咨询与建议

限定检索结果

文献类型

  • 14,802 篇 会议
  • 6,303 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,915 篇 工学
    • 10,111 篇 计算机科学与技术...
    • 8,396 篇 软件工程
    • 2,629 篇 信息与通信工程
    • 1,747 篇 控制科学与工程
    • 1,392 篇 生物工程
    • 1,253 篇 电气工程
    • 974 篇 生物医学工程(可授...
    • 897 篇 电子科学与技术(可...
    • 842 篇 机械工程
    • 707 篇 光学工程
    • 529 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 463 篇 动力工程及工程热...
    • 440 篇 化学工程与技术
    • 405 篇 建筑学
    • 387 篇 交通运输工程
  • 5,781 篇 理学
    • 3,335 篇 数学
    • 1,567 篇 生物学
    • 1,086 篇 物理学
    • 949 篇 统计学(可授理学、...
    • 801 篇 系统科学
    • 463 篇 化学
  • 3,902 篇 管理学
    • 2,418 篇 管理科学与工程(可...
    • 1,650 篇 图书情报与档案管...
    • 1,203 篇 工商管理
  • 946 篇 医学
    • 832 篇 临床医学
    • 742 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 618 篇 法学
    • 479 篇 社会学
  • 400 篇 经济学
    • 398 篇 应用经济学
  • 399 篇 教育学
  • 214 篇 农学
  • 105 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,243 篇 software enginee...
  • 1,086 篇 computer science
  • 407 篇 application soft...
  • 385 篇 deep learning
  • 350 篇 computational mo...
  • 335 篇 computer archite...
  • 328 篇 software
  • 306 篇 machine learning
  • 289 篇 accuracy
  • 272 篇 software systems
  • 269 篇 data mining
  • 247 篇 training
  • 246 篇 internet of thin...
  • 239 篇 feature extracti...
  • 222 篇 programming
  • 216 篇 support vector m...
  • 186 篇 artificial intel...
  • 185 篇 testing
  • 182 篇 optimization
  • 173 篇 semantics

机构

  • 345 篇 college of compu...
  • 196 篇 department of co...
  • 122 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 114 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 76 篇 school of inform...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 52 篇 department of co...
  • 51 篇 department of co...
  • 49 篇 software enginee...
  • 48 篇 department of co...
  • 46 篇 department of so...
  • 45 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 26 篇 xiao qin
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 mian ajmal
  • 24 篇 kotagiri ramamoh...
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry

