咨询与建议

限定检索结果

文献类型

  • 328 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 334 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 271 篇 工学
    • 250 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 39 篇 信息与通信工程
    • 20 篇 生物工程
    • 15 篇 控制科学与工程
    • 15 篇 生物医学工程(可授...
    • 13 篇 动力工程及工程热...
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 建筑学
    • 8 篇 环境科学与工程(可...
    • 7 篇 土木工程
    • 6 篇 机械工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
  • 79 篇 理学
    • 49 篇 数学
    • 21 篇 生物学
    • 8 篇 物理学
    • 8 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 4 篇 化学
  • 64 篇 管理学
    • 38 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 26 篇 教育学
    • 26 篇 教育学
  • 13 篇 法学
    • 10 篇 社会学
  • 7 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 农学
  • 2 篇 军事学

主题

  • 23 篇 mobile computing
  • 14 篇 students
  • 14 篇 cloud computing
  • 7 篇 distributed comp...
  • 6 篇 curricula
  • 6 篇 ubiquitous compu...
  • 5 篇 edge computing
  • 5 篇 education comput...
  • 4 篇 quantum computin...
  • 4 篇 recommender syst...
  • 4 篇 virtual machine
  • 3 篇 genes
  • 3 篇 bandwidth
  • 3 篇 grid computing
  • 3 篇 computer applica...
  • 3 篇 computing power
  • 3 篇 flash memory
  • 3 篇 semantics
  • 3 篇 genetic algorith...
  • 3 篇 virtualization

机构

  • 8 篇 school of comput...
  • 5 篇 school of comput...
  • 4 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 university of be...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 university of co...
  • 2 篇 the hong kong po...
  • 2 篇 marquette univer...
  • 2 篇 dept. of compute...
  • 2 篇 computing instit...
  • 2 篇 institute of com...
  • 2 篇 school of comput...
  • 2 篇 university of ut...
  • 2 篇 college of compu...
  • 2 篇 kyungpook nation...

作者

  • 6 篇 hong jiman
  • 5 篇 hung chih-cheng
  • 5 篇 song enmin
  • 4 篇 zulkernine moham...
  • 4 篇 cho yookun
  • 4 篇 liu hong
  • 3 篇 chan stephen c.f...
  • 3 篇 kim bongjae
  • 3 篇 varadharajan vij...
  • 3 篇 zambonelli franc...
  • 3 篇 ngai grace
  • 2 篇 cassel lillian n...
  • 2 篇 kühn eva
  • 2 篇 sheikh iqbal aha...
  • 2 篇 van langeveld ma...
  • 2 篇 weldemariam komm...
  • 2 篇 liu ling
  • 2 篇 tancer martin
  • 2 篇 mayer wolfgang
  • 2 篇 ni lijun

