咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4471-4480 订阅
排序:
An improved two-sided assembly line balancing algorithm based on heuristic rules
收藏 引用
2nd International Symposium on Manufacturing Systems engineering, ISMSE 2013
作者: Gao, Yan Chang, Tian Xiang Wang, Yang Yang Liu, Yao Quan, Hong Yan Xu, Jian Zhong Institute of Software and Engineering Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Institute of Computer Science and Technology Nanchang Army Collage Shanghai China
According to "Assemble line balancing (ALB)" problem which is widespread in manufacture, we establish a mathematical model and present our improved algorithm that is based on Heuristic rules, which adopt cum... 详细信息
来源: 评论
Zero knowledge proofs from ring-LWE
Zero knowledge proofs from ring-LWE
收藏 引用
12th International Conference on Cryptology and Network Security, CANS 2013
作者: Xie, Xiang Xue, Rui Wang, Minqian Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China
Zero-Knowledge proof is a very basic and important primitive, which allows a prover to prove some statement without revealing anything else. Very recently, Jain et al. proposed very efficient zero-knowledge proofs to ... 详细信息
来源: 评论
Membership encryption and its applications
Membership encryption and its applications
收藏 引用
18th Australasian Conference on Information Security and Privacy, ACISP 2013
作者: Guo, Fuchun Mu, Yi Susilo, Willy Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia Department of Computing Faculty of Science Macquarie University Sydney NSW Australia
We propose a new encryption primitive called Membership Encryption. Let P(G) be a privacy-preserving token on a group attribute/identity G, such that given P(G) it is hard to know the attributes in G. In this membersh... 详细信息
来源: 评论
Understand system's relative effectiveness using adapted confusion matrix
收藏 引用
2nd International Conference on Design, User Experience, and Usability: Design Philosophy, Methods, and Tools, DUXU 2013, Held as Part of 15th International Conference on Human-Computer Interaction, HCI International 2013
作者: Jiang, Nan Liu, Haibin Software Systems Research Centre School of Design Engineering and Computing Bournemouth University United Kingdom National Center for Biotechnology Information National Library of Medicine National Institutes of Health United States
The effectiveness of a system refers to the accuracy and completeness with which users achieve specified goals. These two aspects are interpreted as errors and completion in the context of usability testing. However, ... 详细信息
来源: 评论
Secure RFID ownership transfer protocols
Secure RFID ownership transfer protocols
收藏 引用
9th International Conference on Information Security Practice and Experience, ISPEC 2013
作者: Li, Nan Mu, Yi Susilo, Willy Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia Department of Computing Faculty of Science Macquarie University Sydney NSW Australia
An RFID tag could change hands many times during its lifetime. In a retail chain, the ownership of the tag is instituted by the supplier who initially owns the tag. In the view of a buyer, the validity of the current ... 详细信息
来源: 评论
Automated software architecture security risk analysis using formalized signatures  13
Automated software architecture security risk analysis using...
收藏 引用
International Conference on software engineering (ICSE)
作者: Mohamed Almorsy John Grundy Amani S. Ibrahim Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne Australia
Reviewing software system architecture to pinpoint potential security flaws before proceeding with system development is a critical milestone in secure software development lifecycles. This includes identifying possib... 详细信息
来源: 评论
Social Networks and Crowdsourcing for Stakeholder Analysis in System of Systems Projects
Social Networks and Crowdsourcing for Stakeholder Analysis i...
收藏 引用
International Conference on System of Systems engineering
作者: Soo Ling Lim Cornelius Ncube Software Systems Research Centre School of Design Engineering and Computing Bournemouth University
In system of systems engineering, stakeholders are individuals, groups or organizations that stand to gain or lose from the success or failure of a system of systems. Systems of systems pose unique problems for stakeh... 详细信息
来源: 评论
Fire tracking with collective intelligence using dynamic priority maps
Fire tracking with collective intelligence using dynamic pri...
收藏 引用
Congress on Evolutionary Computation
作者: David J. Howden Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne Australia
This paper describes a swarm control algorithm based on distributed pheromone maps to effectively track a moving fire front. The algorithm uses a single heuristic to maintain persistent surveillance to detect new fire... 详细信息
来源: 评论
Modeling, from the energy viewpoint, a free-form, high energy performance, transparent envelope
Smart Innovation, Systems and Technologies
收藏 引用
Smart Innovation, Systems and Technologies 2013年 22卷 229-237页
作者: Alonso, Luis Bedoya, C. Lauret, Benito Alonso, Fernando Department of Construction and Technology in Architecture School of Architecture UPM Avda. Ramiro de Maeztu s/n 28040 Madrid Spain Languages and Systems and Software Engineering Department School of Computing UPM Campus de Montegancedo s/nBoadilla del Monte 28660 Madrid Spain
This article examines a new lightweight, slim, high energy efficient, light-transmitting, self-supporting envelope system, providing for seamless, free-form designs for use in architectural projects. The system exploi... 详细信息
来源: 评论
The decision-scope approach to specialization of business rules: Application in business process modeling and data warehousing  9th
The decision-scope approach to specialization of business ru...
收藏 引用
9th Asia - Pacific Conference on Conceptual Modelling, APCCM 2013
作者: Schre, Michael Neumayr, Bernd Stumptner, Markus Department of Business Informatics Data and Knowledge Engineering Johannes Kepler Univ. of Linz Austria Advanced Computing Research Centre Knowledge and Software Eng. Lab University of South Australia Australia
It is common in organizational contexts and in law to apply a decision-scope approach to decision making. Higher organization levels set a decision scope within which lower organization levels may operate. In case of ... 详细信息
来源: 评论