咨询与建议

限定检索结果

文献类型

  • 328 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 334 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 271 篇 工学
    • 250 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 39 篇 信息与通信工程
    • 20 篇 生物工程
    • 15 篇 控制科学与工程
    • 15 篇 生物医学工程(可授...
    • 13 篇 动力工程及工程热...
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 建筑学
    • 8 篇 环境科学与工程(可...
    • 7 篇 土木工程
    • 6 篇 机械工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 化学工程与技术
    • 4 篇 力学(可授工学、理...
  • 79 篇 理学
    • 49 篇 数学
    • 21 篇 生物学
    • 8 篇 物理学
    • 8 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 4 篇 化学
  • 64 篇 管理学
    • 38 篇 图书情报与档案管...
    • 29 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 26 篇 教育学
    • 26 篇 教育学
  • 13 篇 法学
    • 10 篇 社会学
  • 7 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 农学
  • 2 篇 军事学

主题

  • 23 篇 mobile computing
  • 14 篇 students
  • 14 篇 cloud computing
  • 7 篇 distributed comp...
  • 6 篇 curricula
  • 6 篇 ubiquitous compu...
  • 5 篇 edge computing
  • 5 篇 education comput...
  • 4 篇 quantum computin...
  • 4 篇 recommender syst...
  • 4 篇 virtual machine
  • 3 篇 genes
  • 3 篇 bandwidth
  • 3 篇 grid computing
  • 3 篇 computer applica...
  • 3 篇 computing power
  • 3 篇 flash memory
  • 3 篇 semantics
  • 3 篇 genetic algorith...
  • 3 篇 virtualization

机构

  • 8 篇 school of comput...
  • 5 篇 school of comput...
  • 4 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 2 篇 university of be...
  • 2 篇 key laboratory o...
  • 2 篇 school of comput...
  • 2 篇 department of co...
  • 2 篇 university of co...
  • 2 篇 the hong kong po...
  • 2 篇 marquette univer...
  • 2 篇 dept. of compute...
  • 2 篇 computing instit...
  • 2 篇 institute of com...
  • 2 篇 school of comput...
  • 2 篇 university of ut...
  • 2 篇 college of compu...
  • 2 篇 kyungpook nation...

作者

  • 6 篇 hong jiman
  • 5 篇 hung chih-cheng
  • 5 篇 song enmin
  • 4 篇 zulkernine moham...
  • 4 篇 cho yookun
  • 4 篇 liu hong
  • 3 篇 chan stephen c.f...
  • 3 篇 kim bongjae
  • 3 篇 varadharajan vij...
  • 3 篇 zambonelli franc...
  • 3 篇 ngai grace
  • 2 篇 cassel lillian n...
  • 2 篇 kühn eva
  • 2 篇 sheikh iqbal aha...
  • 2 篇 van langeveld ma...
  • 2 篇 weldemariam komm...
  • 2 篇 liu ling
  • 2 篇 tancer martin
  • 2 篇 mayer wolfgang
  • 2 篇 ni lijun

