咨询与建议

限定检索结果

文献类型

  • 2,050 篇 会议
  • 868 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,737 篇 工学
    • 1,344 篇 计算机科学与技术...
    • 1,114 篇 软件工程
    • 333 篇 信息与通信工程
    • 299 篇 控制科学与工程
    • 165 篇 生物工程
    • 145 篇 电气工程
    • 120 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 84 篇 安全科学与工程
    • 83 篇 光学工程
    • 73 篇 动力工程及工程热...
    • 66 篇 建筑学
    • 66 篇 土木工程
    • 65 篇 仪器科学与技术
    • 65 篇 化学工程与技术
    • 56 篇 网络空间安全
  • 778 篇 理学
    • 413 篇 数学
    • 190 篇 生物学
    • 147 篇 系统科学
    • 145 篇 物理学
    • 124 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 200 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 128 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 80 篇 法学
    • 62 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 54 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 77 篇 computational mo...
  • 75 篇 application soft...
  • 71 篇 deep learning
  • 71 篇 accuracy
  • 70 篇 laboratories
  • 68 篇 software systems
  • 68 篇 machine learning
  • 67 篇 software
  • 61 篇 computer archite...
  • 59 篇 artificial intel...
  • 58 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 47 篇 security
  • 46 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of softwa...
  • 10 篇 department of so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,837 篇 英文
  • 120 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2974 条 记 录,以下是2691-2700 订阅
排序:
A Context—Aware Infrastructure for Supporting Applications with Pen—Based Interaction
收藏 引用
Journal of computer Science & Technology 2003年 第3期18卷 343-353页
作者: 栗阳 关志伟 戴国忠 任向实 韩勇 Human-Computer Interaction Laboratory Institute of Software The Chinese Academy of Sciences Beijing 100080 P.R. China Department of Information Systems Engineering Kochi University of Technology Tosayamada-cho Kochi 782-8502 Japan
Pen-based user interfaces which leverage the affordances of the pen provide userswith more flexibility and natural interaction. However, it is difficult to construct usable pen-baseduser interfaces because of the lack... 详细信息
来源: 评论
On the cost-quality tradeoff in topology-aware overlay path probing  11
On the cost-quality tradeoff in topology-aware overlay path ...
收藏 引用
11th IEEE International Conference on Network Protocols, ICNP 2003
作者: Tang, Chiping McKinley, P.K. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2), which is prohibitive in large-scale overlay networks. Several methods have... 详细信息
来源: 评论
Using SPIN and STeP to verify business processes specifications
收藏 引用
5th International Andrei Ershov Memorial Conference on Perspectives of System Informatics, PSI 2003
作者: Augusto, Juan C. Butler, Michael Ferreira, Carla Craig, Stephen-John Declarative Systems and Software Engineering Research Group Department of Electronics and Computer Science University of Southampton Southampton United Kingdom
Business transactions are prone to failure and having to deal with unexpected situations. Some business process specification languages, e.g. StAC, introduce notions like compensation handling. Given the need of verif... 详细信息
来源: 评论
AutoMate: Enabling autonomic applications on the grid  5
AutoMate: Enabling autonomic applications on the grid
收藏 引用
5th Annual International Workshop on Active Middleware Services, AMS 2003
作者: Agarwal, M. Bhat, V. Liu, H. Matossian, V. Putty, V. Schmidt, C. Zhang, G. Zhen, L. Parashar, M. Khargharia, B. Hariri, S. Applied Software Systems Laboratory Department of Electrical and Computer Engineering Rutgers the State University of New Jersey United States High Performance Distributed Computing Laboratory Department of Electrical and Computer Engineering University of Arizona United States
The increasing complexity, heterogeneity and dynamism of networks, systems, services applications have made our computational/information infrastructure brittle, unmanageable and insecure. This has necessitated the in... 详细信息
来源: 评论
Comparison of some negotiation algorithms using a tournament-based approach
Comparison of some negotiation algorithms using a tournament...
收藏 引用
