咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4661-4670 订阅
排序:
Embedded software Control of a Hybrid Vehicle's ECU/FCM System
收藏 引用
Computer Technology and Application 2012年 第1期3卷 8-15页
作者: Robert Murphy Patrick Otoo Bobbie Department of Computer Science School of Computing and Software Engineering Southern Polytechnic State University Marietta Georgia USA
This paper describes a research project that uses embedded systems design principles to construct and simulate an Engine Control Unit (ECU) for a hybrid car. The ECU is designed to select a fuel type based on the st... 详细信息
来源: 评论
Smarter wheelchairs who can talk to each other: An integrated and collaborative approach
Smarter wheelchairs who can talk to each other: An integrate...
收藏 引用
2012 IEEE 14th International Conference on e-Health Networking, Applications and Services, Healthcom 2012
作者: Kong, Junjun Cao, Jiannong Liu, Yang Guo, Yao Shao, Weizhong Department of Computing Hong Kong Polytechnic University Kowloon Hong Kong Key Laboratory of High-Confidence Software Technologies School of Electronics Engineering and Computer Science Peking University Beijing China
Pervasive computing technologies can benefit the injured, disabled or elderly people in their daily lives, and smart wheelchair has been a representative of this kind of technologies. However, most existing smart whee... 详细信息
来源: 评论
A pre-computable signature scheme with efficient verification for RFID
收藏 引用
8th International Conference on Information Security Practice and Experience, ISPEC 2012
作者: Guo, Fuchun Mu, Yi Susilo, Willy Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong NSW Australia Department of Computing Faculty of Science Macquarie University Sydney NSW Australia
Passive RFID tags have limited rewritable memory for data storage and limited computation power, which pose difficulties to implement security protection on RFID tags. It has been shown that strong security and privac... 详细信息
来源: 评论
Mobile security labware with smart devices for cybersecurity education
Mobile security labware with smart devices for cybersecurity...
收藏 引用
2012 IEEE 2nd Integrated STEM Education Conference, ISEC 2012
作者: Qian, Kai Dan Lo, Chia-Tien Guo, Minzhe Bhattacharya, Prabir Yang, Li School of Computer Science and Software Engineering Southern Polytechnic State University United States School of Computing Sciences and Informatics University of Cincinnati United States School of Engineering and Computer Science University of Tennessee Chattanooga TN United States
Smart mobile devices such as smartphones and tablets have become an integral part of our society. However, it also becomes a prime target for attackers with malicious intents. There have been a number of efforts on de... 详细信息
来源: 评论
High availability through output continuity
High availability through output continuity
收藏 引用
2012 IEEE International Conference on Cluster computing Workshops, Cluster Workshops 2012
作者: Ye, Wei Dong, Yaozu Ma, Ruhui Liang, Alei Guan, Haibing Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Intel China Software Center Shanghai 200241 China
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio... 详细信息
来源: 评论
Supporting Virtualization-Aware Security Solutions Using a Systematic Approach to Overcome the Semantic Gap
Supporting Virtualization-Aware Security Solutions Using a S...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Amani S. Ibrahim James Hamlyn-Harris John Grundy Mohamed Almorsy Centre for Computing and Engineering Software Systems Swinburne University of Technology Melbourne Australia
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic ga... 详细信息
来源: 评论
TOSSMA: A Tenant-Oriented SaaS Security Management Architecture
TOSSMA: A Tenant-Oriented SaaS Security Management Architect...
收藏 引用
IEEE International Conference on Cloud computing, CLOUD
作者: Mohamed Almorsy John Grundy Amani S. Ibrahim Centre for Computing & Engineering Software Systems Swinburne University of Technology Melbourne Australia
Multi-tenancy helps service providers to save costs, improve resource utilization, and reduce service customization and maintenance time by sharing of resources and services. On the other hand, supporting multi-tenanc... 详细信息
来源: 评论
A method to automatically generate test cases from requirements
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第5期4卷 9-20页
作者: Jiang, Mingyue Ding, Zuohua Center of Math Computing and Software Engineering Zhejiang Sci-Tech University Hangzhou Zhejiang 310019 China
The automation of test case generation process can reduce the testing cost. However, the existing models being used by the test case generation techniques are largely manual built by domain expert from system requirem... 详细信息
来源: 评论
ESF - An extensive service foundation from internet of things perspective
ESF - An extensive service foundation from internet of thing...
收藏 引用
作者: Shi, Jianqi Ye, Xin Chen, Liangyu Zhang, Pei Jiang, Ningkang Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China China Electronics Technology Group Corporation No.32 Research Institute Shanghai China
The increasing interest in the Internet of Things (IoT) has brought lots of opportunities and challenges to researchers. Cyber-space and physical world are more and more amalgamated by smart devices with networking ca... 详细信息
来源: 评论
Analysis of the effects of weight distribution on proportional share scheduling  12
Analysis of the effects of weight distribution on proportion...
收藏 引用
2012 ACM Research in Applied Computation Symposium, RACS 2012
作者: Kim, AhReum Jung, Jinman Jang, Joonhyouk Kim, Sang Cheol School of Computing Soongsil University Korea Republic of School of Computer Science and Engineering Seoul National University Korea Republic of Embedded Software Research Department Electronics and Telecommunications Research Institute Korea Republic of
Proportional share scheduling algorithms have been widely studied as means of guaranteeing the QoS of applications. These algorithms allocate CPU resources to tasks based on their weight, but most are designed to beha... 详细信息
来源: 评论