咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4641-4650 订阅
排序:
On the role of primary and secondary assets in adaptive security: An application in smart grids
On the role of primary and secondary assets in adaptive secu...
收藏 引用
7th ACM/IEEE International Symposium on software engineering for Adaptive and Self-Managing Systems, SEAMS 2012
作者: Pasquale, Liliana Salehie, Mazeiar Ali, Raian Omoronyia, Inah Nuseibeh, Bashar Lero- Irish Software Engineering Research Centre Limerick Ireland Bournemouth University United Kingdom Department of Computing Open University Milton Keynes United Kingdom
Adaptive security aims to protect valuable assets managed by a system, by applying a varying set of security controls. engineering adaptive security is not an easy task. A set of effective security countermeasures sho... 详细信息
来源: 评论
Causal factors behind the failed firecontrol project: A large-scale system-of-systems
Causal factors behind the failed firecontrol project: A larg...
收藏 引用
2012 7th International Conference on System of Systems engineering, SoSE 2012
作者: Ncube, Cornelius Software Systems Research Centre School of Design Engineering and Computing Bournemouth University Poole Dorset BH12 5BB United Kingdom
FiReControl was a large-scale system-of-systems that commenced in 2004 and was expected to be complete by October 2009. In 2007, the Department for Communities and Local Government (the Department) contracted a prime ... 详细信息
来源: 评论
Defect data analysis as input for software process improvement
Defect data analysis as input for software process improveme...
收藏 引用
13th International Conference on Product-Focused software Process Improvement, PROFES 2012
作者: Raninen, Anu Toroi, Tanja Vainio, Hannu Ahonen, Jarmo J. University of Eastern Finland School of Computing PL 1627 FI-70211 Kuopio Finland Lero - The Irish Software Engineering Research Centre University of Limerick Ireland
In this paper, we present the results of defect data analysis done with three software companies' defect databases. 11879 software defects were classified and analyzed in order to find out what the real world defe... 详细信息
来源: 评论
Construction of cellular automata lattice based on the semantics of an urban traffic network
Construction of cellular automata lattice based on the seman...
收藏 引用
10th International Conference on Cellular Automata for Research and Industry, ACRI 2012
作者: Ivanac, Vedran Dalbelo Bašić, Bojana Vanjak, Zvonimir Software RandD Department Telegra Plesivicka 3 Sveta Nedelja Croatia Faculty of Electrical Engineering and Computing University of Zagreb Unska 3 10000 Zagreb Croatia
In this paper, we propose a construction process that enables the transformation of an urban traffic network using a cellular automata lattice. An abstract network hierarchy is defined which allows us to describe the ... 详细信息
来源: 评论
Service restructuring by choreography-driven equivalence
Service restructuring by choreography-driven equivalence
收藏 引用
2012 IEEE 9th International Conference on Services computing, SCC 2012
作者: Feng, Zaiwen Peng, Rong He, Keqing He, Zhou State Key Lab. of Software Engineering Wuhan University Wuhan Hubei Province China School of Computing Wuhan University Wuhan Hubei Province China
A Web service specification can be quite complex, including multiple operations and various kinds of message exchange patterns. In this work, we focus on the problem of restructuring a Web service, which contains a pr... 详细信息
来源: 评论
Static program analysis assisted dynamic taint tracking for software vulnerability discovery
Static program analysis assisted dynamic taint tracking for ...
收藏 引用
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
The evolution of computer science has exposed us to the growing gravity of security problems and threats. Dynamic taint analysis is a prevalent approach to protect a program from malicious behaviors, but fails to prov... 详细信息
来源: 评论
A pseudometric in supervisory control of probabilistic discrete event systems
A pseudometric in supervisory control of probabilistic discr...
收藏 引用
作者: Pantelic, Vera Lawford, Mark Department of Computing and Software Faculty of Engineering McMaster University 1280 Main Street West Hamilton ON L8S 4K1 Canada
The focus of this paper is the pseudometric used as a key concept in our previous work on optimal supervisory control of probabilistic discrete event systems. The pseudometric is employed to measure the behavioural si... 详细信息
来源: 评论
Speculative requirements: Automatic detection of uncertainty in natural language requirements
Speculative requirements: Automatic detection of uncertainty...
收藏 引用
2012 20th IEEE International Requirements engineering Conference, RE 2012
作者: Yang, Hui De Roeck, Anne Gervasi, Vincenzo Willis, Alistair Nuseibeh, Bashar Department of Computing Open University United Kingdom Department of Computer Science University of Pisa Italy Lero-The Irish Software Engineering Research Centre University of Limerick Ireland
Stakeholders frequently use speculative language when they need to convey their requirements with some degree of uncertainty. Due to the intrinsic vagueness of speculative language, speculative requirements risk being... 详细信息
来源: 评论
Stigmergic modeling for web service composition and adaptation
Stigmergic modeling for web service composition and adaptati...
收藏 引用
12th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2012
作者: Moustafa, Ahmed Zhang, Minjie Bai, Quan School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia School of Computing and Mathematical Sciences Auckland University of Technology Auckland New Zealand
As Web services become widespread, many complex applications require service composition to cope with high scalability and heterogeneity. Centralized Web service composition approaches are not sufficient as they alway... 详细信息
来源: 评论
Evaluation of data delivery on Android application for health screening form
Evaluation of data delivery on Android application for healt...
收藏 引用
International Conference on Cloud computing and Social Networking 2012: "Cloud computing and Social Networking for Smart and Productive Society", ICCCSN 2012
作者: Heo, Seonguk Kang, Kyuchang Bae, Changseok Computer Software and Engineering University of Science and Technology Daejeon Korea Republic of Next-Generation Computing Research Department Electronics and Telecommunications Research Institute Daejeon Korea Republic of
This paper presents an evaluation of data delivery on Android applications implementing a health screening form. Typically, the health screening form provides an integrated view of various data (e.g. lifelog, health l... 详细信息
来源: 评论