咨询与建议

限定检索结果

文献类型

  • 3,891 篇 会议
  • 2,050 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,709 篇 工学
    • 2,973 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 333 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,677 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 362 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,129 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 167 篇 computational mo...
  • 139 篇 training
  • 138 篇 feature extracti...
  • 133 篇 semantics
  • 120 篇 deep learning
  • 113 篇 machine learning
  • 110 篇 computer science
  • 109 篇 software
  • 102 篇 accuracy
  • 98 篇 data models
  • 95 篇 cloud computing
  • 87 篇 computer archite...
  • 81 篇 predictive model...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 72 篇 optimization
  • 71 篇 internet of thin...
  • 71 篇 visualization

机构

  • 224 篇 college of compu...
  • 94 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 53 篇 school of inform...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,773 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6019 条 记 录,以下是4791-4800 订阅
排序:
On the engineering of systems of systems: Key challenges for the requirements engineering community
On the engineering of systems of systems: Key challenges for...
收藏 引用
2011 Workshop on Requirements engineering for Systems, Services and Systems-of-Systems, RESS 2011 - Workshop Co-located with the 19th IEEE International Requirements engineering Conference
作者: Ncube, Cornelius Software Systems Research Centre School of Design Engineering and Computing Bournemouth University Poole Dorset BH12 5BB United Kingdom
software intensive systems of the future will be ultra large-scale systems of systems. Systems of Systems engineering focuses on the interoperation of many independent, self-contained constituent systems to achieve a ... 详细信息
来源: 评论
A comparative study and analysis on K-view based algorithms for image texture classification  11
A comparative study and analysis on K-view based algorithms ...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied computing
作者: Lan, Yihua Liu, Hong Song, Enmin Hung, Chih-Cheng School of Computer Science Huazhong University of Science and Technology Wuhan China School of Computing and Software Engineering Southern Polytechnic State University GA United States
Several K-View based algorithms have been made for developing image texture classification. These are K-View-Template algorithm (K-View-T), K-View-Datagram algorithm (K-View-D), Fast Weighted K-View-Voting algorithm (... 详细信息
来源: 评论
Production planning in a software product line organization
Production planning in a software product line organization
收藏 引用
15th International software Product Line Conference, SPLC 2011
作者: Chastek, Gary McGregor, John D. Software Engineering Institute 4500 Fifth Avenue Pittsburgh PA 15213 United States School of Computing Clemson University Clemson SC 29634 United States
Production planning gives early guidance concerning how products should be built and hence how core assets should be designed. The production strategy addresses business goals through product building. The production ... 详细信息
来源: 评论
PrimAndroid: Privacy policy modelling and analysis for android applications
PrimAndroid: Privacy policy modelling and analysis for andro...
收藏 引用
作者: Benats, Guillaume Bandara, Arosha Yu, Yijun Colin, Jean-Noël Nuseibeh, Bashar Centre for Research in Computing Department of Computing The Open University Milton Keynes MK10 9FG United Kingdom Faculty of Computer Sciences FUNDP Namur Belgium Lero Irish Software Engineering Centre Ireland
The rapid growth of mobile applications has imposed new threats to privacy: users often find it challenging to ensure that their privacy policies are consistent with the requirements of a diverse range of of mobile ap... 详细信息
来源: 评论
Combining static and dynamic analysis to discover software vulnerabilities
Combining static and dynamic analysis to discover software v...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous computing, IMIS 2011
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibin School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
Dynamic taint analysis has been proved to be very effective in solving security problems recently, especially in software vulnerability detection and malicious behavior prevention. Unfortunately, most of current resea... 详细信息
来源: 评论
Research on ultra-dependable embedded real time operating system
Research on ultra-dependable embedded real time operating sy...
收藏 引用
2011 IEEE/ACM International Conference on Green computing and Communications, GreenCom 2011
作者: Chen, Hui Yang, Shi Ping Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China Guangzhou Haige Communication Industry Group Guangzhou China
In this paper, to research and design ultra-dependable embedded real time operating system supporting security and safety, spatial and temporal isolation safeguard is proposed and used. Temporal isolation mechanism gu... 详细信息
来源: 评论
Fluctuation free matrix representation based random data partitioning through HDMR
收藏 引用
AIP Conference Proceedings 2012年 第1期1504卷
作者: M. Alper Tunga Metin Demiralp Bahçeşehir University Faculty of Engineering Department of Software Engineering Beşiktaş 34349 İstanbul Turkey İstanbul Technical University Informatics Institute Computational Science and Engineering Program Group for Science and Methods of Computing Maslak 34469 İstanbul Turkey
High Dimensional Model Representation (HDMR) method does not have the random data partitioning capability because of its nature. This paper focuses on how we can bring the random data partitioning feature to the HDMR ...
来源: 评论
Exploring Covert Channels
Exploring Covert Channels
收藏 引用
Annual Hawaii International Conference on System Sciences (HICSS)
作者: Jason Jaskolka Ridha Khedri Department of Computing and Software Faculty of Engineering McMaster University Canada
Covert channels pose a threat to system security for many reasons. One of the most significant security concerns surrounding the use of covert channels in computer and information systems involves confidentiality and ... 详细信息
来源: 评论
Binary bell polynomials, bilinear approach to exact periodic wave solutions of (2 + 1)-dimensional nonlinear evolution equations
收藏 引用
Communications in Theoretical Physics 2011年 第4期56卷 672-678页
作者: Wang, Yun-Hu Chen, Yong Software Engineering Institute East China Normal University Shanghai Key Laboratory of Trustworthy Computing Shanghai 200062 China Nonlinear Science Center and Department of Mathematics Ningbo University Ningbo 315211 China
In the present letter, we get the appropriate bilinear forms of (2 + 1)-dimensional KdV equation, extended (2 + 1)-dimensional shallow water wave equation and (2 + 1)-dimensional Sawada - Kotera equation in a quick an... 详细信息
来源: 评论
Architectural design decision visualization for architecture design: Preliminary results of a controlled experiment  11
Architectural design decision visualization for architecture...
收藏 引用
5th European Conference on software Architecture, ECSA 2011 - Workshop on Traceability, Dependencies and software Architecture, TDSA 2011, 1st International Workshop on software Architecture Variability, SAVA 2011
作者: Shahin, Mojtaba Liang, Peng Li, Zengyang State Key Lab of Software Engineering Wuhan University Wuhan China Department of Computer Engineering Neyriz Branch Islamic Azad University Neyriz Iran Department of Computing Science University of Groningen Groningen Netherlands
Visualization of architectural design decision (ADD) and its rationale, as a kind of traceability information, is supposed to facilitate the understanding of architecture design and the reasoning behind the design rat... 详细信息
来源: 评论