咨询与建议

限定检索结果

文献类型

  • 1,182 篇 会议
  • 816 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,275 篇 工学
    • 1,026 篇 计算机科学与技术...
    • 843 篇 软件工程
    • 249 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 164 篇 生物工程
    • 118 篇 电气工程
    • 109 篇 生物医学工程(可授...
    • 71 篇 光学工程
    • 67 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 51 篇 网络空间安全
    • 47 篇 交通运输工程
    • 46 篇 仪器科学与技术
    • 46 篇 动力工程及工程热...
  • 595 篇 理学
    • 331 篇 数学
    • 180 篇 生物学
    • 119 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 46 篇 化学
  • 385 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 133 篇 工商管理
  • 118 篇 医学
    • 109 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 52 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 6 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 60 篇 machine learning
  • 46 篇 deep learning
  • 46 篇 computational mo...
  • 44 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 internet of thin...
  • 41 篇 grid computing
  • 41 篇 quality of servi...
  • 39 篇 feature extracti...
  • 38 篇 resource managem...
  • 38 篇 training
  • 33 篇 software
  • 32 篇 computer archite...
  • 30 篇 application soft...
  • 30 篇 security
  • 30 篇 artificial intel...
  • 29 篇 laboratories
  • 28 篇 semantics

机构

  • 123 篇 college of compu...
  • 55 篇 department of co...
  • 35 篇 department of co...
  • 35 篇 state key labora...
  • 29 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 21 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 state key labora...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 14 篇 department of co...
  • 13 篇 school of inform...
  • 13 篇 department of in...
  • 12 篇 college of compu...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 13 篇 materwala huned
  • 13 篇 muhammad adnan k...
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 12 篇 tan kay chen
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,784 篇 英文
  • 243 篇 其他
  • 13 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2037 条 记 录,以下是1441-1450 订阅
排序:
Exploring equations ordering influence on variants of the Newton-Raphson method
收藏 引用
AIP Conference Proceedings 2016年 第1期1776卷
作者: Giulio Masetti Silvano Chiaradonna Felicita di Giandomenico 1Software Engineering and Dependable Computing Laboratory ISTI/CNR Via G. Moruzzi 1 Pisa Italy 2Computer Science Department University of Pisa Largo B. Pontecorvo 3 Pisa Italy
Jacobian-free Newton-Raphson methods are general purpose iterative non-linear system solvers. The need to solve non-linear systems is ubiquitous throughout computational physics [1] and Jacobian-free Newton-Raphson me...
来源: 评论
Unified non-volatile memory and NAND flash memory architecture in smartphones
Unified non-volatile memory and NAND flash memory architectu...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Renhai Chen Yi Wang Jingtong Hu Duo Liu Zili Shao Yong Guan Department of Computing The Hong Kong Polytechnic University College of Computer Science and Software Engineering Shenzhen University School of Electrical and Computer Engineering Oklahoma State University College of Computer Science Chongqing University College of Computer and Information Management Capital Normal University
I/O is becoming one of major performance bottlenecks in NAND-flash-based smartphones. Novel NVMs (nonvolatile memories), such as PCM (Phase Change Memory) and STT-RAM (Spin-Transfer Torque Random Access Memory), can p... 详细信息
来源: 评论
Learning automaton based context oriented middleware architecture for precision agriculture
Learning automaton based context oriented middleware archite...
收藏 引用
International Conference on Computer, Information and Telecommunication Systems (CITS)
作者: P. Venkata Krishna S. Sivanesan Sudip Misra Mohammad S. Obaidat Department of Computer Science Sri Padmavathi Mahila Visvavidyalayam Tirupati India School of Information Technology Indian Institute of Technology Kharagpur India School of Computing Science and Engineering VIT University Vellore India Dept. of Computer Science& Software Engineering Monmouth University NJ USA
The continuous alteration of living landscape in earth due to the greatest impact of information technology has converted the whole earth into a small digital village. That means anyone could share information in any ... 详细信息
来源: 评论
An emerging technology-wearable wireless sensor networks with applications in human health condition monitoring
收藏 引用
Journal of Management Analytics 2015年 第2期2卷 121-137页
作者: Hairong Yan LiDa Xu Zhuming Bi Zhibo Pang Jie Zhang Yong Chen Embedded Software and System Institute Beijing University of TechnologyBeijingChina Institute of Computing Technology Chinese Academy of SciencesBeijingChinaShanghai Jiao Tong UniversityShanghaiChinaUniversity of Science and Technology of ChinaHefeiChinaOld Dominion UniversityNorfolkUSA Department of Engineering Indiana University Purdue University Fort WayneFort WayneUSA ABB Corporate Research Center Sweden Old Dominion University NorfolkUSA
