咨询与建议

限定检索结果

文献类型

  • 65 篇 会议
  • 62 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 131 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 95 篇 工学
    • 87 篇 计算机科学与技术...
    • 46 篇 软件工程
    • 15 篇 电气工程
    • 12 篇 控制科学与工程
    • 11 篇 信息与通信工程
    • 8 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
  • 35 篇 理学
    • 32 篇 数学
    • 4 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 6 篇 管理学
    • 4 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
  • 1 篇 哲学
    • 1 篇 哲学

主题

  • 16 篇 laboratories
  • 7 篇 software enginee...
  • 6 篇 concurrent compu...
  • 6 篇 computational mo...
  • 6 篇 algebra
  • 5 篇 computer archite...
  • 5 篇 hardware
  • 4 篇 parallel algorit...
  • 4 篇 costs
  • 4 篇 semantics
  • 4 篇 protocols
  • 4 篇 formal specifica...
  • 4 篇 formal methods
  • 4 篇 functional progr...
  • 4 篇 field programmab...
  • 3 篇 prototypes
  • 3 篇 discrete event s...
  • 3 篇 parallel program...
  • 3 篇 interference
  • 3 篇 programmable log...

机构

  • 18 篇 programming rese...
  • 6 篇 oxford universit...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 oxford universit...
  • 3 篇 oxford universit...
  • 3 篇 computing labora...
  • 2 篇 oxford universit...
  • 2 篇 programming rese...
  • 2 篇 international in...
  • 2 篇 programming rese...
  • 2 篇 programming rese...
  • 2 篇 programming rese...
  • 2 篇 oxford universit...
  • 2 篇 institute of nuc...
  • 2 篇 programming rese...
  • 2 篇 programming rese...
  • 2 篇 oxford universit...

作者

  • 7 篇 hoare car
  • 5 篇 bowen jonathan
  • 4 篇 w. luk
  • 4 篇 he jf
  • 4 篇 sanders j.w.
  • 4 篇 he jifeng
  • 3 篇 m.y.h. low
  • 3 篇 jifeng he
  • 3 篇 j. e. nicholls
  • 3 篇 wood kenneth r.
  • 2 篇 hoare c.a.r.
  • 2 篇 j. graham-cummin...
  • 2 篇 josephs mark b.
  • 2 篇 schneider steve
  • 2 篇 woodcock j.c.p.
  • 2 篇 lano k
  • 2 篇 k.r. sujithan
  • 2 篇 mosses p.d.
  • 2 篇 jones g
  • 2 篇 udding jan tijme...

