咨询与建议

限定检索结果

文献类型

  • 903 篇 会议
  • 446 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 809 篇 工学
    • 601 篇 计算机科学与技术...
    • 434 篇 软件工程
    • 127 篇 控制科学与工程
    • 121 篇 信息与通信工程
    • 59 篇 电气工程
    • 49 篇 电子科学与技术(可...
    • 47 篇 机械工程
    • 47 篇 安全科学与工程
    • 38 篇 生物医学工程(可授...
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 34 篇 生物工程
    • 28 篇 仪器科学与技术
    • 25 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
    • 18 篇 交通运输工程
  • 487 篇 理学
    • 334 篇 数学
    • 81 篇 统计学(可授理学、...
    • 64 篇 系统科学
    • 63 篇 物理学
    • 45 篇 生物学
    • 25 篇 化学
  • 207 篇 管理学
    • 148 篇 管理科学与工程(可...
    • 85 篇 工商管理
    • 61 篇 图书情报与档案管...
  • 40 篇 经济学
    • 38 篇 应用经济学
  • 33 篇 医学
    • 26 篇 基础医学(可授医学...
    • 26 篇 临床医学
  • 27 篇 法学
    • 25 篇 社会学
  • 26 篇 教育学
    • 21 篇 教育学
  • 15 篇 农学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 35 篇 artificial intel...
  • 33 篇 safety
  • 31 篇 computer science
  • 28 篇 computer archite...
  • 27 篇 software
  • 23 篇 monitoring
  • 23 篇 hardware
  • 21 篇 computational mo...
  • 20 篇 application soft...
  • 18 篇 software enginee...
  • 18 篇 semantics
  • 17 篇 data models
  • 16 篇 optimization
  • 15 篇 reliability
  • 14 篇 programming prof...
  • 14 篇 system-on-chip
  • 14 篇 iec standards
  • 13 篇 functional progr...
  • 13 篇 standards
  • 13 篇 training

机构

  • 48 篇 department of ap...
  • 25 篇 department of co...
  • 18 篇 department of ap...
  • 17 篇 department of sy...
  • 17 篇 computer archite...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 13 篇 department of pr...
  • 13 篇 department of co...
  • 11 篇 department of ap...
  • 10 篇 technical univer...
  • 9 篇 department of co...
  • 9 篇 icas institute f...
  • 9 篇 department of ap...
  • 8 篇 institute for co...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of ma...
  • 7 篇 department of pr...
  • 7 篇 chair for comput...

作者

  • 43 篇 josef börcsök
  • 34 篇 pal madhumangal
  • 30 篇 ali hayek
  • 22 篇 börcsök josef
  • 20 篇 madhumangal pal
  • 19 篇 gancheva veska
  • 17 篇 veska gancheva
  • 15 篇 börcsök j.
  • 15 篇 boercsoek josef
  • 15 篇 fritzson peter
  • 14 篇 hayek ali
  • 12 篇 mondal shyamal k...
  • 12 篇 maiti manoranjan
  • 12 篇 gurkan tuna
  • 12 篇 mostafa abotaleb
  • 11 篇 mariana arghir
  • 10 篇 tuna gurkan
  • 10 篇 xue jingling
  • 10 篇 roy abi zeid dao...
  • 9 篇 roy sankar kumar

