咨询与建议

限定检索结果

文献类型

  • 906 篇 会议
  • 448 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 810 篇 工学
    • 602 篇 计算机科学与技术...
    • 434 篇 软件工程
    • 128 篇 控制科学与工程
    • 121 篇 信息与通信工程
    • 59 篇 电气工程
    • 49 篇 电子科学与技术(可...
    • 47 篇 机械工程
    • 47 篇 安全科学与工程
    • 38 篇 生物医学工程(可授...
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 34 篇 生物工程
    • 28 篇 仪器科学与技术
    • 25 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
    • 18 篇 交通运输工程
  • 489 篇 理学
    • 335 篇 数学
    • 81 篇 统计学(可授理学、...
    • 64 篇 物理学
    • 64 篇 系统科学
    • 45 篇 生物学
    • 25 篇 化学
  • 208 篇 管理学
    • 148 篇 管理科学与工程(可...
    • 87 篇 工商管理
    • 61 篇 图书情报与档案管...
  • 42 篇 经济学
    • 40 篇 应用经济学
  • 33 篇 医学
    • 26 篇 基础医学(可授医学...
    • 26 篇 临床医学
  • 27 篇 法学
    • 25 篇 社会学
  • 27 篇 教育学
    • 22 篇 教育学
  • 15 篇 农学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 35 篇 artificial intel...
  • 33 篇 safety
  • 31 篇 computer science
  • 28 篇 computer archite...
  • 27 篇 software
  • 23 篇 monitoring
  • 23 篇 hardware
  • 21 篇 computational mo...
  • 20 篇 application soft...
  • 18 篇 software enginee...
  • 18 篇 semantics
  • 17 篇 data models
  • 16 篇 optimization
  • 15 篇 reliability
  • 14 篇 programming prof...
  • 14 篇 system-on-chip
  • 14 篇 iec standards
  • 13 篇 functional progr...
  • 13 篇 standards
  • 13 篇 training

机构

  • 47 篇 department of ap...
  • 25 篇 department of co...
  • 18 篇 department of ap...
  • 17 篇 department of sy...
  • 17 篇 computer archite...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 13 篇 department of pr...
  • 13 篇 department of co...
  • 11 篇 department of ap...
  • 10 篇 technical univer...
  • 9 篇 department of co...
  • 9 篇 icas institute f...
  • 9 篇 department of ap...
  • 8 篇 institute for co...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of ma...
  • 7 篇 department of pr...
  • 7 篇 chair for comput...

作者

  • 43 篇 josef börcsök
  • 34 篇 pal madhumangal
  • 30 篇 ali hayek
  • 22 篇 börcsök josef
  • 20 篇 madhumangal pal
  • 19 篇 gancheva veska
  • 17 篇 veska gancheva
  • 15 篇 börcsök j.
  • 15 篇 boercsoek josef
  • 15 篇 fritzson peter
  • 14 篇 hayek ali
  • 12 篇 mondal shyamal k...
  • 12 篇 maiti manoranjan
  • 12 篇 gurkan tuna
  • 12 篇 mostafa abotaleb
  • 11 篇 mariana arghir
  • 10 篇 tuna gurkan
  • 10 篇 xue jingling
  • 10 篇 roy abi zeid dao...
  • 9 篇 roy sankar kumar

