咨询与建议

限定检索结果

文献类型

  • 2,042 篇 会议
  • 881 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,979 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,745 篇 工学
    • 1,353 篇 计算机科学与技术...
    • 1,119 篇 软件工程
    • 338 篇 信息与通信工程
    • 300 篇 控制科学与工程
    • 163 篇 生物工程
    • 151 篇 电气工程
    • 119 篇 生物医学工程(可授...
    • 118 篇 电子科学与技术(可...
    • 115 篇 机械工程
    • 84 篇 安全科学与工程
    • 82 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 57 篇 网络空间安全
  • 779 篇 理学
    • 414 篇 数学
    • 189 篇 生物学
    • 147 篇 系统科学
    • 146 篇 物理学
    • 124 篇 统计学(可授理学、...
    • 68 篇 化学
  • 511 篇 管理学
    • 361 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 193 篇 图书情报与档案管...
  • 126 篇 医学
    • 116 篇 临床医学
    • 96 篇 基础医学(可授医学...
  • 81 篇 法学
    • 60 篇 社会学
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 72 篇 deep learning
  • 70 篇 laboratories
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 62 篇 artificial intel...
  • 59 篇 computer archite...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 26 篇 buyya rajkumar
  • 25 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,873 篇 英文
  • 89 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2979 条 记 录,以下是281-290 订阅
排序:
Toward model-driven engineering principles and practices for model replicability and experiment reproducibility (Work in progress)
Toward model-driven engineering principles and practices for...
收藏 引用
2014 Symposium on Theory of Modeling and Simulation - DEVS Integrative M and S Symposium, DEVS 2014;2014 Spring Simulation Multi-Conference, SpringSim 2014
作者: Ledet, Joseph Teran-Somohano, Alejandro Butcher, Zachary Yilmaz, Levent Smith, Alice E. Oǧuztüzün, Halit Dayibaş, Orçun Görür, Bilge Kaan Department of Computer Science and Software Engineering United States Department of Industrial and Systems Engineering Samuel Ginn College of Engineering Auburn University United States Department of Computer Engineering School of Engineering Middle East Technical University Turkey
Recent years have seen a proliferation of the use of simulation models in computational science. Most of these models have never been independently replicated by anyone but the original developer. Furthermore, there i... 详细信息
来源: 评论
A dynamic load balancing architecture for PDES using PVM on clusters  8th
收藏 引用
8th European on Parallel Virtual Machine and Message Passing Interface Users’ Group Meeting, 2001
作者: Pears, Arnold N. Thong, Nicola Department of Computer Systems University of Uppsala Box 325 Uppsala751 05 Sweden Department of Computer Science and Software Engineering University of Melbourne VIC Australia
Scalable simulation in a cluster computing environment depends on effective mechanisms for load balancing. This paper presents an object-oriented software architecture and specifies communication protocols which suppo... 详细信息
来源: 评论
Interaction design for wheelchair using Nintendo Wiimote controller
Interaction design for wheelchair using Nintendo Wiimote con...
收藏 引用
2nd International Conference on User Science and engineering, i-USEr 2011
作者: Ashraf, Mahmood Ghazali, Masitah Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Skudai Johor Malaysia
Impaired people require additional attention by the people around them and also by the people who design artifacts and tools for them. We investigate the interaction design aspects of a wheelchair controller, develope... 详细信息
来源: 评论
Blockchain Model for Enhancing Aircraft Maintenance Records Security
Blockchain Model for Enhancing Aircraft Maintenance Records ...
收藏 引用
2019 IEEE International Symposium on Technologies for Homeland Security, HST 2019
作者: Aleshi, Ahrash Seker, Remzi Babiceanu, Radu F. Embry-Riddle Aeronautical University Department of Elecrical Computer Software and Systems Engineering Daytona BeachFL United States
This paper addresses the need to enhance the integrity and transparency of aircraft maintenance records in the aviation industry by using blockchain technologies. A physical aircraft maintenance logbook is susceptible... 详细信息
来源: 评论
An onboard UAS visual privacy guard system  15
