咨询与建议

限定检索结果

文献类型

  • 3,265 篇 会议
  • 1,252 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,679 篇 工学
    • 2,082 篇 计算机科学与技术...
    • 1,723 篇 软件工程
    • 509 篇 信息与通信工程
    • 450 篇 控制科学与工程
    • 236 篇 生物工程
    • 224 篇 电气工程
    • 178 篇 机械工程
    • 176 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 121 篇 安全科学与工程
    • 104 篇 仪器科学与技术
    • 95 篇 土木工程
    • 94 篇 动力工程及工程热...
    • 90 篇 建筑学
    • 87 篇 交通运输工程
    • 86 篇 网络空间安全
  • 1,139 篇 理学
    • 592 篇 数学
    • 269 篇 生物学
    • 228 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
  • 830 篇 管理学
    • 584 篇 管理科学与工程(可...
    • 321 篇 工商管理
    • 320 篇 图书情报与档案管...
  • 167 篇 医学
    • 153 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 122 篇 法学
    • 99 篇 社会学
  • 100 篇 经济学
    • 100 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 37 篇 农学
  • 16 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 181 篇 computer science
  • 118 篇 computational mo...
  • 111 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 89 篇 machine learning
  • 86 篇 laboratories
  • 85 篇 accuracy
  • 83 篇 deep learning
  • 82 篇 computer archite...
  • 82 篇 training
  • 73 篇 feature extracti...
  • 72 篇 artificial intel...
  • 70 篇 data mining
  • 69 篇 systems engineer...
  • 66 篇 software testing
  • 64 篇 security
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...

