咨询与建议

限定检索结果

文献类型

  • 2,218 篇 会议
  • 476 篇 期刊文献
  • 2 册 图书
  • 2 篇 学位论文

馆藏范围

  • 2,698 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,646 篇 工学
    • 2,414 篇 计算机科学与技术...
    • 2,214 篇 软件工程
    • 211 篇 电气工程
    • 208 篇 信息与通信工程
    • 126 篇 控制科学与工程
    • 59 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 38 篇 生物工程
    • 25 篇 安全科学与工程
    • 22 篇 仪器科学与技术
    • 22 篇 建筑学
    • 21 篇 生物医学工程(可授...
    • 20 篇 土木工程
    • 19 篇 航空宇航科学与技...
    • 18 篇 环境科学与工程(可...
    • 17 篇 材料科学与工程(可...
    • 17 篇 动力工程及工程热...
    • 17 篇 化学工程与技术
  • 491 篇 理学
    • 364 篇 数学
    • 43 篇 统计学(可授理学、...
    • 41 篇 生物学
    • 40 篇 物理学
    • 40 篇 系统科学
    • 17 篇 化学
  • 413 篇 管理学
    • 220 篇 图书情报与档案管...
    • 218 篇 管理科学与工程(可...
    • 128 篇 工商管理
  • 121 篇 教育学
    • 121 篇 教育学
  • 30 篇 法学
    • 21 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 23 篇 医学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 2,698 篇 java programming...
  • 255 篇 java
  • 44 篇 computer softwar...
  • 33 篇 software
  • 22 篇 codes
  • 20 篇 libraries
  • 18 篇 computer personn...
  • 16 篇 software systems
  • 16 篇 software enginee...
  • 16 篇 semantics
  • 16 篇 graphical user i...
  • 16 篇 language
  • 15 篇 source code
  • 14 篇 analysis program...
  • 14 篇 open source soft...
  • 13 篇 runtime
  • 13 篇 extensible marku...
  • 13 篇 computer program...
  • 12 篇 program diagnost...
  • 12 篇 security

机构

  • 6 篇 unisys corporati...
  • 6 篇 kth royal instit...
  • 5 篇 graduate school ...
  • 5 篇 ibm corp thomas ...
  • 5 篇 ibm t.j. watson ...
  • 4 篇 ibm ottawa
  • 4 篇 dipartimento di ...
  • 4 篇 inria sophia ant...
  • 4 篇 department of co...
  • 4 篇 univ york dept c...
  • 4 篇 carnegie mellon ...
  • 3 篇 univ york york y...
  • 3 篇 université de mo...
  • 3 篇 cwi
  • 3 篇 school of comput...
  • 3 篇 utrecht universi...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of ma...
  • 3 篇 singapore manage...
  • 3 篇 indiana univ dep...

作者

  • 16 篇 bettini lorenzo
  • 15 篇 inoue katsuro
  • 14 篇 binder walter
  • 11 篇 leavens gary t.
  • 9 篇 schoeberl martin
  • 9 篇 ernst michael d.
  • 8 篇 ishio takashi
  • 8 篇 monperrus martin
  • 8 篇 carpenter bryan
  • 8 篇 wellings andy
  • 7 篇 visser willem
  • 7 篇 baudry benoit
  • 7 篇 fox geoffrey
  • 7 篇 damiani ferrucci...
  • 7 篇 poll erik
  • 7 篇 poetzsch-heffter...
  • 7 篇 bal henri e.
  • 7 篇 vitek jan
  • 6 篇 kielmann thilo
  • 6 篇 milanova ana

