咨询与建议

限定检索结果

文献类型

  • 2,251 篇 会议
  • 927 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 3,237 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,874 篇 工学
    • 1,446 篇 计算机科学与技术...
    • 1,197 篇 软件工程
    • 350 篇 信息与通信工程
    • 314 篇 控制科学与工程
    • 175 篇 生物工程
    • 152 篇 电气工程
    • 130 篇 生物医学工程(可授...
    • 124 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 89 篇 光学工程
    • 87 篇 安全科学与工程
    • 77 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 71 篇 化学工程与技术
    • 70 篇 土木工程
    • 66 篇 仪器科学与技术
  • 820 篇 理学
    • 436 篇 数学
    • 200 篇 生物学
    • 155 篇 物理学
    • 149 篇 系统科学
    • 132 篇 统计学(可授理学、...
    • 73 篇 化学
  • 547 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 216 篇 工商管理
    • 206 篇 图书情报与档案管...
  • 141 篇 医学
    • 129 篇 临床医学
    • 108 篇 基础医学(可授医学...
  • 88 篇 法学
    • 65 篇 社会学
  • 66 篇 教育学
    • 66 篇 教育学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 26 篇 农学
  • 13 篇 文学
  • 8 篇 军事学
  • 3 篇 艺术学

主题

  • 182 篇 software enginee...
  • 143 篇 computer science
  • 84 篇 application soft...
  • 83 篇 computational mo...
  • 76 篇 wireless sensor ...
  • 75 篇 deep learning
  • 73 篇 accuracy
  • 71 篇 software systems
  • 70 篇 laboratories
  • 70 篇 machine learning
  • 70 篇 software
  • 68 篇 artificial intel...
  • 66 篇 training
  • 63 篇 computer archite...
  • 61 篇 quality of servi...
  • 53 篇 security
  • 51 篇 systems engineer...
  • 51 篇 resource managem...
  • 48 篇 cloud computing
  • 47 篇 grid computing

机构

  • 48 篇 department of la...
  • 44 篇 department of in...
  • 34 篇 graduate school ...
  • 31 篇 beijing key labo...
  • 27 篇 department of co...
  • 26 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of in...
  • 13 篇 department of la...
  • 12 篇 institute for so...
  • 12 篇 school of softwa...
  • 12 篇 department of el...
  • 12 篇 department of so...

作者

  • 67 篇 fatos xhafa
  • 65 篇 leonard barolli
  • 49 篇 rajkumar buyya
  • 49 篇 arjan durresi
  • 35 篇 junping du
  • 34 篇 yingmin jia
  • 24 篇 ismail leila
  • 24 篇 buyya rajkumar
  • 23 篇 fashan yu
  • 21 篇 akio koyama
  • 19 篇 tao yang
  • 19 篇 xenofon koutsouk...
  • 18 篇 gjergji mino
  • 16 篇 makoto ikeda
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned

