咨询与建议

限定检索结果

文献类型

  • 448 篇 会议
  • 246 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 707 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 423 篇 工学
    • 346 篇 计算机科学与技术...
    • 289 篇 软件工程
    • 75 篇 信息与通信工程
    • 63 篇 控制科学与工程
    • 46 篇 生物工程
    • 35 篇 生物医学工程(可授...
    • 32 篇 电气工程
    • 25 篇 动力工程及工程热...
    • 20 篇 电子科学与技术(可...
    • 17 篇 机械工程
    • 17 篇 网络空间安全
    • 16 篇 光学工程
    • 16 篇 建筑学
    • 15 篇 安全科学与工程
  • 168 篇 理学
    • 87 篇 数学
    • 47 篇 生物学
    • 36 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 30 篇 系统科学
    • 17 篇 化学
  • 127 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 43 篇 工商管理
  • 49 篇 医学
    • 47 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 22 篇 公共卫生与预防医...
    • 21 篇 药学(可授医学、理...
  • 23 篇 教育学
    • 22 篇 教育学
  • 22 篇 法学
    • 16 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 grid computing
  • 31 篇 software enginee...
  • 31 篇 cloud computing
  • 30 篇 computer science
  • 28 篇 quality of servi...
  • 27 篇 resource managem...
  • 25 篇 computational mo...
  • 21 篇 processor schedu...
  • 20 篇 laboratories
  • 20 篇 machine learning
  • 18 篇 deep learning
  • 18 篇 application soft...
  • 17 篇 computer archite...
  • 17 篇 distributed comp...
  • 17 篇 accuracy
  • 16 篇 training
  • 15 篇 software
  • 14 篇 predictive model...
  • 13 篇 protocols
  • 13 篇 artificial intel...

机构

  • 26 篇 grid computing a...
  • 10 篇 college of compu...
  • 10 篇 computing and so...
  • 9 篇 cloud computing ...
  • 9 篇 department of in...
  • 8 篇 department of so...
  • 8 篇 department of in...
  • 7 篇 grid computing a...
  • 7 篇 department of la...
  • 7 篇 department of co...
  • 7 篇 school of comput...
  • 7 篇 department of so...
  • 7 篇 state key labora...
  • 7 篇 department of co...
  • 7 篇 national water a...
  • 6 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 department of co...
  • 6 篇 graduate school ...
  • 6 篇 intelligent dist...

作者

  • 49 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 22 篇 buyya rajkumar
  • 13 篇 materwala huned
  • 11 篇 zander carol
  • 11 篇 leila ismail
  • 10 篇 mccartney robert
  • 10 篇 eckerdal anna
  • 9 篇 leonard barolli
  • 9 篇 sanders kate
  • 8 篇 edmundo tovar
  • 8 篇 bei zeng
  • 8 篇 moström jan erik
  • 8 篇 thomas lynda
  • 8 篇 fatos xhafa
  • 8 篇 zhengfeng ji
  • 7 篇 hennebelle alain
  • 7 篇 muhammad younas
  • 6 篇 galindo josé a.
  • 6 篇 r. buyya

