咨询与建议

限定检索结果

文献类型

  • 95 篇 会议
  • 49 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 149 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 88 篇 工学
    • 77 篇 计算机科学与技术...
    • 63 篇 软件工程
    • 16 篇 控制科学与工程
    • 11 篇 信息与通信工程
    • 7 篇 电气工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 2 篇 光学工程
    • 2 篇 电子科学与技术(可...
  • 38 篇 理学
    • 16 篇 数学
    • 14 篇 物理学
    • 7 篇 系统科学
    • 5 篇 生物学
    • 3 篇 化学
    • 2 篇 统计学(可授理学、...
  • 17 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 6 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 10 篇 computational mo...
  • 9 篇 visualization
  • 6 篇 software enginee...
  • 5 篇 computer archite...
  • 5 篇 data models
  • 4 篇 computer science
  • 4 篇 real time system...
  • 4 篇 data mining
  • 4 篇 monitoring
  • 4 篇 security
  • 4 篇 mobile communica...
  • 4 篇 clustering algor...
  • 4 篇 kernel
  • 4 篇 data structures
  • 4 篇 artificial intel...
  • 4 篇 data visualizati...
  • 4 篇 training
  • 3 篇 runtime
  • 3 篇 systems engineer...
  • 3 篇 educational inst...

机构

  • 7 篇 state key labora...
  • 5 篇 centre for compu...
  • 4 篇 centre for compu...
  • 4 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 state key labora...
  • 3 篇 institute for qu...
  • 3 篇 centre for resea...
  • 3 篇 centre for distr...
  • 3 篇 centre for compu...
  • 2 篇 school of mathem...
  • 2 篇 college of engin...
  • 2 篇 high integrity s...
  • 2 篇 perimeter instit...
  • 2 篇 software systems...
  • 2 篇 department of co...
  • 2 篇 department of ps...
  • 2 篇 department of co...
  • 2 篇 centre for compu...

作者

  • 15 篇 john grundy
  • 10 篇 grundy john
  • 8 篇 bei zeng
  • 8 篇 mohamed almorsy
  • 8 篇 zhengfeng ji
  • 7 篇 zahedi mansooreh
  • 6 篇 almorsy mohamed
  • 6 篇 ibrahim amani s.
  • 5 篇 nengkun yu
  • 5 篇 gaber mohamed me...
  • 5 篇 mohamed medhat g...
  • 4 篇 jianxin chen
  • 4 篇 hamlyn-harris ja...
  • 4 篇 shonali krishnas...
  • 4 篇 krishnaswamy sho...
  • 4 篇 amani s. ibrahim
  • 3 篇 black sue
  • 3 篇 bo du
  • 3 篇 lefei zhang
  • 3 篇 rajkumar buyya

