咨询与建议

限定检索结果

文献类型

  • 3,878 篇 会议
  • 2,037 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 5,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,701 篇 工学
    • 2,969 篇 计算机科学与技术...
    • 2,451 篇 软件工程
    • 741 篇 信息与通信工程
    • 489 篇 控制科学与工程
    • 414 篇 生物工程
    • 331 篇 电气工程
    • 261 篇 生物医学工程(可授...
    • 224 篇 机械工程
    • 218 篇 电子科学与技术(可...
    • 186 篇 光学工程
    • 138 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 128 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 123 篇 动力工程及工程热...
    • 117 篇 交通运输工程
  • 1,678 篇 理学
    • 955 篇 数学
    • 449 篇 生物学
    • 363 篇 物理学
    • 300 篇 统计学(可授理学、...
    • 193 篇 系统科学
    • 147 篇 化学
  • 1,128 篇 管理学
    • 700 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 228 篇 医学
    • 202 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 156 篇 法学
    • 117 篇 社会学
  • 135 篇 教育学
    • 129 篇 教育学
  • 125 篇 经济学
    • 123 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 229 篇 software enginee...
  • 166 篇 computational mo...
  • 137 篇 feature extracti...
  • 136 篇 training
  • 132 篇 semantics
  • 119 篇 deep learning
  • 113 篇 machine learning
  • 110 篇 computer science
  • 109 篇 software
  • 100 篇 accuracy
  • 95 篇 cloud computing
  • 95 篇 data models
  • 87 篇 computer archite...
  • 80 篇 quality of servi...
  • 79 篇 data mining
  • 79 篇 security
  • 78 篇 predictive model...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 71 篇 visualization

机构

  • 222 篇 college of compu...
  • 95 篇 national enginee...
  • 69 篇 department of co...
  • 68 篇 state key labora...
  • 65 篇 shanghai key lab...
  • 57 篇 institute of com...
  • 54 篇 college of intel...
  • 52 篇 department of co...
  • 52 篇 school of inform...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of big da...
  • 46 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 37 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 43 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 25 篇 zuohua ding
  • 24 篇 yuanping xu
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 xiaofei wang
  • 20 篇 ding zuohua
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...

