咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是4901-4910 订阅
排序:
Exploring tweets normalization and query time sensitivity for twitter search
Exploring tweets normalization and query time sensitivity fo...
收藏 引用
20th Text REtrieval Conference, TREC 2011
作者: Wei, Zhongyu Gao, Wei Zhou, Lanjun Li, Binyang Wong, Kam-Fai Department of System Engineering and Engineering Management Chinese University of Hong Kong Shatin N.T. Hong Kong Qatar Computing Research Institute Qatar Foundation Doha Qatar Key Laboratory of High Confidence Software Technologies Ministry of Education China
This paper presents our work for the Realtime Adhoc Task of TREC 2011 Microblog Track. Microblog texts like tweets are generally characterized by the inclusion of a large proportion of irregular expressions, such as i... 详细信息
来源: 评论
CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud model
Proceedings - 2011 5th International Conference on Network a...
收藏 引用
Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011 2011年 113-120页
作者: Ibrahim, Amani S. Hamlyn-Harris, James Grundy, John Almorsy, Mohamed Centre for Computing and Engineering Software Systems Faculty of Information and Communication Technologies Swinburne University of Technology Hawthorn VIC Australia
The Infrastructure-as-a-Service (IaaS) cloud computing model has become a compelling computing solution with a proven ability to reduce costs and improve resource efficiency. Virtualization has a key role in supportin... 详细信息
来源: 评论
On the self representation based on the adaptive self radius
On the self representation based on the adaptive self radius
收藏 引用
4th International Workshop on Advanced Computational Intelligence, IWACI 2011
作者: Zhang, Jie Luo, Wenjian School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
Self representation problem is very important for the negative selection algorithms. In this paper, two methods, named as K-NN-ASR and B-NN-ASR, are proposed to calculate the self radius of a self sample in the contin... 详细信息
来源: 评论
A game theoretic model and tree analysis method for fair exchange protocols
A game theoretic model and tree analysis method for fair exc...
收藏 引用
5th International Conference on Theoretical Aspects of software engineering, TASE 2011
作者: Li, Guoqiang Gu, Yonggen Tao, Xiuting Tao, Jie School of Software Shanghai Jiao Tong University MOE-MS Key Laboratory for Intelligent Computing and Intelligent Systems Shanghai China School of Information and Engineering Huzhou Teachers College Zhejiang China College of Mathematics Physics and Information Engineering Zhejiang Normal University China
Exchange protocols are an important theoretic basis to make secure electronic commerce and electronic business transactions possible, in which the fairness is a crucial property. To ensure and verify the property, a s... 详细信息
来源: 评论
Automation of test case generation from textual use cases
Automation of test case generation from textual use cases
收藏 引用
International Conference on Information Sciences and Interaction Sciences (ICIS)
作者: Mingyue Jiang Zuohua Ding Center of Math Computing and Software Engineering Zhejiang Science and Technology University Hangzhou Zhejiang China
Textual use cases are often used to describe system requirements and are believed to be a good basis for system testing. However, due to the lacking of formal syntax and semantics of textual use cases, it is hard to b... 详细信息
来源: 评论
Customisable Transformation-Driven Evolution for Service Architectures
Customisable Transformation-Driven Evolution for Service Arc...
收藏 引用
(CSMR) European Conference on software Maintenance and Reengineering
作者: Aakash Ahmad Claus Pahl Lero-The Irish Software Engineering Research Centre School of Computing University of Dublin Dublin Ireland
Service-based architectures have now become commonplace, creating the need to address their systematic maintenance and evolution. We propose to enable transformation-driven evolution for service architectures in a sem... 详细信息
来源: 评论
Modeling and analysis of collaboration network in large-scale complex software systems
Modeling and analysis of collaboration network in large-scal...
收藏 引用
作者: Sun, Shiwen Xia, Chengyi Wang, Li School of Computer and Communication Engineering Tianjin University of Technology Tianjin 300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
Large-scale software systems represent an important class of artificial complex systems, which can be investigated from the complex network perspective. Based on the collaboration network model, the collaboration rela... 详细信息
来源: 评论
Directed differential evolution based on directional derivative for numerical optimization problems
Directed differential evolution based on directional derivat...
收藏 引用
2011 11th International Conference on Hybrid Intelligent Systems, HIS 2011
作者: Zhang, Jun Luo, Wenjian School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China Anhui Province Key Laboratory of Software Engineering in Computing and Communication University of Science and Technology of China Hefei 230027 Anhui China
Differential Evolution is one kind of Evolutionary Algorithms, which has been successfully applied to solve many optimization problems. In this paper, a directed differential mutation (DDM), which utilizes the directi... 详细信息
来源: 评论
Unsupervised saliency detection based on 2D gabor and curvelets transforms  11
Unsupervised saliency detection based on 2D gabor and curvel...
收藏 引用
3rd International Conference on Internet Multimedia computing and Service, ICIMCS 2011
作者: Zhong, Sheng-Hua Liu, Yan Shao, Ling Wu, Gangshan Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Department of Electronic and Electrical Engineering University of Sheffield Sheffield United Kingdom State Key Laboratory for Novel Software Technology Nanjing University China
Construction of saliency map in multimedia data is useful for applications in multimedia like object segmentation, quality assessment, and object recognition. In this paper, we propose a novel saliency map model calle... 详细信息
来源: 评论
A probabilistic context-aware approach for quality of experience measurement in pervasive systems  11
A probabilistic context-aware approach for quality of experi...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied computing
作者: Mitra, Karan Zaslavsky, Arkady Åhlund, Christer Center for Distributed Systems and Software Engineering Monash University 900 Dandenong Road Caulfield East VIC 3145 Australia Computer Science and Electrical Engineering Luleå University of Technology SE-97187 Luleå Sweden Division of Mobile Networking and Computing SE-93187 Skellefteå Sweden
In this paper, we develop a novel context-aware approach for quality of experience (QoE) modeling, reasoning and inferencing in mobile and pervasive computing environments. The proposed model is based upon a state-spa... 详细信息
来源: 评论