语言

  • 2,416 篇 英文
  • 250 篇 其他
  • 12 篇 中文
  • 10 篇 日文
  • 8 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛伐克文
  • 1 篇 塞尔维亚文
  • 1 篇 乌克兰文
检索条件"主题词=JAVA programming language"
2698 条 记 录,以下是1111-1120 订阅
排序:
java based test case generation and optimization using evolutionary testing
Java based test case generation and optimization using evolu...
收藏 引用
International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2007
作者: Siva Dharsana, C.S. Nithila Jennifer, D. Askarunisha, A. Ramaraj, N. CSE Dept. of CSE GKM Engg College Thiagarajar College of Engineering Madurai
Testing is an iterative process of both validating functionality and even more important attempting to break the softwareTest case is used for testing which is a set of test data and test programs (test scripts) and t... 详细信息
来源: 评论
Package delivery company web-based supporting system with usage of java EE technology
Package delivery company web-based supporting system with us...
收藏 引用
Modern Problems of Radio Engineering, Telecommunications and Computer Science - International Conference, TCSET 2008
作者: Sakowicz, Bartosz Mlocek, Piotr Nowak, Przemyslaw Napieralski, Andrzej Department of Microelectronics and Computer Science Technical University of Lodz Poland
Following paper describes the assumption of application, used technologies and implemen ted functionality of system developed for delivery company . It presents applied solutions as well as the most interesting techno... 详细信息
来源: 评论
Applying generalization refactoring to java generic programs
Applying generalization refactoring to Java generic programs
收藏 引用
1st IEEE International Workshop on Semantic Computing and Systems, WSCS 2008
作者: Chen, Lin Xu, Baowen Zhou, Tianlin Zhou, Yuming School of Computer Science and Engineering Southeast University Nanjing 210096 China Jiangsu Institute of Software Quality Nanjing 210096 China
In generalization refactoring, preconditions and allowable source code modifications depend on type constraints of the refactroed program. Type constraints of parameterized types should be considered when applying the... 详细信息
来源: 评论
UML activity diagram based testing of java concurrent programs for data race and inconsistency
UML activity diagram based testing of Java concurrent progra...
收藏 引用
1st International Conference on Software Testing, Verification and Validation, ICST 2008
作者: Lei, Bin Wang, Linzhang Li, Xuandong State Key Laboratory of Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing Jiangsu 210093 China
Data race occurs when multiple threads simultaneously access shared data without appropriate synchronization, and at least one is write. System with a data race is nondeterministic and may generate different outputs e... 详细信息
来源: 评论
State extensions for java pathfider
State extensions for java pathfider
收藏 引用
30th International Conference on Software Engineering 2008, ICSE'08
作者: Gvero, Tihomir Gligoric, Milos Lauterburg, Steven Marcelo d'Amorim Marinov, Darko Khurshid, Sarfraz University of Belgrade Belgrade Serbia University of Illinois Urbana IL 61801 United States University of Texas Austin TX 78712 United States
java PathFinder (JPF) is an explicit-state model checker for java programs. JPF implements a backtrackable java Virtual Machine (JVM) that provides non-deterministic choices and control over thread scheduling. JPF is ... 详细信息
来源: 评论
Patterns for ADT optimisation  08
Patterns for ADT optimisation
收藏 引用
15th Conference on Pattern languages of Programs, PLoP08
作者: Pearce, David J. Noble, James Computer Science Victoria University of Wellington New Zealand
Operations on abstract data types can be classified as either queries or updates - those that either query the current state, or update it. Modern object-oriented programming languages require classes/interfaces to su... 详细信息
来源: 评论
DiffGen: Automated regression unit-test generation  08
DiffGen: Automated regression unit-test generation
收藏 引用
ASE 2008 - 23rd IEEE/ACM International Conference on Automated Software Engineering
作者: Taneja, Kunal Xie, Tao Department of Computer Science North Carolina State University
Software programs continue to evolve throughout their lifetime. Maintenance of such evolving programs, including regression testing, is one of the most expensive activities in software development. We present an appro... 详细信息
来源: 评论
Data-flow based analysis of java bytecode vulnerability
Data-flow based analysis of Java bytecode vulnerability
收藏 引用
9th International Conference on Web-Age Information Management, WAIM 2008
作者: Zhao, Gang Chen, Hua Wang, Dongxia Department of Computer Science and Technology Tsinghua University Beijing Institute of System Engineering
java is widely used because its security and platform independence. Although java's security model is designed for protecting users from untrusted sources, java's security is not under fully control at the app... 详细信息
来源: 评论
Experiences in engineering active replication into a traditional three-tiered client-server system  08
Experiences in engineering active replication into a traditi...
收藏 引用
2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems, SERENE'08
作者: Zenarosa, Gabriel L. Simanta, Soumya School of Computer Science Carnegie Mellon University Pittsburgh PA 15213 United States Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213 United States
Distributed systems are now widely accepted as a solution to many computing needs. A common distributed system architecture style used today is the three-tiered client-server style;and, a popular technology that reali... 详细信息
来源: 评论
Embedding rule-based security monitors into java programs
Embedding rule-based security monitors into java programs
收藏 引用
32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008
作者: Karlstedt, Tomi Leppänen, Ville Tuohimaa, Sanna Department of Information Technology University of Turku Finland
In this paper we study securing mobile code execution by embedding a rule-based security monitor into the mobile code before execution on a platform. A security monitor guards how the mobile code uses resources of the... 详细信息
来源: 评论