咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4431-4440 订阅
排序:
Visualizing large trees with divide & conquer partition  13
Visualizing large trees with divide & conquer partition
收藏 引用
6th International Symposium on Visual Information Communication and Interaction, VINCI 2013
作者: Liang, Jie Simoff, Simeon Nguyen, Quang Vinh Huang, Mao Lin School of Software Faculty of Engineering and IT University of Technology Sydney NSW Australia MARCS Institute School of Computing Engineering and Mathematics University of Western Sydney Australia
While prior works on enclosure approach, guarantees the space utilization of a single geometrical area, mostly rectangle, this paper proposes a flexible enclosure tree layout method for partitioning various polygonal ... 详细信息
来源: 评论
Generating Test Cases for Context-Aware Applications Using Bigraphs
Generating Test Cases for Context-Aware Applications Using B...
收藏 引用
International Conference on Secure System Integration and Reliability Improvement, SSIRI
作者: Lian Yu Wei Tek Tsai Yanbing Jiang Jerry Gao School of Software & Microelectronics Peking University Beijing P.R. China School of Computing Info. and Decision Sys. Eng. Arizona State University Tempe Arizona USA College of Engineering San Jose State University San Jose CA USA
Context-aware applications often consist of a middleware and a collection of services, which run autonomously adaptive to the changing environments, where a variety of sensors are installed in physical facilities, wit... 详细信息
来源: 评论
DSP re-encryption based access control enforcement management mechanism in DaaS
收藏 引用
International Journal of Network Security 2013年 第1期15卷 28-41页
作者: Tian, Xiuxia Wang, Xiaoling Zhou, Aoying School of Computer and Information Engineering Shanghai University of Electric Power 2103 Pingliang Road Shanghai 200090 China Shanghai Key Lab. of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai 200062 China
With the popular use of service-oriented technologies, Database as a Service(DaaS) paradigm is becoming a more practical and useful model for those enterprises who can't afford the expensive DBMS products. However... 详细信息
来源: 评论
FIMO: A novel WiFi localization method
FIMO: A novel WiFi localization method
收藏 引用
15th Asia-Pacific Web Conference on Web Technologies and Applications, APWeb 2013
作者: Zhou, Yao Jin, Leilei Jin, Cheqing Zhou, Aoying Shanghai Key Laboratory of Trust Worthy Computing Software Engineering Institute East China Normal University Shanghai 200062 China
With the development of technology and the proliferation of mobile computing devices, people's need for pervasive computing is rapidly growing. As a critical part of pervasive computing, Location Based Service (LB... 详细信息
来源: 评论
A virtual environment for teaching technical aspects of privacy  13
A virtual environment for teaching technical aspects of priv...
收藏 引用
2013 Information Security Curriculum Development Conference, InfoSec CD 2013
作者: Peltsverger, Svetlana Zheng, Guangzhi Information Technology Department School of Computing and Software Engineering Southern Polytechnic State University Marietta GA 30060 United States
Most of Information Technology and Information Systems courses teach students about possible invasion of privacy as a result of poor information system security, not about privacy as an essential principle in informat... 详细信息
来源: 评论
Modeling a web forum ecosystem into an enriched social graph
Modeling a web forum ecosystem into an enriched social graph
收藏 引用
3rd International Workshops on Modeling Social Media, MSM 2012
作者: Anwar, Tarique Abulaish, Muhammad Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne VIC 3122 Australia New Delhi 25 India
This paper considers the community interactions in online social media (OSM) as an OSM ecosystem and addresses the problem of modeling a Web forum ecosystem into a social graph. We propose a text mining method to mode... 详细信息
来源: 评论
Topology-preserving transformation based on the correspondence of control points using radial basis functions
Topology-preserving transformation based on the corresponden...
收藏 引用
2012 3rd International Conference on Applied Mechanics and Mechanical engineering, ICAMME 2012
作者: Xuan, Yang Shanshan, Fan College of Computer Science and Software Engineering National High Performance Computing Center at Shenzhen Shenzhen University Guangdong 518060 China
For point-based image registration, transformations using radial basis functions on scattered points cause problems with topology-preservation. We propose here a topology-preserving transformation based on expansions ... 详细信息
来源: 评论
Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution
Automated Coverage-Driven Test Data Generation Using Dynamic...
收藏 引用
International Conference on Secure System Integration and Reliability Improvement, SSIRI
作者: Ting Su Geguang Pu Bin Fang Jifeng He Jun Yan Siyuan Jiang Jianjun Zhao Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China State Key Laboratory of Computer Science Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering University of Notre Dame USA School of Software Shanghai Jiao Tong University Shanghai China
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative... 详细信息
来源: 评论
Measuring the difficulty of code comprehension tasks using software metrics  15
Measuring the difficulty of code comprehension tasks using s...
收藏 引用
15th Australasian computing Education Conference, ACE 2013
作者: Kasto, Nadia Whalley, Jacqueline Software Engineering Research Laboratory School of Computing and Mathematical Sciences AUT University PO Box 92006 Auckland1142 New Zealand
In this paper we report on an empirical study into the use of software metrics as a way of estimating the difficulty of code comprehension tasks. Our results indicate that software metrics can provide useful informati... 详细信息
来源: 评论
The robustness of hollow CAPTCHAs  13
The robustness of hollow CAPTCHAs
收藏 引用
2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013
作者: Gao, Haichang Wang, Wei Qi, Jiao Wang, Xuqin Liu, Xiyang Yan, Jeff Institute of Software Engineering Xidian University Xi'an Shaanxi 710071 China School of Computing Science Newcastle University Newcastle United Kingdom
CAPTCHA is now a standard security technology for differentiating between computers and humans, and the most widely deployed schemes are text-based. While many text schemes have been broken, hollow CAPTCHAs have emerg... 详细信息
来源: 评论