语言

  • 1,334 篇 英文
  • 32 篇 其他
  • 8 篇 中文
  • 1 篇 日文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Computer Programming"
1377 条 记 录,以下是801-810 订阅
排序:
Sophisticated Calculation of the 1oo4-architecture for Safety-related Systems Conforming to IEC61508
收藏 引用
Journal of Physics: Conference Series 2012年 第1期364卷
作者: A Hayek M Al Bokhaiti M H Schwarz J Boercsoek To whom any correspondence should be addressed Institute of Computer Architecture and System Programming University of Kassel Wilhelmshoeher Allee 71 34121 Kassel Germany
With the publication and enforcement of the standard IEC 61508 of safety related systems, recent system architectures have been presented and evaluated. Among a number of techniques and measures to the evaluation of s...
来源: 评论
Security as a service model in SOA
Security as a service model in SOA
收藏 引用
11th WSEAS International Conference on AIC'11, 4th WSEAS International Conference on BEBI'11, International Conference on Environment, Economics, Energy, Devices, Systems, Communications, computers, Pure and Applied Mathematics
作者: Georgieva, Juliana Goranova, Mariana Department of Programming and Computer Technologies Technical University of Sofia Bul. Kl. Ohridski 8 bl. 2 Sofia Bulgaria
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the syste... 详细信息
来源: 评论
XML to DRF scientific data transformation
XML to DRF scientific data transformation
收藏 引用
作者: Gancheva, Veska Department of Programming and Computer Technologies Technical University of Sofia 8 Kliment Ohridski Boul. 1756 Sofia Bulgaria
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to prop... 详细信息
来源: 评论
Security goals assurance based on software active monitoring
Security goals assurance based on software active monitoring
收藏 引用
International Conference on Secure Software Integration and Reliability Improvement
作者: Zhao, Changzhi Dong, Wei Leucker, Martin Qi, Zhichang Department of Computer Science National University of Defense Technology Changsha 410073 China Institute of Software Technology and Programming Languages University of Lubeck Germany
Access control is a vital security mechanism in today's operating systems and the security policies dictating the security relevant behaviors is lengthy and complex for example in Security-Enhanced Linux (SELinux)... 详细信息
来源: 评论
A lambda term representation inspired by linear ordered logic  6
A lambda term representation inspired by linear ordered logi...
收藏 引用
6th International Workshop on Logical Frameworks and Meta-Languages: Theory and Practice, LFMTP 2011
作者: Abel, Andreas Kraus, Nicolai Institut Fur Informatik Theoretical Computer Science Ludwig-Maximilians-Universität München Germany Functional Programming Laboratory School of Computer Science University of Nottingham Nottingham United Kingdom
We introduce a new nameless representation of lambda terms inspired by ordered logic. At a lambda abstraction, number and relative position of all occurrences of the bound variable are stored, and application carries ... 详细信息
来源: 评论
A new involutory 4×4 MDS matrix for the AES-like block ciphers
收藏 引用
International Review on computers and Software 2011年 第1期6卷 96-103页
作者: Aslan, Füsun Yavuzer Sakall, M. Tolga Aslan, Bora Bulut, Selma Computer Engineering Department Trakya University Turkey Computer Programming Department Kirklareli University Turkey
Maximum Distance Separable (MDS) codes are used as diffusion layers in the design of the well known block ciphers like the Advanced Encryption Standard (AES) and Khazad. The reason for the use of MDS codes in the desi... 详细信息
来源: 评论
Approach to predict the software reliability with different methods
Approach to predict the software reliability with different ...
收藏 引用
International Conference on Electrical and Electronics Engineering, ELECO
作者: Ossmane Krini Josef Börcsök Computer Architecture and System Programming University of Kassel Germany
This particular essay expounds upon how one can foresee and predict software reliability. There are two major components that exist within a computer system: hardware and software. The reliabilities between the two ar... 详细信息
来源: 评论
Towards safe data flow processing by integration of design by contract in deterministic UML activities
Towards safe data flow processing by integration of design b...
收藏 引用
2011 23rd International Symposium on Information, Communication and Automation Technologies, ICAT 2011
作者: Daw, Zamira Vetter, Marcus Boercsoek, Josef Institute of Embedded Systems Hochschule Mannheim - University of Applied Sciences Mannheim Germany Dept. of Computer Architecture and System Programming University of Kassel Kassel Germany
Data flow processing is a common task of embedded systems which is usually modeled as a pipeline. Errors in a block of this pipeline can be propagated through it thus leading to unexpected and erroneous behaviors. For... 详细信息
来源: 评论
Information System for Administrative Services of Educational Process
收藏 引用
computer Technology and Application 2011年 第5期2卷 354-357页
作者: Lyudmilla Yordanova Stoyanova Department of Programming and Computer Technology Faculty of Computer Systems and Control Technical University of SofiaSofia 1000 Bulgaria
The goal of this paper is to analyze and propose a reconstruction of functional possibilities and database requirements of a Web based Educational Information system. For the research the Information system of the Tec... 详细信息
来源: 评论
The technique for computer systems Trojan diagnosis in the monitor mode
The technique for computer systems Trojan diagnosis in the m...
收藏 引用
IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
作者: Segiy Lysenko Oleg Savenko System programming Department Khmelnitsky National University Khmelnitskiy Ukraine Computer Systems and Programming Faculty Lecturer of System programming Department Khmelnitsky National University Khmelnitskiy Ukraine
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
来源: 评论