语言

  • 2,936 篇 英文
  • 283 篇 其他
  • 17 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Languages and Computer Systems and Software Engineering"
3237 条 记 录,以下是2471-2480 订阅
排序:
Threats to Health Information Security
Threats to Health Information Security
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Ganthan Narayana Samy Rabiah Ahmad Zuraini Ismail Department of Computer Systems and Communications Faculty of Computer Science and Information System Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology department (ITD), M... 详细信息
来源: 评论
Minimal exposure path algorithms for directional sensor networks
Minimal exposure path algorithms for directional sensor netw...
收藏 引用
2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
作者: Liu, Liang Zhang, Xi Ma, Huadong Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX 77843 United States Beijing Key Lab. of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing 100876 China
As a fundamental problem of wireless sensor networks, the minimal exposure path problem corresponding to the sensor network's worst-case coverage plays an important role in the applications for detecting intrusion... 详细信息
来源: 评论
Constructing a new communication system by integrating the GSM to the satellites infrastructure
收藏 引用
WSEAS Transactions on Communications 2009年 第2期8卷 217-226页
作者: Al-Ani, Muzhir Sh. Al-Kasasbeh, Basil M. Al-Qutaish, Rafa E. Muhairat, Mohammad I. Department of Computer Science Amman Arab University Amman 11953 Jordan Department of Computer Networks Systems Applied Science University Amman 11931 Jordan Department of Software Engineering Alzaytoonah University of Jordan Amman 11733 Jordan
The current researches and industries are looking forward to integrate different technologies to get a global technology that offers all of the intended services in a simple way. In this paper, a new communications sy... 详细信息
来源: 评论
Exposure-path prevention in directional sensor networks using sector model based percolation
Exposure-path prevention in directional sensor networks usin...
收藏 引用
2009 IEEE International Conference on Communications, ICC 2009
作者: Liang, Liu Xi, Zhang Huadong, Ma Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX 77843 United States Beijing Key Lab. of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing 100876 China
In wireless sensor networks, most existing works on region coverage mainly concentrate on the omnidirectional sensor based full coverage, which ensures that all points in the sensor-deployed region are covered. In con... 详细信息
来源: 评论
A Heuristic Approach for Capacity Control in Clouds
A Heuristic Approach for Capacity Control in Clouds
收藏 引用
IEEE International Conference on E-Commerce Technology Workshops
作者: Arun Anandasivam Stefan Buschek Rajkumar Buyya Institute for Information Systems and Management University of Karlsruhe Germany Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne Australia
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud reso... 详细信息
来源: 评论
A Metadata Search Approach with Branch and Bound Algorithm to Keyword Query in Relational Databases
A Metadata Search Approach with Branch and Bound Algorithm t...
收藏 引用
International Conference on computer Sciences and Convergence Information Technology (ICCIT)
作者: Jarunee Saelee Veera Boonjing Software Systems Engineering Laboratory Department of Computer Science Faculty of Science King Mongkut's Institute of Technology Ladkrabang Bangkok Thailand
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directl... 详细信息
来源: 评论
Using Quality Audits to Assess software Course Projects
Using Quality Audits to Assess Software Course Projects
收藏 引用
Conference on software engineering Education & Training (CSEE&T)
作者: Wilson Pádua Synergia Systems and Software Engineering Laboratory Computer Science Department Federal University of Minas Gerais Belo Horizonte Minas Gerais Brazil
Assessing software engineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might require the examination of a significant vo... 详细信息
来源: 评论
TinyBee: Mobile-Agent-Based Data Gathering System in Wireless Sensor Networks
TinyBee: Mobile-Agent-Based Data Gathering System in Wireles...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Kaoru Ota Mianxiong Dong Xiaolin Li School of Computer Science and Engineering University of Aizu Fukushima Japan Scalable Software Systems Laboratory Computer Science Department Oklahoma State University Stillwater OK USA
This paper proposes a mobile-agent-based data gathering system (called TinyBee) in wireless sensor networks. Most existing mobile-agent-based systems consider only static sinks/servers. In this paper, we consider both... 详细信息
来源: 评论
A Contextual Guidance Approach to software Security
A Contextual Guidance Approach to Software Security
收藏 引用
IEEE Annual International computer software and Applications Conference (COMPSAC)
作者: Philipp Schugerl David Walsh Juergen Rilling Philippe Charland Department of Computer Science and Software Engineering Concordia University Montreal Canada System of Systems Section Defence Research and Development Canada QUE Canada
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving independently from each other. Modern IDEs ... 详细信息
来源: 评论
Beyond generated software documentation — A web 2.0 perspective
Beyond generated software documentation — A web 2.0 perspec...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Philipp Schugerl Juergen Rilling Philippe Charland Department of Computer Science and Software Engineering Concordia University Montreal Canada System of Systems Section Defence Research and Development Canada QUE Canada
Over the last decades, software engineering processes have constantly evolved to reflect cultural, social, technological, and organizational changes, which are often a direct result of the Internet. The introduction o... 详细信息
来源: 评论