咨询与建议

限定检索结果

文献类型

  • 2,212 篇 会议
  • 476 篇 期刊文献
  • 5 篇 学位论文
  • 2 册 图书
  • 2 篇 科技报告

馆藏范围

  • 2,697 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,640 篇 工学
    • 2,406 篇 计算机科学与技术...
    • 2,210 篇 软件工程
    • 211 篇 电气工程
    • 207 篇 信息与通信工程
    • 126 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 37 篇 生物工程
    • 25 篇 安全科学与工程
    • 22 篇 仪器科学与技术
    • 22 篇 建筑学
    • 21 篇 生物医学工程(可授...
    • 20 篇 土木工程
    • 19 篇 航空宇航科学与技...
    • 18 篇 材料科学与工程(可...
    • 18 篇 环境科学与工程(可...
    • 17 篇 动力工程及工程热...
    • 17 篇 化学工程与技术
  • 490 篇 理学
    • 366 篇 数学
    • 42 篇 统计学(可授理学、...
    • 40 篇 生物学
    • 40 篇 系统科学
    • 38 篇 物理学
    • 17 篇 化学
  • 414 篇 管理学
    • 221 篇 图书情报与档案管...
    • 218 篇 管理科学与工程(可...
    • 128 篇 工商管理
  • 121 篇 教育学
    • 121 篇 教育学
  • 30 篇 法学
    • 21 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 24 篇 医学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 2,697 篇 java programming...
  • 255 篇 java
  • 44 篇 computer softwar...
  • 33 篇 software
  • 21 篇 codes
  • 20 篇 libraries
  • 18 篇 computer personn...
  • 16 篇 software systems
  • 16 篇 software enginee...
  • 16 篇 semantics
  • 16 篇 graphical user i...
  • 16 篇 language
  • 15 篇 source code
  • 14 篇 analysis program...
  • 14 篇 open source soft...
  • 13 篇 runtime
  • 13 篇 extensible marku...
  • 13 篇 testing
  • 13 篇 computer program...
  • 12 篇 computer program...

机构

  • 6 篇 unisys corporati...
  • 6 篇 kth royal instit...
  • 5 篇 graduate school ...
  • 5 篇 ibm corp thomas ...
  • 5 篇 ibm t.j. watson ...
  • 4 篇 ibm ottawa
  • 4 篇 dipartimento di ...
  • 4 篇 singapore manage...
  • 4 篇 inria sophia ant...
  • 4 篇 department of co...
  • 4 篇 univ york dept c...
  • 4 篇 carnegie mellon ...
  • 3 篇 univ york york y...
  • 3 篇 université de mo...
  • 3 篇 cwi
  • 3 篇 school of comput...
  • 3 篇 utrecht universi...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of ma...
  • 3 篇 indiana univ dep...

作者

  • 16 篇 bettini lorenzo
  • 15 篇 inoue katsuro
  • 14 篇 binder walter
  • 11 篇 leavens gary t.
  • 9 篇 schoeberl martin
  • 9 篇 ernst michael d.
  • 8 篇 ishio takashi
  • 8 篇 monperrus martin
  • 8 篇 carpenter bryan
  • 8 篇 wellings andy
  • 7 篇 visser willem
  • 7 篇 baudry benoit
  • 7 篇 fox geoffrey
  • 7 篇 damiani ferrucci...
  • 7 篇 poll erik
  • 7 篇 poetzsch-heffter...
  • 7 篇 bal henri e.
  • 7 篇 vitek jan
  • 6 篇 kielmann thilo
  • 6 篇 milanova ana

