咨询与建议

限定检索结果

文献类型

  • 2,042 篇 会议
  • 881 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,979 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,745 篇 工学
    • 1,353 篇 计算机科学与技术...
    • 1,119 篇 软件工程
    • 338 篇 信息与通信工程
    • 300 篇 控制科学与工程
    • 163 篇 生物工程
    • 151 篇 电气工程
    • 119 篇 生物医学工程(可授...
    • 118 篇 电子科学与技术(可...
    • 115 篇 机械工程
    • 84 篇 安全科学与工程
    • 82 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 57 篇 网络空间安全
  • 779 篇 理学
    • 414 篇 数学
    • 189 篇 生物学
    • 147 篇 系统科学
    • 146 篇 物理学
    • 124 篇 统计学(可授理学、...
    • 68 篇 化学
  • 511 篇 管理学
    • 361 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 193 篇 图书情报与档案管...
  • 126 篇 医学
    • 116 篇 临床医学
    • 96 篇 基础医学(可授医学...
  • 81 篇 法学
    • 60 篇 社会学
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 72 篇 deep learning
  • 70 篇 laboratories
  • 68 篇 software systems
  • 67 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 62 篇 artificial intel...
  • 59 篇 computer archite...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 26 篇 buyya rajkumar
  • 25 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,873 篇 英文
  • 89 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2979 条 记 录,以下是311-320 订阅
排序:
A Novel Method for Pneumothorax Diagnosis and Segmentation Using Deep Convolution Neural Network
A Novel Method for Pneumothorax Diagnosis and Segmentation U...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Shanthi, S. Nirmaladevi, K. Mathiarasi, N. Tharani, As. Krithika Monisha, A. Kuppuchamy, R. Krishnamoorthy, N. Kongu Engineering College Department of Computer Science & Engineering Perundurai India PSNA College of Engineering and Technology Department of Computer Applications Tamilnadu Dindigul India Vellore Institute of Technology Department of Software Systems and Engineering Vellore Campus India
A pneumothorax is the accumulation of air in the pleural space between the chest and lungs. Air that is in the lungs during breathing can leak out of the lungs and become trapped between the chest and lungs in the tho... 详细信息
来源: 评论
Experiments in composing proxy audio services for mobile users
收藏 引用
IFIP/ACM International Conference on Distributed systems Platforms, Middleware 2001
作者: McKinley, Philip K. Padmanabhan, Udiyan I. Ancha, Nandagopal Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States
This paper describes an experimental study in the use of a composable proxy framework to improve the quality of interactive audio streams delivered to mobile hosts. Two forward error correction (FEC) proxylets are dev... 详细信息
来源: 评论
An approach to implementing dynamic adaptation in C++
An approach to implementing dynamic adaptation in C++
收藏 引用
2005 Workshop on Design and Evolution of Autonomic Application software, DEAS 2005
作者: Fleming, Scott D. Cheng, Betty H. C. Kurt Stirewalt, R.E. McKinley, Philip K. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States
This paper describes TRAP/C++, a software tool that enables new adaptable behavior to be added to existing C++ programs in a transparent fashion. In previous investigations, we used an aspectoriented approach to manua... 详细信息
来源: 评论
Verifying and analyzing adaptive logic through UML state models
Verifying and analyzing adaptive logic through UML state mod...
收藏 引用
1st International Conference on software Testing, Verification and Validation, ICST 2008
作者: Ramirez, Andres J. Cheng, Betty H. C. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
It is becoming increasingly important to be able to adapt an application's behavior at run time in response to changing requirements and environmental conditions. Adaptive programs are typically difficult to speci... 详细信息
来源: 评论
Automated analysis of natural language properties for UML models
收藏 引用
MoDELS 2005 International Workshops OCLWS, MoDeVA, MARTES, AOM, MTiP, WiSME, MODAUI, NfC, MDD, WUsCAM
作者: Konrad, Sascha Cheng, Betty H. C. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
It is well known that errors introduced early in the development process are commonly the most expensive to correct. The increasingly popular model-driven architecture (MDA) exacerbates this problem by propagating the... 详细信息
来源: 评论
Real-time specification patterns  05
Real-time specification patterns
收藏 引用
27th International Conference on software engineering, ICSE 2005
作者: Konrad, Sascha Cheng, Betty H. C. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 United States
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facilitate the specification of critical pro... 详细信息
来源: 评论
On the cost-quality tradeoff in topology-aware overlay path probing  11
On the cost-quality tradeoff in topology-aware overlay path ...
收藏 引用
11th IEEE International Conference on Network Protocols, ICNP 2003
作者: Tang, Chiping McKinley, P.K. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2), which is prohibitive in large-scale overlay networks. Several methods have... 详细信息
来源: 评论
Performance evaluation of backoff algorithms for medium access in wireless networks
Performance evaluation of backoff algorithms for medium acce...
收藏 引用
2011 International Conference on Selected Topics in Mobile and Wireless Networking, iCOST 2011
作者: Ganchev, Antoniy Narayanan, Lata Assi, Chadi Department of Computer Science and Software Engineering Concordia University Montreal Canada Concordia Institute of Information Systems Engineering Concordia University Montreal Canada
Consider a backoff algorithm for medium access in wireless networks where a node chooses with probability 1 - q to transmit right away and with probability q to transmit after CW slots, where CW is the maximum value o... 详细信息
来源: 评论
Online and Scalable Virtual Network Functions Chain Placement for Emerging 5G Networks  2
Online and Scalable Virtual Network Functions Chain Placemen...
收藏 引用
2nd IEEE International Mediterranean Conference on Communications and Networking, MeditCom 2022
作者: Mohamed, Ramy Leivadeas, Aris Lambadaris, Ioannis Morris, Todd Djukic, Petar Carleton University Department of Systems and Computer Engineering Ottawa Canada Ecole de Technologie Superieure Department of Software and IT Engineering Montreal Canada Ciena Ottawa Canada
In 5G network slicing, different services can be modeled as a set of Service Function Chains (SFCs), i.e., graphs of interconnected Virtual Network Functions (VNFs), within a specific network slice. The optimal placem... 详细信息
来源: 评论
On the application of predictive control techniques for adaptive performance management of computing systems
收藏 引用
IEEE Transactions on Network and Service Management 2009年 第4期6卷 212-225页
作者: Abdelwahed, Sherif Bai, Jia Su, Rong Kandasamy, Nagarajan Department of Electrical and Computer Engineering Mississippi State University Mississippi State MS 39759 United States Institute for Software Integrated Systems Vanderbilt University Nashville TN 37235 United States Department of Mathematics and Computer Science Eindhoven Univ. of Technology Eindhoven Netherlands Department of Electrical and Computer Engineering Drexel University Philadelphia PA 19104 United States
This paper addresses adaptive performance management of real-time computing systems. We consider a generic model-based predictive control approach that can be applied to a variety of computing applications in which th... 详细信息
来源: 评论