咨询与建议

限定检索结果

文献类型

  • 2,119 册 图书
  • 37 篇 期刊文献
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 2,161 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 38 篇 工学
    • 27 篇 电气工程
    • 24 篇 软件工程
    • 22 篇 计算机科学与技术...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
  • 8 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 2,161 篇 management of co...
  • 869 篇 computer communi...
  • 650 篇 information syst...
  • 647 篇 cryptology
  • 602 篇 software enginee...
  • 501 篇 systems and data...
  • 481 篇 computers and so...
  • 412 篇 algorithm analys...
  • 317 篇 it in business
  • 207 篇 information stor...
  • 188 篇 software enginee...
  • 186 篇 operating system...
  • 152 篇 programming lang...
  • 139 篇 computer appl. i...
  • 136 篇 logics and meani...
  • 132 篇 artificial intel...
  • 121 篇 programming tech...
  • 106 篇 information syst...
  • 102 篇 discrete mathema...
  • 101 篇 theory of comput...

机构

  • 12 篇 i.s.c.n. gesmbh ...
  • 11 篇 dublin city univ...
  • 10 篇 institute for in...
  • 10 篇 computer science...
  • 10 篇 queensland unive...
  • 10 篇 department of co...
  • 10 篇 university of am...
  • 10 篇 qatar university...
  • 9 篇 university of br...
  • 9 篇 university of lu...
  • 8 篇 vienna universit...
  • 8 篇 department of co...
  • 8 篇 nanyang technolo...
  • 8 篇 stanford univers...
  • 8 篇 software quality...
  • 8 篇 institute of sof...
  • 8 篇 university of ma...
  • 8 篇 fraunhofer insti...
  • 7 篇 institute for is...
  • 7 篇 hochschule bonn-...

作者

  • 29 篇 moti yung
  • 18 篇 richard messnarz
  • 18 篇 luis m. camarinh...
  • 18 篇 javier lopez
  • 18 篇 simone fischer-h...
  • 16 篇 sushil jajodia
  • 14 篇 bruce christians...
  • 14 篇 andreas gadatsch
  • 12 篇 jianying zhou
  • 12 篇 abdelaziz bouras
  • 12 篇 hamideh afsarman...
  • 12 篇 fabio martinelli
  • 11 篇 sokratis katsika...
  • 11 篇 larry leifer
  • 11 篇 christoph meinel
  • 11 篇 leszek a. macias...
  • 11 篇 pierangela samar...
  • 10 篇 bruno crispo
  • 10 篇 louis rivest
  • 10 篇 ilan oshri

