咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4481-4490 订阅
排序:
Approximate online learning for passive monitoring of multi-channel wireless networks
Approximate online learning for passive monitoring of multi-...
收藏 引用
32nd IEEE Conference on Computer Communications, IEEE INFOCOM 2013
作者: Zheng, Rong Le, Thanh Han, Zhu Department of Computing and Software McMaster University Hamilton ON L8S 4K1 Canada Department of Electrical Engineering University of Houston Houston TX 77204 United States
We consider the problem of optimally assigning p sniffers to K channels to monitor the transmission activities in a multi-channel wireless network. The activity of users is initially unknown to the sniffers and is to ... 详细信息
来源: 评论
A novel discrete differential evolution based cost aware data redundancy scheme for cloud providers
收藏 引用
Journal of Computational Information Systems 2013年 第22期9卷 8879-8888页
作者: Zhong, Ruiming Liu, Chuanyi Wang, Chunlu Fang, Binxing Xiang, Fei School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 China Key Lab. of Trustworthy Distributed Computing and Service of the Ministry of Education of China Beijing University of Posts and Telecommunications Beijing 100876 China
Data availability is a desirable feature for all cloud providers. However, data reliability and disaster recovery cost are always two incompatible goals because adoption of data redundancy will bring incremental cost.... 详细信息
来源: 评论
ARES 2012 special issue
收藏 引用
Information Security Technical Report 2013年 第4期17卷 129-130页
作者: Li, Shujun Weippl, Edgar Department of Computing Faculty of Engineering and Physical Sciences University of Surrey Guildford GU2 7XH United Kingdom SBA Research and Institute of Software Technology and Interactive Systems Vienna University of Technology Favoritenstraße 9-11/188 A-1040 Vienna Austria
We are proud to present this special issue of the Elsevier journal Information Security Technical Report, which contains eight of the most outstanding papers of ARES 2012 (7th International Conference on Availability,... 详细信息
来源: 评论
Approximation algorithms for the maximum multiple RNA interaction problem
Approximation algorithms for the maximum multiple RNA intera...
收藏 引用
7th International Conference on Combinatorial Optimization and Applications, COCOA 2013
作者: Tong, Weitian Goebel, Randy Liu, Tian Lin, Guohui Department of Computing Science University of Alberta Edmonton AB T6G 2E8 Canada Key Laboratory of High Confidence Software Technologies Ministry of Education Institute of Software School of Electronic Engineering and Computer Science Peking University Beijing 100871 China
RNA interactions are fundamental in many cellular processes, which can involve two or more RNA molecules. Multiple RNA interactions are also believed to be much more complex than pairwise interactions. Recently, multi... 详细信息
来源: 评论
Attacking and fixing the CS mode
Attacking and fixing the CS mode
收藏 引用
15th International Conference on Information and Communications Security, ICICS 2013
作者: Sui, Han Wu, Wenling Zhang, Liting Wang, Peng Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing 100190 China Data Assurance and Communication Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
The security of the Cipher-State (CS) mode was proposed to NIST as an authenticated encryption (AE) scheme in 2004. The usual SPRP blockcipher security for AE schemes may not guarantee its security. By constructing a ... 详细信息
来源: 评论
A Concept for Securing Cyber-Physical Systems with Organic computing Techniques
A Concept for Securing Cyber-Physical Systems with Organic C...
收藏 引用
26th International Conference on Architecture of computing Systems 2013
作者: Joerg Haehner Stefan Rudolph Sven Tomforde Dominik Fisch Bernhard Sick Nils Kopal Arno Wacker Organic Computing University of Augsburg Intelligent Embedded Systems University of Kassel Software Engineering for Ubiquitous Computing Applications University of Kassel
Cyber-Physical Systems (CPS) are a logical step towards integrating classical IT systems further into physical or virtual surroundings. In consequence this means that CPS will be targets for new security threats, e.g.... 详细信息
来源: 评论
Real-time detection and recognition of landmarks for mobile robot in indoor scenes
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2013年 第4期8卷 329-341页
作者: Xue, Yanbing Zhang, Hua Ju, Yucui Wang, Jin Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin 300191 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China
This paper proposes a robust real-time artificial landmarks detection and recognition system for indoor mobile robot. Landmarks detection and recognition for indoor robots faces two major difficulties, one is the illu... 详细信息
来源: 评论
Learning Style in a Personalized Collaborative Learning Framework
收藏 引用
Procedia - Social and Behavioral Sciences 2013年 103卷 586-594页
作者: Nuzulla Mamat Norazah Yusof Software Engineering Department Faculty of Computing Universiti Teknologi Malaysia Johor Bahru (UTM JB) 81310 Johor Bahru Malaysia
This paper aims to discuss learning style implementation into an e-learning environment. The relationship between learning style and adaptive system is identified and connected. Elements gained from traditional learni... 详细信息
来源: 评论
Expected time to detection of interaction faults
收藏 引用
Journal of Combinatorial Mathematics and Combinatorial computing 2013年 86卷 87-110页
作者: Bryce, Renée C. Colbourn, Charles J. University op North Texas 1155 Union Circle -311366 Denton TX 76203 United States School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287-8809 United States State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China
software interaction test suites serve two complementary roles. They are employed to systematically verify that, for some strength t, no t-way interaction of a system's parameters causes a fault. They are also emp... 详细信息
来源: 评论
A proof system in PADS
收藏 引用
10th International Colloquium on Theoretical Aspects of computing, ICTAC 2013
作者: Yao, Xinghua Zhang, Min Chen, Yixiang MoE Engineering Research Center for Software/Hardware Co-design Technology and Application East China Normal University Shanghai China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China
The PADS (Process Algebra for Demand and Supply) framework is an approach to model resource demand and supply for the formal analysis of hierarchical scheduling. Inspired by the demand relation in PADS, we propose a w... 详细信息
来源: 评论