咨询与建议

限定检索结果

文献类型

  • 965 篇 期刊文献
  • 649 篇 会议
  • 314 册 图书
  • 26 篇 学位论文
  • 5 件 标准
  • 1 篇 资讯

馆藏范围

  • 1,960 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 1,360 篇 工学
    • 912 篇 计算机科学与技术...
    • 565 篇 软件工程
    • 353 篇 电气工程
    • 124 篇 控制科学与工程
    • 83 篇 机械工程
    • 64 篇 信息与通信工程
    • 47 篇 电子科学与技术(可...
    • 36 篇 力学(可授工学、理...
    • 34 篇 材料科学与工程(可...
    • 33 篇 土木工程
    • 20 篇 仪器科学与技术
    • 14 篇 交通运输工程
    • 13 篇 石油与天然气工程
    • 11 篇 化学工程与技术
    • 11 篇 环境科学与工程(可...
    • 10 篇 建筑学
  • 228 篇 理学
    • 104 篇 数学
    • 64 篇 物理学
    • 23 篇 生物学
    • 19 篇 地球物理学
    • 16 篇 化学
    • 15 篇 系统科学
    • 15 篇 统计学(可授理学、...
  • 124 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 110 篇 教育学
    • 105 篇 教育学
  • 18 篇 农学
  • 18 篇 医学
    • 10 篇 基础医学(可授医学...
  • 15 篇 经济学
    • 14 篇 应用经济学
  • 10 篇 文学
    • 9 篇 新闻传播学
  • 7 篇 法学
  • 3 篇 哲学
  • 3 篇 历史学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 1,960 篇 object-oriented ...
  • 252 篇 nasa technical r...
  • 252 篇 (ntrs)
  • 128 篇 java
  • 122 篇 software enginee...
  • 55 篇 simulation
  • 55 篇 computer program...
  • 49 篇 reports
  • 48 篇 computer program...
  • 48 篇 programming lang...
  • 44 篇 object oriented ...
  • 44 篇 software enginee...
  • 43 篇 design
  • 40 篇 applications pro...
  • 39 篇 architecture (co...
  • 39 篇 software
  • 39 篇 artificial intel...
  • 37 篇 software archite...
  • 37 篇 formal specifica...
  • 37 篇 design patterns

机构

  • 13 篇 naval postgradua...
  • 5 篇 univ macedonia d...
  • 5 篇 univ calif berke...
  • 4 篇 iit dept comp sc...
  • 4 篇 georgia inst tec...
  • 4 篇 univ oslo dept i...
  • 4 篇 newcastle univ d...
  • 3 篇 natl res univ hi...
  • 3 篇 international bu...
  • 3 篇 univ oslo dept m...
  • 3 篇 victoria univ we...
  • 3 篇 city univ hong k...
  • 3 篇 oak ridge natl l...
  • 3 篇 nanjing univ sta...
  • 3 篇 univ lancaster d...
  • 3 篇 nova sch sci & t...
  • 3 篇 technion israel ...
  • 3 篇 univ coll dublin...
  • 3 篇 oak ridge natl l...
  • 3 篇 univ macedonia d...

作者

  • 6 篇 kindler eugene
  • 6 篇 abdalla hs
  • 6 篇 ducasse s
  • 5 篇 sokas algirdas
  • 5 篇 xinogalos stelio...
  • 5 篇 yang jeong
  • 5 篇 budiardja reuben...
  • 5 篇 cardall christia...
  • 5 篇 romanovsky a
  • 5 篇 lee young
  • 5 篇 giacaman nasser
  • 5 篇 chatzigeorgiou a...
  • 4 篇 tan wee hoe
  • 4 篇 kramer matthias
  • 4 篇 brinda torsten
  • 4 篇 chang jm
  • 4 篇 noble j
  • 4 篇 fong anthony s.
  • 4 篇 meyer bertrand
  • 4 篇 lanza m

