咨询与建议

限定检索结果

文献类型

  • 1,928 篇 会议
  • 143 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 2,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,312 篇 工学
    • 1,196 篇 计算机科学与技术...
    • 875 篇 软件工程
    • 229 篇 信息与通信工程
    • 178 篇 控制科学与工程
    • 129 篇 电气工程
    • 78 篇 电子科学与技术(可...
    • 73 篇 生物医学工程(可授...
    • 72 篇 生物工程
    • 40 篇 建筑学
    • 37 篇 光学工程
    • 36 篇 动力工程及工程热...
    • 35 篇 机械工程
    • 29 篇 仪器科学与技术
    • 29 篇 化学工程与技术
    • 27 篇 力学(可授工学、理...
    • 27 篇 土木工程
  • 502 篇 理学
    • 379 篇 数学
    • 104 篇 物理学
    • 78 篇 统计学(可授理学、...
    • 75 篇 生物学
    • 26 篇 化学
    • 23 篇 系统科学
  • 276 篇 管理学
    • 168 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 88 篇 工商管理
  • 66 篇 教育学
    • 64 篇 教育学
  • 63 篇 医学
    • 61 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 24 篇 药学(可授医学、理...
  • 28 篇 法学
    • 23 篇 社会学
  • 18 篇 经济学
  • 9 篇 农学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 91 篇 mobile computing
  • 72 篇 distributed comp...
  • 69 篇 computer science
  • 53 篇 grid computing
  • 47 篇 application soft...
  • 40 篇 concurrent compu...
  • 39 篇 computational mo...
  • 36 篇 computer network...
  • 34 篇 computer archite...
  • 32 篇 cloud computing
  • 29 篇 virtual reality
  • 29 篇 ubiquitous compu...
  • 27 篇 internet
  • 26 篇 costs
  • 25 篇 laboratories
  • 23 篇 peer to peer com...
  • 23 篇 middleware
  • 20 篇 parallel process...
  • 20 篇 processor schedu...
  • 20 篇 hardware

机构

  • 20 篇 the hong kong po...
  • 18 篇 hong kong polyte...
  • 18 篇 department of co...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 12 篇 institute of com...
  • 12 篇 department of co...
  • 10 篇 nit calicut
  • 10 篇 depauw universit...
  • 10 篇 national institu...
  • 9 篇 school of comput...
  • 8 篇 college of compu...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 university of lo...
  • 6 篇 pablo de olavide...
  • 6 篇 department of co...
  • 6 篇 college of compu...
  • 6 篇 department of co...
  • 6 篇 school of comput...

作者

  • 25 篇 hong va leong
  • 18 篇 leong hong va
  • 15 篇 alvin chan
  • 13 篇 hong jiman
  • 11 篇 hung chih-cheng
  • 11 篇 chan alvin t.s.
  • 10 篇 liu ling
  • 10 篇 gloria childress...
  • 10 篇 george roussos
  • 8 篇 umesh bellur
  • 8 篇 song enmin
  • 7 篇 rajiv ramnath
  • 7 篇 pu calton
  • 7 篇 si antonio
  • 7 篇 ahamed sheikh iq...
  • 7 篇 chandran priya
  • 6 篇 federico divina
  • 6 篇 sheikh iqbal aha...
  • 6 篇 madhu kumar s.d.
  • 6 篇 raúl giráldez ro...