语言

  • 5,747 篇 英文
  • 202 篇 其他
  • 49 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
5993 条 记 录,以下是4941-4950 订阅
排序:
Materialized view maintenance in columnar storage for massive data analysis
Materialized view maintenance in columnar storage for massiv...
收藏 引用
2010 4th International Universal Communication Symposium, IUCS 2010
作者: Xu, Chen Zhou, Minqi Qian, Weining Institute of Massive Computing Software Engineering Institute East China Normal University Shanghai 200062 China
Data-intensive computing becomes a buzz word nowadays, where constant data for current operational processing and historical data for massive analysis are often separated into two systems. How to keep the historical d... 详细信息
来源: 评论
Polynomial-time hierarchy of computable reals
收藏 引用
Journal of Computational Information Systems 2011年 第4期7卷 1108-1115页
作者: Chen, Qingliang Su, Kaile Wu, Lijun Department of Computer Science Jinan University Guangzhou 510632 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Key Laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China Institute for Integrated and Intelligent Systems Griffith University Brisbane Australia School of Computer Science and Engineering University of Electronic Science and Technology Chengdu 610054 China
In mathematics, various representations of real numbers have been investigated and all these representations are proved to be mathematically equivalent. Furthermore, it is known that all effective versions of these re... 详细信息
来源: 评论
Modeling and behavior checking of component based architecture
Modeling and behavior checking of component based architectu...
收藏 引用
2nd International Conference on software engineering and Data Mining, SEDM 2010
作者: Ding, Zuohua Zhang, Na Center of Math Computing and Software Engineering Zhejiang Sci-Tech University Hangzhou Zhejiang 310018 China
In this paper, we study component-based software architectures and report the following results. 1)By defining port operations, we may use port activities to describe process migration. The proposed formalism(port alg... 详细信息
来源: 评论
A Distributed Intrusion Detection System against flooding Denial of Services attacks
A Distributed Intrusion Detection System against flooding De...
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Xie Chuiyi Zhang Yizhi Bai Yuan Luo Shuoshan Xu Qin School of Mathematics and Information Science ShaoGuan University Guangdong China Information Security Center Beijing University of Posts and Telecommunications Beijing China School of Electronics & Information Engineering Liaoning University of Technology China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China Beijing Safe-Code Technology Company Limited China
A DIDS(Distributed Intrusion Detection System) named as F-DIDS is built to defend against flooding DoS(Denial of Services) attacks in the paper. F-DIDS is composed of F-IDSes which are settled in nodes who need to be ... 详细信息
来源: 评论
Requirement checking: Generating uses cases out of navigational logs in web applications
Requirement checking: Generating uses cases out of navigatio...
收藏 引用
10th International Conference on Quality software, QSIC 2010
作者: Ding, Zuohua Jiang, Mingyue Pu, Geguang Liu, Jing Center of Math Computing and Software Engineering Zhejiang Sci-Tech University Hangzhou Zhejiang 310019 China Software Engineering Institute East China Normal University Shanghai 200062 China
For a web application, we rebuild the use cases from the log file by applying Natural Language Processing technique;then based on these use cases we construct component model and extract the component behavior;finally... 详细信息
来源: 评论
Extracting informative genes from unprocessed microarray data
Extracting informative genes from unprocessed microarray dat...
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Tong, Dong-Ling Software Systems Research Centre School of Design Engineering and Computing Bournemouth University Poole Dorset United Kingdom
Numerous feature selection methods have been developed to identify informative genes from a large pool of genes that are not involved in the array experiments. However, the integrity of the reported genes is still unc... 详细信息
来源: 评论
Reengineering of Java legacy system based on aspect-oriented programming
Reengineering of Java legacy system based on aspect-oriented...
收藏 引用
2nd International Workshop on Education Technology and Computer Science, ETCS 2010
作者: Chen, Liangyu Wang, Jianlin Xu, Ming Zeng, Zhenbing Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China
Legacy System is difficult to be maintained and refactored for lack of necessary documents and source codes. How to generate some valuable information from system runtime behaviors is a big challenge to systems reengi... 详细信息
来源: 评论
A formal proof of pasting lemma in Isabelle/HOL
A formal proof of pasting lemma in Isabelle/HOL
收藏 引用
2nd International Conference on Networks Security, Wireless Communications and Trusted computing, NSWCTC 2010
作者: Wang, Jianlin Chen, Liangyu Zeng, Zhenbing Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China
Pasting lemma is proved in Isabelle/HOL. General topology is formalized to express Pasting lemma. Topology definitions and proofs are written in a computer language so that they can be formally verified by machine. We... 详细信息
来源: 评论
Towards an industrial grade IVE for Java and next generation research platform for JML
收藏 引用
International Journal on software Tools for Technology Transfer 2010年 第6期12卷 429-446页
作者: Chalin, Patrice Robby James, Perry R. Lee, Jooyong Karabotsos, George Department of Computer Science and Software Engineering Concordia University Montreal QC Canada SAnToS Laboratory Department of Computing and Information Sciences Kansas State University Manhattan KS United States
Tool support for the Java Modeling Language (JML) is a very pressing problem. A main issue with current tools is their architecture;the cost of keeping up with the evolution of Java is prohibitively high, e.g., Java 5... 详细信息
来源: 评论
Approximation algorithm for minimizing relay node placement in wireless sensor networks
收藏 引用
Science China(Information Sciences) 2010年 第11期53卷 2332-2342页
作者: LU KeZhong1,2, CHEN GuoLiang1,2, FENG YuHong1,2, LIU Gang1,2 & MAO Rui1,2 1College of Computer Science and software engineering, Shenzhen University, Shenzhen 518060, China 2National High Performance computing Center at Shenzhen, Shenzhen 518060, China 1. College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060 China2. National High Performance Computing Center at Shenzhen Shenzhen 518060 China
To eliminate the routing load unbalance among sensor nodes, one approach is to deploy a small number of powerful relay nodes acting as routing nodes in wireless sensor networks, the major optimization objective of whi... 详细信息
来源: 评论