咨询与建议

限定检索结果

文献类型

  • 244 篇 学位论文
  • 211 篇 期刊文献
  • 145 篇 会议
  • 10 册 图书

馆藏范围

  • 610 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 496 篇 工学
    • 345 篇 计算机科学与技术...
    • 253 篇 软件工程
    • 94 篇 仪器科学与技术
    • 58 篇 电气工程
    • 55 篇 信息与通信工程
    • 34 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 13 篇 机械工程
    • 8 篇 生物医学工程(可授...
    • 8 篇 公安技术
    • 7 篇 网络空间安全
    • 6 篇 交通运输工程
    • 5 篇 土木工程
    • 4 篇 测绘科学与技术
    • 3 篇 建筑学
    • 3 篇 地质资源与地质工...
    • 3 篇 生物工程
    • 3 篇 安全科学与工程
  • 70 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 7 篇 公共管理
    • 6 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 15 篇 教育学
    • 13 篇 教育学
  • 15 篇 艺术学
    • 14 篇 设计学(可授艺术学...
  • 14 篇 理学
    • 4 篇 数学
    • 3 篇 物理学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 医学
    • 6 篇 公共卫生与预防医...
    • 4 篇 临床医学
  • 5 篇 文学
    • 3 篇 新闻传播学
  • 1 篇 法学
  • 1 篇 军事学

主题

  • 610 篇 node.js
  • 100 篇 javascript
  • 57 篇 mongodb
  • 37 篇 text
  • 36 篇 websocket
  • 29 篇 vue.js
  • 28 篇 html5
  • 25 篇 react
  • 22 篇 web
  • 17 篇 物联网
  • 16 篇 express
  • 15 篇 vue
  • 15 篇 socket.io
  • 14 篇 internet of thin...
  • 14 篇 web application
  • 14 篇 webrtc
  • 12 篇 前后端分离
  • 12 篇 typescript
  • 12 篇 rest
  • 11 篇 webová aplikace

机构

  • 62 篇 brno university ...
  • 22 篇 北京邮电大学
  • 14 篇 南京大学
  • 10 篇 北京交通大学
  • 10 篇 电子科技大学
  • 8 篇 大连理工大学
  • 8 篇 东南大学
  • 8 篇 西安电子科技大学
  • 6 篇 华中科技大学
  • 6 篇 上海交通大学
  • 6 篇 浙江工业大学
  • 6 篇 西南科技大学
  • 5 篇 西安邮电大学
  • 5 篇 山东大学
  • 5 篇 南京邮电大学
  • 5 篇 南京理工大学
  • 4 篇 johannes kepler ...
  • 4 篇 辽宁科技大学
  • 4 篇 新华社技术局
  • 4 篇 上海大学

作者

  • 5 篇 bonetta daniele
  • 4 篇 陈自谦
  • 4 篇 陈文艺
  • 4 篇 付丽媛
  • 4 篇 besada-portas e.
  • 4 篇 黄志峰
  • 4 篇 吕海东
  • 4 篇 王晓阳
  • 3 篇 stojanovic radov...
  • 3 篇 刘生建
  • 3 篇 wang xiaoyang
  • 3 篇 wei jun
  • 3 篇 shihab emad
  • 3 篇 moness mohammed
  • 3 篇 dou wensheng
  • 3 篇 叶焱
  • 3 篇 younis al-shaima...
  • 3 篇 binder walter
  • 3 篇 kofjac davorin
  • 3 篇 王风硕

