咨询与建议

限定检索结果

文献类型

  • 3,891 篇 会议
  • 2,050 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,709 篇 工学
    • 2,973 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 333 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,677 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 362 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,129 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 167 篇 computational mo...
  • 139 篇 training
  • 138 篇 feature extracti...
  • 133 篇 semantics
  • 120 篇 deep learning
  • 113 篇 machine learning
  • 110 篇 computer science
  • 109 篇 software
  • 102 篇 accuracy
  • 98 篇 data models
  • 95 篇 cloud computing
  • 87 篇 computer archite...
  • 81 篇 predictive model...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 72 篇 optimization
  • 71 篇 internet of thin...
  • 71 篇 visualization

机构

  • 224 篇 college of compu...
  • 94 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 53 篇 school of inform...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,773 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6019 条 记 录,以下是4761-4770 订阅
排序:
European-Russian-Central Asian network of Master's degree “Informatics as a Second Competence”
European-Russian-Central Asian network of Master's degree “...
收藏 引用
IEEE Education engineering (EDUCON)
作者: Jean-Michel Adam Sergio Luján-Mora Agathe Merceron Marek Milosz Arto Toppinen Laboratory of Informatics of Grenoble (LIG) Pierre Mendès France University Grenoble France Department of Software and Computing Systems University of Alicante Alicante Spain Media Informatics department Beuth University of Applied Sciences Berlin Germany Institute of Computer Science Lublin University of Technology Lublin Poland School of Engineering and Technology Savonia University of Applied Sciences Savonia Finland
The aim of the ERAMIS project is to set up a network of Master's degree “Informatics as a Second Competence” among 9 beneficiary universities of Kazakhstan, Kyrgyzstan and Russia, and 5 European universities. Th... 详细信息
来源: 评论
An architecture-based dynamic adaptation model and framework for adaptive software systems
An architecture-based dynamic adaptation model and framework...
收藏 引用
9th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2011
作者: Hussein, Mohamed Gomaa, Hassan Department of Software Engineering and Computing MITRE Corporation United States Department of Computer Science George Mason University United States
This paper describes an architecture-based dynamic adaptation model and framework for adaptive software systems. The framework provides for a reusable adaptation infrastructure and uses a layered architecture pattern.... 详细信息
来源: 评论
Maintaining balance between theory and practice in information security courses  11
Maintaining balance between theory and practice in informati...
收藏 引用
2011 Information Security Curriculum Development Conference, InfoSecCD'11
作者: Peltsverger, Svetlana Information Technology Department School of Computing And Software Engineering Southern Polytechnic State University Marietta GA 30060 United States
This paper describes an approach to engage hands-on learners in research activities. As a part of this method, students are required to post a question about each assigned reading and answer at least two questions fro... 详细信息
来源: 评论
Towards learning to detect meaningful changes in software  11
Towards learning to detect meaningful changes in software
收藏 引用
International Workshop on Machine Learning Technologies in software engineering, MALETS'11 - Associated with 26th IEEE/ACM International Conference on Automated software engineering
作者: Yu, Yijun Bandara, Arosha Tun, Thein Than Nuseibeh, Bashar Computing Department The Open University Milton Keynes United Kingdom Lero Irish Software Engineering Research Centre Limerick Ireland
software developers are often concerned with particular changes that are relevant to their current tasks: not all changes to evolving software are equally important. Specified at the language-level, we have developed ... 详细信息
来源: 评论
Using automated Control Charts for the Runtime Evaluation of QoS Attributes
Using automated Control Charts for the Runtime Evaluation of...
收藏 引用
13th IEEE International Symposium on High Assurance Systems engineering, HASE 2011
作者: Amin, Ayman Colman, Alan Grunske, Lars Centre for Computing and Engineering Software Systems Faculty of Information and Communication Technologies Swinburne University of Technology Hawthorn VIC 3122 Australia Department of Computer Science Software Engineering: AG AQUA University of Kaiserslautern Kaiserslautern67653 Germany
As modern software systems operate in a highly dynamic context, they have to adapt their behaviour in response to changes in their operational environment or/and requirements. Triggering adaptation depends on detectin... 详细信息
来源: 评论
Asymptotic throughput for large-scale wireless networks with general node density
收藏 引用
Wireless Networks 2012年 第5期19卷 559-575页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Yunhao Liu Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China The Tsinghua National Laboratory for Information Science and Technology (TNLIST) Department of Computer Science and Engineering Tongji University Shanghai China The Department of Computer Science Illinois Institute of Technology Chicago USA The TNLIST and School of Software Tsinghua University Beijing China CSE The Hong Kong University of Science and Technology Kowloon Hong Kong
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast an...
来源: 评论
Research on fractional order controller based on best rational approximation approach
收藏 引用
Journal of Convergence Information Technology 2012年 第4期7卷 50-58页
作者: Zhao, Huimin Nie, Bing Li, Wen Deng, Wu Software Institute Dalian Jiaotong University Dalian 116028 China Key Laboratory of Numerical Simulation in the Sichuan Provincial College Neijiang Normal University Neijiang 641112 China Artificial Intelligence Key Laboratory of Sichuan Province Sichuan University of Science and Engineering Zigong 643000 China State Key Laboratory of Power Transmission Equipment and System Security and New Technology College of Electrical Engineering Chongqing University Chongqing 400044 China Key Laboratory of advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian 116622 China
Introduce the basic concept of best rational approximation and constructing procedure of the best rational approximation function in Laplace domain. By an illustrative example the design method of FOC based on best ra... 详细信息
来源: 评论
Risk identification and risk mitigation instruments for global software development: Systematic review and survey results
Risk identification and risk mitigation instruments for glob...
收藏 引用
2011 6th IEEE International Conference on Global software engineering Workshops, ICGSE Workshops 2011
作者: Nurdiani, Indira Jabangwe, Ronald Šmite, Darja Damian, Daniela Software Engineering Global InterAction Lab. University of Victoria VIC Canada School of Computing Blekinge Institute of Technology Karlskrona Sweden
In this research we conducted a systematic reviewon Global software Development (GSD) literature andperformed a survey to gather challenges associated with GSD projects as well as their mitigation strategies. We revie... 详细信息
来源: 评论
Predicting Thread Linking Structure by Lexical Chaining  9
Predicting Thread Linking Structure by Lexical Chaining
收藏 引用
9th Australasian Language Technology Association Workshop, ALTA 2011
作者: Wang, Li McCarthy, Diana Baldwin, Timothy Dept. of Computer Science and Software Engineering University of Melbourne Australia NICTA Victoria Research Laboratory Australia Lexical Computing Ltd
Web user forums are valuable means for users to resolve specific information needs, both interactively for participants and statically for users who search/browse over historical thread data. However, the complex stru...
来源: 评论
Scalable multi-core simulation using parallel dynamic binary translation
Scalable multi-core simulation using parallel dynamic binary...
收藏 引用
2011 11th International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation, IC-SAMOS 2011
作者: Almer, Oscar Böhm, Igor Von Koch, Tobias Edler Franke, Björn Kyle, Stephen Seeker, Volker Thompson, Christopher Topham, Nigel Institute for Computing Systems Architecture University of Edinburgh United Kingdom Software Engineering for Embedded Systems Group Technical University Berlin Germany
In recent years multi-core processors have seen broad adoption in application domains ranging from embedded systems through general-purpose computing to large-scale data centres. Simulation technology for multi-core s... 详细信息
来源: 评论