语言

  • 147 篇 英文
  • 2 篇 其他
检索条件"机构=Centre for Computing and Engineering Software Systems"
149 条 记 录,以下是21-30 订阅
排序:
Using automated Control Charts for the Runtime Evaluation of QoS Attributes
Using automated Control Charts for the Runtime Evaluation of...
收藏 引用
13th IEEE International Symposium on High Assurance systems engineering, HASE 2011
作者: Amin, Ayman Colman, Alan Grunske, Lars Centre for Computing and Engineering Software Systems Faculty of Information and Communication Technologies Swinburne University of Technology Hawthorn VIC 3122 Australia Department of Computer Science Software Engineering: AG AQUA University of Kaiserslautern Kaiserslautern67653 Germany
As modern software systems operate in a highly dynamic context, they have to adapt their behaviour in response to changes in their operational environment or/and requirements. Triggering adaptation depends on detectin... 详细信息
来源: 评论
SecDSVL: A Domain-Specific Visual Language To Support Enterprise Security Modelling
SecDSVL: A Domain-Specific Visual Language To Support Enterp...
收藏 引用
Australian software engineering Conference
作者: Mohamed Almorsy John Grundy Centre for Computing and Engineering Software and Systems Swinburne University of Technology
Enterprise security management requires capturing different security and IT systems' details, analyzing and enforcing these security details, and improving employed security to meet new risks. Adopting structured ... 详细信息
来源: 评论
Natural strategies for search
收藏 引用
Natural computing 2008年 第3期8卷 547-570页
作者: Banks, Alec Vincent, Jonathan Phalp, Keith Software Systems Research Centre School of Design Engineering and Computing Bournemouth University Poole Dorset UK
In recent years a considerable amount of natural computing research has been undertaken to exploit the analogy between, say, searching a given problem space for an optimal solution and the natural process of foraging ...
来源: 评论
A strategy for the production of verifiable code using the B method  2nd
收藏 引用
2nd International Symposium of Formal Methods Europe, FME 1994
作者: Storey, Andrew C. Haughton, Howard P. Centre of Systems Software Engineering School of Computing Information Systems and Mathematics South Bank University Borough Rd LondonSE1 OAA United Kingdom 77 Crowley Close Waddon Croydon United Kingdom
The purpose of this paper is to describe extensions to the B Method in order to facilitate the generation of provably correct SPARK Ada code. Two strategies are provided. Firstly, a process model for the B Method is s... 详细信息
来源: 评论
Understand system's relative effectiveness using adapted confusion matrix
收藏 引用
2nd International Conference on Design, User Experience, and Usability: Design Philosophy, Methods, and Tools, DUXU 2013, Held as Part of 15th International Conference on Human-Computer Interaction, HCI International 2013
作者: Jiang, Nan Liu, Haibin Software Systems Research Centre School of Design Engineering and Computing Bournemouth University United Kingdom National Center for Biotechnology Information National Library of Medicine National Institutes of Health United States
The effectiveness of a system refers to the accuracy and completeness with which users achieve specified goals. These two aspects are interpreted as errors and completion in the context of usability testing. However, ... 详细信息
来源: 评论
Measurement for software quality
Measurement for software quality
收藏 引用
IEE Colloquium on Proof of Designed Reliability (Digest No. 1994/239)
作者: R. Whitty Centre for Systems and Software Engineering School of Computing South Bank University USA
The author takes an uncontentious view of quality as being 'fitness for purpose', more specifically, conformance to user requirements. Quality can be measured by number of reported nonconformances per hour of ...
来源: 评论
TOSSMA: A Tenant-Oriented SaaS Security Management Architecture
TOSSMA: A Tenant-Oriented SaaS Security Management Architect...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Mohamed Almorsy John Grundy Amani S. Ibrahim Centre for Computing & Engineering Software Systems Swinburne University of Technology Melbourne Australia
Multi-tenancy helps service providers to save costs, improve resource utilization, and reduce service customization and maintenance time by sharing of resources and services. On the other hand, supporting multi-tenanc... 详细信息
来源: 评论
Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap
Supporting Virtualization-Aware Security Solutions Using a S...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Amani S. Ibrahim James Hamlyn-Harris John Grundy Mohamed Almorsy Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne Australia
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic ga... 详细信息
来源: 评论
Automated software architecture security risk analysis using formalized signatures  13
Automated software architecture security risk analysis using...
收藏 引用
International Conference on software engineering (ICSE)
作者: Mohamed Almorsy John Grundy Amani S. Ibrahim Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne Australia
Reviewing software system architecture to pinpoint potential security flaws before proceeding with system development is a critical milestone in secure software development lifecycles. This includes identifying possib... 详细信息
来源: 评论
Fire tracking with collective intelligence using dynamic priority maps
Fire tracking with collective intelligence using dynamic pri...
收藏 引用
Congress on Evolutionary Computation
作者: David J. Howden Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne Australia
This paper describes a swarm control algorithm based on distributed pheromone maps to effectively track a moving fire front. The algorithm uses a single heuristic to maintain persistent surveillance to detect new fire... 详细信息
来源: 评论