咨询与建议

限定检索结果

文献类型

  • 95 篇 会议
  • 50 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 88 篇 工学
    • 77 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 16 篇 控制科学与工程
    • 11 篇 信息与通信工程
    • 7 篇 电气工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 光学工程
    • 2 篇 电子科学与技术(可...
  • 38 篇 理学
    • 16 篇 数学
    • 14 篇 物理学
    • 7 篇 系统科学
    • 5 篇 生物学
    • 3 篇 化学
    • 2 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 10 篇 computational mo...
  • 9 篇 visualization
  • 6 篇 software enginee...
  • 5 篇 computer archite...
  • 5 篇 data models
  • 4 篇 computer science
  • 4 篇 real time system...
  • 4 篇 data mining
  • 4 篇 monitoring
  • 4 篇 security
  • 4 篇 mobile communica...
  • 4 篇 clustering algor...
  • 4 篇 kernel
  • 4 篇 data structures
  • 4 篇 artificial intel...
  • 4 篇 data visualizati...
  • 4 篇 training
  • 3 篇 runtime
  • 3 篇 systems engineer...
  • 3 篇 educational inst...

机构

  • 7 篇 state key labora...
  • 5 篇 centre for compu...
  • 4 篇 centre for compu...
  • 4 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 state key labora...
  • 3 篇 institute for qu...
  • 3 篇 centre for resea...
  • 3 篇 centre for distr...
  • 3 篇 centre for compu...
  • 2 篇 school of mathem...
  • 2 篇 college of engin...
  • 2 篇 high integrity s...
  • 2 篇 perimeter instit...
  • 2 篇 software systems...
  • 2 篇 department of co...
  • 2 篇 department of ps...
  • 2 篇 department of co...
  • 2 篇 centre for compu...

作者

  • 15 篇 john grundy
  • 10 篇 grundy john
  • 8 篇 bei zeng
  • 8 篇 mohamed almorsy
  • 8 篇 zhengfeng ji
  • 7 篇 zahedi mansooreh
  • 6 篇 almorsy mohamed
  • 6 篇 ibrahim amani s.
  • 5 篇 nengkun yu
  • 5 篇 gaber mohamed me...
  • 5 篇 mohamed medhat g...
  • 4 篇 jianxin chen
  • 4 篇 hamlyn-harris ja...
  • 4 篇 shonali krishnas...
  • 4 篇 krishnaswamy sho...
  • 4 篇 amani s. ibrahim
  • 3 篇 black sue
  • 3 篇 bo du
  • 3 篇 lefei zhang
  • 3 篇 rajkumar buyya

