咨询与建议

限定检索结果

文献类型

  • 86,110 篇 会议
  • 2,734 册 图书
  • 1,724 篇 期刊文献
  • 4 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 90,568 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 46,753 篇 工学
    • 38,434 篇 计算机科学与技术...
    • 31,983 篇 软件工程
    • 6,382 篇 控制科学与工程
    • 6,314 篇 信息与通信工程
    • 5,566 篇 电气工程
    • 3,216 篇 机械工程
    • 2,952 篇 电子科学与技术(可...
    • 2,059 篇 生物工程
    • 1,599 篇 生物医学工程(可授...
    • 1,487 篇 安全科学与工程
    • 1,407 篇 动力工程及工程热...
    • 1,374 篇 仪器科学与技术
    • 1,274 篇 建筑学
    • 1,206 篇 土木工程
    • 1,147 篇 材料科学与工程(可...
    • 1,038 篇 光学工程
    • 1,029 篇 交通运输工程
  • 13,168 篇 理学
    • 7,357 篇 数学
    • 2,661 篇 物理学
    • 2,363 篇 系统科学
    • 2,245 篇 生物学
    • 1,766 篇 统计学(可授理学、...
  • 11,155 篇 管理学
    • 7,853 篇 管理科学与工程(可...
    • 4,113 篇 工商管理
    • 4,080 篇 图书情报与档案管...
  • 2,147 篇 教育学
    • 2,121 篇 教育学
  • 1,383 篇 医学
    • 1,181 篇 临床医学
    • 1,036 篇 基础医学(可授医学...
  • 1,378 篇 法学
    • 1,077 篇 社会学
  • 1,313 篇 经济学
    • 1,304 篇 应用经济学
  • 382 篇 农学
  • 257 篇 文学
  • 194 篇 军事学
  • 62 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 8,329 篇 application soft...
  • 7,112 篇 software enginee...
  • 5,921 篇 computer archite...
  • 5,291 篇 software
  • 5,225 篇 computer science
  • 4,425 篇 software systems
  • 4,162 篇 hardware
  • 3,535 篇 computer aided s...
  • 3,262 篇 control systems
  • 2,660 篇 computational mo...
  • 2,223 篇 costs
  • 2,093 篇 programming
  • 1,811 篇 artificial intel...
  • 1,745 篇 computer softwar...
  • 1,740 篇 real time system...
  • 1,619 篇 testing
  • 1,508 篇 real-time system...
  • 1,419 篇 software design
  • 1,371 篇 protocols
  • 1,350 篇 information syst...

机构

  • 197 篇 college of compu...
  • 114 篇 school of comput...
  • 59 篇 school of comput...
  • 56 篇 college of compu...
  • 54 篇 school of comput...
  • 49 篇 department of co...
  • 40 篇 college of compu...
  • 37 篇 department of el...
  • 37 篇 school of comput...
  • 36 篇 school of electr...
  • 36 篇 department of el...
  • 34 篇 institute of inf...
  • 33 篇 state key labora...
  • 32 篇 school of comput...
  • 32 篇 department of el...
  • 31 篇 department of co...
  • 31 篇 department of el...
  • 29 篇 department of co...
  • 28 篇 school of comput...
  • 27 篇 department of co...

作者

  • 49 篇 anon
  • 37 篇 bernady o. apduh...
  • 36 篇 bosch jan
  • 34 篇 o'connor rory v.
  • 28 篇 shaoying liu
  • 28 篇 li yang
  • 26 篇 dubinsky yael
  • 26 篇 ebrahim babaei
  • 22 篇 zhu huibiao
  • 21 篇 lei wang
  • 21 篇 dong jin song
  • 20 篇 katz guy
  • 19 篇 zhang lei
  • 17 篇 levent yilmaz
  • 17 篇 rui wang
  • 17 篇 wenyun zhao
  • 17 篇 shahar maoz
  • 17 篇 vardi moshe y.
  • 16 篇 weiming shen
  • 16 篇 noraziah a.

