咨询与建议

限定检索结果

文献类型

  • 2,217 篇 会议
  • 455 篇 期刊文献
  • 2 册 图书
  • 2 篇 学位论文

馆藏范围

  • 2,676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,629 篇 工学
    • 2,408 篇 计算机科学与技术...
    • 2,209 篇 软件工程
    • 206 篇 信息与通信工程
    • 187 篇 电气工程
    • 126 篇 控制科学与工程
    • 58 篇 电子科学与技术(可...
    • 41 篇 机械工程
    • 37 篇 生物工程
    • 25 篇 安全科学与工程
    • 22 篇 建筑学
    • 21 篇 仪器科学与技术
    • 21 篇 生物医学工程(可授...
    • 20 篇 土木工程
    • 19 篇 航空宇航科学与技...
    • 18 篇 材料科学与工程(可...
    • 18 篇 环境科学与工程(可...
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 482 篇 理学
    • 365 篇 数学
    • 42 篇 统计学(可授理学、...
    • 41 篇 系统科学
    • 38 篇 生物学
    • 37 篇 物理学
    • 17 篇 化学
  • 412 篇 管理学
    • 219 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 119 篇 教育学
    • 119 篇 教育学
  • 28 篇 法学
    • 19 篇 社会学
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 20 篇 医学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 2,676 篇 java programming...
  • 231 篇 java
  • 39 篇 computer softwar...
  • 33 篇 software
  • 19 篇 codes
  • 18 篇 libraries
  • 16 篇 software systems
  • 16 篇 software enginee...
  • 16 篇 semantics
  • 14 篇 graphical user i...
  • 13 篇 runtime
  • 13 篇 open source soft...
  • 13 篇 source code
  • 12 篇 extensible marku...
  • 12 篇 analysis program...
  • 12 篇 security
  • 12 篇 language
  • 12 篇 computer personn...
  • 12 篇 testing
  • 11 篇 monitoring

机构

  • 6 篇 unisys corporati...
  • 6 篇 kth royal instit...
  • 5 篇 graduate school ...
  • 5 篇 ibm corp thomas ...
  • 5 篇 ibm t.j. watson ...
  • 4 篇 ibm ottawa
  • 4 篇 dipartimento di ...
  • 4 篇 singapore manage...
  • 4 篇 inria sophia ant...
  • 4 篇 department of co...
  • 4 篇 ibm corp network...
  • 4 篇 univ york dept c...
  • 4 篇 carnegie mellon ...
  • 4 篇 univ london impe...
  • 3 篇 univ york york y...
  • 3 篇 université de mo...
  • 3 篇 cwi
  • 3 篇 school of comput...
  • 3 篇 utrecht universi...
  • 3 篇 iit dept comp sc...

作者

  • 16 篇 bettini lorenzo
  • 15 篇 inoue katsuro
  • 14 篇 binder walter
  • 11 篇 leavens gary t.
  • 9 篇 schoeberl martin
  • 9 篇 ernst michael d.
  • 8 篇 ishio takashi
  • 8 篇 monperrus martin
  • 8 篇 damiani ferrucci...
  • 8 篇 carpenter bryan
  • 8 篇 wellings andy
  • 7 篇 visser willem
  • 7 篇 baudry benoit
  • 7 篇 poll erik
  • 7 篇 poetzsch-heffter...
  • 7 篇 bal henri e.
  • 7 篇 vitek jan
  • 6 篇 kielmann thilo
  • 6 篇 milanova ana
  • 6 篇 jacobs bart