语言

  • 126 篇 英文
  • 5 篇 其他
检索条件"机构=Computing Laboratory Programming Research Group"
131 条 记 录,以下是121-130 订阅
排序:
On the social organisation of organisations
收藏 引用
Computer Supported Cooperative Work 1992年 第1-2期1卷 95-118页
作者: Jirotka, Marina Gilbert, Nigel Luff, Paul Centre for Requirements and Foundations Programming Research Group University of Oxford Computing Laboratory Oxford OX1 3QD United Kingdom Social and Computer Sciences Research Group Department of Sociology University of Survey Guildford GU2 5XH United Kingdom Department of Sociology University of Surrey Guildford GU2 5XH United Kingdom Rank Xerox Cambridge EuroPARC Cambridge CB2 1AB 61 Regent Street United Kingdom
This paper considers a range of theoretical approaches to the understanding of organisations and the implications these views have for the design of computer supported cooperative work systems. Organisations have ofte... 详细信息
来源: 评论
How to prevent type flaw attacks on security protocols
How to prevent type flaw attacks on security protocols
收藏 引用
作者: Heather, James Lowe, Gavin Schneider, Steve Department of Computing Sch. of Electron. Comp./Mathematics University of Surrey Guildford Surrey GU2 7XH United Kingdom Programming Research Group Computing Laboratory Oxford University Parks Road Oxford OX1 3QD United Kingdom Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX United Kingdom
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number of type flaw attacks have appeared in the... 详细信息
来源: 评论
Weakest specifunctions for BSP
收藏 引用
Parallel Processing Letters 2001年 第4期11卷 439-454页
作者: Chen, Yifeng Sanders, J.W. Department of Maths and Computer Science University of Leicester University Road Leicester LE1 7RH United Kingdom Programming Research Group Oxford University Computing Laboratory Parks Road Oxford OX1 3QD United Kingdom
This paper introduces a calculus of weakest specification for supporting reuse of established components in deriving a design (in the sense of formal methods). The weakest specifunction generalizes the notions of weak... 详细信息
来源: 评论
Machine intelligibility and the duality principle
British Telecom technology journal
收藏 引用
British Telecom technology journal 1996年 第4期14卷 15-23页
作者: Muggleton, S. Michie, D. Wolfson College Oxford United Kingdom University of Tokyo Turing Institute Glasgow United Kingdom Intelligent Systems Research Group BT Laboratories Inductive Logic Programming Oxford University Press Logic Programming ILP Oxford Univ. Computing Laboratory University of Edinburgh Royal Society of Edinburgh British Computer Society
Lack of machine intelligibility in human/computer interactions can be traced to present approaches in software design. From the duality principle, software involved in human/computer software interaction contains two ... 详细信息
来源: 评论
Implementation lessons of performance prediction tool for parallel conservative simulation  6
收藏 引用
6th International European Conference on Parallel computing, Euro-Par 2000
作者: Lim, Chu-Cheow Low, Yoke-Hean Gan, Boon-Ping Cai, Wentong Intel Corporation SC12-305 2000 Mission College Blvd Santa ClaraCA95052-8119 United States Programming Research Group Oxford University Computing Laboratory University of Oxford OxfordOX1 3QD United Kingdom Gintic Institute of Manufacturing Technology 71 Nanyang Drive Singapore638075 Singapore Center for Advanced Information Systems School of Applied Science Nanyang Technological University Singapore639798 Singapore
Performance prediction is useful in helping parallel programmers answer questions such as speedup scalability. Performance prediction for parallel simulation requires first working out the performance analyzer algorit... 详细信息
来源: 评论
Formal Methods and Software Safety
收藏 引用
IFAC Proceedings Volumes 1992年 第30期25卷 93-98页
作者: J.P. Bowen V. Stavridou Oxford University Computing Laboratory Programming Research Group 11 Keble Road Oxford OX1 3QD UK Department of Computer Science Royal Holloway and Bedford New College University of London Egham Hill Egham Surrey TW20 0EX UK
The safety of software is becoming increasingly important as computers pervade control systems on which human life depends. Whilst hardware has become significantly more reliable over the years, the same cannot be sai... 详细信息
来源: 评论
Scientific Data Lake for High Luminosity LHC project and other data-intensive particle and astro-particle physics experiments  5
Scientific Data Lake for High Luminosity LHC project and oth...
收藏 引用
5th International Conference on Particle Physics and Astrophysics, ICPPA 2020
作者: Alekseev, A. Kiryanov, A. Klimentov, A. Korchuganova, T. Mitsyn, V. Oleynik, D. Smirnov, A. Smirnov, S. Zarochentsev, A. Compiler Technology Department Ivannikov Institute for System Programming of the Ras Moscow109004 Russia Cloud Technologies and Big Data Analytics Laboratory Plekhanov Russian University of Economics Moscow117997 Russia Atlas Group Universidad Andres Bello Santiago7550196 Chile Department of Computing Resources and Technologies Nrc "kurchatov Institute"-PNPI Gatchina188300 Russia Physics Department Brookhaven National Laboratory UptonNY11973 United States Laboratory of Information Technologies Joint Institute for Nuclear Research Dubna141980 Russia Institute of Nuclear Physics and Engineering National Research Nuclear University MEPhI Moscow115409 Russia Laboratory of Ultra-High Energy Physics Saint Petersburg State University Saint Petersburg198504 Russia
The next phase of LHC Operations-High Luminosity LHC (HL-LHC), which is aimed at ten-fold increase in the luminosity of proton-proton collisions at the energy of 14 TeV, is expected to start operation in 2027-2028 and... 详细信息
来源: 评论
How to prevent type flaw attacks on security protocols
收藏 引用
Journal of Computer Security 2003年 第2期11卷 217-244页
作者: Heather, James Lowe, Gavin Schneider, Steve Department of Computing School of Electronics Computing and Mathematics University of Surrey Guildford Surrey GU2 7XH UK. E-mail: Programming Research Group Oxford University Computing Laboratory Wolfson Building Parks Road Oxford OX1 3QD UK. E-mail: Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX UK. E-mail:
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number of type flaw attacks have appeared in the...
来源: 评论
PRAM programming: in theory and in practice
收藏 引用
Concurrency and Computation: Practice and Experience 2000年 第4期12卷
作者: D. S. Lecomber C. J. Siniolakis K. R. Sujithan Programming Research Group Oxford University Computing Laboratory Oxford OX1 3QD U.K.
That the influence of the PRAM model is ubiquitous in parallel algorithm design is as clear as the fact that it is technologically infeasible for the forseeable future. The current generation of parallel hardware prom... 详细信息
来源: 评论
Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1993年 670 LNCS卷
作者: Woodcock, James C. P. Oxford University Computing Laboratory Programming Research Group 11 Keble Road OxfordOX1 3QD United Kingdom
来源: 评论