语言

  • 334 篇 英文
检索条件"任意字段=Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing"
334 条 记 录,以下是181-190 订阅
排序:
Checking concurrent contracts with aspects  10
Checking concurrent contracts with aspects
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Kerfoot, Eric McKeever, Steve Oxford University Computing Laboratory Wolfson Building Parks Road Oxford United Kingdom
the applicability of aspects as a means of implementing runtime contract checking has been demonstrated in prior work, where contracts are identified as cross-cutting concerns [12, 13]. Checking contracts at runtime e... 详细信息
来源: 评论
Load forecasting applied to soft real-time web clusters  10
Load forecasting applied to soft real-time web clusters
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Santana, Carlos Leite, J.C.B. Mossé, Daniel Institute of Computing Fluminense Federal University Niterói Brazil Dept. of Computer Science University of Pittsburgh Pittsburgh PA 15260 United States
Dynamic configuration techniques such as DVFS (Dynamic Voltage and Frequency Scaling) and turning on/off computers are well known ways to promote energy consumption reduction in web server clusters. this paper demonst... 详细信息
来源: 评论
Document retrieval using image features  10
Document retrieval using image features
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Smith, Dan Harvey, Richard School of Computing Sciences University of East Anglia Norwich NR4 7TJ United Kingdom
this paper describes a new approach to document classification based on visual features alone. Text-based retrieval systems perform poorly on noisy text. We have conducted series of experiments using cosine distance a... 详细信息
来源: 评论
Understanding meta-communication in an inclusive scenario  10
Understanding meta-communication in an inclusive scenario
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Hayashi, Elaine C. S. Baranauskas, M. Cecília C. Institute of Computing UNICAMP Av. Albert Einstein 1251 Campinas SP Brazil Institute of Computing NIED UNICAMP Av. Albert Einstein 1251 Campinas SP Brazil
Meta-communication can be defined as all exchanges of information that are related to the conceptual model of the system, including the communication that takes place in order to clarify or overcome problems during th... 详细信息
来源: 评论
Scalable analysis of collective behaviour in smart service systems  10
Scalable analysis of collective behaviour in smart service s...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Massink, Mieke Harrison, Michael Latella, Diego Istituto di Scienza e Tecnologie dell'Informazione 'A. Faedo' CNR Pisa Italy School of Computing Science Newcastle University Newcastle upon Tyne United Kingdom
the long term vision of smart service systems in which electronic environments are made sensitive and responsive to the presence of, possibly many, people is gradually taking shape through a number of pilot projects. ... 详细信息
来源: 评论
A lightweight framework for testing database applications  10
A lightweight framework for testing database applications
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Tang, Joe Lo, Eric Department of Computing Hong Kong Polytechnic University Hong Kong
Testing is one of the most expensive tasks in today's software development cycle and it is very important to devise techniques that speed up the whole testing process. In a recent paper [9], it has been shown that... 详细信息
来源: 评论
An improved algorithm to enumerate all traces that sort a signed permutation by reversals  10
An improved algorithm to enumerate all traces that sort a si...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Baudet, Christian Dias, Zanoni INRIA Grenoble Rhône-Alpes Laboratoire de Biométrie et Biologie Évolutive Univ. Lyon 1 43 bd 11 Nov 69622 Villeurbanne Cedex France Institute of Computing University of Campinas - Unicamp Cidade Universitaria Av. Albert Einstein 1251 CEP 13083-970 Campinas - São Paulo Brazil
In 2008, Braga et al. proposed an algorithm to perform the enumeration of traces that sort a signed permutation by reversals. this algorithm has exponential complexity in both time and space. the original implementati... 详细信息
来源: 评论
A group-based security policy for wireless sensor networks  10
A group-based security policy for wireless sensor networks
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Claycomb, William Lopes, Rodrigo Shin, Dongwan Kim, Byunggi Secure Computing Laboratory New Mexico Tech. 801 Leroy Place Socorro NM 87801 United States Soongsil University 511 Sangdo-dong Dongjak-gu Seoul 156-743 Korea Republic of
the protection of wireless sensor networks is an important task, especially for critical situations such as intrusion detection, tamper monitoring, or military applications. To date, much of the emphasis on protecting... 详细信息
来源: 评论
Exploiting non-functional preferences in architectural adaptation for self-managed systems  10
Exploiting non-functional preferences in architectural adapt...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: Sykes, Daniel Heaven, William Magee, Jeff Kramer, Jeff Department of Computing Imperial College London United Kingdom
Among the many challenges of engineering dependable, self-managed, component-based systems is their need to make informed decisions about adaptive reconfigurations in response to changing requirements or a changing en... 详细信息
来源: 评论
Summarizing observational client-side data to reveal web usage patterns  10
Summarizing observational client-side data to reveal web usa...
收藏 引用
25th Annual acm symposium on applied computing, SAC 2010
作者: De Santana, Vagner Figuerêdo Baranauskas, M. Cecília C. Institute of Computing-UNICAMP 1251 Albert Einstein Av. Campinas SP Brazil
Client-side event logs may reveal patterns of usage of Web pages. Nevertheless, extracting useful and novel information from this voluminous data set is a challenge for evaluation tools, since a few minutes simple tas... 详细信息
来源: 评论