咨询与建议

限定检索结果

文献类型

  • 14 篇 期刊文献
  • 11 篇 会议

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 18 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 5 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 环境科学与工程(可...
  • 6 篇 理学
    • 3 篇 数学
    • 1 篇 物理学
    • 1 篇 地理学
    • 1 篇 海洋科学
    • 1 篇 地球物理学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 25 篇 transformation a...
  • 4 篇 uml
  • 2 篇 fibonacci nlfsr
  • 2 篇 mda
  • 2 篇 model checking
  • 2 篇 fuzzy computatio...
  • 2 篇 model transforma...
  • 2 篇 knowledge-based
  • 2 篇 is engineering
  • 2 篇 multi-agent syst...
  • 2 篇 galois nlfsr
  • 1 篇 semantic metalan...
  • 1 篇 address
  • 1 篇 equivalence
  • 1 篇 enterprise model...
  • 1 篇 programming lang...
  • 1 篇 abbott assay
  • 1 篇 time-varying sys...
  • 1 篇 uml statechart
  • 1 篇 performance

机构

  • 1 篇 univ murcia murc...
  • 1 篇 univ hyogo grad ...
  • 1 篇 univ zilina fac ...
  • 1 篇 school of comput...
  • 1 篇 argonne national...
  • 1 篇 the software eng...
  • 1 篇 hanwha syst co 2...
  • 1 篇 radharaman inst ...
  • 1 篇 univ montreal de...
  • 1 篇 vilnius univ kau...
  • 1 篇 univ melbourne m...
  • 1 篇 kuthstr. 1 d-511...
  • 1 篇 college of infor...
  • 1 篇 hitachi ltd yoko...
  • 1 篇 nec corp ltd sys...
  • 1 篇 hohai univ comp ...
  • 1 篇 north west ctr e...
  • 1 篇 kaunas univ tech...
  • 1 篇 山东大学
  • 1 篇 taiyuan univ dep...

作者

  • 3 篇 lopata audrius
  • 3 篇 veitaite ilona
  • 2 篇 yao ge
  • 2 篇 parampalli udaya
  • 1 篇 wu xiaodan
  • 1 篇 zhang xuejie
  • 1 篇 kim byeong hak
  • 1 篇 zhanyou ma
  • 1 篇 asakura yoshihar...
  • 1 篇 morris jm
  • 1 篇 kim min young
  • 1 篇 ziyuan liu
  • 1 篇 tajine m
  • 1 篇 li xia
  • 1 篇 elizondo d
  • 1 篇 袁辉
  • 1 篇 weiming wang
  • 1 篇 asamoah-barnieh ...
  • 1 篇 张世栋
  • 1 篇 nana he

