咨询与建议

限定检索结果

文献类型

  • 261 篇 期刊文献
  • 181 篇 会议
  • 44 册 图书
  • 12 篇 学位论文
  • 6 篇 科技报告

馆藏范围

  • 504 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 354 篇 工学
    • 168 篇 计算机科学与技术...
    • 92 篇 航空宇航科学与技...
    • 82 篇 电气工程
    • 74 篇 软件工程
    • 65 篇 机械工程
    • 34 篇 信息与通信工程
    • 27 篇 力学(可授工学、理...
    • 27 篇 石油与天然气工程
    • 27 篇 生物工程
    • 18 篇 控制科学与工程
    • 10 篇 土木工程
    • 9 篇 化学工程与技术
    • 8 篇 仪器科学与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 动力工程及工程热...
    • 5 篇 电子科学与技术(可...
  • 89 篇 理学
    • 38 篇 生物学
    • 29 篇 物理学
    • 10 篇 数学
    • 10 篇 化学
  • 58 篇 医学
    • 23 篇 基础医学(可授医学...
    • 10 篇 临床医学
  • 52 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 17 篇 公共管理
    • 15 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 11 篇 农学
  • 10 篇 文学
    • 8 篇 新闻传播学
  • 9 篇 法学
    • 8 篇 社会学
  • 7 篇 教育学
    • 5 篇 教育学
  • 5 篇 经济学
    • 5 篇 应用经济学

主题

  • 504 篇 application prog...
  • 44 篇 nasa technical r...
  • 44 篇 (ntrs)
  • 39 篇 api
  • 24 篇 machine learning
  • 18 篇 software
  • 16 篇 computational fl...
  • 15 篇 computer program...
  • 14 篇 graphical user i...
  • 14 篇 software enginee...
  • 14 篇 cloud computing
  • 14 篇 reports
  • 12 篇 artificial intel...
  • 11 篇 graphics process...
  • 11 篇 application prog...
  • 11 篇 architecture (co...
  • 11 篇 high performance...
  • 11 篇 open source soft...
  • 10 篇 interoperability
  • 10 篇 architecture

机构

  • 4 篇 nasa langley res...
  • 4 篇 univ michigan de...
  • 4 篇 brno university ...
  • 4 篇 univ cent florid...
  • 3 篇 nasa langley res...
  • 3 篇 purdue univ w la...
  • 2 篇 univ algarve ceo...
  • 2 篇 russian acad sci...
  • 2 篇 univ surrey dept...
  • 2 篇 brigham young un...
  • 2 篇 univ chicago com...
  • 2 篇 suny buffalo dep...
  • 2 篇 ran innovat srl ...
  • 2 篇 old dominion uni...
  • 2 篇 univ colorado de...
  • 2 篇 nasa langley res...
  • 2 篇 mit dept aeronau...
  • 2 篇 georgia inst tec...
  • 2 篇 univ hamburg ham...
  • 2 篇 univ syst maryla...

作者

  • 6 篇 park michael a.
  • 4 篇 martins joaquim ...
  • 3 篇 loseille adrien
  • 3 篇 xu hao
  • 3 篇 sawant anand ash...
  • 3 篇 winter tyler
  • 3 篇 bacchelli albert...
  • 3 篇 michal todd
  • 3 篇 viana felipe a. ...
  • 3 篇 anderson w. kyle
  • 2 篇 cardoso pedro j....
  • 2 篇 czarnecki krzysz...
  • 2 篇 sabeti shaadi
  • 2 篇 mavris dimitri n...
  • 2 篇 mangortey eugene
  • 2 篇 hladish thomas
  • 2 篇 mihalick bc
  • 2 篇 rinelli marco
  • 2 篇 galbraith marsha...
  • 2 篇 ey emanuel

