咨询与建议

限定检索结果

文献类型

  • 1,182 篇 会议
  • 820 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,275 篇 工学
    • 1,026 篇 计算机科学与技术...
    • 843 篇 软件工程
    • 250 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 164 篇 生物工程
    • 117 篇 电气工程
    • 108 篇 生物医学工程(可授...
    • 72 篇 光学工程
    • 67 篇 机械工程
    • 66 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 52 篇 网络空间安全
    • 47 篇 交通运输工程
    • 46 篇 仪器科学与技术
    • 46 篇 动力工程及工程热...
  • 594 篇 理学
    • 330 篇 数学
    • 180 篇 生物学
    • 119 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 46 篇 化学
  • 386 篇 管理学
    • 264 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 133 篇 工商管理
  • 118 篇 医学
    • 109 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 52 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 6 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 60 篇 machine learning
  • 47 篇 deep learning
  • 46 篇 computational mo...
  • 44 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 cloud computing
  • 41 篇 grid computing
  • 41 篇 quality of servi...
  • 38 篇 resource managem...
  • 38 篇 feature extracti...
  • 38 篇 training
  • 33 篇 software
  • 32 篇 computer archite...
  • 31 篇 artificial intel...
  • 30 篇 application soft...
  • 30 篇 security
  • 29 篇 laboratories
  • 28 篇 semantics

机构

  • 123 篇 college of compu...
  • 55 篇 department of co...
  • 35 篇 state key labora...
  • 34 篇 department of co...
  • 30 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 department of in...
  • 15 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 school of inform...
  • 14 篇 department of co...
  • 13 篇 department of in...
  • 12 篇 college of compu...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 13 篇 materwala huned
  • 13 篇 muhammad adnan k...
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 12 篇 tan kay chen
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,788 篇 英文
  • 243 篇 其他
  • 13 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2041 条 记 录,以下是1511-1520 订阅
排序:
Resolving vulnerability identification errors using security requirements on business process models
收藏 引用
Information Management and Computer Security 2013年 第3期21卷 202-223页
作者: Taubenberger, Stefan Jürjens, Jan Yu, Yijun Nuseibeh, Bashar Computing Department Open University Milton Keynes United Kingdom Department of Computer Science Technical University Dortmund Dortmund Germany Fraunhofer Institute for Software Systems Engineering ISST Dortmund Germany Lero the Irish Software Engineering Research Centre Computing Department University of Limerick Limerick Ireland Open University Milton Keynes United Kingdom
Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified vuln... 详细信息
来源: 评论
DIV: Dynamic Integrity Validation Framework for Detecting Compromises on Virtual Machine Based Cloud Services in Real Time
收藏 引用
China Communications 2014年 第8期11卷 15-27页
作者: WANG Chunlu LIU Chuanyi LIU Bin DONG Yingfei School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 P. R. China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 P. R. China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing 100876 P. R. China Department of Electrical Engineering University of Hawaii Honolulu Hawaii U.S.
with the increasing popularity of cloud services,attacks on the cloud infrastructure also increase ***,how to monitor the integrity of cloud execution environments is still a difficult *** this paper,a real-time dynam... 详细信息
来源: 评论
A secure elliptic curve based RFID ownership transfer scheme with controlled delegation
收藏 引用
Cryptology and Information Security Series 2013年 11卷 31-43页
作者: Cheng, Shu Varadharajan, Vijay Mu, Yi Susilo, Willy Department of Computing Faculty of Scicence Macquarie University Sydney Australia Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia
In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers security and privacy... 详细信息
来源: 评论
Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution
Automated Coverage-Driven Test Data Generation Using Dynamic...
收藏 引用
International Conference on Secure System Integration and Reliability Improvement, SSIRI
作者: Ting Su Geguang Pu Bin Fang Jifeng He Jun Yan Siyuan Jiang Jianjun Zhao Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China State Key Laboratory of Computer Science Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering University of Notre Dame USA School of Software Shanghai Jiao Tong University Shanghai China
Recently code transformations or tailored fitness functions are adopted to achieve coverage (structural or logical criterion) driven testing to ensure software reliability. However, some internal threats like negative... 详细信息
来源: 评论
Energy-aware multipath routing for data aggregation in wireless sensor networks
Energy-aware multipath routing for data aggregation in wirel...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yingyuan Xiao Xinrong Zhao Hongya Wang Ching-Hsien Hsu Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin P.R. China School of Computer Science and Technology Donghua University Shanghai P.R. China Department of Computer Science and Information Engineering Chung Hua University Hsinchu Taiwan R.O.C
Data aggregation in wireless sensor networks is widely used to collect data in an energy efficient manner to eliminate redundant data transmission so that prolong the network lifetime. To meet the data aggregation nee... 详细信息
来源: 评论
Teaching black-box testing to high school students  13
Teaching black-box testing to high school students
收藏 引用
8th Workshop in Primary and Secondary computing Education, WiPSCE 2013
作者: Sarkar, Amitrajit Bell, Tim Department of Computing Christchurch Polytechnic Institute of Technology Christchurch New Zealand Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
This paper focuses on pedagogy for teaching acceptance testing to high school students in the context of the new New Zealand computer science standards. A review of resources that are currently available for teaching ... 详细信息
来源: 评论
A generic algebraic model for the analysis of cryptographic-key assignment schemes
A generic algebraic model for the analysis of cryptographic-...
收藏 引用
5th International Symposium on Foundations and Practice of Security, FPS 2012
作者: Sabri, Khair Eddin Khedri, Ridha Department of Computer Science King Abdulla II School for Information Technology University of Jordan Jordan Department of Computing and Software Faculty of Engineering McMaster University Canada
One of the means to implement information flow policies is by using a cryptographic approach commonly referred to as key assignment schemes. In this approach, information is made publicly available to users but in an ... 详细信息
来源: 评论
An evaluation framework for software crowdsourcing
收藏 引用
Frontiers of Computer science 2013年 第5期7卷 694-709页
作者: Wenjun WU Wei-Tek TSAI Wei LI State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ85281 USA Department of Computer Science and Technology INLIST Tsinghua University Beijing 100084 China
Recently software crowdsourcing has become an emerging area of software engineering. Few papers have pre- sented a systematic analysis on the practices of software crowdsourcing. This paper first presents an evaluatio... 详细信息
来源: 评论
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt"
Relations among privacy notions for signcryption and key inv...
收藏 引用
18th Australasian Conference on Information Security and Privacy, ACISP 2013
作者: Wang, Yang Manulis, Mark Au, Man Ho Susilo, Willy Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Department of Computing University of Surrey United Kingdom
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and publ... 详细信息
来源: 评论
Query generation for semantic datasets  13
Query generation for semantic datasets
收藏 引用
7th International Conference on Knowledge Capture: "Knowledge Capture in the Age of Massive Web Data", K-CAP 2013
作者: Pan, Jeff Z. Ren, Yuan Wu, Honghan Zhu, Man Department of Computing Science University of Aberdeen United Kingdom College of Computer and Software Nanjing University of Information and Technology China School of Computer Science and Engineering Southeast University China
Due to the increasing volume of and interconnections between semantic datasets, it becomes a challenging task for novice users to know what are included in a dataset, how they can make use of them, and particularly, w... 详细信息
来源: 评论