Monitoring health conditions over a human body to detect anomalies is a multidisciplinary task,which involves anatomy,artificial intelligence,and sensing and computing networks.A wearable wireless sensor network(WWSN)... 详细信息
来源: 评论
Envisioning a requirements specification template for medical device software
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8892卷 209-223页
作者: Wang, Hao Chen, Yihai Khedri, Ridha Wassyng, Alan Aalesund University College Norway School of Computer Engineering and Science Shanghai University China Department of Computing and Software McMaster University Canada McMaster University Canada
In many health jurisdictions, software is considered to be medical device software (MDS), when it is used to analyze patient data in order to render a diagnosis or monitor the patient’s health;when it is to be used b... 详细信息
来源: 评论
Privacy-Preserving authorized RFID authentication protocols
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8651卷 108-122页
作者: Li, Nan Mu, Yi Susilo, Willy Guo, Fuchun Varadharajan, Vijay Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Department of Computing Macquarie University Sydney Australia
Radio Frequency Identification (RFID) has been widely ad-opted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system... 详细信息
来源: 评论
Two squares canonical factorization  18
Two squares canonical factorization
收藏 引用
18th Prague Stringology Conference, PSC 2014
作者: Bai, Haoyue Franek, Frantisek Smyth, William F. Department of Computing and Software McMaster University HamiltonON Canada School of Computer Science and Software Engineering University of Western Australia Australia
We present a new combinatorial structure in a string: a canonical factorization for any two squares that occur at the same position and satisfy some size restrictions. We believe that this canonical factorization will... 详细信息
来源: 评论
An efficient privacy-preserving compressive data gathering scheme in WSNs  1
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Xie, Kun Ning, Xueping Wang, Xin Wen, Jigang Liu, Xiaoxiao He, Shiming Zhang, Daqiang College of Computer Science and Electronics Engineering Hunan University Changsha410082 China The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommmunications Beijing100876 China Department of Electrical and Computer Engineering State University of New York at Stony Brook New York11790 United States Institute of Computing Technology Chinese Academy of Sciences Beijing100080 China State Grid HuNan Electric Power Company Research Insitute Changsha410000 China School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China School of Software Engineering Tongji University Shanghai201804 China
Due to the strict energy limitation and the common vulnerability of WSNs, providing efficient and security data gathering in WSNs becomes an essential problem. Compressive data gathering, which is based on the recent ... 详细信息
来源: 评论
Cross-project build co-change prediction
Cross-project build co-change prediction
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Xin Xia David Lo Shane McIntosh Emad Shihab Ahmed E. Hassan College of Computer Science and Technology Zhejiang University Hangzhou China School of Information Systems Singapore Management University Singapore School of Computing Queen's University Kingston Canada Department of Computer Science and Software Engineering Concordia University Montreal Canada
Build systems orchestrate how human-readable source code is translated into executable programs. In a software project, source code changes can induce changes in the build system (aka. build co-changes). It is difficu... 详细信息
来源: 评论
Virtual Machine Image Content Aware I/O Optimization for Mobile Virtualization
Virtual Machine Image Content Aware I/O Optimization for Mob...
收藏 引用
IEEE International Symposium on Cyberspace Safety and Security
作者: Renhai Chen Yi Wang Jingtong Hu Duo Liu Zili Shao Yong Guan Embedded Systems and CPS Laboratory Department of Computing The Hong Kong Polytechnic University College of Computer Science and Software Engineering Shenzhen University School of Electrical and Computer Engineering Oklahoma State University College of Computer Science Chongqing University College of Computer and Information Management Capital Normal University
Mobile virtualization introduces extra layers in software stacks, which leads to performance degradation. Especially, each I/O operation has to pass through several software layers to reach the NAND-flash-based storag... 详细信息
来源: 评论