咨询与建议

限定检索结果

文献类型

  • 3,891 篇 会议
  • 2,050 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,709 篇 工学
    • 2,973 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 333 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,677 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 362 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,129 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 167 篇 computational mo...
  • 139 篇 training
  • 138 篇 feature extracti...
  • 133 篇 semantics
  • 120 篇 deep learning
  • 113 篇 machine learning
  • 110 篇 computer science
  • 109 篇 software
  • 102 篇 accuracy
  • 98 篇 data models
  • 95 篇 cloud computing
  • 87 篇 computer archite...
  • 81 篇 predictive model...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 72 篇 optimization
  • 71 篇 internet of thin...
  • 71 篇 visualization

机构

  • 224 篇 college of compu...
  • 94 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 53 篇 school of inform...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,773 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6019 条 记 录,以下是4811-4820 订阅
排序:
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases
A Hybrid of the prefix algorithm and the q-hidden algorithm ...
收藏 引用
IEEE Symposium on Computational Intelligence in Cyber Security
作者: Liu, Ran Luo, Wenjian Wang, Xufa School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software Engineering in Computing and Communication Hefei 230027 Anhui China
The negative database (NDB) is a complement of the corresponding database. The NDB could protect the privacy of the data, but it should be complete and hard-to-reverse. However, existent techniques cannot generate the... 详细信息
来源: 评论
From Message Sequence Charts to Service Component Model
From Message Sequence Charts to Service Component Model
收藏 引用
The second International Conference of Electrical and Electronics engineering(ICEEE 2011)
作者: Mingyue Jiang Zuohua Ding Center of Math Computing and Software Engineering Zhejiang Sci-Tech University
Message Sequence Charts(MSCs) are a popular visual formalism for documenting system requirementsFrom MSCs to architecture level model is usually through manual work, which puts the burden on the human and may introduc... 详细信息
来源: 评论
LIR-OSGi: Extends OSGi to support distributed and heterogeneous ubiquitous computing system
LIR-OSGi: Extends OSGi to support distributed and heterogene...
收藏 引用
2011 6th International Conference on Pervasive computing and Applications, ICPCA 2011
作者: Liu, Jinzhao Lu, Xiaojuan Wang, Dan Liu, Xin Lu, Yongqiang Chen, Yu Dept. of Computer Science and Technology Beijing University of Technology Beijing China General Hospital PLA Second Artillery China Research Institute of Information Technology Key Laboratory of Pervasive Computing Ministry of Education Beijing China System Software and Software Engineering Group Laboratory of Pervasive Computing Dept. of Computer Science and Technology Beijing 100084 China
As an emerging portable service platform, OSGi is now taking a more and more important role in Ubiquitous computing environment. As a module management framework, OSGi provides the functions of dynamic loading and unl... 详细信息
来源: 评论
Generating essential user interface prototypes to validate requirements  11
Generating essential user interface prototypes to validate r...
收藏 引用
2011 26th IEEE/ACM International Conference on Automated software engineering, ASE 2011
作者: Kamalrudin, Massila Grundy, John Department of Electrical and Computer Engineering University of Auckland Private bag 92019 Auckland 1142 New Zealand Centre for Computing and Engineering Software Systems Swinburne University of Technology PO Box 218 Hawthorn VIC 3122 Australia
Requirements need to be validated at an early stage of analysis to address inconsistency and incompleteness issues. Capturing requirements usually involves natural language analysis, which is often imprecise and error... 详细信息
来源: 评论
VASP: Virtualization assisted security monitor for cross-platform protection  11
VASP: Virtualization assisted security monitor for cross-pla...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied computing
作者: Zhu, Min Yu, Miao Xia, Mingyuan Li, Bingyu Yu, Peijie Gao, Shang Qi, Zhengwei Liu, Liang Chen, Ying Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China IBM Research China China
Numerous operating systems have been designed to manage and control system resources with large and complicated features, so they need high security protection. However, previous security applications can not provide ... 详细信息
来源: 评论
Porous media precise reconstruction and porosity fluid animated simulation
Porous media precise reconstruction and porosity fluid anima...
收藏 引用
International Conference on Image and Graphics
作者: Song, Bo Dong, Lanfang Lu, Detang Vision Computing and Visualization Laboratory School of Computer Science and Technology University of Science and Technology of China Hefei China Institute of Engineering and Science Software University of Science and Technology of China Hefei China
In this paper we discuss how to precisely reconstruct porous media 3D model and simulate the fluid flow in the porous media. Considering the characteristics of the porous media's fault slice images, we present a c... 详细信息
来源: 评论
Automated extraction of data lifecycle support from database applications
Automated extraction of data lifecycle support from database...
收藏 引用
SEKE 2011 - Proceedings of the 23rd International Conference on software engineering and Knowledge engineering
作者: Liu, Kaiping Tan, Hee Beng Kuan Chen, Xu Zhang, Hongyu Padmanabhuni, Bindu Madhavi School of Electrical and Electronic Engineering Nanyang Technological University Singapore Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China School of Software Tsinghua University Beijing 100084 China
Database application is one of the most common types of systems. Grounded on the simple concept of data lifecycle-any data in database is created from insertion, used via selection and modification and terminated at d... 详细信息
来源: 评论
MyEACBR -myCBR as explanation-aware Protégé plugin
MyEACBR -myCBR as explanation-aware Protégé plugin
收藏 引用
16th UK Workshop on Case-Based Reasoning, UKCBR 2011
作者: Lillehaug, Marvin Bredal Roth-Berghofer, Thomas Kofod-Petersen, Anders Department of Computer and Information Science Norwegian University of Science and Technology 7491 Trondheim Norway Centre for Model-based Software Engineering and Explanation-aware Computing School of Computing and Technology University of West London London W5 5RF United Kingdom
Explanation, trust, and transparency are concepts that are strongly tied in with users' confidence in, and acceptance of computerised systems. Case-based reasoning (CBR) systems lend themselves easily to generate ... 详细信息
来源: 评论
Evaluating effectiveness of risk identification and management using organisational models
Evaluating effectiveness of risk identification and manageme...
收藏 引用
IEEE International Conference on Computer Research and Development
作者: Bhuiyan, Moshiur Rana, Sohel Krishna, Aneesh Decision Systems Laboratory School of Computer Science and Software Engineering University of Wollongong NSW 2522 Australia OptInfra Systems Sydney NSW Australia Department of Computing Faculty of Science and Engineering Curtin University of Technology Perth WA 6102 Australia
In this paper firstly we discuss an approach for supporting risk identification with the use of higher-level organizational models. We provide some intuitive metrics for extracting measures of actor criticality and vu... 详细信息
来源: 评论
State/Action-based Fairness Verification for Non-determinism
收藏 引用
电子学报(英文版) 2011年 第4期20卷 603-606页
作者: XU Guangquan PANG Shanchen GAO Honghao XIAO Yingyuan LI Xiaohong FENG Zhiyong School of Computer Science and Technology Tianjin University Tianjin China Department of Computer Science and Technology Tsinghua University Beijing China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China School of Computer Engineering and Science Shanghai University Shanghai China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
Most of the existing work about fairness verification was carried out by checking the fairness based on state, action, or process respectively. It is hard to resolve the fairness issue for complex software systems, es... 详细信息
来源: 评论