咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4491-4500 订阅
排序:
Differencing UML models: A domain-specific vs. a domain-agnostic method
Differencing UML models: A domain-specific vs. a domain-agno...
收藏 引用
4th International Summer School on Generative and Transformational Techniques in software engineering IV, GTTSE 2011
作者: Mikhaiel, Rimon Tsantalis, Nikolaos Negara, Natalia Stroulia, Eleni Xing, Zhenchang Computing Science Department University of Alberta Edmonton AB T6G 2E8 Canada Department of Computer Science and Software Engineering Concordia University Montreal QC H3G 1M8 Canada Department of Computer Science School of Computing National University of Singapore 13 Computing Drive Singapore 117417 Singapore
Comparing software artifacts to identify their similarities and differences is a task ubiquitous in software engineering. Logical-design comparison is particularly interesting, since it can serve multiple purposes. Wh... 详细信息
来源: 评论
Contradistinction and Relevant Learning for Transform Processing with Smartphones in engineering Education
Contradistinction and Relevant Learning for Transform Proces...
收藏 引用
IEEE International Conference on Advanced Learning Technologies
作者: Kuo-Sheng Ma Ming Yang Kai Qian Department of Electrical Engineering Southern Polytechnic State University Department of Computing and Software Engineering Southern Polytechnic State University
In this study, we have successfully developed a prototype which is a mobile friendly user interface for relevant laboratories that will improve students' understanding and learning of the transform techniques in e... 详细信息
来源: 评论
Investigation into the personal epistemology of computer science students  13
Investigation into the personal epistemology of computer sci...
收藏 引用
18th ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE 2013
作者: McDermott, Roger Pirie, Iain Cajander, Åsa Daniels, Mats Laxer, Cary School of Computing Science and Digital Media Robert Gordon University United Kingdom Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Software Engineering Rose-Hulman Institute of Technology United States
In this paper, we investigate the personal epistemology of computing students, that is, their conceptions of knowledge and learning. We review some models of personal epistemological development and describe one of th... 详细信息
来源: 评论
Real-Valued Negative Databases  12
Real-Valued Negative Databases
收藏 引用
12th European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, ECAL 2013
作者: Zhao, Dongdong Luo, Wenjian School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei Anhui230027 China
The negative database (NDB) is the negative representation of original data. Existing work has demonstrated that NDB can be used to preserve privacy and hide information. However, most work about NDB is based on binar... 详细信息
来源: 评论
A fostering embedded system education with android sensory embedded system labware  13
A fostering embedded system education with android sensory e...
收藏 引用
18th ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE 2013
作者: Qian, Kai Ma, Kuo-Sheng Computing and Software Engineering Southern Polytechnic State University 1100 South Marietta Pkwy Marietta GA 30060-2896 United States Electrical Mechatronic Engineering Southern Polytechnic State University 1100 South Marietta Pkwy Marietta GA 30060-2896 United States
The rapid growth of embedded systems especially mobile embedded devices results in a shortage of professionals for embedded hardware and software developments. In order to broader embedded system education in small co... 详细信息
来源: 评论
Requirements-driven adaptive digital forensics
Requirements-driven adaptive digital forensics
收藏 引用
IEEE International Conference on Requirements engineering
作者: Liliana Pasquale Yijun Yu Mazeiar Salehie Luca Cavallaro Thein Than Tun Bashar Nuseibeh The Irish Software Engineering Research Centre Limerick Ireland Department of computing Open University Milton Keynes UK Lero - the Irish Software Engineering Research Centre Limerick Ireland
We propose the use of forensic requirements to drive the automation of a digital forensics process. We augment traditional reactive digital forensics processes with proactive evidence collection and analysis activitie... 详细信息
来源: 评论
Exploring Self-Service Support Methods in IT Service Management
Exploring Self-Service Support Methods in IT Service Managem...
收藏 引用
International Conference on Services Systems and Services Management, ICSSSM
作者: Marko Jäntti School of Computing Software Engineering IT Service Management Research Group University of Eastern Finland Kuopio Finland
IT service providers are placing more and more resources for implementing self-service channels. Although there are several best practice frameworks available for managing IT service desk, such as IT Infrastructure Li... 详细信息
来源: 评论
Using concrete visual notations as first class citizens for model transformation specification
Using concrete visual notations as first class citizens for ...
收藏 引用
IEEE Symposium on Visual Languages and Human Centric computing (VL/HCC)
作者: Iman Avazpour John Grundy Centre for Computing and Engineering Software and Systems Faculty of ICT Swinburne University of Technology Hawthorn VIC Australia
Model transformations are an important part of Model Driven engineering (MDE). To generate a transformation with current MDE approaches, users are required to specify (or provide) complex meta-models and then engage i... 详细信息
来源: 评论
Sparse learning for face recognition with social context
Sparse learning for face recognition with social context
收藏 引用
4th International Conference on Intelligence Science and Big Data engineering, IScIDE 2013
作者: Gui, Jie Mi, Jian-Xun Lei, Ying-Ke Wang, Hong-Qiang State Key Laboratory of Software Engineering Wuhan University 430072 China Hefei Institute of Intelligent Machines Chinese Academy of Sciences Hefei Anhui China State Key Laboratory for Novel Software Technology Nanjing University China Bio-Computing Research Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen Guangdong Province China Electronic Engineering Institute Hefei Anhui 230037 China
Face recognition in uncontrolled environments, such as large pose variations, and extreme ambient illumination and expressions is a challenging task for traditional face recognition methods. Some recent works show tha... 详细信息
来源: 评论
Linking Algebraic Semantics and Operational Semantics for Web Services Using Maude
Linking Algebraic Semantics and Operational Semantics for We...
收藏 引用
IEEE International Conference on engineering of Complex Computer Systems
作者: Peng Liu Huibiao Zhu Shengchao Qin Phillip J. Brooke Xi Wu Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University China School of Computing University of Teesside Middlesbrough UK
Web services have become more and more important in these years. It is of key importance for enterprise web applications to combine different services available to accomplish complex business processes. BPEL4WS (BPEL)... 详细信息
来源: 评论