咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,662 篇 工学
    • 2,070 篇 计算机科学与技术...
    • 1,715 篇 软件工程
    • 494 篇 信息与通信工程
    • 430 篇 控制科学与工程
    • 236 篇 生物工程
    • 218 篇 电气工程
    • 177 篇 机械工程
    • 175 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 316 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 120 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 118 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 74 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,356 篇 英文
  • 164 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4551 条 记 录,以下是4261-4270 订阅
排序:
Reliable backup routing in fault tolerant real-time networks
Reliable backup routing in fault tolerant real-time networks
收藏 引用
IEEE International Conference on Networks
作者: V. Rajeev C.R. Muthukrishnan Hughes Software Systems Limited Gurgaon India Department of Computer Science and Engineering Indian Institute of Technology Chennai India
Broadband integrated services digital networks (B-ISDN) are aimed to transport both real-time traffic and non real-time traffic. Many of these applications require quality of service (QoS) guarantees. In the literatur... 详细信息
来源: 评论
DSP application in e-commerce security
DSP application in e-commerce security
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jiankun Hu Ziping Xi A. Jennings H.Y.J. Lee D. Wahyudi Software & Networks Discipline School of Electrical and Computer Systems Engineering Royal Melbourne Institute of Technology University Melbourne Australia
This is a case study on using a DSP board to construct an encryption/decryption module embedded in a e-commerce Web server. The idea of using DSP is to push beyond the key length limits of encryption/decryption algori... 详细信息
来源: 评论
Measuring object-orientedness: The invocation profile  10th
收藏 引用
10th International Workshop on software Measurement, IWSM 2000
作者: Rosner, Peter Hall, Tracy Mayer, Tobias Centre for Systems and Software Engineering South Bank University Borough Rd LondonSE1 0AA United Kingdom Department of Computer Science University of Hertfordshire Hatfield HertfordshireAL10 8AB United Kingdom
This paper introduces the invocation profile as the basis for a suite of metrics to indicate the presence and mix of object-oriented mechanisms in a system written in an object-oriented language. This addresses concer... 详细信息
来源: 评论
Active resource management for the differentiated services environment
Active resource management for the differentiated services e...
收藏 引用
International Workshop on Active Middleware Services
作者: A. Ramanathan M. Parashar The Applied Software Systems Laboratory Department of Electrical and Computer Engineering State University of New Jersey Rutgers Piscataway NJ USA
This paper presents a mechanism for active resource management (ARM) in a differentiated services environment.. While the differentiated services architecture and the bandwidth broker agent provide a mechanism for QoS... 详细信息
来源: 评论
Federated data mining services and a supporting XML-based language
Federated data mining services and a supporting XML-based la...
收藏 引用
Annual Hawaii International Conference on System Sciences (HICSS)
作者: S. Krishnaswamy A. Zaslavsky S.W. Loke School of Computer Science & Software Engineering Monash University Caulfield Australia CRC for Enterprise Distributed Systems Technology Caulfield Australia
E-businesses are increasingly looking towards data mining systems for meeting their business intelligence needs. However, the current state of the art in data mining does not allow any one system to be able to meet th... 详细信息
来源: 评论
Performance evaluation of multiple regions-of-interest query for accessing image databases
Performance evaluation of multiple regions-of-interest query...
收藏 引用
International Symposium on Intelligent Multimedia, Video and Speech Processing
作者: O. Huseyin T. Chen H.R. Wu School of Computer Science and Software Engineering Monash University Clayton Australia Visual Information Systems Sarnoff Corporation Princeton NJ USA
The paper addresses two fundamental aspects of content based image retrieval (CBIR) systems: visual feature extraction and retrieval system design which uses multiple regions-of-interest (ROIs) as the key to retrieve ... 详细信息
来源: 评论
Defect content estimation for two reviewers
Defect content estimation for two reviewers
收藏 引用
International Symposium on software Reliability engineering (ISSRE)
作者: C. Wohlin H. Petersson M. Host P. Runeson Department of Software Engineering and Computer Science Blekinge Institute of Technology Ronneby Sweden Department of Communication Systems Lund University Lund Sweden
Estimation of the defect content is important to enable quality control throughout the software development process. Capture-recapture methods and curve fitting methods have been suggested as tools to estimate the def... 详细信息
来源: 评论
A family-oriented software development process for engine controllers
收藏 引用
Lecture Notes in computer Science
作者: Allenby, Karen Burton, Simon Buttle, Darren McDermid, John Murdoch, John Stephenson, Alan Bardill, Mike Hutchesson, Stuart Rolls-Royce University Technology Centre in Systems and Software Engineering Department of Computer Science University of York YorkYO10 5DD United Kingdom Rolls-Royce Plc Control Systems SinC-3 P.O. Box 31 Moor Lane DerbyDE24 8BJ United Kingdom
This paper presents a software engineering process that includes family-based aspects for aero-engine control software. The process uses a "family capability" derived from family analysis of the embedding sy... 详细信息
来源: 评论
IDEA - An information superstructure  2
IDEA - An information superstructure
收藏 引用
2nd DARPA Information Survivability Conference and Exposition (DISCEX II)
作者: Tallet, JO Henning, RR Fox, KL IDEA Project United States Harris' Software Architecture Tools Methods and Technology Team United States Harris Corporation's Government Communications Systems Division United States Information Assurance Center of Excellence United States Harris Engineering Process Group United States IEEE IEEE Computer Society United States
This past October, the Associated Press reported that for over a month hackers effectively penetrated Microsoft's firewall and, potentially, had access to source code for future products. Over the past year, repor... 详细信息
来源: 评论
Advances in software specification and verification introduction to minitrack
Advances in software specification and verification introduc...
收藏 引用
Annual Hawaii International Conference on System Sciences (HICSS)
作者: A.E.K. Sobel R.C. Linger Computer Science & Systems Analysis Department Miami University Oxford OH USA Software Engineering Institute Carnegie Mellon University Pittsburgh PA USA
Provides an overview of the technical articles and features presented in this minitrack.
来源: 评论