An onboard UAS visual privacy guard system
收藏 引用
2015 15th Annual Integrated Communication, Navigation and Surveillance Conference, ICNS 2015
作者: Babiceanu, Radu F. Bojda, Petr Seker, Remzi Alghumgham, Mohammed A. Department of Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona BeachFL United States
x UAS application areas increase by the day. x UAS relatively easy to be built. x News outlets UAS applications: + Expected use on a massive scale. + Equipped with high-res cameras and storage. + Record visual and aud... 详细信息
来源: 评论
Integrity assurance in resource-bounded systems through stochastic message authentication  15
Integrity assurance in resource-bounded systems through stoc...
收藏 引用
Symposium and Bootcamp on the Science of Security, HotSoS 2015
作者: Laszka, Aron Vorobeychik, Yevgeniy Koutsoukos, Xenofon Institute for Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University NashvilleTN United States
Assuring communication integrity is a central problem in security. However, overhead costs associated with cryptographic primitives used towards this end introduce significant practical implementation challenges for r... 详细信息
来源: 评论
AI-Enhanced AUTOSAR Configuration: Efficient Methods for Dataset Generation and Automated Code Production  8
AI-Enhanced AUTOSAR Configuration: Efficient Methods for Dat...
收藏 引用
8th IEEE International Forum on Research and Technologies for Society and Industry Innovation, RTSI 2024
作者: El-Gnainy, Nada Shanouda, Mira Essam, Ahmed Ibrahim, Anas Abdallah William, John Elsharkawy, Mariam Moustafa, Passant Ahmed Al Ansary, Mohamed Mahmoud, Hossam Moro, Ahmed Salama, Cherif Siemens Digital Industries Software Cairo Egypt The American University in Cairo Department of Computer Science and Engineering Egypt Ain Shams University Department of Computer and Systems Engineering Cairo Egypt
This research presents a novel approach to stream-line the configuration of AUTOSAR (Automotive Open System Architecture) modules using Artificial Intelligence (AI)-based tools. Traditional methods of generating AUTOS...
来源: 评论
Investigating physical interaction complexities in embedded systems
Investigating physical interaction complexities in embedded ...
收藏 引用
2011 5th Malaysian Conference in software engineering, MySEC 2011
作者: Ashraf, Mahmood Ghazali, Masitah Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Skudai Johor Malaysia
Embedded systems are proliferating in vast application areas of life with ever increasing multifarious functionalities. Due to the focus of research and development on growing software issues, the naturalness of physi... 详细信息
来源: 评论
Usability in software development: Frameworks comparison between IKnowU and User Behavior Analysis Framework (UBAF)
Usability in software development: Frameworks comparison bet...
收藏 引用
2011 5th Malaysian Conference in software engineering, MySEC 2011
作者: Razak, Norliza Abd Ghazali, Masitah Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Skudai Johor Malaysia
software engineering (SE) and human-computer interaction (HCI) are often regarded as two separate entities while the fact is the two share many similarities and should affect each other to produce a better product or ... 详细信息
来源: 评论
An Efficient Soft Error Tolerant Approach to Enhance Reliability of TCAM  1
An Efficient Soft Error Tolerant Approach to Enhance Reliabi...
收藏 引用
1st International Conference on Advances in Science, engineering and Robotics Technology, ICASERT 2019
作者: Afrin, Rumana Sadi, Muhammad Sheikh Jurjens, Jan Khulna University of Engineering Techonology Department of Computer Science Engineering Khulna9203 Bangladesh University of Koblenz-Landau Fraunhofer-Institute for Software and Systems Engineering ISST Department of Computer Science Koblenz Germany
Ternary Content Addressable Memory (TCAM) is a kind of extraordinary memory which is used to search operations in routers, firewalls, network address translators, and entire content in a single clock cycle. It is a sp... 详细信息
来源: 评论