咨询与建议

限定检索结果

文献类型

  • 10,310 篇 会议
  • 248 篇 期刊文献
  • 187 册 图书
  • 2 篇 学位论文

馆藏范围

  • 10,747 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,857 篇 工学
    • 4,306 篇 计算机科学与技术...
    • 3,039 篇 软件工程
    • 722 篇 电气工程
    • 678 篇 信息与通信工程
    • 520 篇 控制科学与工程
    • 376 篇 电子科学与技术(可...
    • 161 篇 机械工程
    • 147 篇 动力工程及工程热...
    • 98 篇 网络空间安全
    • 97 篇 生物工程
    • 91 篇 安全科学与工程
    • 86 篇 仪器科学与技术
    • 79 篇 建筑学
    • 71 篇 土木工程
    • 71 篇 生物医学工程(可授...
    • 64 篇 化学工程与技术
    • 57 篇 材料科学与工程(可...
    • 54 篇 力学(可授工学、理...
    • 54 篇 光学工程
  • 1,330 篇 理学
    • 954 篇 数学
    • 213 篇 系统科学
    • 162 篇 统计学(可授理学、...
    • 157 篇 物理学
    • 120 篇 生物学
    • 67 篇 化学
  • 1,046 篇 管理学
    • 827 篇 管理科学与工程(可...
    • 409 篇 工商管理
    • 252 篇 图书情报与档案管...
  • 119 篇 经济学
    • 119 篇 应用经济学
  • 71 篇 法学
    • 58 篇 社会学
  • 45 篇 教育学
  • 40 篇 医学
  • 26 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 1,688 篇 application soft...
  • 893 篇 distributed comp...
  • 874 篇 computer archite...
  • 872 篇 computer science
  • 845 篇 hardware
  • 728 篇 concurrent compu...
  • 668 篇 parallel process...
  • 565 篇 computational mo...
  • 558 篇 software enginee...
  • 446 篇 real time system...
  • 345 篇 runtime
  • 324 篇 software systems
  • 322 篇 costs
  • 318 篇 processor schedu...
  • 317 篇 fault tolerance
  • 312 篇 resource managem...
  • 290 篇 software
  • 289 篇 operating system...
  • 287 篇 scalability
  • 285 篇 bandwidth

机构

  • 35 篇 school of comput...
  • 23 篇 ibm thomas j. wa...
  • 22 篇 department of co...
  • 21 篇 school of softwa...
  • 20 篇 college of compu...
  • 20 篇 school of electr...
  • 19 篇 state key labora...
  • 19 篇 department of el...
  • 19 篇 department of co...
  • 18 篇 department of co...
  • 16 篇 school of comput...
  • 15 篇 department of el...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 14 篇 department of el...
  • 14 篇 beijing jiaotong...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 institute of inf...

作者

  • 20 篇 m. takizawa
  • 20 篇 rajkumar buyya
  • 20 篇 k.h. kim
  • 18 篇 dhabaleswar k. p...
  • 18 篇 jack dongarra
  • 17 篇 m. kandemir
  • 17 篇 h.j. siegel
  • 16 篇 a. choudhary
  • 14 篇 m. parashar
  • 14 篇 howard jay siege...
  • 13 篇 l.r. welch
  • 13 篇 parashar manish
  • 13 篇 gao guang r.
  • 12 篇 dongarra jack
  • 12 篇 h. casanova
  • 12 篇 hari subramoni
  • 12 篇 welch lonnie r.
  • 12 篇 xiao qin
  • 12 篇 maciejewski anth...
  • 11 篇 jun wang