语言

  • 1,779 篇 英文
  • 145 篇 其他
  • 31 篇 中文
  • 3 篇 德文
  • 1 篇 法文
检索条件"主题词=object-oriented programming"
1960 条 记 录,以下是881-890 订阅
排序:
WCET Analysis of Component-Based Systems using Timing Traces
WCET Analysis of Component-Based Systems using Timing Traces
收藏 引用
IEEE Int Conf/Workshops on Engineering of Autonomic and Autonomous Systems/Int Conf on the Engineering of Computer-Based Systems/Int Conf on the Engineering of Complex Computer Systems
作者: Betts, Adam Marref, Amine Univ London Imperial Coll Sci Technol & Med Dept Comp London England Umm Al Qura Univ Dept Comp Sci Mecca Saudi Arabia
Construction of a Real-Time System (RTS) out of a number of pre-fabricated pieces of software, otherwise known as components, is a pervasive area of interest. Typically, only relocatable object code of the component i... 详细信息
来源: 评论
As strong as the weakest link: Handling compromised components in OpenStack
As strong as the weakest link: Handling compromised componen...
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
作者: Taheri Monfared, Aryan Jaatun, Martin Gilje Department of Telematics Norwegian University of Science and Technology Norway SINTEF ICT Trondheim Norway
This paper presents an approach to handle compromised components in an Infrastructure-as-a-Service Cloud Computing platform. Our experiments show that traditional incident handling procedures are applicable for cloud ... 详细信息
来源: 评论
Program slicing research based on MSV in software security field
Program slicing research based on MSV in software security f...
收藏 引用
6th International Conference on Computer Science and Education, ICCSE 2011
作者: Zhang, ZhongLin Lin, MuYu School of Electronic and Information Engineering Lanzhou Jiaotong University Lanzhou China
By proposing a new idea of use of program slicing techniques to determine the independence of the critical safety variables. Mainly to solve the independence of critical security components within a class of critical ... 详细信息
来源: 评论
Towards a contextualization solution for cloud platform services
Towards a contextualization solution for cloud platform serv...
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
作者: Armstrong, Django Djemame, Karim Nair, Srijith Tordsson, Johan Ziegler, Wolfgang School of Computing University of Leeds Leeds LS2 9JT United Kingdom Security Futures Practice BT Office Minerva Herikerbergweg 2 Amsterdam 1101CM Netherlands Department of Computing Science Umeå University SE-901 87 Umeå Sweden Department of Bioinformatics Fraunhofer Institute SCAI 53754 Sankt Augustin Germany
We propose a cloud contextualization mechanism which operates in two stages, contextualization of VM images prior to service deployment (PaaS level) and self-contextualization of VM instances created from the image (I... 详细信息
来源: 评论
Pay to play or requirements prioritization in collectives
Pay to play or requirements prioritization in collectives
收藏 引用
2011 1st International Workshop on Requirements Patterns, RePa'11
作者: Weiss, Michael Systems and Computer Engineering Carleton University Ottawa Canada
This paper presents two patterns for requirements prioritization in a collective. A collective is a group of stakeholders with a common need. The stakeholders join the collective to create an infrastructure that they ... 详细信息
来源: 评论
Serial communication between PDA and GPS based on windows CE
Serial communication between PDA and GPS based on windows CE
收藏 引用
Pacific-Asia Conference on Circuits, Communications and System
作者: Ma, Hongbin Lu, Dongyang He, Qun Yue, Yumei Wang, Xue School of Resources and Civil Engineering Northeastern University Shenyang China Institute for Geo-Informatics and Digital Mine Research Northeastern University Shenyang China
This article put GIS application development as the goal. Based on the basis functions of Windows CE,the methods of opening and reading GPS serial data are analyzed and studied. The program put forward the method whic... 详细信息
来源: 评论
C++ for Dummies®, 6th Edition  6
收藏 引用
2011年
作者: Stephen R. Davis
Stephen R. Davis is the bestselling author of several books on C++, including previous editions of C++ For Dummies . He has been programming for more than 30 years and presently works for L-3 Communications in the are... 详细信息
来源: 评论
An overview of the object-oriented database programming language DBPQL
An overview of the object-oriented database programming lang...
收藏 引用
9th International Conference on Enterprise Information Systems (ICEIS 2007)
作者: Kirchberg, Markus Massey Univ Informat Sci Res Ctr Palmerston North 5301 New Zealand
In this paper, we present a new approach to the integration of object-oriented programming languages, database programming languages and query languages. While object-oriented programming languages and languages that ... 详细信息
来源: 评论
object-oriented programming for the boundary element method in two-dimensional heat transfer analysis
收藏 引用
ADVANCES IN ENGINEERING SOFTWARE 2006年 第4期37卷 248-259页
作者: Qiao, H Cardiff Sch Engn Cardiff CF24 0YF Wales
The usual boundary element analysis programs are coded in FORTRAN, which makes it difficult to build and maintain complex program systems. This paper presents the idea and implementation of the object-oriented program... 详细信息
来源: 评论
Perfect class hashing and numbering for object-oriented implementation
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2011年 第6期41卷 661-694页
作者: Ducournau, Roland Morandat, Floreal Univ Montpellier 2 LIRMM F-34000 Montpellier France CNRS F-34000 Montpellier France
Late binding and subtyping create run-time overhead for object-oriented languages, especially in the context of both multiple inheritance and dynamic loading, for instance for JAVA interfaces. In a previous article, w... 详细信息
来源: 评论