语言

  • 2,427 篇 英文
  • 215 篇 其他
  • 11 篇 中文
  • 10 篇 日文
  • 8 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛伐克文
  • 1 篇 塞尔维亚文
  • 1 篇 乌克兰文
检索条件"主题词=JAVA programming language"
2676 条 记 录,以下是2061-2070 订阅
排序:
Portable resource control in java: Application to mobile agent security
Portable resource control in Java: Application to mobile age...
收藏 引用
SEMAS 2001, First International Workshop on Security of Mobile Multiagent System
作者: Binder, Walter Hulaas, Jarle G. Villanzon, Alex CoCo Software Engineering Margaretenstr. 22/9 1040 Vienna Austria University of Geneva rue Géeáral Dufour 24 1211 Geneva 4 Switzerland
Prevention of denial-of-service attacks is indispensable for distributed agent sys-tems to execute securely. To implement the required defense mechanisms, it is necessary to have support for resource control, i.e., ac... 详细信息
来源: 评论
Experiments with multi-protocol RMI in java
Experiments with multi-protocol RMI in Java
收藏 引用
Proceedings of the Joint ACM java Grande - ISCOPE 2002 Conference
作者: Kurzyniec, Dawid Wrzosek, Tomasz Sunderam, Vaidy Slomiński, Aleksander Dept. of Math and Computer Science Emory University Atlanta GA United States Department of Computer Science Indiana University Bloomington IN United States
Remote Method Invocation (RMI) is an adaptation of the remote procedure call paradigm for object-oriented environments. As such, RMI allows clients to seamlessly invoke methods of objects within remote servers. Commun... 详细信息
来源: 评论
An approach for a dependable java embedded environment  10
An approach for a dependable Java embedded environment
收藏 引用
10th Workshop on ACM SIGOPS European Workshop, EW 10
作者: Cabillic, Gilbert Majoul, Salam Lesot, Jean-Philippe Banâtre, Michel IRISA Campus Universitaire de Beaulieu 35042 Rennes Cedex France
A java Execution Environment (JEE) presents lots of advantages for embedded architectures. In this paper, we present an approach to build a dependable java execution environment for Wireless PDAs. It is based on a mod... 详细信息
来源: 评论
Using an APL approach with java  02
Using an APL approach with Java
收藏 引用
2002 Conference on APL: Array Processing languages: Lore, Problems, and Applications, APL-LPA 2002
作者: Burchfield, Joseph Lipovaca, Samir New York Stock Exchange Inc. 20 Broad Street 24th floor New YorkNY10005 United States
Three java examples are developed to advance an APL approach in reducing conceptual intricacies in java programming. The key part of these examples is a new java class named APL. By making an instance of this class, a... 详细信息
来源: 评论
Describing hierarchical compositions of java beans with the beanome language
Describing hierarchical compositions of Java beans with the ...
收藏 引用
SC 2002, Workshop on Software Composition Affiliated with ETAPS 2002 (Satellite Event of ETAPS 2002)
作者: Cervantes, Humberto Favre, Jean Marie Duclos, Frédéric Laboratoire LSR-IMAG Domaine Universitaire 220 Rue de la Chimie F38041 Grenoble Cedex 9 France Dassault Systèmes 9 quai Marcel Dassault 92150 Suresnes France
To better understand the conceptual issues concerning hierarchical composition, that is the possibility of an assembly of components to become itself a component, we are developing a simple component model that includ... 详细信息
来源: 评论
Specifying java thread semantics using a uniform memory model  02
Specifying Java thread semantics using a uniform memory mode...
收藏 引用
Proceedings of the Joint ACM java Grande - ISCOPE 2002 Conference
作者: Yang, Yue Gopalakrishnan, Ganesh Lindstrom, Gary School of Computing University of Utah Salt Lake City UT United States
Standardized language level support for threads is one of the most important features of java. However, defining the java Memory Model (JMM) has turned out to be a major challenge. Several models produced to date are ... 详细信息
来源: 评论
A Web-based management system for network monitoring
A Web-based management system for network monitoring
收藏 引用
IEEE Workshop on IP Operations and Management, IPOM 2002
作者: Choi, Jae-Won Lee, Kwang-Hui Dept. of Computer Engineering Changwon National University Changwon Korea Republic of
We have designed and implemented a network monitoring and analysis system with efficient and integrated methods. As implemented using java with JDBC (java database connectivity), the proposed system can be operated pl... 详细信息
来源: 评论
Evaluating the precision of static reference analysis using profiling
Evaluating the precision of static reference analysis using ...
收藏 引用
ISSTA 02 Proceedings of the ACM SIGSOFT 2002 International Symposium on Software Testing and Analysis
作者: Liang, Donglin Pennings, Maikel Harrold, Mary Jean College of Computing Georgia Institute of Technology Atlanta GA 30332 United States
Program analyses and optimizations of java programs require reference information that determines the instances that may be accessed through dereferences. Reference information can be computed using reference analysis... 详细信息
来源: 评论
Towards adocument centred computer-aided control system design environment  15th
Towards adocument centred computer-aided control system desi...
收藏 引用
15th World Congress of the International Federation of Automatic Control, 2002
作者: Halepota Al Sadiq ul, Amin M. Madani Jobling, Christopher P. Grant, Philip W. Centre for Communications and Software Technologies University of Wales Swansea Singleton Park Swansea United Kingdom Topline Data Limited Wiltshire United Kingdom
Most conventional design processes produce documentation as a by-product: design is done within an environment or collection of tools and the design outputs, models, diagrams, results, etc are gathered together along ... 详细信息
来源: 评论
Elimination of java array bounds checks in the presence of indirection  02
Elimination of Java array bounds checks in the presence of i...
收藏 引用
Proceedings of the Joint ACM java Grande - ISCOPE 2002 Conference
作者: Luján, Mikel Gurd, John R. Freeman, T.L. Miguel, José Centre for Novel Computing University of Manchester Oxford Road Manchester M13 9PL United Kingdom Dep. Arquitectura Tecnologia Comp. UPV-EHU P.O. Box 649 20080 Donostia-San Sebastian Spain
The java language specification states that every access to an array needs to be within the bounds of that array;i.e. between 0 and array length -1. Different techniques for different programming languages have been p... 详细信息
来源: 评论