咨询与建议

限定检索结果

文献类型

  • 1,154 篇 会议
  • 818 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 2,011 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 1,009 篇 计算机科学与技术...
    • 834 篇 软件工程
    • 247 篇 信息与通信工程
    • 162 篇 生物工程
    • 161 篇 控制科学与工程
    • 118 篇 电气工程
    • 106 篇 生物医学工程(可授...
    • 68 篇 光学工程
    • 64 篇 机械工程
    • 64 篇 电子科学与技术(可...
    • 54 篇 安全科学与工程
    • 51 篇 网络空间安全
    • 48 篇 交通运输工程
    • 45 篇 仪器科学与技术
    • 43 篇 动力工程及工程热...
  • 585 篇 理学
    • 329 篇 数学
    • 178 篇 生物学
    • 115 篇 物理学
    • 91 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 46 篇 化学
  • 385 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 131 篇 工商管理
  • 118 篇 医学
    • 109 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 53 篇 公共卫生与预防医...
  • 53 篇 经济学
    • 52 篇 应用经济学
  • 51 篇 教育学
    • 49 篇 教育学
  • 50 篇 法学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学

主题

  • 80 篇 software enginee...
  • 79 篇 computer science
  • 60 篇 machine learning
  • 46 篇 deep learning
  • 45 篇 computational mo...
  • 42 篇 internet of thin...
  • 42 篇 quality of servi...
  • 42 篇 cloud computing
  • 41 篇 grid computing
  • 41 篇 training
  • 40 篇 accuracy
  • 38 篇 resource managem...
  • 33 篇 feature extracti...
  • 32 篇 software
  • 31 篇 computer archite...
  • 31 篇 artificial intel...
  • 30 篇 application soft...
  • 29 篇 laboratories
  • 28 篇 semantics
  • 27 篇 security

机构

  • 123 篇 college of compu...
  • 54 篇 department of co...
  • 35 篇 state key labora...
  • 34 篇 department of co...
  • 29 篇 national enginee...
  • 26 篇 grid computing a...
  • 23 篇 college of intel...
  • 22 篇 shenzhen univers...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 17 篇 department of co...
  • 17 篇 state key labora...
  • 16 篇 department of in...
  • 15 篇 department of co...
  • 14 篇 school of comput...
  • 13 篇 school of inform...
  • 13 篇 college of compu...
  • 13 篇 artificial intel...
  • 13 篇 department of in...
  • 12 篇 school of softwa...

作者

  • 49 篇 rajkumar buyya
  • 24 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 18 篇 leung victor c.m...
  • 16 篇 shen linlin
  • 15 篇 wang xiaofei
  • 14 篇 muhammad adnan k...
  • 13 篇 parizi reza m.
  • 13 篇 tan kay chen
  • 13 篇 materwala huned
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 12 篇 xiaofei wang
  • 12 篇 li jianqiang
  • 11 篇 niyato dusit
  • 10 篇 mccartney robert
  • 10 篇 eckerdal anna
  • 10 篇 zhengfeng ji