语言

  • 2,161 篇 英文
检索条件"主题词=Management of Computing and Information Systems"
2161 条 记 录,以下是1-10 订阅
排序:
Securing embedded systems
收藏 引用
IEEE SECURITY & PRIVACY 2006年 第2期4卷 40-49页
作者: Hwang, DD Tiri, SK Verbauwhede, I Univ Calif Los Angeles Los Angeles CA 90024 USA
A top-down, multiabstraction layer approach for embedded security design reduces the risk of security flaws, letting designers maximize security while limiting area, energy, and computation costs.
来源: 评论
Designing Corporate Hackathons with a Purpose The Future of Software Development
收藏 引用
IEEE SOFTWARE 2019年 第1期36卷 15-22页
作者: Pe-Than, Ei Pa Pa Nolte, Alexander Filippova, Anna Bird, Christian Scallen, Steve Herbsleb, James D. Carnegie Mellon Univ Sch Comp Sci Inst Software Res Pittsburgh PA 15213 USA Univ Tartu Inst Comp Sci Tartu Estonia GitHub San Francisco CA USA Microsoft Res Redmond WA USA Microsoft Garage Redmond WA USA
Based on our empirical studies of 10 hackathons held by scientific communities, a corporation, and universities as well as the review of published literature, we discuss that hackathons can be organized around goals s... 详细信息
来源: 评论
Scientific software development at a research facility
收藏 引用
IEEE SOFTWARE 2008年 第4期25卷 44-51页
作者: Ackroyd, Karen S. Kinder, Steve H. Mant, Geoff R. Miller, Mike C. Ramsdale, Christine A. Stephenson, Paul C. Daresbury Laboratory
The Synchrotron Radiation computing Group at Daresbury Laboratory develops experiment control and data acquisition software to support scientific research. Here, the authors review their experiences and learning over ... 详细信息
来源: 评论
Security Education against Phishing: A Modest Proposal for a Major Rethink
收藏 引用
IEEE SECURITY & PRIVACY 2012年 第2期10卷 24-32页
作者: Kirlappos, Iacovos Sasse, M. Angela UCL Secur Sci Doctoral Res Training Ctr London WC1E 6BT England UCL Dept Comp Sci London WC1E 6BT England UCL Informat Secur Res Grp London WC1E 6BT England
User education must focus on challenging and correcting the misconceptions that guide current user behavior. To date, user education on phishing has tried to persuade them to check URLs and a number of other indicator... 详细信息
来源: 评论
Analyzing and Managing Complex Software Ecosystems A Framework to Understand Value in information systems
收藏 引用
IEEE SOFTWARE 2019年 第3期36卷 55-60页
作者: Vorraber, Wolfgang Mueller, Matthias Voessner, Siegfried Slany, Wolfgang Graz Univ Technol Inst Engn & Business Informat Graz Austria Graz Univ Technol Inst Software Technol Graz Austria
Managing complex software ecosystems, such as free open source software projects, is crucial for software-producing organizations. We present a framework that helps visualize complex ecosystem settings, gain insights ... 详细信息
来源: 评论
A process model for successful CRM system development
收藏 引用
IEEE SOFTWARE 2004年 第4期21卷 22-+页
作者: Kim, HW Natl Univ Singapore Sch Comp Dept Informat Syst Singapore 117543 Singapore
The author argues that the state of knowledge in IS development is analogous to cooking with a list of ingredients but without the recipe. This study presents a process model for successful IS development, examining s... 详细信息
来源: 评论
Attribute-based access control with hidden policies and hidden credentials
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2006年 第10期55卷 1259-1270页
作者: Frikken, Keith Atallah, Mikhail Li, Jiangtao Purdue Univ CERIAS W Lafayette IN 47907 USA Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via ... 详细信息
来源: 评论
Bad Parts: Are Our Manufacturing systems at Risk of Silent Cyberattacks?
收藏 引用
IEEE SECURITY & PRIVACY 2015年 第3期13卷 40-47页
作者: Turner, Hamilton White, Jules Camelio, Jaime A. Williams, Christopher Amos, Brandon Parker, Robert Virginia Tech Blacksburg VA USA Vanderbilt Univ Elect Engn & Comp Sci Nashville TN 37235 USA Virginia Tech Dept Ind & Syst Engn Blacksburg VA USA Virginia Tech Dept Mech Engn Blacksburg VA USA Carnegie Mellon Univ Sch Comp Sci Pittsburgh PA 15213 USA Virginia Tech Appl Res Corp Blacksburg VA USA
Recent cyberattacks have highlighted the risk of physical equipment operating outside designed tolerances to produce catastrophic failures. A related threat is cyberattacks that change the design and manufacturing of ... 详细信息
来源: 评论
Software Development Analytics for Xen: Why and How
收藏 引用
IEEE SOFTWARE 2019年 第3期36卷 28-32页
作者: Izquierdo, Daniel Gonzalez-Barahona, Jesus M. Kurth, Lars Robles, Gregorio Bitergia Madrid Spain Univ Rey Juan Carlos Madrid Spain Citrix Open Source London England
Xen is one of the most popular virtualization technologies. Several IT companies collect and publish metrics, helping the ecosystem to be more self-aware of their development processes. Thus, ecosystem participants ma... 详细信息
来源: 评论
A Distributed Memory Hierarchy and Data management for Interactive Scene Navigation and Modification on Tiled Display Walls
收藏 引用
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 2015年 第6期21卷 714-729页
作者: Duy-Quoc Lai Sajadi, Behzad Jiang, Shan Meenakshisundaram, Gopi Majumder, Aditi Univ Calif Irvine Dept Comp Sci Irvine CA 92697 USA
Simultaneous modification and navigation of massive 3D models are difficult because repeated data edits affect the data layout and coherency on a secondary storage, which in turn affect the interactive out-of-core ren... 详细信息
来源: 评论