咨询与建议

限定检索结果

文献类型

  • 2,050 篇 会议
  • 868 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,737 篇 工学
    • 1,344 篇 计算机科学与技术...
    • 1,114 篇 软件工程
    • 333 篇 信息与通信工程
    • 299 篇 控制科学与工程
    • 165 篇 生物工程
    • 145 篇 电气工程
    • 120 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 84 篇 安全科学与工程
    • 83 篇 光学工程
    • 73 篇 动力工程及工程热...
    • 66 篇 建筑学
    • 66 篇 土木工程
    • 65 篇 仪器科学与技术
    • 65 篇 化学工程与技术
    • 56 篇 网络空间安全
  • 778 篇 理学
    • 413 篇 数学
    • 190 篇 生物学
    • 147 篇 系统科学
    • 145 篇 物理学
    • 124 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 200 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 128 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 80 篇 法学
    • 62 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 54 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 77 篇 computational mo...
  • 75 篇 application soft...
  • 71 篇 deep learning
  • 71 篇 accuracy
  • 70 篇 laboratories
  • 68 篇 software systems
  • 68 篇 machine learning
  • 67 篇 software
  • 61 篇 computer archite...
  • 59 篇 artificial intel...
  • 58 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 47 篇 security
  • 46 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of softwa...
  • 10 篇 department of so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,837 篇 英文
  • 120 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Software Systems"
2974 条 记 录,以下是2451-2460 订阅
排序:
Exception diagnosis architecture for open multi-agent systems
Exception diagnosis architecture for open multi-agent system...
收藏 引用
5th Workshop on software engineering for Large-Scale Multi-Agent systems, SELMAS 2006
作者: Shah, Nazaraf Chao, Kuo-Ming Godwin, Nick Software Engineering Research Group Sheffield Hallam University Sheffield United Kingdom DSM Research Group Department of Computer and Network Systems Coventry University Coventry United Kingdom
Multi-Agent systems (MAS) are collection of loosely coupled intelligent agents. These systems operate in a distributed, highly dynamic, unpredictable and unreliable environment in order to meet their overall goals. Ag... 详细信息
来源: 评论
A Robust and Low-Complexity Gas Recognition Technique for On-Chip Tin-Oxide Gas Sensor Array
收藏 引用
Journal of Sensors 2008年 第1期2008卷
作者: Farid Flitti Aicha Far Bin Guo Amine Bermak School of Computer Science and Software Engineering The University of Western Australia 35 Stirling Highway CRAWLEY WA 6009 Australiauwa.edu.au Smart Sensory Integrated Systems Lab ECE Department The Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kongust.hk
Gas recognition is a new emerging research area with many civil, military, and industrial applications. The successof any gas recognition system depends on its computationalcomplexity and its robustness. In this work,...
来源: 评论
Evaluation of medical image watermarking with tamper detection and recovery (AW-TDR)
Evaluation of medical image watermarking with tamper detecti...
收藏 引用
29th Annual International Conference of IEEE-EMBS, engineering in Medicine and Biology Society, EMBC'07
作者: Zain, Jasni M. Fauzi, Abdul R. M. IEEE Faculty of Computer Systems and Software Engineering University Malaysia Pahang Locked Bag 12 25000 Kuantan Pahang Malaysia Department of Internal Medicine International Islamic University Kuantan Pahang
This paper will study and evaluate watermarking technique by Zain and Fauzi [1]. Recommendations will then be made to enhance the technique especially in the aspect of recovery or reconstruction rate for medical image... 详细信息
来源: 评论
Five years of success: Some outcomes of the Carnegie Mellon Information Assurance Capacity Building Program
Five years of success: Some outcomes of the Carnegie Mellon ...
收藏 引用
24th Information systems Education Conference, ISECON 2007
作者: Sledge, Carol Manson, Daniel P. Berta, Anna Maria Tsamitis, Dena Haritos Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213 United States Computer Information Systems Department California State Polytechnic University Pomona Pomona CA 91768 United States
In July 2007 Carnegie Mellon University (Carnegie Mellon®) hosted its sixth annual offering of the Information Assurance Capacity Building Program (IACBP). The goal of the intensive in-residence summer program is... 详细信息