语言

  • 2,062 篇 英文
  • 14 篇 其他
  • 3 篇 中文
  • 2 篇 葡萄牙文
检索条件"任意字段=Applied Computing 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing"
2081 条 记 录,以下是831-840 订阅
排序:
Implementation of a partnership to improve applied science education among women in Uganda
Implementation of a partnership to improve applied science e...
收藏 引用
114th Annual ASEE Conference and Exposition, 2007
作者: Duda, Frank Greninger, Nevin Idowu, Peter Lauffer, Douglas Grove City College United States Pennsylvania State University Harrisburg United States Community College of Beaver County Beaver PA United States
The economic, education, and health problems facing Uganda are immense. The average life span is around 42 years of age. Health clinics, potable [drinkable] water and electricity are not readily available for most cit... 详细信息
来源: 评论
Special issue dedicated to the Thirty-Sixth Annual acm symposium on Theory of computing (STOC 2004)
收藏 引用
SIAM JOURNAL ON computing 2006年 第4期35卷 IX-X页
作者: Babai, L University of Chicago United States
This volume comprises the polished and fully refereed versions of a selection of papers presented at the Thirty-Sixth Annual acm symposium on Theory of computing (STOC 2004), held in Chicago, Illinois, June 13-15, 200...
来源: 评论
Inferring Regulatory Interactions between Transcriptional Factors and Genes by Propagating Known Regulatory Links
Inferring Regulatory Interactions between Transcriptional Fa...
收藏 引用
IEEE symposium on Computational Intelligence and Bioinformatics and Computational Biology (CIBCB)
作者: Qian Zhong Riccardo Boscolo Timothy S. Gardner Vwani P. Roychowdhury Department of Electrical Engineering University of California Los Angeles CA USA Center for BioDynamics and Department of Biomedical Engineering Boston University Boston MA USA
Determining transcriptional regulatory networks has been one of the most important goals in the field of functional genomics. Despite the recent advances in experimental techniques, complementary computational techniq... 详细信息
来源: 评论
Java bytecode specification and verification  06
Java bytecode specification and verification
收藏 引用
2006 acm symposium on applied computing
作者: Burdy, Lilian Pavlova, Mariela INRIA Sophia-Antipolis 2004 Route des Lucioles 06902 Sophia-Antipolis France
We propose a framework for establishing the correctness of untrusted Java bytecode components w.r.t. to complex functional and/or security policies. To this end, we define a bytecode specification language (BCSL) and ... 详细信息
来源: 评论
To infinity and beyond or, avoiding the infinite in security protocol analysis  06
To infinity and beyond or, avoiding the infinite in security...
收藏 引用
2006 acm symposium on applied computing
作者: Heather, James Schneider, Steve Department of Computing University of Surrey Guildford United Kingdom
We investigate conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol. The work is conducted using the strand spaces f... 详细信息
来源: 评论
ALTER: First step towards dependable grids  06
ALTER: First step towards dependable grids
收藏 引用
2006 acm symposium on applied computing
作者: Xuanhua, Shi Hai, Jin Weizhong, Qiang Cluster and Grid Computing Lab. Huazhong University of Science and Technology Wuhan 430074 China
This paper presents ALTER, an adaptive failure detection service, which incorporates the technique of unreliable failure detection service and the idea of R-GMA. ALTER is organized in a hierarchical structure and it c... 详细信息
来源: 评论
BambooTrust: Practical scalable trust management for global public computing
BambooTrust: Practical scalable trust management for global ...
收藏 引用
2006 acm symposium on applied computing
作者: Kotsovinos, Evangelos Williams, Aled Deutsche Telekom Laboratories Ernst-Reuter-Platz 7 10587 Berlin Germany Cambridge University Computer Laboratory 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effectively in an open and untrusted environ... 详细信息
来源: 评论
Design and development of a multiversion OLAP application  06
Design and development of a multiversion OLAP application
收藏 引用
2006 acm symposium on applied computing
作者: Mitrpanont, Jarernsri L. Fugkeaw, Somchart Computer Science Department Mahidol University Computing Center Mahidol University Bangkok 10400 Thailand
This paper proposes a temporal version mapping concept and a SQL query rewriting technique to support the OLAP query analysis in multidimensional database (MDB) systems modeled on multiversion schema. Based on our pro... 详细信息
来源: 评论
The advent of trusted computing: Implications for digital forensics
The advent of trusted computing: Implications for digital fo...
收藏 引用
2006 acm symposium on applied computing
作者: Burmester, Mike Mulholland, Judie Department of Computer Science Florida State University Tallahassee FL 32306-4530 Florida Cybersecurity Institute Florida State University Tallahassee FL 32306-4530
The release of computer hardware devices based on "trusted computing" technologies is heralding a paradigm shift that will have profound implications for digital forensics. In this paper, we map out the cont... 详细信息
来源: 评论
Extending noninterference properties to the timed world  06
Extending noninterference properties to the timed world
收藏 引用
2006 acm symposium on applied computing
作者: Huang, Jian Roscoe, A.W. Oxford University Computing Laboratory Wolfson Building Parks Road Oxford OX1 3QD United Kingdom
Most previous work on information flow in process algebras has been based on untimed models of concurrency. It is obvious, however, that an observer might well use time to gain information about what a high-level user... 详细信息
来源: 评论