咨询与建议

限定检索结果

文献类型

  • 1,182 篇 会议
  • 816 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,275 篇 工学
    • 1,026 篇 计算机科学与技术...
    • 843 篇 软件工程
    • 249 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 164 篇 生物工程
    • 118 篇 电气工程
    • 109 篇 生物医学工程(可授...
    • 71 篇 光学工程
    • 67 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 51 篇 网络空间安全
    • 47 篇 交通运输工程
    • 46 篇 仪器科学与技术
    • 46 篇 动力工程及工程热...
  • 595 篇 理学
    • 331 篇 数学
    • 180 篇 生物学
    • 119 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 46 篇 化学
  • 385 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 133 篇 工商管理
  • 118 篇 医学
    • 109 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 52 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 6 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 60 篇 machine learning
  • 46 篇 deep learning
  • 46 篇 computational mo...
  • 44 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 internet of thin...
  • 41 篇 grid computing
  • 41 篇 quality of servi...
  • 39 篇 feature extracti...
  • 38 篇 resource managem...
  • 38 篇 training
  • 33 篇 software
  • 32 篇 computer archite...
  • 30 篇 application soft...
  • 30 篇 security
  • 30 篇 artificial intel...
  • 29 篇 laboratories
  • 28 篇 semantics

机构

  • 123 篇 college of compu...
  • 55 篇 department of co...
  • 35 篇 department of co...
  • 35 篇 state key labora...
  • 29 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 21 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 department of in...
  • 17 篇 state key labora...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 14 篇 department of co...
  • 13 篇 school of inform...
  • 13 篇 department of in...
  • 12 篇 college of compu...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 13 篇 materwala huned
  • 13 篇 muhammad adnan k...
  • 12 篇 parizi reza m.
  • 12 篇 victor c. m. leu...
  • 12 篇 zander carol
  • 12 篇 tan kay chen
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 11 篇 lin qiuzhen
  • 11 篇 srivastava gauta...
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,784 篇 英文
  • 243 篇 其他
  • 13 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2037 条 记 录,以下是1551-1560 订阅
排序:
An implementation of a multi-site virtual cluster cloud
An implementation of a multi-site virtual cluster cloud
收藏 引用
International Joint Conference on Computer science and software engineering (JCSSE)
作者: Pongsakorn U-chupala Putchong Uthayopas Kohei Ichikawa Susumu Date Hirotake Abe High Performance Computing and Networking Center Department of Computer Engineering Faculty of Engineering Kasetsart University Bangkok Thailand Software Design & Analysis Laboratory Graduate School of Information Science NAIST Nara Japan Cybermedia Center Osaka University Osaka Japan Division of Information Science Graduate School of Systems and Information Engineering University of Tsukuba Ibaragi Japan
The use of virtual cluster for High Performance computing (HPC) work has a great benefit of hiding the complexity of physical infrastructure while providing a familiar HPC environment for users. Nevertheless, setting ... 详细信息
来源: 评论
Adaptive Fault Detection for Testing Tenant Applications in Multi-tenancy SaaS Systems
Adaptive Fault Detection for Testing Tenant Applications in ...
收藏 引用
IEEE International Conference on Cloud engineering (IC2E)
作者: W.T. Tsai Qingyang Li Charles J. Colbourn Xiaoying Bai School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ USA State Key Laboratory of Software Development Environment Beihang University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
SaaS (software-as-a-Service) often uses multi-tenancy architecture (MTA) where tenant developers compose their applications online using the components stored in the SaaS database. Tenant applications need to be teste... 详细信息
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论
Test algebra for combinatorial testing
Test algebra for combinatorial testing
收藏 引用
International Workshop on Automation of software Test (AST)
作者: Wei-Tek Tsai Charles J. Colbourn Jie Luo Guanqiu Qi Qingyang Li Xiaoying Bai School of Computing Informatics and Decision Systems Arizona State University Tempe AZ USA Arizona State University Tempe AZ US State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Department of Computer Science and Technology INLIST Tsinghua University Beijing China