语言

  • 10,443 篇 英文
  • 268 篇 其他
  • 34 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Symposium on Software Engineering for Parallel and Distributed Systems"
10747 条 记 录,以下是3801-3810 订阅
排序:
DsVD: An effective low-overhead dynamic software vulnerability discoverer
DsVD: An effective low-overhead dynamic software vulnerabili...
收藏 引用
international Workshop on Assurance in distributed systems and Networks
作者: Wang, Zhuo Tang, Zhushou Zhou, Kan Zhang, Ruoyu Qi, Zhengwei Guan, Haibin School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
Dynamic taint analysis based software vulnerability and malware detection is an effective method to detect a wide range of vulnerabilities. Unfortunately, existing systems suffer from requirement of source code, high ... 详细信息
来源: 评论
A distributed RFID discovery system: Architecture, component and application
A distributed RFID discovery system: Architecture, component...
收藏 引用
14th IEEE Int. Conf. on Computational Science and engineering, CSE 2011, the 11th international symposium on Pervasive systems, Algorithms, and Networks, I-SPAN 2011, and the 10th IEEE Int. Conf. on Ubiquitous Computing and Communications, IUCC 2011
作者: Zhao, Wen Liu, Xue Yang Ma, Sen Yuan, Chong Yi Wang, Li Fu National Engineering Research Center for Software Engineering Peking University Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China
For performance and security concern in large-scale application environment, based on "follow the chain" mode, a distributed RFID discovery system is proposed and implemented. At first, system architecture i... 详细信息
来源: 评论
Accelerating DFA construction by hierarchical merging
Accelerating DFA construction by hierarchical merging
收藏 引用
9th IEEE international symposium on parallel and distributed Processing with Applications, ISPA 2011
作者: Liu, Yanbing Guo, Li Guo, Muyi Liu, Ping Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Graduate School Chinese Academy of Sciences Beijing 100049 China National Engineering Laboratory for Information Security Technologies Beijing 100190 China
Regular expression matching is widely used in many network applications to analyze suspicious traffic against predefined signatures, and to discover anomalous events. Deterministic Finite Automaton (DFA), which recogn... 详细信息
来源: 评论
I2SD: Reverse engineering Sequence Diagrams from Enterprise Java Beans with Interceptors
I2SD: Reverse Engineering Sequence Diagrams from Enterprise ...
收藏 引用
11th IEEE international Working Conference on Source Code Analysis and Manipulation/IEEE international Conference on software Maintenance/IEEE international symposium on Web systems Evolution/VISSOFT/MESOCA
作者: Roubtsov, Serguei Serebrenik, Alexander Mazoyer, Aurelien Van den Brand, Mark Roubtsova, E. Eindhoven Univ Technol POB 513 NL-5600 MB Eindhoven Netherlands France Lab CICA F-06560 Valbonne France Open Univ NL-6401DL Heerlen Netherlands
An Enterprise JavaBeans (EJB) interceptor is a software mechanism that provides for introducing behavior implemented as separate code into the execution of a Java application. In this way EJB interceptors provide a cl... 详细信息
来源: 评论
Design and implementation of SIMD Vector Processor on FPGA
Design and implementation of SIMD Vector Processor on FPGA
收藏 引用
2011 4th international symposium on Innovation in Information and Communication Technology, ISIICT'2011
作者: Mahmood, Basil Sh. Jbaar, Mamoon A. Al College of Electronics Engineering/Computer IT Department Iraq
This paper handle the design and implementation of the SIMD Vector Processor on FPGA, this processor consist of 4 parallel lanes (processing elements PEs) that work simultaneously independent with each other, each one... 详细信息
来源: 评论
Some implications of eye gaze behavior and perception for the design of immersive telecommunication systems  11
Some implications of eye gaze behavior and perception for th...
收藏 引用
15th IEEE/ACM international symposium on distributed Simulation and Real Time Applications, DS-RT 2011
作者: Rae, John P. Steptoe, William Roberts, David J. Department of Psychology Roehampton University London SW15 4JD United Kingdom Department of Computer Science University College London London WC1E 6BT United Kingdom School of Computer Science and Engineering University of Salford Salford M5 4WT United Kingdom
A feature of standard video-mediated Communication systems (VMC) is that participants see into each other's spaces from the viewpoint of a camera. Consequently, participants' capacity to use the spatially-base... 详细信息
来源: 评论
Detection and protection against distributed denial of service attacks in accountable grid computing systems  11
Detection and protection against distributed denial of servi...
收藏 引用
Proceedings of the 2011 11th IEEE/ACM international symposium on Cluster, Cloud and Grid Computing
作者: Lee, Wonjun Squicciarini, Anna C. Bertino, Elisa Electrical and Computer Engineering CERIAS Purdue University West Lafayette IN United States Information Sciences and Technology Pennsylvania State University College Park PA United States Computer Science CERIAS Purdue University West Lafayette IN United States
By exploiting existing vulnerabilities, malicious parties can take advantage of resources made available by grid systems to attack mission-critical websites or the grid itself. In this paper, we present two approaches... 详细信息
来源: 评论
Efficient reconfigurable architectures of generic cyclic convolution
Efficient reconfigurable architectures of generic cyclic con...
收藏 引用
IEEE international symposium on Consumer Electronics
作者: Krill, B. Amira, A. Faculty of Computing and Engineering University of Ulster Newtownabbey Co. Antrim BT37 0QB Belfast United Kingdom
This paper presents the design and implementation of a generic cyclic convolution architecture for imaging applications on field programmable gate array (FPGA). Two main architectures are implemented. A parallel archi... 详细信息
来源: 评论
GALS-based LPSP: Implementation of a novel architecture for low power high performance security processors
GALS-based LPSP: Implementation of a novel architecture for ...
收藏 引用
25th IEEE international parallel and distributed Processing symposium, Workshops and Phd Forum, IPDPSW 2011
作者: Farouk, Hala A. El-Hadidi, Mahmoud T. El Farag, Ahmed Abou Computer Engineering Arab Academy for Science and Technology Alexandria Egypt Electronics and Electrical Communication Cairo University Cairo Giza Egypt
Current architectures for processors that run security applications are optimized for either high-performance or low energy consumption. We propose an implementation for an architecture that not only provides high per... 详细信息
来源: 评论
Testing and validating machine learning classifiers by metamorphic testing
Testing and validating machine learning classifiers by metam...
收藏 引用
作者: Xie, Xiaoyuan Ho, Joshua W.K. Murphy, Christian Kaiser, Gail Xu, Baowen Chen, Tsong Yueh Centre for Software Analysis and Testing Swinburne University of Technology Hawthorn VIC 3122 Australia Department of Medicine Brigham and Women's Hospital Harvard Medical School Boston MA 02115 United States Department of Computer Science Columbia University New York NY 10027 United States School of Computer Science and Engineering Southeast University Nanjing 210096 China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China Department of Computer and Information Science University of Pennsylvania Philadelphia PA 19103 United States
Machine learning algorithms have provided core functionality to many application domains - such as bioinformatics, computational linguistics, etc. However, it is difficult to detect faults in such applications because... 详细信息
来源: 评论