机构

  • 40 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 software enginee...
  • 16 篇 college of compu...
  • 15 篇 university of ch...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 28 篇 buyya rajkumar
  • 27 篇 yingmin jia
  • 24 篇 ismail leila
  • 20 篇 zamli kamal z.
  • 20 篇 noraziah ahmad
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 14 篇 gautam biswas
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,052 篇 英文
  • 506 篇 其他
  • 28 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4589 条 记 录,以下是4021-4030 订阅
排序:
Combining Probabilistic Ranking and Latent Semantic Indexing for Feature Identification
Combining Probabilistic Ranking and Latent Semantic Indexing...
收藏 引用
IEEE Workshop on Program Comprehension
作者: D. Poshyvanyk A. Marcus V. Rajlich Y.-G. Gueheneuc G. Antoniol Department of Computer Science Wayne State University Detroit MI USA GEODES-Research Group on Open Distributed Systems Experimental Software Engineering University of Montreal Canada Department of Mathematics and Computer Science Babeş-Bolyai University Cluj-Napoca Romania Département de Génie Informatique École Polytechnique de Montréal Canada
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature lo... 详细信息
来源: 评论
Security analysis and improvement of hsu et al.'s threshold proxy signature scheme
收藏 引用
International Journal of Network Security 2006年 第1期2卷 69-72页
作者: Guo, Lifeng Cheng, Xiangguo Liu, Yang Institute of Systems Science Academy of Mathematics and System Sciences Chinese Academy of Sciences Graduate School of Chinese Academy of Sciences Beijing 100080 China 21 Heng Mui Keng Terrace Singapore State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 China Software Institute School of Electronic Engineering and Computer Science Peking University 100871 China
In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang's threshold proxy signature scheme. But in 2003 Hsu et al. pointed out that Sun's scheme suffered from a drawback and d... 详细信息
来源: 评论
Aligning software processes with strategy
收藏 引用
MIS Quarterly: Management Information systems 2006年 第4期30卷 891-918页
作者: Slaughter, Sandra A. Levine, Linda Ramesh, Balasubramaniam Pries-Heje, Jan Baskerville, Richard David A. Tepper School of Business Carnegie Mellon University Tech and Frew Streets Pittsburgh PA 15213 United States Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213 United States Computer Information Systems Department Georgia State University Atlanta GA 30303 United States IT University of Copenhagen Rued Langgaards Vej 7 DK-2300 Copenhagen S Denmark
Although increasing evidence suggests that superior performance requires alignment between firms' strategies and production processes, it is not known if such alignment is relevant for software development process... 详细信息
来源: 评论
The First Step in Security engineering and Information Assurance: Defining the System Boundaries
收藏 引用
EDPACS 2006年 第10期29卷 1-15页
作者: Debra S. Herrmann Assessment of secure mission-critical systems and networks. She is uniquely qualified because of her experience representing the United States on IEC standards committees and because the FAA has employed the Common Criteria since its inception. Ms. Herrmann has written two books: A Practical Guide to Security Engineering and Information Assurance Auerbach Publications and Software Safety and Reliability: Techniques Approaches and Standards of Key Industrial Sectors IEEE Computer Society Press.
To be effective, an information security/IA program must correspond to the reality of today's technology: distributed processing; client/server applications; mobile code; integrated audio, video, image, and textua...
来源: 评论
Meeting the Information Assurance Crisis in the U.S. Now
收藏 引用
EDPACS 2006年 第6期28卷 1-14页
作者: Corey Schou Deborah Frincke Charles Reynolds James Frost The Associate Dean of Information Systems Programs at Idaho State University (ISU) in Pocatello and the director of the Center for Decision Support. Currently he serves as the Chair of the National Colloquium on Information System Security Education. Schou also directs the ISU National Center of Excellence in Information Assurance Education and the ISU Technology Innovation Center. Contact Corey Schou one of the authors of this article and the Chair of the NCISSE by email at Schou@*** for help in finding additional ways to address the issues raised in this article. A member of the University of Idaho College of Engineering faculty. She graduated from the University of California at Davis. Frincke is the co-director and co-founder of the university's Center for Secure and Dependable Software (CSDS). She was the program chair for the 2nd International Workshop on Recent Advances in Intrusion Detection (RAID). A professor of Computer Science at the College of Integrated Science and Technology at James Madison University in Harrisonburg Virginia. He holds a Ph.D. in computer science from the University of Texas at Austin and a BA in philosophy from the University of Houston. Reynolds is the Director of Information System Security Education at James Madison University. Since 1997 Reynolds has led the development of the first remote Internet-based curriculum that leads to an M.S. degree in computer science with a concentration in information security. Thus far 160 students have completed this program. A professor of computer information systems at Idaho State University and the manager of its Simplot Decision Support Center.
T he only difference etween evolution and revolution is the speed at which each occurs.
来源: 评论
Self-stabilizing deterministic TDMA for sensor networks
收藏 引用
2nd International Conference on Distributed Computing and Internet Technology, ICDCIT 2005
作者: Arumugam, Mahesh Kulkarni, Sandeep S. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824
An algorithm for time division multiple access (TDMA) is found to be applicable in converting existing distributed algorithms into a model that is consistent with sensor networks. Such a TDMA service needs to be self-... 详细信息
来源: 评论
On the semantics of EPCs: Efficient calculation and simulation
On the semantics of EPCs: Efficient calculation and simulati...
收藏 引用
3rd Internaional Conference on Business Process Management,BPM 2005
作者: Cuntz, Nicolas Kindler, Ekkart University of Siegen Computer Graphics and Multimedia Systems Group Germany University of Paderborn Software Engineering Group Germany
Recently, we have defined a formal semantics of Event driven Process Chains (EPCs) that, for the first time, faithfully captures the non-local behaviour of the XOR- and OR-join connectors. This fixed-point characteris... 详细信息
来源: 评论
Mobile information processing incorporating location-based services
Mobile information processing incorporating location-based s...
收藏 引用
2005 3rd IEEE International Conference on Industrial Informatics, INDIN
作者: Say, Ying Lim Taniar, David Srinivasan, Bala School of Computer Science and Software Engineering Monash University Australia School of Business Systems Monash University Australia
Mobile technology has been increasingly in demand and is widely used to allow people to be connected wirelessly without having to worry about the distance barrier. Location-dependent information services have becoming... 详细信息
来源: 评论
Global indexing scheme for location-dependent queries in multi channels mobile broadcast environment
Global indexing scheme for location-dependent queries in mul...
收藏 引用
19th International Conference on Advanced Information Networking and Applications, AINA 2005
作者: Waluyo, Agustinus Borgy Srinivasan, Bala Taniar, David School of Computer Science and Software Engineering Monash University Australia School of Business Systems Monash University Australia
Broadcast indexing is necessary to be applied in a wireless broadcast environment as such the scheme helps mobile clients to find the desired data instances efficiently. This is particularly important considering the ... 详细信息
来源: 评论
On building a data broadcasting system for mobile databases
On building a data broadcasting system for mobile databases
收藏 引用
19th International Conference on Advanced Information Networking and Applications, AINA 2005
作者: Waluyo, Agustinus Borgy Goh, Gabriel Taniar, David Srinivasan, Bala School of Computer Science and Software Engineering Monash University Australia School of Business Systems Monash University Australia
Data broadcasting is a scalable mechanism to disseminate information to a large number of mobile clients in a wireless environment. Our paper concerns with developing a data broadcasting system in a mobile environment... 详细信息
来源: 评论