咨询与建议

限定检索结果

文献类型

  • 2,501 篇 期刊文献
  • 2,464 篇 会议
  • 2 册 图书
  • 1 篇 学位论文

馆藏范围

  • 4,968 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,563 篇 工学
    • 4,262 篇 计算机科学与技术...
    • 3,623 篇 软件工程
    • 407 篇 信息与通信工程
    • 312 篇 电气工程
    • 306 篇 电子科学与技术(可...
    • 292 篇 控制科学与工程
    • 112 篇 机械工程
    • 100 篇 材料科学与工程(可...
    • 68 篇 建筑学
    • 55 篇 土木工程
    • 45 篇 仪器科学与技术
    • 40 篇 航空宇航科学与技...
    • 37 篇 光学工程
    • 36 篇 生物医学工程(可授...
    • 33 篇 测绘科学与技术
    • 32 篇 安全科学与工程
    • 30 篇 生物工程
    • 24 篇 网络空间安全
    • 23 篇 力学(可授工学、理...
  • 536 篇 管理学
    • 412 篇 管理科学与工程(可...
    • 244 篇 工商管理
    • 142 篇 图书情报与档案管...
  • 502 篇 理学
    • 346 篇 数学
    • 98 篇 物理学
    • 85 篇 统计学(可授理学、...
    • 39 篇 系统科学
    • 33 篇 生物学
  • 49 篇 经济学
    • 48 篇 应用经济学
  • 48 篇 教育学
    • 46 篇 教育学
  • 33 篇 法学
    • 21 篇 社会学
  • 19 篇 医学
  • 19 篇 军事学
  • 5 篇 文学
  • 2 篇 农学
  • 1 篇 艺术学

主题

  • 4,968 篇 computer operati...
  • 3 篇 computer simulat...
  • 3 篇 computer systems...
  • 3 篇 operating system...
  • 3 篇 robot operating ...
  • 2 篇 linux
  • 2 篇 computer archite...
  • 2 篇 network protocol...
  • 2 篇 storage allocati...
  • 2 篇 personal compute...
  • 2 篇 artificial intel...
  • 2 篇 mathematical mod...
  • 2 篇 user interfaces
  • 1 篇 surveys
  • 1 篇 blocking mechani...
  • 1 篇 encoders
  • 1 篇 data storage equ...
  • 1 篇 degradation of p...
  • 1 篇 human interactio...
  • 1 篇 project manageme...

机构

  • 9 篇 computer design ...
  • 9 篇 univ of tokyo
  • 9 篇 ibm corp thomas ...
  • 8 篇 carnegie mellon ...
  • 7 篇 univ of illinois...
  • 6 篇 univ of washingt...
  • 6 篇 ntt jpn ntt jpn
  • 5 篇 univ of californ...
  • 5 篇 ntt musashino jp...
  • 5 篇 univ of pittsbur...
  • 5 篇 univ of illinois...
  • 5 篇 carnegie-mellon ...
  • 5 篇 ibm yorktown hei...
  • 5 篇 deakin univ geel...
  • 5 篇 edn newton ma ed...
  • 4 篇 univ of utah sal...
  • 4 篇 microsoft corp r...
  • 4 篇 ibm thomas j. wa...
  • 4 篇 siemens ag munic...
  • 4 篇 ieee

作者

  • 140 篇 anon
  • 16 篇 dunn scott
  • 11 篇 tanenbaum andrew...
  • 11 篇 tokuda hideyuki
  • 10 篇 popek gerald j.
  • 8 篇 stankovic john a...
  • 8 篇 sakamura ken
  • 7 篇 farber david j.
  • 7 篇 williams tom
  • 7 篇 spanbauer scott
  • 7 篇 jaeger trent
  • 6 篇 finkel raphael a...
  • 6 篇 jones michael b.
  • 6 篇 schindler m
  • 6 篇 wrege douglas e.
  • 6 篇 wittie larry d.
  • 5 篇 reeves cm
  • 5 篇 graham susan l.
  • 5 篇 peterson larry l...
  • 5 篇 chen xiangqun

