咨询与建议

限定检索结果

文献类型

  • 2,053 篇 会议
  • 871 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,735 篇 工学
    • 1,336 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 331 篇 信息与通信工程
    • 299 篇 控制科学与工程
    • 165 篇 生物工程
    • 146 篇 电气工程
    • 119 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 84 篇 安全科学与工程
    • 83 篇 光学工程
    • 73 篇 动力工程及工程热...
    • 66 篇 土木工程
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
  • 777 篇 理学
    • 415 篇 数学
    • 190 篇 生物学
    • 147 篇 系统科学
    • 145 篇 物理学
    • 126 篇 统计学(可授理学、...
    • 67 篇 化学
  • 505 篇 管理学
    • 357 篇 管理科学与工程(可...
    • 200 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 128 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 80 篇 法学
    • 62 篇 社会学
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 54 篇 教育学
    • 54 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 134 篇 computer science
  • 76 篇 computational mo...
  • 75 篇 application soft...
  • 71 篇 deep learning
  • 71 篇 accuracy
  • 70 篇 laboratories
  • 69 篇 machine learning
  • 68 篇 software systems
  • 66 篇 software
  • 61 篇 computer archite...
  • 60 篇 training
  • 59 篇 artificial intel...
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 48 篇 security
  • 47 篇 grid computing
  • 46 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 institute for so...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 34 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,697 篇 英文
  • 266 篇 其他
  • 16 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Engineering and Software Systems Department"
2980 条 记 录,以下是2671-2680 订阅
排序:
A distributed approach to topology-aware overlay path monitoring
A distributed approach to topology-aware overlay path monito...
收藏 引用
International Conference on Distributed Computing systems
作者: C. Tang P.K. McKinley Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Path probing is essential to maintain an efficient overlay network topology. However, the cost of complete probing can be as high as O(n/sup 2/), which is prohibitive in large-scale overlay networks. Recently we propo... 详细信息
来源: 评论
Transparent self-optimization in existing CORBA applications
Transparent self-optimization in existing CORBA applications
收藏 引用
International Conference on Autonomic Computing (ICAC)
作者: S.M. Sadjadi P.K. McKinley Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
This paper addresses the design of adaptive middleware to support autonomic computing in pervasive computing environments. The particular problem we address here is how to support self-optimization to changing network... 详细信息
来源: 评论
Generation of self-optimizing wireless network applications
Generation of self-optimizing wireless network applications
收藏 引用
International Conference on Autonomic Computing (ICAC)
作者: S.M. Sadjadi P.K. McKinley R.E.K. Stirewalt B.H.C. Cheng Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Adaptable applications are difficult to develop and maintain especially if adaptive code, which implements the adaptive behavior, is tangled into functional code, which implements the imperative behavior. Our work inv... 详细信息
来源: 评论
Automated analysis of timing information in UML diagrams  04
Automated analysis of timing information in UML diagrams
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: S. Konrad L.A. Campbell B.H.C. Cheng Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
This work introduces an approach to adding timing information to UML diagrams for modeling embedded systems. In order to perform automated formal analysis of these UML diagrams with timing information, we extend a pre... 详细信息
来源: 评论
Constraint-guided dynamic reconfiguration in sensor networks
Constraint-guided dynamic reconfiguration in sensor networks
收藏 引用
International Symposium on Information Processing in Sensor Networks (IPSN)
作者: S. Kogekar S. Neema B. Eames X. Koutsoukos A. Ledeczi M. Maroti Institute for Software integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University Nashville TN USA
This work presents an approach for dynamic software reconfiguration in sensor networks. Our approach utilizes explicit models of the design space of the embedded application. The design space is captured by formally m... 详细信息
来源: 评论
A component-based programming model for autonomic applications
A component-based programming model for autonomic applicatio...
收藏 引用
International Conference on Autonomic Computing (ICAC)
作者: Hua Liu M. Parashar S. Hariri The Applied Software Systems Laboratory Department of Electrical and Computer Engineering Rutgers University Piscataway NJ USA Department of Electrical and Computer Engineering University of Arizona Tucson AZ USA
The emergence of pervasive wide-area distributed computing environments, such as pervasive information systems and computational grids, has enabled new generations of applications that are based on seamless access, ag... 详细信息
来源: 评论
Utilising push and pull mechanism in wireless e-health environment
Utilising push and pull mechanism in wireless e-health envir...
收藏 引用
IEEE International Conference on e-Technology, e-Commerce and e-Service
作者: A.B. Waluyo R. Hsieh D. Taniar W. Rahayu Bala Srinivasan School of Computer Science and Software Engineering Monash University Australia Department of Computer Science and Computer Engineering La Trobe University Australia School of Business Systems Monash University Australia
The emerging of wireless computing motivates radical changes of how information is derived. Our paper concerns with developing push and pull based application in wireless environment. We use a simplified e-health (hos... 详细信息
来源: 评论
Bi-criteria model for locating a semi-desirable facility on a plane using particle swarm optimization
Bi-criteria model for locating a semi-desirable facility on ...
收藏 引用
Congress on Evolutionary Computation
作者: H. Yapicioglu G. Dozier A.E. Smith Department of Industrial and Systems Engineering Aubum University Auburn AL USA Department of Computer Science and Software Engineering Aubum University Auburn AL USA
The problem of locating a semi-desirable facility on a plane is considered. A bi-criteria model is used. One of the criteria is well known minimum criterion. The second criterion is a weighted sum of Euclidean distanc... 详细信息
来源: 评论
A replicated experiment of usage-based and checklist-based reading
A replicated experiment of usage-based and checklist-based r...
收藏 引用
International Symposium on software Metrics
作者: T. Thelin C. Andersson P. Runeson N. Dzamashvili-Fogelstrom Department of Communication Systems Lund University Lund Sweden Department of Software Engineering and Computer Science Blekinge Institute of Technology Ronneby Sweden
software inspection is an effective method to detect faults in software artefacts. Several empirical studies have been performed on reading techniques, which are used in the individual preparation phase of software in... 详细信息
来源: 评论
An authorization model for multimedia digital libraries
收藏 引用
International Journal on Digital Libraries 2004年 第3期4卷 139-155页
作者: Kodali, Naren Farkas, Csilla Wijesekera, Duminda Department of Information and Software Engineering George Mason University Fairfax VA 22030-4444 United States Center for Secure Information Systems George Mason University Fairfax VA 22030-4444 United States Information Security Laboratory University of South Carolina Columbia SC 29208 United States Department of Computer Science and Engineering University of South Carolina Columbia SC 29208 United States
In this paper we present a generalized authorization model for multimedia digital libraries. Our aim is to support the enforcement of access control requirements of the original data sources without the need to create... 详细信息
来源: 评论