语言

  • 1,339 篇 英文
  • 23 篇 其他
  • 8 篇 中文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Computer Programming "
1372 条 记 录,以下是231-240 订阅
排序:
An automated tool for analyzing completeness of equational specifications  94
An automated tool for analyzing completeness of equational s...
收藏 引用
1994 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 1994
作者: Kapur, Deepak Institute for Programming and Logics Department of Computer Science University at Albany AlbanyNY12222 United States
Books on software engineering methodologies talk about the significance and need for designing consistent and complete specifications during the requirement analysis and design stages of a software development cycle. ... 详细信息
来源: 评论
Considering security aspects in safety environment
Considering security aspects in safety environment
收藏 引用
11th International Probabilistic Safety Assessment and Management Conference and the Annual European Safety and Reliability Conference 2012, PSAM11 ESREL 2012
作者: Ugljesa, E. Boercsoeck, J. Computer Architecture and System Programming Universität Kassel Wilhelmshöher Allee 73 Kassel Germany
The present paper deals with the quantitative analysis of the safety-related systems. The configuration of such safety-related system is composed of channels that include both detectable and undetectable failures. It ... 详细信息
来源: 评论
Checking RSC criteria for extended dixon resultant by interpolation method
Checking RSC criteria for extended dixon resultant by interp...
收藏 引用
7th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2005
作者: Yong, Feng Yaohui, Li Laboratory for Automated Reasoning and Programming Chengdu Institute of Computer Applications Academia Sinica 610041 Chengdu China
Dixon Resultant method can eliminate many variables simultaneously. It is often used to solve a system of polynomial equations. However, the Dixon matrix is often singular, and the Dixon Resultant vanishes identically... 详细信息
来源: 评论
Ensuring the reliability of remote online monitoring systems
Ensuring the reliability of remote online monitoring systems
收藏 引用
2022 International Conference on Information Science and Communications Technologies, ICISCT 2022
作者: Alexandr, Sergeev Mikhail, Sergeev Saint Petersburg State University of Aerospace Instrumentation Department of Computer Technology and Programming Saint Petersburg Russia
the issue of ensuring the reliability of the functioning of global systems of remote online monitoring of the condition of patients is considered. Remote monitoring is in demand when supervision the health status of d... 详细信息
来源: 评论
A lightweight LTL runtime verification tool for java
A lightweight LTL runtime verification tool for java
收藏 引用
19th Annual ACM Conference on Object-Oriented programming, Systems, Languages, and Applications, OOPSLA'04
作者: Bodden, Eric Computer Science II Programming Languages and Program Analysis RWTH Aachen University 52062 Aachen Germany
Runtime verification is a special form of runtime testing, employing formal methods and languages. In this work, we utilize next-time free linear-time temporal logic (LTL\X) as formal framework. The discipline serves ... 详细信息
来源: 评论
A recommender system for WordPress themes using item-based collaborative filtering technique  29
A recommender system for WordPress themes using item-based c...
收藏 引用
29th International Scientific Conference Electronics, ET 2020
作者: Ujkani, Berat Minkovska, Daniela Stoyanova, Lyudmila Technical University of Sofia Faculty of Computer Systems and Technologies Department of Programming and Computer Technologies 8 Kliment Ohridski blvd Sofia1000 Bulgaria
Recommender systems allow making personalized recommendations for items or products while browsing online, using numerous algorithms and techniques to predict and recommend potentially useful items to a specific user.... 详细信息
来源: 评论
Picture fuzzy -tolerance competition graphs with its application
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第1期15卷 547-559页
作者: Das, Sankar Poulik, Soumitra Ghorai, Ganesh Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University West Bengal Midnapore721102 India Department of Mathematics Kharagpur College West Bengal Kharagpur721305 India
In this study, the notions of picture fuzzy -tolerance competition graphs are exhibited adding more uncertainties to the fuzzy -tolerance competition graphs. Taking as max, min and sum functions three special types of... 详细信息
来源: 评论
ALGORITHMIC DEBUGGING FOR LAZY FUNCTIONAL LANGUAGES  4th
ALGORITHMIC DEBUGGING FOR LAZY FUNCTIONAL LANGUAGES
收藏 引用
4TH INTERNATIONAL SYMP ON programming LANGUAGE IMPLEMENTATION AND LOGIC programming ( PLILP 92 )
作者: NILSSON, H FRITZSON, P Programming Environments Laboratory Department of Computer and Information Science Linköping University Linköping S-581 83 Sweden
Lazy functional languages have non-strict semantics and are purely declarative, i.e. they support the notion of referential transparency and are devoid of side effects. Traditional debugging techniques are, however, n... 详细信息
来源: 评论
Implementation and comparison of machine learning classifiers for information security risk analysis of a human resources department
Implementation and comparison of machine learning classifier...
收藏 引用
International Conference on computer Information Systems and Industrial Management Applications
作者: Eminagaoglu, Mete Eren, Saban Department of Computer Programming Yasar University Izmir Turkey Department of Statistics Yasar University Izmir Turkey
The aim of this study is threefold. First, a qualitative information security risk survey is implemented in human resources department of a logistics company. Second, a machine learning risk classification and predict... 详细信息
来源: 评论
Formal specification of virtual process topologies  1
Formal specification of virtual process topologies
收藏 引用
1st IEEE computer Society International Workshop on Cluster Computing, IWCC 1999
作者: Kazemi, K. McDonald, C. Programming Languages and Systems Group Department of Computer Science University of Western Australia NedlandsWA6907 Australia
A lack of adequate and flexible topology support in the popular message passing systems such as Parallel Virtual Machine was a major factor in the development of our Virtual Process Topology Environment. This parallel... 详细信息
来源: 评论