咨询与建议

限定检索结果

文献类型

  • 2,327 篇 会议
  • 41 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 2,380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,469 篇 工学
    • 1,075 篇 计算机科学与技术...
    • 1,032 篇 软件工程
    • 357 篇 电气工程
    • 151 篇 信息与通信工程
    • 103 篇 控制科学与工程
    • 32 篇 机械工程
    • 25 篇 电子科学与技术(可...
    • 21 篇 土木工程
    • 18 篇 建筑学
    • 12 篇 生物工程
    • 12 篇 安全科学与工程
    • 11 篇 仪器科学与技术
    • 11 篇 动力工程及工程热...
    • 11 篇 网络空间安全
    • 8 篇 航空宇航科学与技...
    • 8 篇 环境科学与工程(可...
    • 8 篇 生物医学工程(可授...
  • 169 篇 管理学
    • 121 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 46 篇 工商管理
  • 130 篇 理学
    • 74 篇 数学
    • 40 篇 系统科学
    • 19 篇 物理学
    • 13 篇 生物学
    • 9 篇 统计学(可授理学、...
  • 16 篇 教育学
    • 16 篇 教育学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 11 篇 法学
    • 8 篇 社会学
  • 9 篇 医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 668 篇 software archite...
  • 634 篇 computer archite...
  • 263 篇 software
  • 213 篇 software systems
  • 182 篇 software enginee...
  • 175 篇 application soft...
  • 109 篇 hardware
  • 101 篇 computer science
  • 92 篇 programming
  • 85 篇 unified modeling...
  • 80 篇 software design
  • 77 篇 costs
  • 63 篇 documentation
  • 51 篇 analytical model...
  • 50 篇 security
  • 49 篇 runtime
  • 48 篇 prototypes
  • 48 篇 computer aided s...
  • 48 篇 protocols
  • 45 篇 monitoring

机构

  • 16 篇 software enginee...
  • 16 篇 vrije univ amste...
  • 12 篇 carnegie mellon ...
  • 9 篇 computer science...
  • 8 篇 vu university
  • 8 篇 university of gr...
  • 7 篇 fraunhofer iese ...
  • 6 篇 johannes kepler ...
  • 6 篇 gran sasso scien...
  • 6 篇 george mason uni...
  • 6 篇 carnegie mellon ...
  • 6 篇 jet propulsion l...
  • 6 篇 vrije universite...
  • 6 篇 vrije univ amste...
  • 6 篇 vu university am...
  • 5 篇 caltech jet prop...
  • 5 篇 department of co...
  • 5 篇 school of comput...
  • 5 篇 univ zurich soft...
  • 5 篇 nokia research c...

作者

  • 18 篇 lago patricia
  • 16 篇 paris avgeriou
  • 16 篇 avgeriou paris
  • 16 篇 van vliet hans
  • 12 篇 nenad medvidovic
  • 12 篇 babar muhammad a...
  • 12 篇 patrizio pellicc...
  • 11 篇 patricia lago
  • 11 篇 uwe zdun
  • 11 篇 tang antony
  • 10 篇 yuanfang cai
  • 10 篇 medvidovic nenad
  • 10 篇 kazman rick
  • 10 篇 rick kazman
  • 10 篇 hans van vliet
  • 9 篇 bosch jan
  • 9 篇 cai yuanfang
  • 9 篇 knodel jens
  • 9 篇 nord robert l.
  • 8 篇 weyns danny