语言

  • 148 篇 英文
  • 2 篇 其他
检索条件"机构=Centre for Computing and Engineering Software Systems"
150 条 记 录,以下是91-100 订阅
排序:
Visualizing traceability links between source code and documentation
Visualizing traceability links between source code and docum...
收藏 引用
IEEE Symposium on Visual Languages and Human Centric computing (VL/HCC)
作者: Xiaofan Chen John Hosking John Grundy Department of Computer Science University of Auckland Auckland New Zealand College of Engineering & Computer Science Australian National University Canberra Australia Centre for Computing & Engineering Software Systems Swinburne University of Technology Melbourne Australia
It is well recognized that visualizing traceability links between software artifacts helps developers to recover, browse, and maintain these inter-relationships effectively and efficiently. However, it is a major chal... 详细信息
来源: 评论
Long term bank failure prediction using Fuzzy Refinement-based Transductive Transfer learning
Long term bank failure prediction using Fuzzy Refinement-bas...
收藏 引用
IEEE International Conference on Fuzzy systems (FUZZ-IEEE)
作者: Vahid Behbood Jie Lu Guangquan Zhang Decision Systems & E-Service Intelligence Research Laboratory Centre of Qua ntum Computing and Intelligent System School of Software Faculty of Engineering and Information Technology University of Technology-Sydney Broadway NSW Australia
Machine learning algorithms, which have been considered as robust methods in different computational fields, assume that the training and test data are drawn from the same distribution. This assumption may be violated... 详细信息
来源: 评论
No-go theorem for one-way quantum computing on naturally occurring two-level systems
收藏 引用
Physical Review A 2011年 第5期83卷 050301(R)-050301(R)页
作者: Jianxin Chen Xie Chen Runyao Duan Zhengfeng Ji Bei Zeng Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Physics Massachusetts Institute of Technology Cambridge Massachusetts USA Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney New South Wales Australia Perimeter Institute for Theoretical Physics Waterloo Ontario Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Institute for Quantum Computing and Department of Combinatorics and Optimization University of Waterloo Waterloo Ontario Canada
The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, i... 详细信息
来源: 评论
A worldwide survey of base process activities towards software engineering process excellence  98
A worldwide survey of base process activities towards softwa...
收藏 引用
Proceedings of the 20th international conference on software engineering
作者: Yingxu Wang Graham King Alex Dorling Dilip Patel Ian Court Geoff Staples Margaret Ross School of Computing Information Systems and Mathematics South Bank University London 103 Borough Road London SE1 0AA UK Research Centre for Systems Engineering Southampton Institute Southampton SO14 0YN UK Centre for Software Engineering IVF Sweden
来源: 评论
Evaluation of security training and awareness programs: Review of current practices and guidelines
arXiv
收藏 引用
arXiv 2021年
作者: Jayatilaka, Asangi Beu, Nathan Baetu, Irina Zahedi, Mansooreh Ali Babar, M. Hartley, Laura Lewinsmith, Winston CREST – the Centre for Research on Engineering Software Technologies School of Computer Science The University of Adelaide Australia School of Psychology University of Adelaide Australia School of Computing and Information Systems The University of Melbourne Australia Melbourne Australia
Evaluating the effectiveness of security awareness and training programs is critical for minimizing organizations’ human security risk. Based on a literature review and industry interviews, we discuss current practic...
来源: 评论
Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR Compliance
Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR...
收藏 引用
18th International Conference on software Technologies, ICSOFT 2023
作者: Al-Obeidallah, Mohammed Ghazi Piras, Luca Iloanugo, Onyinye Mouratidis, Haralambos Alkubaisy, Duaa Dellagiacoma, Daniele Department of Software Engineering Al Ain University Abu Dhabi United Arab Emirates School of Computing Middlesex University London United Kingdom School of Computing Robert Gordon University Aberdeen United Kingdom Institute for Analytics and Data Science University of Essex Colchester United Kingdom College of Applied Studies and Community Service Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia Centre for Secure Intelligent and Usable Systems University of Brighton Brighton United Kingdom
The introduction of the European General Data Protection Regulation (GDPR) has imposed obligations on organisations collecting data in the EU. This has been beneficial to citizens due to rights reinforcement achieved ...
来源: 评论
A Flexible Keyphrase Extraction Technique for Academic Literature
收藏 引用
Procedia Computer Science 2018年 135卷 553-563页
作者: Gollam Rabby Saiful Azad “ Mufti Mahmud Kamal Z. Zamli Mohammed Mostafizur Rahman Faculty of Computer Systems & Software Engineering University Malaysia Pahang Gambang Kuantan Malaysia IBM Centre of Excellence Gambang Kuantan Malaysia Department of Computing and Technology Nottingham Trent University Nottingham United Kingdom Department of Mathematics American International University - Bangladesh (AIUB) Dhaka Bangladesh
A keyphrase extraction technique endeavors to extract quality keyphrases from a given document, which provide a high-level summary of that document. Except statistical keyphrase extraction approaches, all other approa... 详细信息
来源: 评论
Data-Driven Distributionally Robust Safety Verification Using Barrier Certificates and Conditional Mean Embeddings
arXiv
收藏 引用
arXiv 2024年
作者: Schön, Oliver Zhong, Zhengang Soudjani, Sadegh The School of Computing Newcastle University Newcastle upon TyneNE4 5TG United Kingdom The Sargent Centre for Process Systems Engineering Imperial College London London United Kingdom The Max Planck Institute for Software Systems Kaiserslautern Germany
Algorithmic verification of realistic systems to satisfy safety and other temporal requirements has suffered from poor scalability of the employed formal approaches. To design systems with rigorous guarantees, many ap... 详细信息
来源: 评论
Search-based techniques for optimizing software project resource allocation
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3103卷 1425-1426页
作者: Antoniol, G. Di Penta, M. Harman, M. RCOST - Research Centre on Software Technology University of Sannio Department of Engineering Palazzo ex Poste Via Traiano 82100 Benevento Italy Department of Information Systems and Computing Brunel University Uxbridge Middlesex UB8 3PH United Kingdom
来源: 评论
Challenges and open questions in soft consensus models
Challenges and open questions in soft consensus models
收藏 引用
Conference of the North American Fuzzy Information Processing Society - NAFIPS
作者: F.J. Cabrerizo F. Chiclana M.R. Ureña E. Herrera-Viedma Department of Computer Systems and Software Engineering UNED University Madrid Spain Centre for Computational Intelligence School of Computing De Montfort University Leicester UK Department of Computer Sciences and Artificial Intelligence University of Granada Granada Spain
In group decision making problems, given the importance of obtaining an accepted solution by the whole group, the consensus has attained a great attention and it is virtually a major goal of these problems. Consensus,... 详细信息
来源: 评论