语言

  • 23 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Transformation algorithm"
25 条 记 录,以下是11-20 订阅
排序:
Target Coordinate System for Robust LADAR Systems to Magnetic Field Variation  15
Target Coordinate System for Robust LADAR Systems to Magneti...
收藏 引用
Conference on Technologies for Optical Countermeasures XV
作者: Kim, Jin Kyum Kim, Byeong Hak Kim, Min Young Hanwha Syst Co 2441 Gongdan Ro Gumi South Korea Kyungpook Natl Univ 80 Daehakro Daegu South Korea
The LADAR system is a device that generates a depth map using reflected laser range information after irradiating a laser pulse onto a terrain or target. In recent years, it is important to acquire accurate 3D coordin... 详细信息
来源: 评论
Scheduling model-to-model transformations with continuations
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2014年 第11期44卷 1351-1378页
作者: Sanchez Cuadrado, Jesus Perera Aracil, Jesus Univ Autonoma Madrid E-28049 Madrid Spain Univ Murcia Murcia Spain
Model transformations are at the heart of model-driven engineering because they allow the automation of diverse kinds of model manipulations. transformation scheduling is a key issue in the design and implementation o... 详细信息
来源: 评论
The General algorithm for the Design of the MDA transformation Models
The General Algorithm for the Design of the MDA Transformati...
收藏 引用
5th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN)
作者: Tavac, Marek Tavac, Viliam Univ Zilina Fac Management Sci & Informat Dept Software Technol Zilina Slovakia
This article deals with the design of the MDA transformation models. It suggests a new general algorithm for systematic and step by step construction of the MDA transformation models. In the first part, the theory and... 详细信息
来源: 评论
Restoration of Blur & Noisy Images Using Hybrid Kernel-Padding algorithm with transformation Technique
Restoration of Blur & Noisy Images Using Hybrid Kernel-Paddi...
收藏 引用
4th IEEE International Conference on Computer and Communication Technology (ICCCT)
作者: Ansari, Rohina Yadav, Himanshu Jain, Anurag Radharaman Inst Sci & Technol Dept Comp Sci Bhopal India
Digital world is a dire need of the current scenario. Now these days equipments take the digital snapshots which may be blur due to bad focus of camera, relative motion between camera and scene to be capture etc. This... 详细信息
来源: 评论
Unconditionally provably secure cancellable biometrics based on a quotient polynomial ring
收藏 引用
IET BIOMETRICS 2012年 第1期1卷 63-71页
作者: Takahashi, K. Naganuma, K. Hitachi Ltd Yokohama Res Lab Kanagawa Japan Univ Tokyo Grad Sch Informat Sci & Technol Tokyo Japan
Biometric authentication has attracted attention because of its high security and usability. However, biometric features such as fingerprints are unchangeable throughout the life of individuals. Thus, once biometric d... 详细信息
来源: 评论
Research on transformation from UML Statechart to Classical State Diagram
Research on Transformation from UML Statechart to Classical ...
收藏 引用
2nd International Conference on Computer Science and Network Technology (ICCSNT)
作者: Wu Xiaodan Zhang Xuejie Li Liangming Hohai Univ Comp & Informat Coll Nanjing Jiangsu Peoples R China
UML statechart are finite state machines extended with hierarchy, orthogonality and broadcasting. It can describes all dynamic actions of the element in system. But it is very difficult to be applied to generating tes... 详细信息
来源: 评论
Queuing Network Based Performance Analysis for Reconfigurable Routing and Switching Platform Management System
Queuing Network Based Performance Analysis for Reconfigurabl...
收藏 引用
The 2011 International Conference on Informatics,Cybernetics,and Computer Engineering(ICCE 2011)
作者: Yinyan Shi Weiming Wang Chuanhuang Li College of Information & Electronic Engineering Zhejiang Gongshang University
This paper describes Reconfigurable Routing and Switching Platform Management System by Unified Modeling Language model, and then gives the transformation description for the conversion from an UML model with fork and... 详细信息
来源: 评论
Extending a Role Graph for Role-Based Access Control
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2009年 第2期E92D卷 211-219页
作者: Asakura, Yoshiharu Nakamoto, Yukikazu NEC Corp Ltd Syst Platforms Res Labs Kawasaki Kanagawa 2118666 Japan Univ Hyogo Grad Sch Appl Informat Kobe Hyogo 6500044 Japan
Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. Since an organization's lines of authority influence the authorized privileges of jobs, roles also form a... 详细信息
来源: 评论
MULTI-DOMAIN MATRICES: ANOTHER PERSPECTIVE
MULTI-DOMAIN MATRICES: ANOTHER PERSPECTIVE
收藏 引用
10th International Design Structure Matrix Conference
作者: Danilovic, Mike Asamoah-Barnieh, Raymond Jonkoping Univ Jonkoping Int Business Sch Jonkoping Sweden Jonkoping Univ Sch Engn Jonkoping Sweden
• With ever increasing competition, companies are collaborating in networks with projects increasingly spanning across different teams in companies with divisions in different geographical locations and with partner c... 详细信息
来源: 评论
基于多时间粒度转换算法的时态数据库扩展
基于多时间粒度转换算法的时态数据库扩展
收藏 引用
第二十四届中国数据库学术会议
作者: 尹浩 张世栋 袁辉 山东大学计算机科学与技术系
1引言由于越来越多的应用需要保存历史信息,对时态数据库的研究受到了人们的关注。不同的应用领域具有对时间的不同要求,因此一个时态数据库管理系统(TDBMS)的数据定义语言应提供用户定义时间元的功能。由于应用的复杂性及多样性,不但
来源: 评论