International Workshop on Agent Technologies for e-Services, ATES 2002, 3rd International Symposium on Multi-Agent systems, Large Complex systems, and E-Businesses, MALCEB 2002 and International Workshop on Agent Technology and software engineering, AgeS 2002 held in conjunction with International Conference on Net.ObjectDays, NODe 2002
作者: Henderson, Peter Crouch, Stephen Walters, Robert John Ni, Qinglai Declarative Systems and Software Engineering Department of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom
This paper provides some results and analysis of several negotiation algorithms. We have used a tournament-based approach to evaluation and applied this within a community of Buyers and Sellers in a simulated car hire... 详细信息
来源: 评论
Towards automated support for deriving test data from UML statecharts
Towards automated support for deriving test data from UML st...
收藏 引用
6th International Conference on Unified Modeling Language, UML 2003
作者: Briand, Lionel C. Cui, Jim Labiche, Yvan Software Quality Engineering Laboratory Systems and Computer Engineering Department Carleton University 1125 Colonel By Drive OttawaONK1S5B6 Canada
Many statechart-based testing strategies result in specifying a set of paths to be executed through a (flattened) statechart. These techniques can usually be easily automated so that the tester does not have to go thr... 详细信息
来源: 评论
Datawarp: Building applications which make progress in an inconsistent world
Datawarp: Building applications which make progress in an in...
收藏 引用
4th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable systems, DAIS 2003 held as a joint event in federation with 6th IFIP WG 6.1 International Conference on Formal Methods for Open Object-based Distributed systems, FMOODS 2003
作者: Henderson, Peter Walters, Robert John Crouch, Stephen Ni, Qinglai Declarative Systems and Software Engineering Group Department of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom
The usual approach to dealing with imperfections in data is to attempt to eliminate them. However, the nature of modern systems means this is often futile. This paper describes an approach which permits applications t... 详细信息
来源: 评论
Grouping verifiable content for selective disclosure
Grouping verifiable content for selective disclosure
收藏 引用
8th Australasian Conference on Information Security and Privacy, ACISP 2003
作者: Bull, Laurence Squire, David McG. Newmarch, Jan Zheng, Yuliang School of Computer Science and Software Engineering Monash University Caulfield East 3145 Australia School of Network Computing Monash University Frankston 3199 Australia Department of Software and Information Systems University of North Carolina at Charlotte Charlotte NC 28223 United States
This paper addresses the issue of selective disclosure of verifiable content. It extends previous work relating to Content Extraction Signatures [21] to implement a more complex structure that encodes a richer, more f... 详细信息
来源: 评论
A Framework for Adaptive Cluster Computing Using JavaSpaces
收藏 引用
Cluster Computing 2003年 第3期6卷 201-213页
作者: Batheja, Jyoti Parashar, Manish The Applied Software Systems Laboratory Department of Electrical and Computer Engineering Rutgers The State University of New Jersey Piscataway USA
Heterogeneous networked clusters are being increasingly used as platforms for resource-intensive parallel and distributed applications. The fundamental underlying idea is to provide large amounts of processing capacit...
来源: 评论
An empirical study of an ER-model inspection meeting
An empirical study of an ER-model inspection meeting
收藏 引用
29th EUROMICRO Conference, EUROMICRO 2003
作者: Rombach, Caroline D. Kude, Oliver Aurum, Aybüke Jeffery, Ross Wohlin, Claes Computer Science and Economics University of Mannheim Germany School of Information Systems Technology and Management Univ. of New South Wales Australia School of Computer Science and Engineering Univ. of New South Wales Australia National ICT Australia Department of Software Engineering and Computer Science Blekinge Institute of Technology Sweden
A great benefit of software inspections is that they can be applied at almost any stage of the software development life cycle. We document a large-scale experiment conducted during an entity relationship (ER) model i... 详细信息
来源: 评论