来源: 评论
A compositional method for the synthesis of asynchronous communication mechanisms
收藏 引用
28th International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency
作者: Gorgonio, Kyller Cortadella, Jordi Xia, Fei Embedded Systems and Pervasive Computing Laboratory Federal University of Campina Grande Brazil Department of Software Universitat Politécnica de Catalunya Spain School of Electrical Electronic and Computer Engineering University of Newcastle Upon Tyne United Kingdom
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the gen... 详细信息
来源: 评论
A modal logic for beliefs and pro attitudes
A modal logic for beliefs and pro attitudes
收藏 引用
AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
作者: Su, Kaile Sattar, Abdul Lin, Han Reynolds, Mark Institute for Integrated and Intelligent Systems Griffith University Brisbane Australia Key Laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China Department of Computer Science Sun Yat-Sen University Guangzhou China School of Computer Science and Software Engineering University of Western Australia Perth Australia
Agents' pro attitudes such as goals, intentions, desires, wishes, and judgements of satisfactoriness play an important role in how agents act rationally. To provide a natural and satisfying formalization of these ... 详细信息
来源: 评论
Multi-Objective Genetic Algorithm to Support Class Responsibility Assignment
Multi-Objective Genetic Algorithm to Support Class Responsib...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Michael Bowman Lionel C. Briand Yvan Labiche Software Quality Engineering Laboratory Department of Systems and Computer Engineering Carleton University Ottawa ONT Canada
Class responsibility assignment is not an easy skill to acquire. Though there are many methodologies for assigning responsibilities to classes, they all rely on human judgment and decision making. Our objective is to ... 详细信息
来源: 评论
Mobile game development: Object-orientation or not
Mobile game development: Object-orientation or not
收藏 引用
31st Annual International computer software and Applications Conference, COMPSAC 2007
作者: Zhang, Weishan Han, Dong Kunz, Thomas Hansen, Klaus Marius School of Software Engineering Tongji University No. 1239 Siping Road Shanghai 200092 China Department of Computer Science Anhui Vocational College of Electronics and IT Anhui 233030 China Department of Systems and Computer Engineering Carleton University Ottawa K1S 5B6 Canada Computer Science Department University of Aarhus Aabogade 34 8200 Aarhus N Denmark
Mobile games are one of the primary entertainment applications at present. Limited by scarce resources, such as memory, CPU, input and output, etc, mobile game development is more difficult than desktop application de... 详细信息
来源: 评论
Testing Intrusion Detection systems in MANET: A Comprehensive Study
Testing Intrusion Detection Systems in MANET: A Comprehensiv...
收藏 引用
Annual Conference on Communication Networks and Services Research (CNSR)
作者: Hadi Otrok Joey Paquet Mourad Debbabi Prabir Bhattacharya Concordia Institute for Information Systems Engineering Department Computer Security Laboratory Computer Science and Software Engineering Department Concordia University Montreal QUE Canada
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infra... 详细信息
来源: 评论
Can graduating students design software systems
Can graduating students design software systems
收藏 引用
37th SIGCSE Technical Symposium on computer Science Education
作者: Eckerdal, Anna McCartney, Robert Moström, Jan Erik Ratcliffe, Mark Zander, Carol Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT 06269 United States Department of Computing Science Umeå University 901 87 Umeå Sweden Department of Computer Science University of Wales Aberystwyth United Kingdom Computing and Software Systems University of Washington Bothell Bothell WA United States
This paper examines software designs produced by students nearing completion of their computer Science degrees. The results of this multi-national, multi institutional experiment present some interesting implications ... 详细信息
来源: 评论