语言

  • 492 篇 英文
  • 8 篇 其他
  • 2 篇 中文
  • 1 篇 德文
  • 1 篇 荷兰文
检索条件"主题词=Application programming interface"
504 条 记 录,以下是481-490 订阅
排序:
Robustly secure computer systems: a new security paradigm of system discontinuity  07
Robustly secure computer systems: a new security paradigm of...
收藏 引用
Proceedings of the 2007 Workshop on New Security Paradigms
作者: Jon A. Solworth University of Illinois at Chicago Chicago Illinois
For over 30 years, system software has been bound by compatibility with legacy applications. The system software base, whether proprietary or open source, is dominated by the programming language C and the POSIX opera... 详细信息
来源: 评论
API Refactoring to Patterns: Catalog, Template and Tools for Remote interface Evolution  23
API Refactoring to Patterns: Catalog, Template and Tools for...
收藏 引用
Proceedings of the 28th European Conference on Pattern Languages of Programs
作者: Mirko Stocker Olaf Zimmermann Institute for Software Eastern Switzerland University of Applied Sciences Switzerland
Refactoring is an essential agile practice for software evolution. While program-internal code-level refactoring is well established, architecture-level refactoring has been researched but not yet widely adopted in pr... 详细信息
来源: 评论
GraphBLAS: A programming Specification for Graph Analysis
GraphBLAS: A Programming Specification for Graph Analysis
收藏 引用
作者: McMillan, Scott
来源: 评论
Towards Understanding Malware Behaviour by the Extraction of API Calls
Towards Understanding Malware Behaviour by the Extraction of...
收藏 引用
Cybercrime and Trustworthy Computing Workshop (CTC)
作者: Mamoun Alazab Sitalakshmi Venkataraman Paul Watters Internet Commerce Security Laboratory (ICSL) University of Ballarat Australia Internet Commerce Security Laboratory (ICSL University of Ballarat Australia
One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion techniques such as polymorphism a... 详细信息
来源: 评论
A low power design and verification API
A low power design and verification API
收藏 引用
International Conference on Energy Aware Computing
作者: Nadeem Kalil Sathyam Pattanam Verification Group Synopsys Inc. Marlborough MA USA
A novel object oriented API that enables the merger of the design power architecture specification with its HDL representation is described. The single high level view of the design and its power intent enabled by the... 详细信息
来源: 评论
Simulation of computational grids scheduling politics
Simulation of computational grids scheduling politics
收藏 引用
Iberian Conference on Information Systems and Technologies (CISTI)
作者: Lilian Felix de Oliveira Renata Spolon Lobato Roberta Spolon Marcos Antonio Cavenaghi Departamento de Ciências de Computação e Estatística IBILCE UNESP-Universidade Estadual Paulista Sao Paulo Brazil Departamento de Computação Faculdade de Ciências UNESP-Universidade Estadual Paulista Sao Paulo Brazil
Computational grids allow users to share resources of distributed machines, even if those machines belong to different corporations. The scheduling of applications must be performed aiming at performance goals, and fo... 详细信息
来源: 评论
Lazy Runtime Verification for Constraints on Interacting Objects
Lazy Runtime Verification for Constraints on Interacting Obj...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Jin Shao Fang Deng Haiwen Liu Qianxiang Wang Hong Mei School of Electronics Engineering and Computer Science Peking University Beijing China
application programming interface (API) constraints on objects are rules that API client code must follow in order to get expected results from these objects. Runtime verification, an important approach for detecting ... 详细信息
来源: 评论
Watershed and Catchment Meshing Python Tool Utilizing the XmsMesh Meshing Software
Watershed and Catchment Meshing Python Tool Utilizing the Xm...
收藏 引用
作者: McKnight,C. J.,Loney,Drew,Winters,Kevin, ERDC Coastal and Hyraulic Laboratory Vicksburg United States
This Coastal and Hydraulics Engineering Technical Note describes the approach, methodology, and utilities of a Python code to flexibly create finite element meshes for a single catchment, multiple catchments, or an en... 详细信息
来源: 评论
Human-Systems Integration (HSI) Metric Tradespace Exploration Environment (HMTee) Technical Documentation
Human-Systems Integration (HSI) Metric Tradespace Exploratio...
收藏 引用
作者: Garneau, C ARMY EVALUATION ANALYSIS CENTER ABERDEEN PROVING GROUND MD Army Combat Capabilities Development Command Analysis Center Aberdeen Proving Ground MD
The Human-Systems Integration (HSI) Metric Tradespace Exploration Environment (HMTee) is a convenient R Shiny application for human factors and HSI analysis problems. This report is intended to serve as technical docu... 详细信息
来源: 评论
Median filter using open multiprocessing in agriculture
Median filter using open multiprocessing in agriculture
收藏 引用
International Conference on Signal Processing Proceedings (ICSP)
作者: E. Ramaraj A. Senthil Rajan Department MCA Jyoti nivas College Bangalore Karnataka India Madurai Kamaraj University Madurai Tamil Nadu India
Noise is caused by malfunctioning pixels in camera sensors, faulty memory locations in hardware, or transmission in a noisy channel. Two common types of impulse noise are the salt-and-pepper noise and the random-value... 详细信息
来源: 评论