咨询与建议

限定检索结果

文献类型

  • 83 篇 会议
  • 60 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 85 篇 工学
    • 55 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 13 篇 核科学与技术
    • 8 篇 控制科学与工程
    • 7 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 生物工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 环境科学与工程(可...
  • 55 篇 理学
    • 32 篇 物理学
    • 9 篇 数学
    • 6 篇 生物学
    • 5 篇 化学
    • 3 篇 天文学
    • 3 篇 地球物理学
    • 3 篇 地质学
    • 3 篇 系统科学
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 11 篇 gravitational wa...
  • 9 篇 software enginee...
  • 9 篇 computational mo...
  • 9 篇 visualization
  • 7 篇 software
  • 7 篇 gravitational wa...
  • 6 篇 monitoring
  • 6 篇 gravitational wa...
  • 5 篇 computer archite...
  • 5 篇 artificial intel...
  • 4 篇 computer science
  • 4 篇 educational inst...
  • 4 篇 kernel
  • 4 篇 data structures
  • 4 篇 measurement
  • 4 篇 data models
  • 4 篇 unified modeling...
  • 4 篇 australia
  • 3 篇 runtime
  • 3 篇 information syst...

机构

  • 19 篇 institute for pl...
  • 19 篇 university of so...
  • 19 篇 indian institute...
  • 17 篇 université libre...
  • 16 篇 department of as...
  • 16 篇 scuola di ingegn...
  • 16 篇 king’s college l...
  • 16 篇 the university o...
  • 16 篇 infn sezione di ...
  • 16 篇 dipartimento di ...
  • 16 篇 università degli...
  • 16 篇 ligo laboratory ...
  • 16 篇 university of ma...
  • 16 篇 stony brook univ...
  • 16 篇 university of mi...
  • 16 篇 nasa goddard spa...
  • 16 篇 university of rh...
  • 16 篇 montclair state ...
  • 16 篇 infn trento inst...
  • 16 篇 max planck insti...

作者

  • 16 篇 r. takahashi
  • 16 篇 j. c. bayley
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 f. hellman
  • 16 篇 m. kinley-hanlon
  • 16 篇 t. mcrae
  • 16 篇 a. parisi
  • 16 篇 t. sawada
  • 16 篇 s. rowan
  • 16 篇 s. m. aronson
  • 16 篇 v. p. mitrofanov
  • 16 篇 a. j. tanasijczu...
  • 16 篇 g. moreno
  • 16 篇 g. hemming
  • 16 篇 a. z. jan
  • 16 篇 r. c. walet
  • 16 篇 b. f. neil
  • 16 篇 c. kim
  • 16 篇 f. muciaccia

