咨询与建议

限定检索结果

文献类型

  • 3,948 篇 会议
  • 2,063 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,769 篇 工学
    • 3,025 篇 计算机科学与技术...
    • 2,485 篇 软件工程
    • 749 篇 信息与通信工程
    • 505 篇 控制科学与工程
    • 416 篇 生物工程
    • 337 篇 电气工程
    • 263 篇 生物医学工程(可授...
    • 231 篇 机械工程
    • 222 篇 电子科学与技术(可...
    • 191 篇 光学工程
    • 140 篇 网络空间安全
    • 136 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 118 篇 交通运输工程
  • 1,692 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 367 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,146 篇 管理学
    • 712 篇 管理科学与工程(可...
    • 498 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 227 篇 医学
    • 201 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 137 篇 教育学
    • 132 篇 教育学
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 145 篇 feature extracti...
  • 140 篇 training
  • 136 篇 semantics
  • 123 篇 deep learning
  • 112 篇 software
  • 111 篇 machine learning
  • 110 篇 computer science
  • 107 篇 accuracy
  • 99 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 86 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 231 篇 college of compu...
  • 104 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 53 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 49 篇 school of big da...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,733 篇 英文
  • 310 篇 其他
  • 52 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6089 条 记 录,以下是4521-4530 订阅
排序:
Leveraging Performance Counters and Execution Logs to Diagnose Memory-Related Performance Issues
Leveraging Performance Counters and Execution Logs to Diagno...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Mark D. Syer Zhen Ming Jiang Meiyappan Nagappan Ahmed E. Hassan Mohamed Nasser Parminder Flora Software Analysis and Intelligence Lab Queen's University Canada Department of Electrical Engineering & Computer Science York University Canada Performance Engineering School of Computing BlackBerry Canada
Load tests ensure that software systems are able to perform under the expected workloads. The current state of load test analysis requires significant manual review of performance counters and execution logs, and a hi... 详细信息
来源: 评论
Integral attacks on reduced-round PRESENT
Integral attacks on reduced-round PRESENT
收藏 引用
15th International Conference on Information and Communications Security, ICICS 2013
作者: Wu, Shengbao Wang, Mingsheng Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing 100190 PO Box 8718 China Graduate School of Chinese Academy of Sciences Beijing 100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China
Integral attack is a powerful technique to recover the secret key of block ciphers by usually exploiting the fact that specific parts of the output after several round encryptions has a zero-sum property in a set of c... 详细信息
来源: 评论
A comprehensive QoS determination model for Infrastructure-as-a-Service clouds
A comprehensive QoS determination model for Infrastructure-a...
收藏 引用
2013 IEEE International Conference on Automation Science and engineering, CASE 2013
作者: Xia, Yunni Zhou, Mengchu Luo, Xin Zhu, Qingsheng Software Theory and Technology Chongqing Key Lab Chongqing University Chongqing 400030 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102 United States
Cloud computing is a recently developed new technology for complex systems with massive service sharing, which is different from the resource sharing of the grid computing systems. In a cloud environment, service requ... 详细信息
来源: 评论
Thesaurus Performance with Information Retrieval: Schema Matching as A Case Study
Thesaurus Performance with Information Retrieval: Schema Mat...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Thabit Sabbah Ali Selamat Faculty of Computing Department of Computer Science Universiti Teknologi Malaysia (UTM) 81310 Skudai Johor Malaysia Faculty of Computing Department of Software Engineering Universiti Teknologi Malaysia (UTM) 81310 Skudai Johor Malaysia
Thesaurus is used with many Information Retrieval (IR) models such as data integration, data warehousing, semantic query processing and classifiers. Considering the existence of various thesauri for a particular domai... 详细信息
来源: 评论
Model-Based Management of Service Composition
Model-Based Management of Service Composition
收藏 引用
2013 IEEE Seventh International Symposium on Service-Oriented System engineering
作者: Yun Ma Xuanzhe Liu Yihan Wu Paul Grace Institute of Software School of Electronics Engineering and Computer Science Key Laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China School of Computing and Communications Lancaster University Lancaster UK
Promoted by the Service computing paradigm, service composition has played an important role in modern software development. Currently, available services have covered a wide spectrum of heterogeneity, including SOAP ... 详细信息
来源: 评论
A Framework for Classifying and Comparing Architecture-centric software Evolution Research
A Framework for Classifying and Comparing Architecture-centr...
收藏 引用
(CSMR) European Conference on software Maintenance and Reengineering
作者: Pooyan Jamshidi Mohammad Ghafari Aakash Ahmad Claus Pahl Lero-The Irish Software Engineering Research Centre School of Computing Dublin City University Ireland DeepSE Group @ DEI Politecnico di Milano Italy
Context: software systems are increasingly required to operate in an open world, characterized by continuous changes in the environment and in the prescribed requirements. Architecture-centric software evolution (ACSE... 详细信息
来源: 评论
Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8833卷
作者: Sun, Zhenan Shan, Shiguang Sang, Haifeng Zhou, Jie Wang, Yunhong Yuan, Weiqi Chinese Academy of Sciences National Laboratory of Pattern Recognition Institute of Automation Beijing China Chinese Academy of Sciences Institute of Computing Technology Beijing China Shenyang University of Technology School of Information Science and Engineering Shenyang China Tsinghua University Software Engineering Institute Beijing China Beihang University School of Computer Science and Engineering Beijing China
来源: 评论
An Improved Two-sided Assembly Line Balancing Algorithm based on Heuristic Rules
An Improved Two-sided Assembly Line Balancing Algorithm base...
收藏 引用
The 2013 2nd International Symposium on Manufacturing Systems engineering(ISMSE 2013)
作者: Yan Gao Tianxiang Chang Yangyang Wang Yao Liu HongYan Quan Jianzhong Xu Institute of Software and Engineering Shanghai Key Laboratory of Trustworthy Computing East China Normal University Institute of Computer Science and Technology Nanchang Army Collage
According to "Assemble line balancing(ALB)" problem which is widespread in manufacture, we establish a mathematical model and present our improved algorithm that is based on Heuristic rules, which adopt cumu... 详细信息
来源: 评论
Choice of boundary condition for lattice-Boltzmann simulation of moderate-Reynolds-number flow in complex domains
收藏 引用
Physical Review E 2014年 第2期89卷 023303-023303页
作者: Rupert W. Nash Hywel B. Carver Miguel O. Bernabeu James Hetherington Derek Groen Timm Krüger Peter V. Coveney Centre for Computational Science Department of Chemistry University College London 20 Gordon Street London WC1H 0AJ United Kingdom CoMPLEX University College London Physics Building Gower Street London WC1E 6BT United Kingdom Research Software Development Team Research Computing and Facilitating Services University College London Podium Building - 1st Floor Gower Street London WC1E 6BT United Kingdom Institute for Materials and Processes School of Engineering University of Edinburgh King's Buildings Mayfield Road Edinburgh EH9 3JL United Kingdom
Modeling blood flow in larger vessels using lattice-Boltzmann methods comes with a challenging set of constraints: a complex geometry with walls and inlets and outlets at arbitrary orientations with respect to the lat... 详细信息
来源: 评论
A static detection of security defects between inter-components' communication
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) 2013年 第SUPPL.2期41卷 259-264页
作者: Fu, Jianming Li, Pengwei Yi, Qiao Huang, Shiyong Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Wuhan 430072 China School of Computer Wuhan University Wuhan 430072 China State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
Security defects were found between inter-components' communication: the use of implicit intents leaded to component hijacking and information leakage, risk of privilege mission leakage existed in public component... 详细信息
来源: 评论