语言

  • 369 篇 中文
  • 238 篇 英文
  • 3 篇 其他
检索条件"主题词=Node.js"
610 条 记 录,以下是41-50 订阅
排序:
Time-Travel Debugging for JavaScript/***  24
Time-Travel Debugging for JavaScript/***
收藏 引用
24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE)
作者: Barr, Earl T. Marron, Mark Maurer, Ed Moseley, Dan Seth, Gaurav UCL London England Microsoft Res Redmond WA USA Microsoft Redmond WA USA
Time-traveling in the execution history of a program during debugging enables a developer to precisely track and understand the sequence of statements and program values leading to an error. To provide this functional... 详细信息
来源: 评论
Architecture Analysis and Implementation of 3D Theatre Display System Based on ***
Architecture Analysis and Implementation of 3D Theatre Displ...
收藏 引用
International Conference on Network and Information Systems for Computers (ICNISC)
作者: Jiang, Wei Zhou, Bin Zhang, Meng Commun Univ China Elect Informat Engn Sch Beijing Peoples R China Minist Culture Key Lab Acoust Visual Technol & Intelligent Contr Beijing Peoples R China Beijing Key Lab Modern Entertainment Technol Beijing Peoples R China
*** is one of the better-known frameworks and environments that support server-side JavaScript development. Many frameworks provide a full-featured Web stack, such as Connect and Express. Finally, many libraries avail... 详细信息
来源: 评论
AFFOGATO: Runtime Detection of Injection Attacks for ***  18
AFFOGATO: Runtime Detection of Injection Attacks for ***
收藏 引用
ISSTA/ECOOP Workshops
作者: Gauthier, Francois Hassanshahi, Behnaz Jordan, Alexander Oracle Labs Brisbane Qld Australia
*** took JavaScript from the browser to server-side web applications, and injection vulnerabilities are now commonly reported in *** modules. However, existing taint analysis approaches for JavaScript require extensiv... 详细信息
来源: 评论
Toward Real-Time High-Frequency Stock Monitoring System Using ***  8th
Toward Real-Time High-Frequency Stock Monitoring System Usin...
收藏 引用
8th International Conference on Soft Computing and Pattern Recognition (SoCPaR) / 8th International Conference on Computational Aspects of Social Networks (CASoN)
作者: Qu, Hao Ma, Kun Yang, Zhe Niu, Xuewei Abraham, Ajith Univ Jinan Sch Informat Sci & Engn Jinan 250022 Shandong Peoples R China Univ Jinan Shandong Prov Key Lab Network Based Intelligent C Jinan 250022 Shandong Peoples R China Shandong Univ Sch Comp Sci & Technol Jinan 250101 Shandong Peoples R China Sci Network Innovat & Res Excellence MIR Labs Auburn WA 98071 USA
Investing in stocks is a very popular financial management for modern people. Accurate data is aided for investor to make better decisions. But there are some challenges to design such a real-time system to present hi... 详细信息
来源: 评论
Research and Application of *** Core Technology
Research and Application of *** Core Technology
收藏 引用
International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)
作者: Huang, Xiaoping Guangzhou Univ South China Inst Software Engn Dept Network Technol Guangzhou 510990 Peoples R China
Web development companies and developers can choose a variety of technology stacks to build Web applications. In the early days of network development, different technologies were used for front-end and back-end devel... 详细信息
来源: 评论
SPMP: A JavaScript Support for Shared Persistent Memory on ***  18th
SPMP: A JavaScript Support for Shared Persistent Memory on *...
收藏 引用
18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Zhang, Qipeng Li, Tianyou Deng, Pan Chen, Yuting Huang, Linpeng Rudoff, Andy Shanghai Jiao Tong Univ Shanghai Peoples R China Intel Asia Pacific R&D Co LTD Shanghai Peoples R China Intel Corp Santa Clara CA USA
JavaScript is widely used for scripting on client side. *** is a JavaScript runtime environment, allowing Javascript to be used for building scalable network applications on server side. However, *** does not support ... 详细信息
来源: 评论
Energy and Runtime Performance Optimization of *** Web Requests  9
Energy and Runtime Performance Optimization of *** Web Reque...
收藏 引用
9th IEEE International Conference on Cloud Engineering (IC2E)
作者: Patrou, Maria Kent, Kenneth B. Siu, Joran Dawson, Michael Univ New Brunswick Fac Comp Sci Fredericton NB Canada IBM Corp IBM Runtime Technol Toronto ON Canada Red Hat Nodejs Lead Red Hat & IBM Ottawa ON Canada
The *** framework uses an event-driven model with a single-threaded event loop and provides asynchronous and non-blocking I/O operations. As with other programs, *** web applications take advantage of underlying resou... 详细信息
来源: 评论
Code-based Vulnerability Detection in *** Applications: How far are we?  35
Code-based Vulnerability Detection in *** Applications: How ...
收藏 引用
35th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Chinthanet, Bodin Ponta, Serena Elisa Plate, Henrik Sabetta, Antonino Kula, Raula Gaikovina Ishio, Takashi Matsumoto, Kenichi Nara Inst Sci & Technol Nara Japan SAP Secur Res Paris France
With one of the largest available collection of reusable packages, the JavaScript runtime environment *** is one of the most popular programming application. With recent work showing evidence that known vulnerabilitie... 详细信息
来源: 评论
Performance Comparison and Evaluation Of *** And Traditional Web Server (IIS)
Performance Comparison and Evaluation Of *** And Traditional...
收藏 引用
International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)
作者: Chitra, Lakshmi Prasanna Satapathy, Ravikanth GITAM Univ Dept Comp Sci Visakhapatnam Andhra Prades India
As the technological needs increase there is an increase in the necessity for information of users using the internet that has lead to the development of real-time web services. This paper analyses the differences of ... 详细信息
来源: 评论
Scaling JavaScript Abstract Interpretation to Detect and Exploit *** Taint-style Vulnerability  44
Scaling JavaScript Abstract Interpretation to Detect and Exp...
收藏 引用
44th IEEE Symposium on Security and Privacy (SP)
作者: Kang, Mingqing Xu, Yichao Li, Song Gjomemo, Rigel Hou, Jianwei Venkatakrishnan, V. N. Cao, Yinzhi Johns Hopkins Univ Baltimore MD 21218 USA Zhejiang Univ Hangzhou Peoples R China Univ Illinois Chicago IL USA Renmin Univ China Beijing Peoples R China
Taint-style vulnerabilities, such as OS command injection and path traversal, are common and severe software weaknesses. There exists an inherent trade-off between analysis scalability and accuracy in detecting such v... 详细信息
来源: 评论