语言

  • 142 篇 英文
  • 8 篇 其他
检索条件"机构=Centre for Computing and Engineering Software and Systems Swinburne University of Technology"
150 条 记 录,以下是91-100 订阅
排序:
An Algorithm for Cost-Effectively Storing Scientific Datasets with Multiple Service Providers in the Cloud
An Algorithm for Cost-Effectively Storing Scientific Dataset...
收藏 引用
IEEE International Conference on e-Science and Grid computing
作者: Dong Yuan Xiao Liu Lizhen Cui Tiantian Zhang Wenhao Li Dahai Cao Yun Yang Centre for Computing Engineering and Software Systems Swinburne University of Technology Melbourne Australia Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute of East China Normal University Shanghai China School of Computer Science and Technology Shandong University Jinan China School of Computer Science and Technology Anhui University Hefei China
The proliferation of cloud computing allows scientists to deploy computation and data intensive applications without infrastructure investment, where large generated datasets can be flexibly stored with multiple cloud... 详细信息
来源: 评论
Development of Robust Traceability Benchmarks
Development of Robust Traceability Benchmarks
收藏 引用
Australian software engineering Conference
作者: Xiaofan Chen John Hosking John Grundy Robert Amor Department of Computer Science University of Auckland Auckland New Zealand College of Engineering & Computer Science Australian National University Canberra Australia Centre for Computing and Engineering Software Systems Swinburne University of Technology Hawthorn Australia
Traceability benchmarks are essential for the evaluation of traceability recovery techniques. This includes the validation of an individual traceability technique itself and the objective comparison of the technique w... 详细信息
来源: 评论
Temporal QOS Management in Scientific Cloud Workflow systems
收藏 引用
丛书名: Elsevier insights
2012年
作者: Xiao Liu Yun Yang Jinjun Chen
Cloud computing can provide virtually unlimited scalable high performance computing resources. Cloud workflows often underlie many large scale data/computation intensive e-science applications such as earthquake model... 详细信息
来源: 评论
TOSSMA: A tenant-oriented SaaS security management architecture
TOSSMA: A tenant-oriented SaaS security management architect...
收藏 引用
2012 IEEE 5th International Conference on Cloud computing, CLOUD 2012
作者: Almorsy, Mohamed Grundy, John Ibrahim, Amani S. Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne VIC Australia
Multi-tenancy helps service providers to save costs, improve resource utilization, and reduce service customization and maintenance time by sharing of resources and services. On the other hand, supporting multi-tenanc... 详细信息
来源: 评论
Supporting virtualization-aware security solutions using a systematic approach to overcome the semantic gap
Supporting virtualization-aware security solutions using a s...
收藏 引用
2012 IEEE 5th International Conference on Cloud computing, CLOUD 2012
作者: Ibrahim, Amani S. Hamlyn-Harris, James Grundy, John Almorsy, Mohamed Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne VIC Australia
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic ga... 详细信息
来源: 评论
MDSE@R: Model-driven security engineering at runtime
MDSE@R: Model-driven security engineering at runtime
收藏 引用
4th International Symposium on Cyberspace Safety and Security, CSS 2012
作者: Almorsy, Mohamed Grundy, John Ibrahim, Amani S. Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne VIC Australia
New security threats arise frequently and impact on enterprise software security requirements. However, most existing security engineering approaches focus on capturing and enforcing security requirements at design ti... 详细信息
来源: 评论
Operating system kernel data disambiguation to support security analysis
Operating system kernel data disambiguation to support secur...
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Ibrahim, Amani S. Grundy, John Hamlyn-Harris, James Almorsy, Mohamed Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne VIC Australia
It is very challenging to verify the integrity of Operating System (OS) kernel data because of its complex layout. In this paper, we address the problem of systematically generating an accurate kernel data definition ... 详细信息
来源: 评论
Identifying OS kernel objects for run-time security analysis
Identifying OS kernel objects for run-time security analysis
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Ibrahim, Amani S. Hamlyn-Harris, James Grundy, John Almorsy, Mohamed Centre for Computing and Engineering Software Systems Faculty of ICT Swinburne University of Technology Melbourne VIC Australia
As dynamic kernel runtime objects are a significant source of security and reliability problems in Operating systems (OSes), having a complete and accurate understanding of kernel dynamic data layout in memory becomes... 详细信息