This paper proposes a new algebraic system, Test Algebra (TA), for identifying faults in combinatorial testing for SaaS (software-as-a-Service) applications. SaaS as a part of cloud computing is a new software deliver... 详细信息
来源: 评论
Undo the codebook bias by linear transformation for visual applications  13
Undo the codebook bias by linear transformation for visual a...
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Zhang, Chunjie Zhang, Yifan Wang, Shuhui Pang, Junbiao Liang, Chao Huang, Qingming Tian, Qi School of Computer and Control Engineering University of Chinese Academy of Sciences 100049 Beijing China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing China Key Lab of Intell. Info. Process Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China College of Computer Science and Technology Beijing University of Technology 100124 Beijing China School of Computer National Engineering Research Center for Multimedia Software Wuhan University 430072 Wuhan China Department of Computer Sciences University of Texas at San Antonio San Antonio TX 78249 United States
The bag of visual words model (BoW) and its variants have demonstrate their effectiveness for visual applications and have been widely used by researchers. The BoW model first extracts local features and generates the... 详细信息
来源: 评论
Neural network-based data analysis for medical-surgical nursing learning
Neural network-based data analysis for medical-surgical nurs...
收藏 引用
34th Annual International Conference of the IEEE engineering in Medicine and Biology Society, EMBS 2012
作者: Fernandez-Aleman, Jose Luis Jayne, Chrisina Sanchez, Ana Belen Carrillo-De-Gea, Juan Manuel Toval, Ambrosio Research Group of Software Engineering Faculty of Computer Science University of Murcia Murcia Spain Department of Computing Faculty of Engineering and Computing University of Coventry United Kingdom
This paper presents the results of a project on neural network-based data analysis for knowledge clustering in a second-year course on medical-surgical nursing. Data was collected from 208 nursing students which perfo... 详细信息
来源: 评论
Mathematical reasoning at the: Crossroads
收藏 引用
ACM Inroads 2012年 第1期3卷 30-31页
作者: Henderson, Peter B. Sitaraman, Murali Department of Computer Science and Software Engineering Butler University Indianapolis IN 46208 United States School of Computing Clemson University Clemson SC 29631 United States
No abstract available.
来源: 评论
Speculative requirements: Automatic detection of uncertainty in natural language requirements
Speculative requirements: Automatic detection of uncertainty...
收藏 引用
2012 20th IEEE International Requirements engineering Conference, RE 2012
作者: Yang, Hui De Roeck, Anne Gervasi, Vincenzo Willis, Alistair Nuseibeh, Bashar Department of Computing Open University United Kingdom Department of Computer Science University of Pisa Italy Lero-The Irish Software Engineering Research Centre University of Limerick Ireland
Stakeholders frequently use speculative language when they need to convey their requirements with some degree of uncertainty. Due to the intrinsic vagueness of speculative language, speculative requirements risk being... 详细信息
来源: 评论
2012 Information Security for South Africa - Proceedings of the ISSA 2012 Conference: Introduction
2012 Information Security for South Africa - Proceedings of ...
收藏 引用
2012 Conference on Information Security for South Africa, ISSA 2012
作者: Venter, Hein Loock, Marianne Coetzee, Marijke Department of Computer Science University of Pretoria South Africa School of Computing University of South Africa South Africa Academy for Computer Science and Software Engineering University of Johannesburg South Africa
ISSA2012 is the annual conference for the information security community that continues on the successful recipe established in *** are pleased to announce, however, that from 2010, ISSA is co-sponsored by the IEEE Sy... 详细信息
来源: 评论
An O(n3 log log n/ log2 n) time algorithm for all pairs shortest paths
An O(n3 log log n/ log2 n) time algorithm for all pairs shor...
收藏 引用
13th Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2012
作者: Han, Yijie Takaoka, Tadao School of Computing and Engineering University of Missouri at Kansas City Kansas City MO 64110 United States Department of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
We present an O(n 3 loglogn/log2 n) time algorithm for all pairs shortest paths. This algorithm improves on the best previous result of O(n 3 (loglogn)3/log2 n ) time. © 2012 Springer-Verlag.
来源: 评论