语言

  • 20,611 篇 英文
  • 601 篇 其他
  • 159 篇 中文
  • 7 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Software Engineering"
21365 条 记 录,以下是4831-4840 订阅
排序:
Estimating system effectiveness scoreswith incomplete evidence
Estimating system effectiveness scoreswith incomplete eviden...
收藏 引用
15th Australasian Document Computing Symposium, ADCS 2010
作者: Ravana, Sri Devi Moffat, Alistair Department of Computer Science and Software Engineering The University of Melbourne VIC 3010 Australia Department of Information Science University of Malaya Kuala Lumpur 50603 Malaysia
It is common for only partial relevance judgments to be used when comparing retrieval system effectiveness, in order to control experimental cost. Using TREC data, we consider the uncertainty introduced into per-topic... 详细信息
来源: 评论
Tool support for the design of self-optimizing mechatronic multi-agent systems
收藏 引用
International Journal on software Tools for Technology Transfer 2008年 第3期10卷 207-222页
作者: Burmester, Sven Giese, Holger Münch, Eckehard Oberschelp, Oliver Klein, Florian Scheideler, Peter Software Engineering Group Department of Computer Science University of Paderborn Paderborn Germany System Analysis and Modeling Group Hasso Plattner Institute University of Potsdam Potsdam Germany Control Engineering and Mechatronics University of Paderborn Paderborn Germany Heinz Nixdorf Institute University of Paderborn Paderborn Germany
Complex technical systems, such as mechatronic systems, can exploit networking as well as the computational power available today to achieve an automatic improvement of the technical system performance at run-time thr... 详细信息
来源: 评论
An efficient algorithm for computing MHP information for concurrent java programs
收藏 引用
7th European software engineering Conference, ESEC 1999 - Held Jointly with the 7th ACM SIGSOFT Symposium on the Foundations of software engineering, FSE 1999
作者: Naumovich, Gleb Avrunin, George S. Clarke, Lori A. Laboratory for Advanced Software Engineering Research Department of Computer Science University of Massachusetts at Amherst Amherst MA 01003-6410 United States
Information about which statements in a concurrent program may happen in parallel (MHP) has a number of important applications. It can be used in program optimization, debugging, program understanding tools, improving... 详细信息
来源: 评论
A Multiple Locking Group Scheme for Flexible Semantic Conflict Prevention in Real-Time Collaborative Programming  25
A Multiple Locking Group Scheme for Flexible Semantic Confli...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Xu, Wenhua Ma, Yifan Zhou, Hongguang Wang, Mingjie Du, Bowen Fan, Hongfei Tongji University School of Software Engineering Shanghai China University of Warwick Department of Computer Science Coventry United Kingdom Jiangsu China
Real-time collaborative programming has attracted increasing attention and interest in recent years. To resolve the semantic conflict problem in real-time collaborative programming, a Dependency-based Automatic Lockin... 详细信息
来源: 评论
Distributed change-point detection of ddos attacks: Experimental results on DETER testbed  16
Distributed change-point detection of ddos attacks: Experime...
收藏 引用
DETER Community Workshop on Cyber Security Experimentation and Test 2007, DETER 2007, co-located with the 16th USENIX Security Symposium
作者: Chen, Yu Hwang, Kai Ku, Wei-Shinn Department of Electrical and Computer Engineering SUNY Binghamton BinghamtonNY13902 United States Department of Electrical Engineering University of Southern California Los AngelesCA90089 United States Dept. of Computer Science and Software Engineering Auburn University AuburnAL36849 United States
It is highly desired to detect the DDoS flooding attacks at an early stage in order to launch effective countermeasures timely. We have developed a distributed change-point detection scheme to detect flooding type DDo... 详细信息
来源: 评论
Innovative CS capstone projects on green energy applications with WSN in a Box
Innovative CS capstone projects on green energy applications...
收藏 引用
15th Innovation and Technology in computer Science Education Conference, ITiCSE 2010
作者: Dan Lo, Chia-Tien Qian, Kai Yang, Li Department of Computing Science and Software Engineering Southern Polytechnic State University United States Department of Computer Science University of Tennessee Chattanooga United States
Green computing has become an important subject due to global warming caused by man-made greenhouse gas emissions. While green computing is an active research area, it is still of infancy in computer science (CS) educ... 详细信息
来源: 评论
Explaining propagators for s-DNNF circuits
Explaining propagators for s-DNNF circuits
收藏 引用
9th International Conference on Integration of Artificial Intelligence and Operations Research Techniques in Constraint Programming, CPAIOR 2012
作者: Gange, Graeme Stuckey, Peter J. National ICT Australia Victoria Laboratory VIC Australia Department of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia
Smooth decomposable negation normal form (s-DNNF) circuits are a compact form of representing many Boolean functions, that permit linear time satisfiability checking. Given a constraint defined by an s-DNNF circuit, w... 详细信息
来源: 评论
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 778-790页
作者: Muhammad Salah ud din Muhammad Atif Ur Rehman Rehmat Ullah Chan-Won Park Dae Ho Kim Byung-seo Kim Department of Electronics&Computer Engineering Hongik UniversitySejong City30016South Korea Department of Computing&Mathematics Manchester Metropolitan University United Kingdom Cardiff School of Technologies Cardiff Metropolitan UniversityCardiffCF52YBUnited Kingdom Electronics and Telecommunications Research Institute Daejeon34129South Korea Department of Software and Communications Engineering Hongik UniversitySejong City30016South Korea
In Wireless Multimedia Sensor Networks(WMSNs),nodes capable of retrieving video,audio,images,and small scale sensor data,tend to generate immense traffic of various *** energy-efficient transmission of such a vast amo... 详细信息
来源: 评论
RNAi-mediated transgenic rice resistance to Rice stripe virus
收藏 引用
Journal of Integrative Agriculture 2016年 第11期15卷 2539-2549页
作者: LI Li GUO Cheng WANG Biao ZHOU Tong LEI Yang DAI Yu-hua HE Wen LIANG Chun WANG Xi-feng State Key Laboratory for Biology of Plant Diseases and Insect Pests Institute of Plant ProtectionChinese Academy of Agricultural Sciences Department of Biology Miami University Institute of Plant Protection Jiangsu Academy of Agricultural Sciences Department of Computer Science and Software Engineering Miami University
Rice stripe virus(RSV) often causes severe rice yield loss in temperate regions of East Asia. Although the correlation of small interfering RNAs(si RNAs) with transgenic virus resistance of plants using RNA interf... 详细信息
来源: 评论
Study on the Role of Adaptive Power Control in Jamming Mitigation for Remote Keyless Entry Systems  29
Study on the Role of Adaptive Power Control in Jamming Mitig...
收藏 引用
29th IEEE Asia Pacific Conference on Communications, APCC 2024
作者: Alkofahi, Hamza Altarawneh, Amani Jordan University of Science and Technology Department of Software Engineering Irbid Jordan Tennessee Tech University Department of Computer Science CookevilleTN United States
Remote keyless entry (RKE) systems have become a standard feature in modern vehicles, offering the convenience of wireless control. However, this convenience is accompanied by significant security vulnerabilities, par... 详细信息
来源: 评论