international conference on Advancement of Science and Technology, ICAST 2021
作者: Abeba, Getasew Alemneh, Esubalew Faculty of Computing Bahir Dar Institute of Technology Bahir Dar University Bahir Dar Ethiopia ICT4D Research Center Bahir Dar Institute of Technology Bahir Dar University Bahir Dar Ethiopia
the most common causes of software failure in system development are requirements issues. One of these issues is requirement conflicts, which results in expensive costs and a long development time. this is because con... 详细信息
来源: 评论
A Lifecycle for engineering IoT Neural Network-based Systems
A Lifecycle for Engineering IoT Neural Network-based Systems
收藏 引用
9th IEEE international conference on Big Data (IEEE BigData)
作者: Nascimento, Nathalia Alencar, Paulo Cowan, Donald Univ Waterloo UW David R Cheriton Sch Comp Sci Waterloo ON Canada
Internet of things (IoT) applications have been deployed in several domains, including health care, smart cities, and agriculture. Because of the complex static and dynamic variability of the environment in which thes... 详细信息
来源: 评论
Mining Learner-friendly Security Patterns from Huge Published Histories of software Applications for an Intelligent Tutoring System in Secure Coding
Mining Learner-friendly Security Patterns from Huge Publishe...
收藏 引用
9th IEEE international conference on Big Data (IEEE BigData)
作者: Imtiaz, Sayem Mohammad Sultana, Kazi Zakia Varde, Aparna S. Iowa State Univ Ames IA 50011 USA Montclair State Univ Montclair NJ 07043 USA
Security patterns are proven solutions to recurring problems in software development. the growing importance of secure software development has introduced diverse research efforts on security patterns that mostly focu... 详细信息
来源: 评论
Trigger2B: A Tool Generating Event-B models from Database Triggers  9th
Trigger2B: A Tool Generating Event-B Models from Database Tr...
收藏 引用
9th EAI international conference on Context-Aware Systems and Applications, ICCASA 2020 and 6th EAI international conference on Nature of Computation and Communication, ICTCC 2020
作者: Le, Hong Anh Hanoi University of Mining and Geology 18 Pho Vien Bac Tu Liem Hanoi Viet Nam
Triggers are commonly used many traditional database applications that can be checked if they are correct after execution or manual inspection. Formal methods are techniques complementing to testing that ensure the co... 详细信息
来源: 评论