咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4651-4660 订阅
排序:
Estimate unlabeled-data-distribution for semi-supervised PU learning
收藏 引用
14th Asia Pacific Web Technology Conference, APWeb 2012
作者: Hu, Haoji Sha, Chaofeng Wang, Xiaoling Zhou, Aoying Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University China Shanghai Key Laboratory of Intelligent Information Processing Fudan University China
Traditional supervised classifiers use only labeled data (features/label pairs) as the training set, while the unlabeled data is used as the testing set. In practice, it is often the case that the labeled data is hard... 详细信息
来源: 评论
UPPAAL-SMC: Statistical model checking for priced timed automata  10
UPPAAL-SMC: Statistical model checking for priced timed auto...
收藏 引用
10th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2012
作者: Bulychev, Peter David, Alexandre Larsen, Kim Guldstrand Mikučionis, Marius Poulsen, Danny Bøgsted Legay, Axel Wang, Zheng Department of Computer Science Aalborg University Denmark INRIA Rennes France Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University China
This paper offers a survey of UPPAAL-SMC, a major extension of the real-Time verification tool UPPAAL. UPPAAL-SMC allows for the efficient analysis of performance properties of networks of priced timed automata under ... 详细信息
来源: 评论
Multi-Layer Synthesis of HighlyStructured Texture
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第4期17卷 302-308页
作者: TANG Li YU Rongwei GU Yuanting YUAN Jie DU Gong School of Computer Science and Engineering ChangshuInstitute of Technology Changshu 215500 Jiangsu China State Key Laboratary of Software Engineering WuhanUniversity Wuhan 430072 Hubei China Key Laboratory of Aerospace Information Security andTrust Computing Ministry of Education Wuhan 430072 HubeiChina Institute of Software Chinese Academy of Sciences Beijing100080 Beijing China
In this paper, a novel concept of multilayer synthesis and a general framework for texture synthesis method are presented. Within this framework, we first decompose the texture into the supposed pattern layer and mate... 详细信息
来源: 评论
2012 Information Security for South Africa - Proceedings of the ISSA 2012 Conference: Introduction
2012 Information Security for South Africa - Proceedings of ...
收藏 引用
2012 Conference on Information Security for South Africa, ISSA 2012
作者: Venter, Hein Loock, Marianne Coetzee, Marijke Department of Computer Science University of Pretoria South Africa School of Computing University of South Africa South Africa Academy for Computer Science and Software Engineering University of Johannesburg South Africa
ISSA2012 is the annual conference for the information security community that continues on the successful recipe established in *** are pleased to announce, however, that from 2010, ISSA is co-sponsored by the IEEE Sy... 详细信息
来源: 评论
Understanding the formation of trust in IT artifacts
Understanding the formation of trust in IT artifacts
收藏 引用
International Conference on Information Systems, ICIS 2012
作者: Söllner, Matthias Hoffmann, Axel Hoffmann, Holger Wacker, Arno Leimeister, Jan Marco Kassel University Information Systems Pfannkuchstr. 1 34121 Kassel Germany Kassel University Software Engineering for Ubiquitous Computing Applications Pfannkuchstr. 1 34121 Kassel Germany
IT artifacts often take the role of a trustee in a trust relationship between users and IT artifacts. The goal of this paper is to increase the understanding of the formation of trust in such trust relationships. Inst... 详细信息
来源: 评论
MAP-numa: Access patterns used to characterize the NUMA memory access optimization techniques and algorithms
MAP-numa: Access patterns used to characterize the NUMA memo...
收藏 引用
9th IFIP International Conference on Network and Parallel computing, NPC 2012
作者: Luo, Qiuming Liu, Chenjian Kong, Chang Cai, Ye Shenzhen China College of Computer Science and Software Engineering Shenzhen University China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Some typical memory access patterns are provided and programmed in C, which can be used as benchmark to characterize the various techniques and algorithms aim to improve the performance of NUMA memory access. These ac... 详细信息
来源: 评论
Applying Cobit 4.1 to knowledge governance: Matrix ProGOB to control governance objectives
Applying Cobit 4.1 to knowledge governance: Matrix ProGOB to...
收藏 引用
7th Iberian Conference on Information Systems and Technologies, CISTI 2012
作者: Rouyet, Juan Ignacio Aguilar, Luis Joyanes Marcos, Antonio Folgueras IT Consulting Services Quint Wellington Redwood Madrid Spain Department of Languages and Computing Systems and Software Engineering Pontifical Salamanca University Madrid Spain Carlos III University of Madrid Spain
Knowledge governance analyses to what extent knowledge processes are influenced by governance mechanisms. A number of advances have been made in this field, but much space remains for research. However, before advanci... 详细信息
来源: 评论
STeC: A location-triggered specification language for real-time systems
STeC: A location-triggered specification language for real-t...
收藏 引用
作者: Chen, Yixiang MoE Engineering Research Center for Software/Hardware Co-design Technology and Application Shanghai Key Lab. for Trustworthy Computing East China Normal University Shanghai 200062 China
Internet of Things (IoT) or Cyber-Physical Systems (CPS) is a new trend of real-time systems in the area of information technology. This paper introduces a spatiotemporal consistence language for real-time systems (Sh... 详细信息
来源: 评论
A reputation model based on hierarchical bayesian estimation for Web services
A reputation model based on hierarchical bayesian estimation...
收藏 引用
2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2012
作者: Jiang, Dongming Xue, Jinyun Xie, Wuping State Key Laboratory of Software Engineering Wuhan University China Wuhan Key Laboratory of High Performance Computing Jiangxi Normal University China Computer School of Wuhan University China
The motivation of Web service comes from its interoperational ability so a large number of Web services can interact with others and constitute an open network, Web service network. The success of Web services selecti... 详细信息
来源: 评论
Towards Efficient K-Dominant Skyline Computation in CSCW
收藏 引用
电子学报(英文版) 2012年 第3期21卷 445-448页
作者: HUANG Jin CHEN Jian HUANG Da TANG Yong School of Computer Science South China Normal University Guangzhou 510631 China School of Software Engineering South China University of Technology Guangzhou 510006 China School of Computing Science Simon Fraser University Burnaby BC Canada V5A 1S6
Considering benefits of different collabora- tors, cooperative work usually faces the challenge to make a trade-off decision upon multiple criterions. K-dominant skyline, a novel database query technology, may return ... 详细信息
来源: 评论