语言

  • 2,530 篇 英文
  • 130 篇 其他
  • 13 篇 中文
  • 10 篇 日文
  • 8 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛伐克文
  • 1 篇 塞尔维亚文
  • 1 篇 乌克兰文
检索条件"主题词=Java programming language"
2697 条 记 录,以下是381-390 订阅
排序:
Program Verification Under Weak Memory Consistency Using Separation Logic  29th
Program Verification Under Weak Memory Consistency Using Sep...
收藏 引用
29th International Conference on Computer-Aided Verification (CAV)
作者: Vafeiadis, Viktor SWS MPI Saarbrucken Germany
The semantics of concurrent programs is now defined by a weak memory model, determined either by the programming language (e.g., in the case of C/C++11 or java) or by the hardware architecture (e.g., for assembly and ... 详细信息
来源: 评论
Review on Structural Health Monitoring System using WSN for Bridges
Review on Structural Health Monitoring System using WSN for ...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Patil, Pooja Krishnath Patil, S. R. Savitribai Phule Univ Bharati Vidyapeeth Coll Engn Women Dept Elect & Tele Commun Pune Maharashtra India
Structural health monitoring (SHM) is processes which detects and monitor the destructive part of various structures like bridges, buildings, wind turbines etc. Structural health assessment is widely applied to variou... 详细信息
来源: 评论
Empirical Study of Abnormalities in Local Variables of Change-Prone java Methods  28
Empirical Study of Abnormalities in Local Variables of Chang...
收藏 引用
28th IEEE International Symposium on Software Reliability Engineering
作者: Aman, Hirohisa Amasaki, Sousuke Yokogawa, Tomoyuki Kawahara, Minoru Ehime Univ Ctr Informat Technol Matsuyama Ehime 7908577 Japan Okayama Prefectural Univ Fac Comp Sci & Syst Engn Okayama 7191197 Japan
The naming of local variables is usually at the programmer's discretion. Thus, there is a diversity in naming local variables and this may cause variations in the code quality. Many coding conventions say that the... 详细信息
来源: 评论
Model-based Testing of the java network API  14
Model-based Testing of the Java network API
收藏 引用
14th International Workshop on Formal Engineering Approaches to Software Components and Architectures (FESCA) / European Joint Conference on Theory and Practice of Software (ETAPS)
作者: Artho, Cyrille Rousset, Guillaume KTH Sch Comp Sci & Commun Stockholm Sweden AIST Informat Technol Res Inst Osaka Japan Univ Nantes Nantes France
Testing networked systems is challenging. The client or server side cannot be tested by itself. We present a solution using tool "Modbat" that generates test cases for java's network library ***, where w... 详细信息
来源: 评论
An Agent Based Approach for Efficient Energy Management of Microgrids
An Agent Based Approach for Efficient Energy Management of M...
收藏 引用
IEEE Region 10 Symposium on Technologies for Smart Cities (TENSYMP)
作者: Balakrishnan, Hariharan Tomar, K. K. Singh Singh, S. N. Indian Inst Technol Kanpur Depertment Elect Engn Kanpur 208016 Uttar Pradesh India
Demand Side Management (DSM) is to be handled in a better coordinated way with the increase in the intermittency of the renewable energy sources (RES) into the power sector. With the implementation of centralized cont... 详细信息
来源: 评论
Revisiting Visitors for Modular Extension of Executable DSMLs  17
Revisiting Visitors for Modular Extension of Executable DSML...
收藏 引用
ACM/IEEE 20th International Conference on Model Driven Engineering languages and Systems (MODELS)
作者: Leduc, Manuel Degueule, Thomas Combemale, Benoit van der Storm, Tijs Barais, Olivier Univ Rennes 1 Rennes France CWI Amsterdam Netherlands Univ Groningen Groningen Netherlands
Executable Domain-Specific Modeling languages (xDSMLs) are typically defined by metamodels that specify their abstract syntax, and model interpreters or compilers that define their execution semantics. To face the pro... 详细信息
来源: 评论
Realization and Evaluation of java Wrapper that calls the End-to-End Communication Library  10
Realization and Evaluation of Java Wrapper that calls the En...
收藏 引用
10th International Conference on Mobile Computing and Ubiquitous Network (ICMU)
作者: Shimizu, Kazuki Suzuki, Hidekazu Naito, Katsuhiro Watanabe, Akira Meijo Univ Grad Sch Sci & Technol Nagoya Aichi 4688502 Japan Aichi Inst Technol Fac Informat Sci Nagoya Aichi 4700392 Japan
With the spread of mobile communication nodes such as smartphones and wireless communication technologies, the demand for the use of networks has been increasing. In the case of IPv4 networks, exhaustion of global IP ... 详细信息
来源: 评论
Capabilities for java: Secure Access to Resources  1
收藏 引用
15th Asian Symposium on programming languages and Systems (APLAS)
作者: Hayes, Ian J. Wu, Xi Meinicke, Larissa A. Univ Queensland Sch ITEE Brisbane Qld 4072 Australia
This paper explores adding capabilities to java with the objective of tightening security management for access to resources both within the java Class Library and java applications. Code can only access resources if ... 详细信息
来源: 评论
Interface-based Semi-automated Testing of Software Components
Interface-based Semi-automated Testing of Software Component...
收藏 引用
Federated Conference on Computer Science and Information Systems (FedCSIS)
作者: Potuzak, Tomas Lipka, Richard Brada, Premek Univ West Bohemia Fac Appl Sci Dept Comp Sci Univ 8 Plzen 30614 Czech Republic Univ West Bohemia Fac Appl Sci European Ctr Excellence New Technol Informat Soc Univ 8 Plzen 30614 Czech Republic
The component-based software development enables to construct applications from reusable components providing particular functionalities and simplifies application evolution. To ensure the correct functioning of a giv... 详细信息
来源: 评论
Reflection Analysis for java: Uncovering More Reflective Targets Precisely  28
Reflection Analysis for Java: Uncovering More Reflective Tar...
收藏 引用
28th IEEE International Symposium on Software Reliability Engineering
作者: Liu, Jie Li, Yue Tan, Tian Xue, Jingling UNSW Sch Comp Sci & Engn Sydney NSW Australia Wuhan Univ Comp Sch State Key Lab Software Engn Wuhan Hubei Peoples R China
Reflection, which is widely used in practice and abused by many security exploits, poses a significant obstacle to program analysis. Reflective calls can be analyzed statically or dynamically. Static analysis is more ... 详细信息
来源: 评论