语言

  • 1,915 篇 英文
  • 86 篇 其他
  • 11 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computing Science and Software Engineering"
2011 条 记 录,以下是1821-1830 订阅
排序:
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
A Static Analysis Framework For Detecting SQL Injection Vuln...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Xiang Fu Xin Lu Boris Peltsverger Shijun Chen Kai Qian Lixin Tao School of Computer and Information Sciences Georgia Southwestern State University Americus GA USA School of Computing and Software Engineering Southern Polytechnic State University Marietta GA USA Computer Science Department Pace University Pleasantville NY USA
Recently SQL injection attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a Web application. This paper proposes t... 详细信息
来源: 评论
Presentation and Visualization of Redundant Code: Working Session Summary
Presentation and Visualization of Redundant Code: Working Se...
收藏 引用
Duplication, Redundancy, and Similarity in software 2006
作者: Walenstein, Andrew Cordy, Jim Evans, Will Hassan, Ahmed Kamiya, Toshihiro Kapser, Cory Merlo, Ettore University of Louisiana at Lafayette Center for Advanced Computer Studies P.O. Box 44330 LafayetteLA70504-4330 United States Queen's University School of Computing KingstonONK7L 3N6 Canada University of British Columbia Department of Computer Science 201-2366 Main Mall VancouverBCV6T 1Z4 Canada University of Victoria Electrical and Computer Engineering Engineering Office Wing 315 P.O. Box 3055 VictoriaBCV8W 3P6 Canada Information Technology Research Institute Ubiquitous Software Group University of Waterloo David R. Cheriton School of Computer Science WaterlooONN2L 3G1 Canada C.P. 6079 Succ. Centre Ville MontréalQCH3C 3A7 Canada
This report summarizes the proceedings of a workshop discussion session presentation and visualization of aspects relating to duplicated, copied, or cloned code. The main outcomes of the working session were: (a) a re... 详细信息
来源: 评论
Refactoring-aware version control towards refactoring support in API evolution and team development
Refactoring-aware version control towards refactoring suppor...
收藏 引用
28th International Conference on software engineering 2006, ICSE '06
作者: Freese, Tammo Software Engineering Group Department of Computing Science University of Oldenburg Oldenburg Germany
Today, refactorings are supported in some integrated development environments (IDEs). The refactoring operations can only work correctly if all source code that needs to be changed is available to the IDE. However, th... 详细信息
来源: 评论
A logic of believablel agents
A logic of believablel agents
收藏 引用
5th IEEE International Conference on Cognitive Informatics, ICCI 2006
作者: Yu, Pan Cungen, Cao Sui, Yuefei Intelligent Software Department Institute of Computing Technology Knowledge Science and Engineering Group Beijing China
In this paper, we describe our so-called IOBA logic (a logic of Believable Agents). IOBA has expanded the work of KARO [1][2][3][4][18] and IORA logic [5][6][7][8] and interpreted cognitive actions which only occur in... 详细信息
来源: 评论
Message passing over windows-based desktop grids
Message passing over windows-based desktop grids
收藏 引用
4th International Workshop on Middleware for Grid computing (MGC'06) held at the ACM/IFIP/USENIX International Middleware Conference
作者: Queiroz, Carlos Netto, Marco A. S. Buyya, Rajkumar Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne Australia
Message Passing is a popular mechanism used to enable inter-process communication in parallel and distributed computing. Many complex scientific and engineering applications that are executed on clusters have been dev... 详细信息
来源: 评论
Managing risk of inaccurate runtime estimates for deadline constrained job admission control in clusters
Managing risk of inaccurate runtime estimates for deadline c...
收藏 引用
ICPP 2006: 2006 International Conference on Parallel Processing
作者: Yeo, Chee Shin Buyya, Rajkumar Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne Vic. 3010 Australia
The advent of service-oriented Grid computing has resulted in the need for Grid resources such as clusters to enforce user-specific service needs and expectations. Service Level Agreements (SLAs) define conditions whi... 详细信息
来源: 评论
Recognizing behavioral patterns at runtime using finite automata
Recognizing behavioral patterns at runtime using finite auto...
收藏 引用
4th International Workshop on Dynamic Analysis, WODA'06, Co-located with the 28th International Conference on software engineering, ICSE 2006
作者: Wendehals, Lothar Orso, Alessandro Software Engineering Group Department of Computer Science University of Paderborn Germany SPARC Group College of Computing Georgia Institute of Technology United States
During reverse engineering, developers often need to understand the undocumented design of a software. In particular, recognizing design patterns in the software can provide reverse engineers with considerable insight... 详细信息
来源: 评论
Customizing aspect-oriented variabilities using generative techniques
Customizing aspect-oriented variabilities using generative t...
收藏 引用
18th International Conference on software engineering and Knowledge engineering, SEKE 2006
作者: Kulesza, Uirá Lucena, Carlos Alencar, Paulo Garcia, Alessandro Software Engineering Laboratory Computer Science Department PUC-Rio Brazil Computer Systems Group Computer Science Department University of Waterloo Canada Computing Department InfoLab 21 Lancaster University United Kingdom
With the emergence of aspect-oriented (AO) techniques, crosscutting concerns can be now explicitly modularized and exposed as additional variabilities in program families Hence, the development of highly customizable ... 详细信息
来源: 评论
Parametric linear system of equations, whose elements are nonlinear functions
Parametric linear system of equations, whose elements are no...
收藏 引用
12th GAMM-IMACS International Symposium on Scientific computing, Computer Arithmetic and Validated Numerics, SCAN 2006
作者: El-Owny, H. Bergische Universität Wuppertal Faculty C - Department of Mathematics and Computer Science Scientific Computing / Software Engineering Gaußstraße 20 42097 Wuppertal Germany
This paper addresses the problem of solving parametric linear systems of equations whose coefficients are, in the general case, nonlinear functions of interval parameters. Such systems, are encountered in many practic... 详细信息
来源: 评论
Composition of a DIDS by integrating heterogeneous IDSs on grids
Composition of a DIDS by integrating heterogeneous IDSs on g...
收藏 引用
4th International Workshop on Middleware for Grid computing (MGC'06) held at the ACM/IFIP/USENIX International Middleware Conference
作者: Silva, Paulo F. Westphall, Carlos B. Westphall, Carla M. Assunçao, Marcos D. Network and Management Laboratory Department of Computer Science and Statistics Federal University of Santa Catarina Florianópolis Brazil Department of Computer Science and Software Engineering Grid Computing and Distributed Systems Laboratory University of Melbourne Vic. 3053 Australia
This paper considers the composition of a DIDS (Distributed Intrusion Detection System) by integrating heterogeneous IDSs (Intrusion Detection Systems). A Grid middleware is used for this integration. In addition, an ... 详细信息
来源: 评论