来源: 评论
Human genome meeting 2016 : Houston, TX, USA. 28 February - 2 March 2016
收藏 引用
Human genomics 2016年 第1期10 Suppl 1卷 12页
作者: A. K. Srivastava Y. Wang R. Huang C. Skinner T. Thompson L. Pollard T. Wood F. Luo R. Stevenson R. Polimanti J. Gelernter X. Lin I. Y. Lim Y. Wu A. L. Teh L. Chen I. M. Aris S. E. Soh M. T. Tint J. L. MacIsaac F. Yap K. Kwek S. M. Saw M. S. Kobor M. J. Meaney K. M. Godfrey Y. S. Chong J. D. Holbrook Y. S. Lee P. D. Gluckman N. Karnani A. Kapoor D. Lee A. Chakravarti C. Maercker F. Graf M. Boutros G. Stamoulis F. Santoni P. Makrythanasis A. Letourneau M. Guipponi N. Panousis M. Garieri P. Ribaux E. Falconnet C. Borel S. E. Antonarakis S. Kumar J. Curran J. Blangero S. Chatterjee J. Akiyama D. Auer C. Berrios L. Pennacchio T. R. Donti G. Cappuccio M. Miller P. Atwal A. Kennedy A. Cardon C. Bacino L. Emrick J. Hertecant F. Baumer B. Porter M. Bainbridge P. Bonnen B. Graham R. Sutton Q. Sun S. Elsea Z. Hu P. Wang Y. Zhu J. Zhao M. Xiong David A. Bennett A. Hidalgo-Miranda S. Romero-Cordoba S. Rodriguez-Cuevas R. Rebollar-Vega E. Tagliabue M. Iorio E. D’Ippolito S. Baroni B. Kaczkowski Y. Tanaka H. Kawaji A. Sandelin R. Andersson M. Itoh T. Lassmann Y. Hayashizaki P. Carninci A. R. R. Forrest C. A. Semple E. A. Rosenthal B. Shirts L. Amendola C. Gallego M. Horike-Pyne A. Burt P. Robertson P. Beyers C. Nefcy D. Veenstra F. Hisama R. Bennett M. Dorschner D. Nickerson J. Smith K. Patterson D. Crosslin R. Nassir N. Zubair T. Harrison U. Peters G. Jarvik F. Menghi K. Inaki X. Woo P. Kumar K. Grzeda A. Malhotra H. Kim D. Ucar P. Shreckengast K. Karuturi J. Keck J. Chuang E. T. Liu B. Ji A. Tyler G. Ananda G. Carter H. Nikbakht M. Montagne M. Zeinieh A. Harutyunyan M. Mcconechy N. Jabado P. Lavigne J. Majewski J. B. Goldstein M. Overman G. Varadhachary R. Shroff R. Wolff M. Javle A. Futreal D. Fogelman L. Bravo W. Fajardo H. Gomez C. Castaneda C. Rolfo J. A. Pinto K. C. Akdemir L. Chin S. Patterson C. Statz S. Mockus S. N. Nikolaev X. I. Bonilla L. Parmentier B. King F. Bezrukov G. Kaya V. Zoete V. Seplyarskiy H. Sharpe T. McKee K. Popadin N. Basset-Seguin R. Ben Chaabene M. Andrianova C. Verdan K. Grosdemange O. Sumara M. E JCSRI Greenwood Genetic Center Greenwood USA School of Computing Clemson University Clemson USA Biochemical Genetics Laboratory Greenwood Genetic Center Greenwood USA Department Psychiatry Yale Sch Med and VA CT Healthcare Center West Haven USA Department Genetics Yale Sch Med and VA CT Healthcare Center West Haven USA Department Neurobiology Yale Sch Med and VA CT Healthcare Center West Haven USA Singapore Institute for Clinical Sciences Singapore Singapore National University of Singapore Singapore Singapore University of British Columbia Vancouver Canada KK Women’s and Children’s Hospital Singapore Singapore University of Southampton and University Hospital Southampton NHS Foundation Trust Southampton UK University of Auckland Auckland New Zealand McKusick-Nathans Institute of Genetic Medicine Johns Hopkins University School of Medicine Baltimore USA Esslingen University of Applied Sciences Esslingen Germany German Cancer Research Center Heidelberg Germany Department of Genetic Medicine and Development University of Geneva Medical School Geneva Switzerland Geneva University Hospitals-HUG Service of Genetic Medicine Geneva Switzerland GE3 Institute of Genetics and Genomics of Geneva University of Geneva Medical School Geneva Switzerland South Texas Diabetes and Obesity Institute School of Medicine University of Texas Rio-Grande Valley Edinburg USA South Texas Diabetes and Obesity Institute School of Medicine University of Texas Rio-Grande Valley Brownsville USA Institute of Genetic Medicine Johns Hopkins University Baltimore USA Genomics Division Lawrence Berkeley National Laboratory Berkeley USA Molecular and Human Genetics Baylor College of Medicine Houston USA Department of Translational Medical Sciences Federico II University Naples Italy Metabolon Inc Durham USA Section of Pediatric Neurology and Neuroscience Baylor College of Medicine Houston USA Tawam Hospital Abu Dhabi United Arab Emirates Stanford Medical School Stanford USA Sch
O1 The metabolomics approach to autism: identification of biomarkers for early detection of autism spectrum disorder A. K. Srivastava, Y. Wang, R. Huang, C. Skinner, T. Thompson, L. Pollard, T. Wood, F. Luo, R. Steven... 详细信息
来源: 评论
Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap
Supporting Virtualization-Aware Security Solutions Using a S...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Amani S. Ibrahim James Hamlyn-Harris John Grundy Mohamed Almorsy Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne Australia
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic ga... 详细信息
来源: 评论