语言

  • 334 篇 英文
检索条件"任意字段=Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing"
334 条 记 录,以下是171-180 订阅
排序:
the illusion of one hundred percent uptime  12
The illusion of one hundred percent uptime
收藏 引用
40th Annual acm Management symposium and Service and Support Conference, SIGUCCS 2012
作者: Kim, Jeremy Denk, James Wharton Computing University of Pennsylvania 3733 Vance Hall Philadelphia PA 19105 United States
In demanding academic environments students expect 100% uptime. It is rarely the case when dealing with school technology including Macs, PCs, printers, servers, complex networks and numerous peripherals that everythi... 详细信息
来源: 评论
Crafting great user experiences  12
Crafting great user experiences
收藏 引用
40th Annual acm Management symposium and Service and Support Conference, SIGUCCS 2012
作者: Bertino, Nic Corrales, Andrew Chen, Allan Law School Santa Clara University 500 El Camino Real Santa Clara CA 95053 United States Law Technology and Academic Computing Law School Santa Clara University 500 El Camino Real Santa Clara CA 95053 United States
As a user of products and technology, one often experiences a wide range of emotions: happiness, frustration, gratitude, irritation, excitement, and apathy amongst others. Yet, as designers and deliverers of these too... 详细信息
来源: 评论
26th Annual acm symposium on applied computing, SAC 2011
26th Annual ACM Symposium on Applied Computing, SAC 2011
收藏 引用
26th Annual acm symposium on applied computing, SAC 2011
the proceedings contain 294 papers. the topics discussed include: raster image representation of fingerprint minutiae;fusion in fingerprint authentication: two finger types vs. two scanner types;keystroke dynamics aut...
来源: 评论
Weed classification based on Haar wavelet transform via k-Nearest Neighbor (k-NN) for real-time automatic sprayer control system  11
Weed classification based on Haar wavelet transform via k-Ne...
收藏 引用
proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
作者: Ahmad, Irshad Siddiqi, Muhammad Hameed Fatima, Iram Lee, Sungyoung Lee, Young-Koo College of Computer and Information Technology Al Jouf University Sakaka Al Jouf Saudi Arabia Ubiquitous Computing Lab. Kyung Hee University Korea Republic of
Weeds cause harm to crops by competing for water, light, nutrients and space, reducing crop yields and inhibiting the efficiency of machinery. Although there is a large volume of work on this topic, previous studies h... 详细信息
来源: 评论
Introducing global scaling parameters into Ncut  10
Introducing global scaling parameters into Ncut
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Zeng, Yiling Xu, Hongbo Cheng, Xueqi Bai, Shuo Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Shanghai Stock Exchange Shanghai 200120 China
Gaussian similarity is usually used in spectral clustering. It generates the affinity matrix by mainly considering point-to-point distances in a local region with respect to the scaling parameters Δ. As a result, glo... 详细信息
来源: 评论
Network state consistency of virtual machine in live migration  10
Network state consistency of virtual machine in live migrati...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Liu, Xingang Huai, Jinpeng Li, Qin Wo, Tianyu School of Computing Beihang University Beijing China
the current Virtual Machine (VM) live migration research mainly focuses on transferring run-time memory state of VMs, but neglects the consistency of the network state while migration. this paper designs an Efficient ... 详细信息
来源: 评论
UbiCheck: An approach to support requirements definition in the ubicomp domain  10
UbiCheck: An approach to support requirements definition in ...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Spínola, Rodrigo O. Pinto, Felipe C. Do R. Travassos, Guilherme H. PESC-COPPE/UFRJ Cidade Universitária Centro de Tecnologia Bloco H Rio de Janeiro RJ Brazil
Ubiquitous computing brings a set of characteristics that are not commonly found in conventional software projects. One of the consequences is an increase in the software development complexity. Additionally, traditio... 详细信息
来源: 评论
applied computing 2010 - the 25th Annual acm symposium on applied computing
APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Ap...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
the proceedings contain 449 papers. the topics discussed include: text versus non-text distinction in online handwritten documents;enhancing document structure analysis using visual analytics;an automatic linking serv...
来源: 评论
MetaSelf - An architecture and a development method for dependable self-* systems  10
MetaSelf - An architecture and a development method for depe...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Di Marzo Serugendo, Giovanna Fitzgerald, John Romanovsky, Alexander Dept. of Computer Science and Information Systems Birkbeck College London United Kingdom School of Computing Science Newcastle University Newcastle Upon Tyne United Kingdom
this paper proposes a software architecture and a development process for engineering dependable and controllable self-organising (SO) systems. Our approach addresses dependability by exploiting metadata to support de... 详细信息
来源: 评论
Mobile Intelligent Interruptions Management (MIIM): A context aware unavailability system  10
Mobile Intelligent Interruptions Management (MIIM): A contex...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Stamm, Karl Ahamed, Sheikh Iqbal Madiraju, Praveen Zulkernain, Sina Department of Mathematics Statistics and Computer Science Marquette University Milwaukee WI 53233 United States
Mobile phones that currently cause interruptions by blindly allowing calls to ring at busy moments and inappropriate situations can be managed using context aware computing, ubiquitous computing, and the available sen... 详细信息
来源: 评论