咨询与建议

限定检索结果

文献类型

  • 3,891 篇 会议
  • 2,050 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,019 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,709 篇 工学
    • 2,973 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 333 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 219 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,677 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 362 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,129 篇 管理学
    • 701 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 167 篇 computational mo...
  • 139 篇 training
  • 138 篇 feature extracti...
  • 133 篇 semantics
  • 120 篇 deep learning
  • 113 篇 machine learning
  • 110 篇 computer science
  • 109 篇 software
  • 102 篇 accuracy
  • 98 篇 data models
  • 95 篇 cloud computing
  • 87 篇 computer archite...
  • 81 篇 predictive model...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 72 篇 optimization
  • 71 篇 internet of thin...
  • 71 篇 visualization

机构

  • 224 篇 college of compu...
  • 94 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 53 篇 school of inform...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,773 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6019 条 记 录,以下是4851-4860 订阅
排序:
An architecture-based dynamic adaptation model and framework for adaptive software systems
An architecture-based dynamic adaptation model and framework...
收藏 引用
ACS/IEEE International Conference on Computer Systems and Applications
作者: Mohamed Hussein Hassan Gomaa Department of Software Engineering & Computing MITRE Corporation USA Department of Computer Science George Mason University USA
This paper describes an architecture-based dynamic adaptation model and framework for adaptive software systems. The framework provides for a reusable adaptation infrastructure and uses a layered architecture pattern.... 详细信息
来源: 评论
Measuring the Conceptual Coupling of Services Using Latent Semantic Indexing
Measuring the Conceptual Coupling of Services Using Latent S...
收藏 引用
IEEE International Conference on Services computing (SCC)
作者: Ali Kazemi Ali Nasirzadeh Azizkandi Ali Rostampour Hassan Haghighi Pooyan Jamshidi Fereidoon Shams Automated Software Engineering Research Group ECE Faculty Shahid Beheshti University Tehran Iran Lero-The Irish Software Engineering Research Centre School of Computing University of Dublin Dublin Ireland
Low coupling is a service-oriented design and development principle that should be taken into account during all stages. Having loosely coupled services not only increases service reusability, but also prevents the pr... 详细信息
来源: 评论
An adaptive strategy for updating the memory in evolutionary algorithms for dynamic optimization
An adaptive strategy for updating the memory in evolutionary...
收藏 引用
IEEE Symposium on Computational Intelligence in Dynamic and Uncertain Environments
作者: Zhu, Tao Luo, Wenjian Li, Zhifang Nature Inspired Computation and Applications Laboratory School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 China
The memory scheme is one of the most widely employed techniques in Evolutionary Algorithms for solving dynamic optimization problems. The updating strategy is a key concern for the memory scheme. Unfortunately, the ex... 详细信息
来源: 评论
WebSense: A lightweight and configurable application for publishing sensor network data
WebSense: A lightweight and configurable application for pub...
收藏 引用
2011 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2011
作者: Cardell-Oliver, Rachel Huebner, Christof Foeller-Nord, Miriam School of Computer Science and Software Engineering University of Western Australia Perth Australia Institute for Industrial Data Processing and Communication University of Applied Sciences Mannheim Mannheim Germany Institute for Embedded and Mobile Computing University of Applied Sciences Mannheim Mannheim Germany
Wireless sensor networks generate volumes of scientific observations. However, gathered data is typically not published for use by other scientists. This paper analyses the reasons that so little sensor network data i... 详细信息
来源: 评论
Spike sorting based on radial basis function network with overlap decomposition
Spike sorting based on radial basis function network with ov...
收藏 引用
作者: Dai, Min Hu, Su-Rui Qi, Jia Tianjin Key Lab of Intelligent Computing and Novel Software Technology School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the most serious problems in the spike sorting f... 详细信息
来源: 评论
Communications in Computer and Information Science: Preface
Communications in Computer and Information Science
收藏 引用
Communications in Computer and Information Science 2011年 155 CCIS卷 VI页
作者: O'Connor, Rory V. Rout, Terry McCaffery, Fergal Dorling, Alec Lero The Irish Software Engineering Research Centre School of Computing Dublin City University Dublin Ireland Software Quality Institute Griffith University Brisbane QLD Australia Regulated Software Research Group Lero The Irish Software Engineering Research Centre Dundalk Institute of Technology Dundalk Ireland InterSPICE Ltd. Cambridge United Kingdom
来源: 评论
A Calculus for Mobile Ad Hoc Networks from a Group Probabilistic Perspective
A Calculus for Mobile Ad Hoc Networks from a Group Probabili...
收藏 引用
IEEE International Symposim on High Assurance Systems engineering
作者: Si Liu Yongxin Zhao Huibiao Zhu Qin Li Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Jiao Tong University Shanghai China
Mobile Ad hoc Networks (MANETs) are networks dynamically formed by mobile nodes without the support of prior stationary infrastructures. The essential features of such a network are local broadcast, mobility and proba... 详细信息
来源: 评论
Run-time discovery of Java design patterns
Run-time discovery of Java design patterns
收藏 引用
International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)
作者: Kang Miao Siyuan Jiang Xiao Yu Ji Zhao Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Jiao Tong University Shanghai China
Design patterns are widely used in design of software product in practice. To understand and discover the design patterns used in source code, we develop a run-time approach to explore the patterns from Java source co... 详细信息
来源: 评论
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model
CloudSec: A security monitoring appliance for Virtual Machin...
收藏 引用
International Conference on Network and System Security, NSS
作者: Amani S. Ibrahim James Hamlyn-Harris John Grundy Mohamed Almorsy Centre for Computing and Engineering Software Systems Faculty of Information & Communication Technologies Swinburne University of Technology Hawthorn VIC Australia
The Infrastructure-as-a-Service (IaaS) cloud computing model has become a compelling computing solution with a proven ability to reduce costs and improve resource efficiency. Virtualization has a key role in supportin... 详细信息
来源: 评论
Formal Approaches to Wireless Sensor Networks
Formal Approaches to Wireless Sensor Networks
收藏 引用
International Conference on Secure software Integration and Reliability Improvement Companion (SSIRI-C)
作者: Si Liu Xiaofeng Wu Qin Li Huibiao Zhu Qian Wang Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Jiao Tong University Shanghai China
Wireless sensor networking, as a burgeoning technology, supports the monitoring of physical environments and control of sensor data, and has been widely applied in many fields. Due to its unique features, a number of ... 详细信息
来源: 评论