语言

  • 89,084 篇 英文
  • 1,017 篇 其他
  • 437 篇 中文
  • 32 篇 西班牙文
  • 18 篇 葡萄牙文
  • 15 篇 德文
  • 14 篇 土耳其文
  • 13 篇 俄文
  • 9 篇 法文
  • 4 篇 捷克文
  • 4 篇 日文
  • 2 篇 乌克兰文
  • 1 篇 朝鲜文
检索条件"任意字段=Israel Conference on Computer Systems and Software Engineering"
90574 条 记 录,以下是4921-4930 订阅
Ten open challenges at the boundaries of software engineering and Information systems  23rd
Ten open challenges at the boundaries of Software Engineerin...
收藏 引用
23rd International conference on Advanced Information systems engineering, CAiSE 2011
作者: Finkelstein, Anthony Department of Computer Science University College London United Kingdom
In this talk, intended to provoke discussion, I will suggest ten important open challenges at boundaries where software engineering & Information systems meet. I will focus on challenges are both intellectually de... 详细信息
来源: 评论
Reputation by design: using VDML and ServiceML for reputation systems modeling  11
Reputation by design: using VDML and ServiceML for reputatio...
收藏 引用
11th IEEE International conference on e-Business engineering (ICEBE)
作者: Capecchi, Sara Pisano, Paola Univ Turin Dipartimento Informat I-10124 Turin Italy
Despite reputation deeply influences system providers and users interactions (e.g. in e-commerce), today implementations of reputation systems are far from being satisfactory. Reputation systems implemented so far for... 详细信息
来源: 评论
Automatic Generation of Package Diagram to Understand Java Packages  13
Automatic Generation of Package Diagram to Understand Java P...
收藏 引用
13th IEEE/ACIS International conference on computer and Information Science (ICIS)
作者: Jiang, Li Sun, Xiaobing Li, Yun Liu, Xiangyue Yangzhou Univ Sch Informat Engn Yangzhou 225009 Jiangsu Peoples R China
Program comprehension is a prerequisite in most software maintenance and evolution tasks. Given an unfamiliar system, it is difficult for practitioners to determine which software artifacts are relevant to the current... 详细信息
来源: 评论
Developing a hardware laboratory for software engineering students
Developing a hardware laboratory for software engineering st...
收藏 引用
Proceedings of the 1995 Annual ASEE conference. Part 1 (of 2)
作者: Steidley, Carl W. Southeastern Louisiana Univ Hammond United States
Described is a laboratory which is being equipped and developed to provide software engineering/computer science majors with important hardware, instrumentation, and interfacing knowledge that many such majors do not ... 详细信息
来源: 评论
RNAMute: RNA secondary structure mutation analysis tool
RNAMute: RNA secondary structure mutation analysis tool
收藏 引用
2005 IEEE Computational systems Bioinformatics conference, Workshops and Poster Abstracts
作者: Churkin, Alexander Elgad, Ornit Petgho, Oshrat Barash, Danny Department of Computer Science Ben-Gurion University 84105 Beer-Sheva Israel
RNAMute is an interactive web tool written in Java that calculates the secondary structure of all single point mutations, given an RNA sequence, and organizes them into categories according to their distances from the... 详细信息
来源: 评论
software Test Capability Improvement Method
Software Test Capability Improvement Method
收藏 引用
International conference on Advanced software engineering and Its Applications/International conference on Disaster Recovery and Business Continuity
作者: Lee, Jihyun Hwang, Sunmyung Daejeon Univ Taejon South Korea
An Integrated Medical Information System (IMIS) requires continuous customization to cope with periodic government notifications, changes in customer needs, and changing customer preferences. These systems are also mo... 详细信息
来源: 评论
software security concerns modeling method based on UML extension
Software security concerns modeling method based on UML exte...
收藏 引用
International conference on computer, Intelligent Computing and Education Technology, CICET 2014
作者: Li, Wen-Juan Zhao, Kai Zhang, Lin-Lin Wei, Chun-Xia Wang, Jie Xu, She-Hui College of Information Science and Engineering Xinjiang University Urumqi China
software security has an enormous impact on almost all areas ranging from general software systems to security critical systems. The traditional measures such as firewalls cannot fundamentally solve the problem of sof... 详细信息
来源: 评论
software Technologies for Embedded and Ubiquitous systems: 8th IFIP WG 10.2 InternationalWorkshop, SEUS 2010 Waidhofen/Ybbs, Austria, October 13-15, 2010 Proceedings  8
Software Technologies for Embedded and Ubiquitous Systems: 8...
收藏 引用
8th IFIP WG 10.2 International Workshop on software Technologies for Embedded and Ubiquitous systems, SEUS 2010
作者: Min, Sang Lyul Pettit, Robert Puschner, Peter Ungerer, Theo Seoul National University School of Computer Science and Engineering 599 Kwanak-ro Gwanak-gu Seoul Korea Republic of The Aerospace Corporation Software Systems Engineering Department 15049 Conference Center Drive CH3/320 ChantillyVA United States Vienna University of Technology Institute of Computer Engineering Treitlstrasse 3 Vienna Austria University of Augsburg Systems and Networking Universitätsstr. 6a Augsburg Germany
来源: 评论
Providing secrecy in key management protocols for large wireless sensors networks
收藏 引用
Ad Hoc Networks 2003年 第4期1卷 455-468页
作者: Pietro, Roberto Di Mancini, Luigi V. Jajodia, Sushil Dipartimento di Informatica Univ. di Roma La Sapienza Via Salaria 113 00198 Roma Italy Ctr. for Secure Information Systems George Mason University University Drive VA 22030 United States
This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if... 详细信息
来源: 评论
Enriching Reverse engineering with Annotations
收藏 引用
11th International conference on Model Driven engineering Languages and systems
作者: Bruehlmann, Andrea Girba, Tudor Greevy, Orla Nierstrasz, Oscar Univ Bern Software Composit Grp CH-3012 Bern Switzerland
Much of the knowledge about software systems is implicit and therefore difficult to recover by purely automated techniques. Architectural layers and die externally visible features of software, systems are two example... 详细信息
来源: 评论