语言

  • 2,369 篇 英文
  • 6 篇 其他
  • 4 篇 中文
  • 1 篇 俄文
检索条件"任意字段=Working IEEE/IFIP Conference on Software Architecture"
2380 条 记 录,以下是31-40 订阅
排序:
The architecture of Scientific software: ifip TC2/WG2.5 working conference on the architecture of Scientific software October 2-4, 2000, Ottawa, ... in Information and Communication Technology)
收藏 引用
2013年
作者: Ronald Boisvert Ping Tak Peter Tang
Scientific applications involve very large computations that strain the resources of whatever computers are available. Such computations implement sophisticated mathematics, require deep scientific knowledge, depend o...
来源: 评论
Mining Security Documentation Practices in OpenAPI Descriptions
Mining Security Documentation Practices in OpenAPI Descripti...
收藏 引用
working ieee/ifip conference on software architecture
作者: Diana Carolina Muñoz Hurtado Souhaila Serbout Cesare Pautasso Software Institute USI Lugano Switzerland
Security is an integral requirement of any trustworthy software architecture, particularly critical for application programming interfaces (APIs). In this paper, we survey security documentation practices, specificall... 详细信息
来源: 评论
architecture as Code
Architecture as Code
收藏 引用
working ieee/ifip conference on software architecture
作者: Alessio Bucaioni Amleto Di Salle Ludovico Iovino Patrizio Pelliccione Franco Raimondi Mälardalen University Sweden Gran Sasso Science Institute Italy
After more than thirty-five years of research and development in software architecture, several fundamental challenges remain unsolved. First, despite the importance of having a well-defined architecture description a... 详细信息
来源: 评论
RISC-V Based Secure Processor architecture for Return Address Protection  38
RISC-V Based Secure Processor Architecture for Return Addres...
收藏 引用
38th International conference on VLSI Design, VLSID 2025
作者: Sharma, Lalit Goel, Neeraj Indian Institute of Technology Ropar India
RISC-V-based cores are increasingly becoming pop-ular in embedded system applications because of their open-source architecture. Protecting such systems against memory-based attacks is one of the most difficult challe... 详细信息
来源: 评论
Investigating the Impact of software Design Patterns on Energy Consumption
Investigating the Impact of Software Design Patterns on Ener...
收藏 引用
working ieee/ifip conference on software architecture
作者: Adel Noureddine Olivier Le Goaer E2S UPPA LIUPPA Universite de Pau et des Pays de l’Adour France
GoF’s design patterns are popular structures designed for flexible and reusable object-oriented software. However, their energy impact is not well understood, with contradictory existing results. In this paper, we ai... 详细信息
来源: 评论
Do Large Language Models Contain software Architectural Knowledge? : An Exploratory Case Study with GPT
Do Large Language Models Contain Software Architectural Know...
收藏 引用
working ieee/ifip conference on software architecture
作者: Mohamed Soliman Jan Keim Heinz Nixdorf Institut Universität Paderborn Germany Karlsruhe Institute of Technology (KIT) Germany
Architectural knowledge (AK) of existing systems is essential for software engineers to make design decisions. Recently, Large Language Models (LLMs) trained on large-scale datasets, including software repositories, h... 详细信息
来源: 评论
An architecture-Based Approach to Mitigate Confidentiality Violations Using Machine Learning
An Architecture-Based Approach to Mitigate Confidentiality V...
收藏 引用
working ieee/ifip conference on software architecture
作者: Nils Niehues Sebastian Hahner Robert Heinrich Karlsruhe Institute of Technology Karlsruhe Germany
Today’s software systems have become increasingly connected and complex, requiring comprehensive analysis to ensure quality properties like confidentiality. architecture-based confidentiality analysis enables the ear... 详细信息
来源: 评论
A Map of Cloud-Native Practices and Tools to Achieve Desirable System Qualities
A Map of Cloud-Native Practices and Tools to Achieve Desirab...
收藏 引用
working ieee/ifip conference on software architecture
作者: Haoran Wei Nazim Madhavji John Steinbacher Computer Science Western University London Canada IBM Canada Lab Toronto Canada
Cloud-native technologies have been widely adopted, enabling organizations to build scalable, observable, resilient, and secure software systems within cloud environments. However, the rapid evolution of these technol... 详细信息
来源: 评论
Swiss Cheese Model for AI Safety: A Taxonomy and Reference architecture for Multi-Layered Guardrails of Foundation Model Based Agents
Swiss Cheese Model for AI Safety: A Taxonomy and Reference A...
收藏 引用
working ieee/ifip conference on software architecture
作者: Md Shamsujjoha Qinghua Lu Dehai Zhao Liming Zhu Data61 CSIRO Australia
Foundation Model (FM)-based agents are revolutionizing application development across various domains. However, their rapidly growing capabilities and autonomy have raised significant concerns about AI safety. Researc... 详细信息
来源: 评论
From Legacy to Intelligent IIoT Systems: Automation, Scalability and Elasticity
From Legacy to Intelligent IIoT Systems: Automation, Scalabi...
收藏 引用
working ieee/ifip conference on software architecture
作者: Gianluca Caiazza Teodors Lisovenko Pietro Ferrara Fabio Berti Francesca Ferrari Alessandro Zaupa Guangzheng Zhang Ca’ Foscari University Venice Italy Zamperla Vicenza Italy
The Internet of Things (IoT) revolution is reshaping how physical devices embedded with software connect to the Internet, facilitating seamless data exchange and driving automation. Industrial IoT (IIoT) extends these... 详细信息
来源: 评论