咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 863 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,728 篇 工学
    • 1,339 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 69 篇 deep learning
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 59 篇 artificial intel...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,862 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2960 条 记 录,以下是301-310 订阅
排序:
COCA: A contract-based infrastructure for composing adaptive multimedia systems
COCA: A contract-based infrastructure for composing adaptive...
收藏 引用
26th IEEE International Conference on Distributed Computing systems Workshops, ICDCS 2006
作者: Zhou, Zhinan McKinley, Philip K. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
Achieving acceptable quality of service in highly dynamic computing environments requires not only adaptation and reconfiguration of individual components of the system, but also collaboration among these components. ... 详细信息
来源: 评论
Model-based development of dynamically adaptive software  06
Model-based development of dynamically adaptive software
收藏 引用
28th International Conference on software engineering 2006, ICSE '06
作者: Zhang, Ji Cheng, Betty H. C. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
Increasingly, software should dynamically adapt its behavior at run-time in response to changing conditions in the supporting computing and communication infrastructure, and in the surrounding physical environment. In... 详细信息
来源: 评论
Enabling safe dynamic component-based software adaptation
收藏 引用
Lecture Notes in computer Science
作者: Zhang, Ji Cheng, Betty H.C. Yang, Zhenxiao McKinley, Philip K. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
Recomposable software enables a system to change its structure and behavior during execution, in response to a dynamic execution environment. This paper proposes an approach to ensure that such adaptations are safe wi... 详细信息
来源: 评论
Redundancy and coverage detection in wireless sensor networks in the presence of obstacles
Redundancy and coverage detection in wireless sensor network...
收藏 引用
作者: Fotouhi, Azade Razzazi, Mohammadreza Software Systems R and D Lab Department of Computer Engineering IT Amirkabir University of Technology Tehran Iran
In the real applications of wireless sensor networks (WSNs), a great number of sensors are distributed in the region of interest in order to monitor the environment. The area covered and the energy consumed by the sen... 详细信息
来源: 评论
Resolving vulnerability identification errors using security requirements on business process models
收藏 引用
Information Management and computer Security 2013年 第3期21卷 202-223页
作者: Taubenberger, Stefan Jürjens, Jan Yu, Yijun Nuseibeh, Bashar Computing Department Open University Milton Keynes United Kingdom Department of Computer Science Technical University Dortmund Dortmund Germany Fraunhofer Institute for Software Systems Engineering ISST Dortmund Germany Lero the Irish Software Engineering Research Centre Computing Department University of Limerick Limerick Ireland Open University Milton Keynes United Kingdom
Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified vuln... 详细信息
来源: 评论
Human motion recognition using Gaussian Processes classification
Human motion recognition using Gaussian Processes classifica...
收藏 引用
作者: Zhou, Hang Wang, Liang Suter, David Department of Electrical and Computer Systems Engineering Monash University VIC 3800 Australia Department of Computer Science and Software Engineering University of Melbourne VIC 3010 Australia
This paper investigates the applicability of Gaussian Processes (GP) classification for recognition of articulated and deformable human motions from image sequences. Using Tensor Subspace Analysis (TSA), space-time hu... 详细信息
来源: 评论
An efficient algorithm to maximize the network lifetime for target coverage
An efficient algorithm to maximize the network lifetime for ...
收藏 引用
作者: Fotouhi, Azade Razzazi, Mohammadreza Software Systems R and D Lab Department of Computer Engineering and IT Amirkabir University of Technology Tehran Iran
A critical aspect of applications with wireless sensor networks is network lifetime. Therefore, judicious power management and scheduling can effectively extend operational time. One way to prolong the network lifetim... 详细信息
来源: 评论
Towards Modeling Functional Requirements From Tacit Knowledge
Towards Modeling Functional Requirements From Tacit Knowledg...
收藏 引用
2023 Congress in computer Science, computer engineering, and Applied Computing, CSCE 2023
作者: Jafar, Rameen Almufareh, Maram Fahaad Ashraf, Sundas Khan, Bushra Butt, Wasi Haider Humayun, Mamoona National University of Sciences and Technology Department of Computer and Software Engineering Pakistan College of Computer and Information Sciences Jouf University Department of Information Systems Sakakah Saudi Arabia
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o... 详细信息
来源: 评论
Using Trusted Email to Prevent Credit Card Frauds in Multimedia Products
收藏 引用
World Wide Web 2002年 第3期5卷 245-256页
作者: Alfuraih, Saleh I. Sui, Nien T. McLeod, Dennis Department of Computer Science Integrated Media Systems Center University of Southern California Los AngelesCA90089-2561 United States Department of Computer Science Center for Software Engineering University of Southern California Los AngelesCA90089-0781 United States
This paper focuses on credit card fraud in Multimedia Products, which are soft-products. By soft-products, we mean intangible products that can be used and consumed without having them shipped physically, such as soft... 详细信息
来源: 评论
Integrated risk analysis for a commercial computing service
Integrated risk analysis for a commercial computing service
收藏 引用
21st International Parallel and Distributed Processing Symposium, IPDPS 2007
作者: Yeo, Chee Shin Buyya, Rajkumar Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne Vic. 3010 Australia
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs whenever the need arises and simply pay... 详细信息
来源: 评论