咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4631-4640 订阅
排序:
Expander Code: A Scalable Erasure-Resilient Code to Keep up with Data Growth in Distributed Storage
Expander Code: A Scalable Erasure-Resilient Code to Keep up ...
收藏 引用
IEEE International Performance computing and Communication Conference
作者: Guangping Xu Sheng Lin Hua Zhang Xing Guo Kai Shit Computer and Communication Engineering School Tianjin University of Technology Tianjin China 300384 Tianjin Key Lab. of Intelligence Computing and New Software Technology Tianjin China 300384
To ensure high reliability and storage efficiency, erasure codes are preferred in storage systems. With the prevalent of distributed storage systems such as clouds storage, how to design a scalable and efficient erasu... 详细信息
来源: 评论
Critical challenges in offshore software development outsourcing: An empirical study
Critical challenges in offshore software development outsour...
收藏 引用
IASTED International Conference on software engineering, SE 2012
作者: Khan, Siffat Ullah Niazi, Mahmood Department of Software Engineering University of Malakand Khyber Pakhtunkhwa Pakistan Dhahran Saudi Arabia Faculty of Computing Riphah International University Islamabad Pakistan School of Computing and Mathematics Keele University United Kingdom
Offshore software development outsourcing is a contractual business of high quality software production at offshore destination(s) with significant cost-saving. The objective of this research paper is to identify chal... 详细信息
来源: 评论
PERM: Practical reputation-based blacklisting without TTPs  12
PERM: Practical reputation-based blacklisting without TTPs
收藏 引用
2012 ACM Conference on Computer and Communications Security, CCS 2012
作者: Au, Man Ho Kapadia, Apu School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia School of Informatics and Computing Indiana University Bloomington IN United States
Some users may misbehave under the cover of anonymity by, e.g., defacing webpages on Wikipedia or posting vulgar comments on YouTube. To prevent such abuse, a few anonymous credential schemes have been proposed that r... 详细信息
来源: 评论
An aspect-oriented approach to relating security requirements and access control
An aspect-oriented approach to relating security requirement...
收藏 引用
CAiSE 2012 Forum at the 24th International Conference on Advanced Information Systems engineering, CAiSE 2012
作者: Alebrahim, Azadeh Tun, Thein Than Yu, Yijun Heisel, Maritta Nuseibeh, Bashar Paluno - The Ruhr Institute for Software Technology University of Duisburg-Essen Germany Department of Computing Open University Milton Keynes United Kingdom Lero - The Irish Software Engineering Research Centre University of Limerick Ireland
Affecting multiple parts in software systems, security requirements often tangle with functional requirements. In order to separate crosscutting concerns and increase modularity, we propose to represent security requi... 详细信息
来源: 评论
Mathematical reasoning at the: Crossroads
收藏 引用
ACM Inroads 2012年 第1期3卷 30-31页
作者: Henderson, Peter B. Sitaraman, Murali Department of Computer Science and Software Engineering Butler University Indianapolis IN 46208 United States School of Computing Clemson University Clemson SC 29631 United States
No abstract available.
来源: 评论
On the Necessary Conditions for Covert Channel Existence: A State-of-the-Art Survey
收藏 引用
Procedia Computer Science 2012年 10卷 458-465页
作者: Jason Jaskolka Ridha Khedri Qinglei Zhang Department of Computing and Software Faculty of Engineering McMaster University Hamilton Ontario Canada
With the ability to leak confidential information in a secret manner, covert channels pose a significant threat to the confidentiality of a system. Due to this threat, the identification of covert channel existence has be... 详细信息
来源: 评论
Transfer Error and Correction Approach in Mobile Network
Transfer Error and Correction Approach in Mobile Network
收藏 引用
2012 International Conference on Solid State Devices and Materials Science(SSDMS 2012)
作者: Wu Xiao-kai Shi Yong-jin Chen Da-jin Ma Bing-he Zhou Qi-li Computing Software EngineeringHangzhou Dianzi University
With the development of information technology and social progress, human demand for information has become increasingly diverse, wherever and whenever people want to be able to easily, quickly and flexibly via voice,... 详细信息
来源: 评论
An Aspect-Oriented Language for Product Family Specification
收藏 引用
Procedia Computer Science 2012年 10卷 482-489页
作者: Qinglei Zhang Ridha Khedri Jason Jaskolka Department of Computing and Software Faculty of Engineering McMaster University Hamilton Ontario Canada
Aspect-orientation is a paradigm for managing the separation of crosscutting concerns and decomposing a system using more than one criterion. This paper proposes an aspect-oriented approach at the feature-modeling lev... 详细信息
来源: 评论
History-sensitive heuristics for recovery of features in code of evolving program families  12
History-sensitive heuristics for recovery of features in cod...
收藏 引用
16th International software Product Line Conference, SPLC 2012
作者: Nunes, Camila Garcia, Alessandro Lucena, Carlos Lee, Jaejoon Informatics Department Opus Research Group Software Engineering Lab PUC-Rio Brazil School of Computing and Communications Lancaster University Lancaster United Kingdom
A program family might degenerate due to unplanned changes in its implementation, thus hindering the maintenance of family members. This degeneration is often induced by feature code that is changed individually in ea... 详细信息
来源: 评论
An O(n3 log log n/ log2 n) time algorithm for all pairs shortest paths
An O(n3 log log n/ log2 n) time algorithm for all pairs shor...
收藏 引用
13th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2012
作者: Han, Yijie Takaoka, Tadao School of Computing and Engineering University of Missouri at Kansas City Kansas City MO 64110 United States Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
We present an O(n 3 loglogn/log2 n) time algorithm for all pairs shortest paths. This algorithm improves on the best previous result of O(n 3 (loglogn)3/log2 n ) time. © 2012 Springer-Verlag.
来源: 评论