咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4461-4470 订阅
排序:
Improvement of key in ZigBee wireless network
收藏 引用
Information Technology Journal 2013年 第18期12卷 4593-4596页
作者: Li, Wenjie Cao, Qianqian Liu, Zhuzi Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology China
Zigbee provides a connection to a variety of wireless devices and solves the problem of the communicating between different protocols. ZigBee can provide wireless communication which is low rate, low complexity, short... 详细信息
来源: 评论
Recovering software architectural knowledge from documentation using conceptual model  25
Recovering software architectural knowledge from documentati...
收藏 引用
25th International Conference on software engineering and Knowledge engineering, SEKE 2013
作者: Shahin, Mojtaba Liang, Peng Li, Zengyang State Key Lab of Software Engineering Computer School Wuhan University China Department of Computer Engineering Islamic Azad University Neyriz Branch Iran Department of Computing Science University of Groningen Netherlands
software architectural knowledge (AK) is the integrated representation of the software architecture (SA) of a software-intensive system, the architectural design decisions, and the external context/environment. AK ann... 详细信息
来源: 评论
A universal heterogeneous data integration standard and parse algorithm in real-time database
A universal heterogeneous data integration standard and pars...
收藏 引用
2012 International Conference on Information Technology and software engineering, ITSE 2012
作者: Chang, Fei Zhu, Li Liu, Jin Yuan, Jin Deng, Xiaoxia China Academic of Engineering Physics Computer Application Institute Mianyang Sichuan China School of Software Engineering Xi'an Jiaotong University Xi'an China School of Computing National University of Singapore Singapore Singapore
The online automatic monitoring is a hot topic in the real-time application. Generally, the real-time data could come from different sources with different formats, resulting in difficulty in data parsing. To solve th... 详细信息
来源: 评论
Landscape image composition analysis based on image processing and curve fitting
Landscape image composition analysis based on image processi...
收藏 引用
2013 5th International Conference on Computational and Information Sciences, ICCIS 2013
作者: Yang, Hengxiang Wang, Xiujin Bai, Lifang School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University Tianjin China Department of Software Engineering Tianjin University Tianjin China
The composition of the landscape image can convey the emotion of cameramen. Proposed in this article is one novel technique for landscape image composition analysis, which could lay the foundation for the further anal... 详细信息
来源: 评论
A Cynefin Based Approach to Process Model Tailoring and Goal Alignment
A Cynefin Based Approach to Process Model Tailoring and Goal...
收藏 引用
International Conference on the Quality of Information and Communications Technology (QUATIC)
作者: Marion Lepmets Rory V. O'Connor Aileen Cater-Steel Antoni Lluís Mesquida Tom McBride Regulated Software Research Centre Dundalk Institute of Technology Dundalk Ireland Faculty of Business Education Law and Arts University of Southern Queensland Toowoomba Australia Department of Mathematics and Computer Science University of the Balearic Islands Palma de Mallorca Spain School of Computing Dublin City University Dublin Ireland Faculty of Engineering and IT University of Technology Sydney Sydney Australia
In an industrial context all process models require a certain amount of tailoring to fit to the business environment of any specific organization in which the model is to be deployed. Process models should therefore b... 详细信息
来源: 评论
Learning mobile security with android security labware  13
Learning mobile security with android security labware
收藏 引用
44th ACM Technical Symposium on Computer Science Education, SIGCSE 2013
作者: Guo, Minzhe Bhattacharya, Prabir Yang, Ming Qian, Kai Yang, Li School of Computing Sciences and Informatics University of Cincinnati Cincinnati OH 45221 United States School of Computing and Software Engineering Southern Polytechnic State University Marietta GA 30060 United States Department of Computer Science and Engineering University of Tennessee at Chattanooga Chattanooga TN 37403 United States
As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources... 详细信息
来源: 评论
SRA tool: SOFL-based requirements analysis tool
SRA tool: SOFL-based requirements analysis tool
收藏 引用
9th International Conference on computing and Information Technology, IC2IT 2013
作者: Mat, A.R. Masli, A.B. Burhan, N.H. Liu, S. Department of Computing and Software Engineering Faculty of Computer Science and IT Universiti Malaysia Sarawak Kota Samarahan Sarawak Malaysia Department of Computer and Information Sciences Hosei University Tokyo Japan
Capturing requirements in order to produce a complete and accurate specification for developing software systems requires a deep understanding of domain knowledge. It becomes more difficult if the system analyst is de... 详细信息
来源: 评论
Query generation for semantic datasets  13
Query generation for semantic datasets
收藏 引用
7th International Conference on Knowledge Capture: "Knowledge Capture in the Age of Massive Web Data", K-CAP 2013
作者: Pan, Jeff Z. Ren, Yuan Wu, Honghan Zhu, Man Department of Computing Science University of Aberdeen United Kingdom College of Computer and Software Nanjing University of Information and Technology China School of Computer Science and Engineering Southeast University China
Due to the increasing volume of and interconnections between semantic datasets, it becomes a challenging task for novice users to know what are included in a dataset, how they can make use of them, and particularly, w... 详细信息
来源: 评论
A petri net based public-key cryptosystem
A petri net based public-key cryptosystem
收藏 引用
2013 International Conference on Vehicle and Mechanical engineering and Information Technology, VMEIT 2013
作者: Zhou, Hui Ding, Zuo Hua Huang, Hong Yun Lab of Intelligent Computing and Software Engineering Zhejiang Sci-Tech University Hangzhou Zhejiang 310018 China Library Zhejiang Sci-Tech University Hangzhou Zhejiang 310018 China
In this paper, we present a new method to build public-key Cryptosystem. The method is based on the state explosion problem occurred in the computing of average number of tokens in the places of Stochastic Petri Net (... 详细信息
来源: 评论
An intelligent framework for auto-filling web forms from different web applications
An intelligent framework for auto-filling web forms from dif...
收藏 引用
2013 IEEE 9th World Congress on Services, SERVICES 2013
作者: Wang, Shaohua Zou, Ying Upadhyaya, Bipin Ng, Joanna School of Computing Queen's University Kingston Canada Electronical and Computer Engineering Queen's University Kingston Canada CAS Research IBM Canada Software Laboratory Markham ON Canada
Nowadays, people use on-line services to conduct various tasks such as on-line shopping and holiday trip planning using web applications. Generally users are required to enter information into web forms to interact wi... 详细信息
来源: 评论