语言

  • 3,859 篇 英文
  • 919 篇 其他
  • 107 篇 德文
  • 24 篇 中文
  • 17 篇 日文
  • 15 篇 法文
  • 13 篇 俄文
  • 4 篇 意大利文
  • 3 篇 波兰文
  • 2 篇 西班牙文
  • 1 篇 丹麦文
  • 1 篇 匈牙利文
  • 1 篇 罗马尼亚文
  • 1 篇 塞尔维亚文
  • 1 篇 土耳其文
检索条件"主题词=Computer Operating Systems"
4968 条 记 录,以下是1-10 订阅
排序:
Study of the security of processes running in computer operating systems
Study of the security of processes running in computer opera...
收藏 引用
PROCEEDINGS OF THE EUROPEAN SAFETY AND RELIABILITY CONFERENCE (ESREL)
作者: Jozwiak, I. J. Szleszynski, A. Wroclaw Univ Technol Fac Informat & Management Wroclaw Poland Gen Tadeusz Kosciuszko Mil Acad Land Forces Wroclaw Poland
A process is the main part of a computer operating system. Its role is to fulfil its task(s). But if it contains errors it may disrupt the proper work of the host computer operating system. Any disruption affects host... 详细信息
来源: 评论
DESIGNING AND DEVELOPING OF THE MICRO AND MINI-computer operating systems.
DESIGNING AND DEVELOPING OF THE MICRO AND MINI-COMPUTER OPER...
收藏 引用
Proceedings of the Third Symposium on Microcomputer and Microprocessor Application.
作者: Szyller, J.
The paper contains a short description of the M-140 micro-computer architecture and the minimal set of primitives consisting of the nucleus of the REX/80 operating system. Special emphasis is put on explaining the ado... 详细信息
来源: 评论
Machine Learning Approach to Predict computer operating systems Vulnerabilities  3
Machine Learning Approach to Predict Computer Operating Syst...
收藏 引用
3rd International Conference on computer Applications and Information Security, ICCAIS 2020
作者: Alenezi, Freeh Tsokos, Chris P. Majmaah University Department of Mathematics Majmaah11952 Saudi Arabia University of South Florida Department of Mathematics and Statistics Tampa33647 United States
Information security is everyone's concern. computer systems are used to store sensitive data. Any weakness in their reliability and security makes them vulnerable. The Common Vulnerability Scoring System (CVSS) i... 详细信息
来源: 评论
The advent of trusted∗ computer operating systems  80
The advent of trusted∗ computer operating systems
收藏 引用
1980 National computer Conference, AFIPS 1980
作者: Walker, Stephen T. Department of Defense WashingtonDC United States
This paper has described the background surrounding the development of several DoD trusted computer systems including the DoD Kernelized Secure operating System and the Kernelized VM370 System, and the implications of... 详细信息
来源: 评论
BASIC STRUCTURE FOR DISTRIBUTED computer operating systems WITH EMPHASIS ON PROGRAM MANAGEMENT.
BASIC STRUCTURE FOR DISTRIBUTED COMPUTER OPERATING SYSTEMS W...
收藏 引用
Pacific computer Communications '85, Proceedings of a Symposium.
作者: Foudriat, Edwin C. NASA Langley Research Cent Hampton VA USA NASA Langley Research Cent Hampton VA USA
operating system structure holds the key to obtaining improved processing power, greater reliability, transparent sharing of distributed resources, etc. A look at the present taxonomies of both concurrent and distribu... 详细信息
来源: 评论
Automatic Generation of Problem-Oriented Process computer operating systems.
Angewandte Informatik/Applied Informatics
收藏 引用
Angewandte Informatik/Applied Informatics 1980年 第1期22卷 7-17页
作者: Rueb, W. Schrott, G.
operating systems for process control applications are generated automatically by a ″kit″ of program functions. The capabilities of the nucleus and the strategies of the operating objective are formed individually a... 详细信息
来源: 评论
EXTENDING A STAND-ALONE PERSONAL-computer TO INTEGRATE MULTIPLE operating-systems CONCURRENTLY
收藏 引用
JOURNAL OF systems AND SOFTWARE 1989年 第1期9卷 41-49页
作者: SHIEH, CK TSENG, LM NATL CHENG KUNG UNIV ELECT & COMP ENGN RES INST TAINAN TAIWAN NATL CENT UNIV INFORMAT & ELECTR ENGN RES INST CHUNG LI TAIWAN
This paper presents a virtual I/O approach to extend an existing personal computer to provide a multiple operating environment. Multiple operating systems can be executed simultaneously, each using a separate window a... 详细信息
来源: 评论
Interactive teaching design of mobile English based on deep learning
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2025年 第1期16卷 1-14页
作者: Yan, Zhang Bing, Yan Shimeng, Pan Department of Computer Science and Technology Taiyuan University Shanxi Taiyuan030032 China University of Science and Technology Liaoning Liaoning Anshan114051 China
Aiming to enhance the management stage of Mobile English Interactive Educating in the intelligent flipped classroom mode, a design method of Mobile English Interactive Teaching Based on deep learning is proposed. Extr... 详细信息
来源: 评论
operating systems OFFER SECURITY FEATURES TO CONTROL computer ACCESS.
收藏 引用
computer Technology Review 1986年 第1期6卷 191-192,194-196,198-199页
作者: Goldstein, Andy Digital Equipment Corp Digital Equipment Corp
It is widely recognized among professionals that business, scientific, and engineering information at most computer sites is seriously vulnerable. And the situation can only get worse as the amount and variety of info... 详细信息
来源: 评论
operating systems ARCHITECTURE FOR A DISTRIBUTED computer NETWORK.
收藏 引用
1974年 39-43页
作者: Lay, W.M. Mills, D.L. Zelkowitz, M.V.
This paper describes the structure of the supervisory system for a distributed computer network. The network is designed so that processes and data can migrate among the processors as a function of load sharing and re... 详细信息
来源: 评论