咨询与建议

限定检索结果

文献类型

  • 1,178 篇 会议
  • 831 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,048 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,284 篇 工学
    • 1,034 篇 计算机科学与技术...
    • 851 篇 软件工程
    • 251 篇 信息与通信工程
    • 171 篇 控制科学与工程
    • 164 篇 生物工程
    • 122 篇 电气工程
    • 108 篇 生物医学工程(可授...
    • 72 篇 光学工程
    • 69 篇 机械工程
    • 66 篇 电子科学与技术(可...
    • 55 篇 安全科学与工程
    • 52 篇 网络空间安全
    • 48 篇 交通运输工程
    • 46 篇 动力工程及工程热...
    • 45 篇 仪器科学与技术
  • 595 篇 理学
    • 331 篇 数学
    • 180 篇 生物学
    • 119 篇 物理学
    • 92 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 46 篇 化学
  • 391 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 135 篇 工商管理
  • 119 篇 医学
    • 110 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 54 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 54 篇 经济学
    • 53 篇 应用经济学
  • 53 篇 法学
  • 52 篇 教育学
    • 50 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 60 篇 machine learning
  • 48 篇 deep learning
  • 47 篇 computational mo...
  • 43 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 internet of thin...
  • 42 篇 quality of servi...
  • 41 篇 grid computing
  • 41 篇 training
  • 39 篇 feature extracti...
  • 38 篇 resource managem...
  • 33 篇 software
  • 32 篇 computer archite...
  • 30 篇 application soft...
  • 30 篇 artificial intel...
  • 29 篇 laboratories
  • 29 篇 semantics
  • 28 篇 data models

机构

  • 125 篇 college of compu...
  • 57 篇 department of co...
  • 35 篇 state key labora...
  • 34 篇 department of co...
  • 31 篇 national enginee...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 22 篇 college of intel...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 department of in...
  • 15 篇 college of compu...
  • 14 篇 school of comput...
  • 13 篇 school of inform...
  • 13 篇 department of in...
  • 12 篇 college of compu...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 15 篇 wang xiaofei
  • 13 篇 parizi reza m.
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 13 篇 muhammad adnan k...
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 10 篇 qi lianyong
  • 10 篇 mccartney robert
  • 10 篇 leung victor c. ...

语言

  • 1,911 篇 英文
  • 126 篇 其他
  • 11 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2048 条 记 录,以下是1601-1610 订阅
排序:
Introduction
Introduction
收藏 引用
Information Security for South Africa (ISSA)
作者: Hein Venter Marianne Loock Marijke Coetzee Department of Computer Science University of Pretoria South Africa School of Computing University of South Africa South Africa Academy for Computer Science and Software Engineering University of Johannesburg South Africa
ISSA2012 is the annual conference for the information security community that continues on the successful recipe established in *** are pleased to announce, however, that from 2010, ISSA is co-sponsored by the IEEE Sy...
来源: 评论
Unifying software and product configuration: A research roadmap
Unifying software and product configuration: A research road...
收藏 引用
Workshop on Configuration at ECAI, ConfWS 2012
作者: Hubaux, Arnaud Jannach, Dietmar Drescher, Conrad Murta, Leonardo Männistö, Tomi Czarnecki, Krzysztof Heymans, Patrick Nguyen, Tien Zanker, Markus PReCISE Research Center University of Namur Belgium Department of Computer Science TU Dortmund Germany Computing Laboratory University of Oxford United Kingdom Fluminense Federal University Niterói Brazil Aalto University School of Science Finland Generative Software Development Lab University of Waterloo Canada Electrical and Computer Engineering Department Iowa State University United States Alpen-Adria-Universität Klagenfurt Austria
For more than 30 years, knowledge-based product configuration systems have been successfully applied in many industrial domains. Correspondingly, a large number of advanced techniques and algorithms have been develope... 详细信息
来源: 评论
Causes of requirement change - A systematic literature review
Causes of requirement change - A systematic literature revie...
收藏 引用
16th International Conference on Evaluation & Assessment in software engineering (EASE 2012)
作者: Muneera Bano Salma Imtiaz Naveed Ikram Mahmood Niazi Muhammad Usman Department of Computer Science and Software Engineering International Islamic University Pakistan Faculty of Computing Riphah International University Pakistan Department of Information and Computer Science King Fahd University of Petroleum and Minerals Saudi Arabia School of Computing and Mathematics Keele University Keele UK
Context: Research shows that one of the main reasons of project failure is changing requirements. The success or failure of software projects largely depends upon how we respond to changing requirements. The knowledge... 详细信息
来源: 评论
Visualizing traceability links between source code and documentation
Visualizing traceability links between source code and docum...
收藏 引用
IEEE Symposium on Visual Languages and Human Centric computing (VL/HCC)
作者: Xiaofan Chen John Hosking John Grundy Department of Computer Science University of Auckland Auckland New Zealand College of Engineering & Computer Science Australian National University Canberra Australia Centre for Computing & Engineering Software Systems Swinburne University of Technology Melbourne Australia
It is well recognized that visualizing traceability links between software artifacts helps developers to recover, browse, and maintain these inter-relationships effectively and efficiently. However, it is a major chal... 详细信息
来源: 评论
Conservation laws and self-consistent sources for a super integrable equation hierarchy
收藏 引用
Communications in Nonlinear science and Numerical Simulation 2012年 第6期17卷 2292-2298页
作者: Yun-Hu Wang Yong Chen Software Engineering Institute of East China Normal University Shanghai Key Laboratory of Trustworthy Computing Shanghai 200062 PR China Nonlinear Science Center and Department of Mathematics Ningbo University Ningbo 315211 PR China
In this paper, a super integrable equation hierarchy is considered based on a Lie superalgebra and supertrace identity. Then, a super integrable equation hierarchy with self-consistent sources is established. Furtherm... 详细信息
来源: 评论
High Availability through Output Continuity
High Availability through Output Continuity
收藏 引用
IEEE International Conference on Cluster computing Workshops and Posters (CLUSTER WORKSHOPS)
作者: Wei Ye Yaozu Dong Ruhui Ma Alei Liang Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China Intel China Software Center Shanghai China
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Multi-document extractive summarization using event semantic relation graph clustering
收藏 引用
International Journal of Advancements in computing Technology 2012年 第22期4卷 721-730页
作者: Liu, Maofu Hu, Huijun Li, Wenjie College of Computer Science and Technology Wuhan University of Science and Technology Wuhan 430065 China State Key Lab of Software Engineering Wuhan University Wuhan 430072 China Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong
Multi-document summarization aims to extract information from the original multiple unstructured text documents or other types of multimedia about the same topic and this paper will focus on eventbased multi-document ... 详细信息
来源: 评论
XML based workflow definition language design
XML based workflow definition language design
收藏 引用
IEEE International Conference on software engineering and Service sciences (ICSESS)
作者: Yun Feng Yu Xiang Zhou Key Laboratory of Software Engineering of Yunnan Province Department of Computer Science Zunyi Normal College 563002 China Department of Computing Imperial College London SW7 2AZ UK
Workflow is a technology which software system uses highly frequent. A good workflow system can replace the traditional manual way document circulation and greatly simplify office process. It has become an indispensab... 详细信息
来源: 评论
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model
收藏 引用
IEEE Transactions on Computers 2012年 第5期61卷 713-725页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Yuan He Xufei Mao Yunhao Liu Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering Building of Electronics and Information Engineering University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology (TNLIST) Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Tsinghua National Laboratory for Information Science and Technology (TNLIST) School of Software Tsinghua University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm... 详细信息
来源: 评论