语言

  • 626 篇 英文
  • 79 篇 其他
  • 2 篇 中文
检索条件"机构=Department of Languages and Computing Systems and Software Engineering"
707 条 记 录,以下是421-430 订阅
排序:
Egovernment and web accessibility in South America
Egovernment and web accessibility in South America
收藏 引用
International Conference on eDemocracy & eGovernment (ICEDEG)
作者: Sergio Luján-Mora Rosa Navarrete Myriam Peñafiel Department of Software and Computing Systems University of Alicante Spain Faculty of System Engineering National Polytechnic School Ecuador
The number of e-government websites has increased greatly in recent years. Many countries have laws to ensure that e-government sites satisfy web accessibility requirements. The objective of web accessibility is to en... 详细信息
来源: 评论
A Pair-Oriented Requirements engineering Approach for Analysing Multi-lingual Requirements
A Pair-Oriented Requirements Engineering Approach for Analys...
收藏 引用
1st Asia Pacific Requirements engineering Symposium, APRES 2014
作者: Kamalrudin, Massila Sidek, Safiah Salleh, Norsaremah Hosking, John Grundy, John Innovative Software System and Services Group Universiti Teknikal Malaysia Melaka Melaka Malaysia Department of Computer Science International Islamic University Malaysia 50728 Kuala Lumpur Malaysia College of Engineering and Computer Science Australian National University ACT ACT 0200 Australia Centre for Computing and Engineering Software Systems Swinburne University of Technology PO Box 218 Hawthorn VIC 3122 Australia
Requirements written in multiple languages can lead to error-proneness, inconsistency and incorrectness. In a Malaysian setting, software engineers are exposed to both Malay and English requirements. This can be a cha... 详细信息
来源: 评论
Graduating students' designs - Through a phenomenographic lens  14
Graduating students' designs - Through a phenomenographic le...
收藏 引用
10th Annual International Conference on International computing Education Research, ICER 2014
作者: Thomas, Lynda Eckerdal, Anna McCartney, Robert Moström, Jan Erik Sanders, Kate Zander, Carol Department of Computer Science Aberystwyth University Aberystwyth United Kingdom Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT United States Department of Computing Science Umeå University 901 87 Umeå Sweden Mathematics and Computer Science Department Rhode Island College Providence RI United States Computing and Software Systems University of Washington Bothell Bothell WA United States
We expand upon previous research that looked at the question: \Can graduating students design software systems?" Specifically we want to examine students' understanding of the phenomenon\produce a design.&quo... 详细信息
来源: 评论
HorusCML: Context-aware domain-specific visual languages designer
HorusCML: Context-aware domain-specific visual languages des...
收藏 引用
IEEE Symposium on Visual languages and Human Centric computing (VL/HCC)
作者: Mohamed Almorsy John Grundy Ulf Rüegg Centre for Computing and Engineering Software and Systems Swinburne University of Technology Hawthorn Australia Department of Computer Science Kiel University Kiel Germany
The objective behind building domain-specific visual languages (DSVLs) is to provide users with the most appropriate concepts and notations that best fit with their domain and experience. However, the existing DSVL de... 详细信息
来源: 评论
Increasing awareness of computer science in high school girls
Increasing awareness of computer science in high school girl...
收藏 引用
Frontiers in Education (FIE) Conference
作者: Gerald C. Gannod Janet E. Burge Victoria McIe Maureen Doyle Karen C. Davis Department of Computer Science and Software Engineering Miami University Oxford OH Department of Computer Science Northern Kentucky University Highland Heights KY Electrical Engineering and Computing Systems University of Cincinnati Cincinnati OH
The "Girls on the Go: The Mobile computing College Experience" is a residential summer camp whose aim is to encourage female high school students to attend college, to consider computer science as viable maj... 详细信息
来源: 评论
FACIAL ACTION UNIT RECOGNITION BY RELATION MODELING FROM BOTH QUALITATIVE KNOWLEDGE AND QUANTITATIVE DATA
FACIAL ACTION UNIT RECOGNITION BY RELATION MODELING FROM BOT...
收藏 引用
IEEE International Conference on Multimedia and Expo Workshops
作者: Zhen Gao Shangfei Wang Chongliang Wu Jun Wang Qiang Ji Key Lab of Computing and Communication Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute
In this paper, we propose to capture Action Unit (AU) relations existing in both qualitative knowledge and quantitative data through Credal Networks (CN). Each node of the CN represents an AU label, and the links and ... 详细信息
来源: 评论
Cloudsme: Developing a cloud computing-based platform for simulation in manufacturing and engineering
Cloudsme: Developing a cloud computing-based platform for si...
收藏 引用
2014 Operational Research Society Simulation Workshop, SW 2014
作者: Taylor, Simon J. E. Kiss, Tamas Kacsuk, Peter Terstyanszky, Gabor Nicola, Fantini Department of Information Systems and Computing Brunel University Uxbridge MiddlesexUB8 3PH United Kingdom Centre for Parallel Computing Department of Business Information Systems University of Westminster 115 New Cavendish St LondonW1W 6UW United Kingdom MTA SZTAKI Victor Hugo u. 18-22 Budapest1132 Hungary Department of Computer Science and Software Engineering Faculty of Science and Technology University of Westminster LondonW1W 6UW United Kingdom Huobstrasse 10 Pfäffikon8808 Switzerland
There is a demand from simulation users for speed, the ability to obtain quickly results from simulation runs. Cloud computing offers the potential for scalable, on-demand access to resources that can be used to speed... 详细信息
来源: 评论
Understanding the tradeoffs between software-managed vs. hardware-managed caches in GPUs
Understanding the tradeoffs between software-managed vs. har...
收藏 引用
IEEE International Symposium on Performance Analysis of systems and software
作者: Chao Li Yi Yang Hongwen Dai Shengen Yan Frank Mueller Huiyang Zhou Department of Electrical and Computer Engineering North Carolina State University Department of Computing Systems Architecture NEC Laboratories America Institute of Software North Carolina State University Department of Computer Science North Carolina State University
On-chip caches are commonly used in computer systems to hide long off-chip memory access latencies. To manage on-chip caches, either software-managed or hardware-managed schemes can be employed. State-of-art accelerat... 详细信息
来源: 评论
Process deployment: A taxonomy of critical success factors
Process deployment: A taxonomy of critical success factors
收藏 引用
2010 6th International Joint Conference on Computer, Information, and systems Sciences, and engineering, CISSE 2010
作者: Bayona, Luz S. Calvo-Manzano, Jose A. Cuevas, Gonzalo Feliu, Tomás San Faculty of Computer Science Department of Languages and IT Systems and Software Engineering Technical University of Madrid Madrid Spain
Various methods, models and standards for software process improvement have been adopted by organizations to improve their software processes. However, despite these efforts they still encounter difficulties in their ... 详细信息
来源: 评论
Resolving vulnerability identification errors using security requirements on business process models
收藏 引用
Information Management and Computer Security 2013年 第3期21卷 202-223页
作者: Taubenberger, Stefan Jürjens, Jan Yu, Yijun Nuseibeh, Bashar Computing Department Open University Milton Keynes United Kingdom Department of Computer Science Technical University Dortmund Dortmund Germany Fraunhofer Institute for Software Systems Engineering ISST Dortmund Germany Lero the Irish Software Engineering Research Centre Computing Department University of Limerick Limerick Ireland Open University Milton Keynes United Kingdom
Purpose - In any information security risk assessment, vulnerabilities are usually identified by information-gathering techniques. However, vulnerability identification errors - wrongly identified or unidentified vuln... 详细信息
来源: 评论