咨询与建议

限定检索结果

文献类型

  • 1,336 篇 会议
  • 214 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,012 篇 工学
    • 851 篇 计算机科学与技术...
    • 734 篇 软件工程
    • 223 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 107 篇 生物工程
    • 67 篇 生物医学工程(可授...
    • 64 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 38 篇 光学工程
    • 37 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 建筑学
    • 26 篇 动力工程及工程热...
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 421 篇 理学
    • 252 篇 数学
    • 117 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 58 篇 物理学
    • 57 篇 系统科学
  • 316 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 160 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 59 篇 法学
    • 42 篇 社会学
  • 59 篇 医学
    • 57 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 54 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 35 篇 accuracy
  • 32 篇 computational mo...
  • 30 篇 semantics
  • 29 篇 real-time system...
  • 28 篇 artificial intel...
  • 28 篇 training
  • 27 篇 deep learning
  • 23 篇 data models
  • 22 篇 data mining
  • 21 篇 internet of thin...
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 19 篇 quality of servi...
  • 19 篇 predictive model...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 13 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 university of re...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,547 篇 英文
  • 30 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept of Computer Science and Software Engineering"
1589 条 记 录,以下是81-90 订阅
排序:
Propagating Requirement Change into software High Level Designs towards Resilient software Evolution
Propagating Requirement Change into Software High Level Desi...
收藏 引用
16th Asia-Pacific software engineering Conference
作者: Ibrahim, Noraini Kadir, Wan M. N. Wan Deris, Safaai Software Engineering Dept. Faculty of Computer Science and Information System Universiti Teknologi Malaysia Malaysia
Uncertain and incomplete requirements throughout the whole software life cycle contribute to volatility of the requirements. In a situation where the volatile requirement is changed to satisfy stakeholder needs, all t... 详细信息
来源: 评论
A Re-examination of Lexical Association Measures
A Re-examination of Lexical Association Measures
收藏 引用
2009 Workshop on Multiword Expressions: Identification, Interpretation, Disambiguation, Applications, MWE 2009
作者: Hoang, Hung Huu Kim, Su Nam Kan, Min-Yen Dept. of Computer Science National University of Singapore Singapore Dept. of Computer Science and Software Engineering University of Melbourne Australia
We review lexical Association Measures (AMs) that have been employed by past work in extracting multiword expressions. Our work contributes to the understanding of these AMs by categorizing them into two groups and su... 详细信息
来源: 评论
Ballot permutations in Prêt à voter
Ballot permutations in Prêt à voter
收藏 引用
2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE 2009, Held in Conjunction with the 18th USENIX Security Symposium
作者: Ryan, Peter Y.A. Teague, Vanessa Dept. Computer Science and Communications University of Luxembourg Luxembourg Dept. Computer Science and Software Engineering University of Melbourne Australia
Handling full permutations of the candidate list along with re-encryption mixes is rather difficult in Prêt à Voter but handling cyclic shifts is straightforward. One of the versions of Prêt à Vote... 详细信息
来源: 评论
Measuring the Impacts of Virtualization on the Performance of Thread-Based Applications  7
Measuring the Impacts of Virtualization on the Performance o...
收藏 引用
7th International Conference on software Defined Systems, SDS 2020
作者: Al-Hamouri, Rahaf Al-Jarrah, Heba Al-Sharif, Ziad A. Jararweh, Yaser Dept. of Computer Science Jordan University of Science and Technology Dept. of Software Engineering Irbid Jordan
The rapid advancements in computer hardware and software facilitated the ability for conventional users and developers to use various virtualization techniques on their common personal computers. For example, users an... 详细信息
来源: 评论
Feature-oriented re-engineering of legacy systems into product line assets - A case study
Feature-oriented re-engineering of legacy systems into produ...
收藏 引用
9th International Conference on software Product Lines, SPLC 2005
作者: Kang, Kyo Chul Kim, Moonzoo Lee, Jaejoon Kim, Byungkil Software Engineering Lab. Computer Science and Engineering Dept. Pohang University of Science and Technology Korea Republic of
Home service robots have a wide range of potential applications, such as home security, patient caring, cleaning, etc. The services provided by the robots in each application area are being defined as markets are form... 详细信息
来源: 评论
Performance analysis of evolving wireless ieee 802.11 security architectures  08
Performance analysis of evolving wireless ieee 802.11 securi...
收藏 引用
International Conference on Mobile Technology, Applications, and Systems, Mobility'08
作者: Gin, Andrew Hunt, Ray Dept. of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
Degradation in performance has been a common reason for limited use of security in Wireless LAN equipment such as PCs and embedded devices such as PDAs. However, performance has depended in part upon the technical cho... 详细信息
来源: 评论
A framework for analysis of typed logic programs  5th
收藏 引用
5th International Symposium on Functional and Logic Programming, FLOPS 2001
作者: Lagoon, Vitaly Stuckey, Peter J. Dept. of Computer Science and Software Engineering University of Melbourne Parkville3052 Australia
The paper presents a novel approach to the analysis of typed logic programs. We assume regular type descriptions of logic program variables provided by regular tree grammars. Types are used to identify components of t... 详细信息
来源: 评论
A three-valued declarative debugging scheme  23
A three-valued declarative debugging scheme
收藏 引用
23rd Australasian computer science Conference, ACSC 2000
作者: Naish, L. Dept. of Computer Science and Software Engineering University of Melbourne Parkville3052 Australia
Declarative debugging has many advantages over conventional approaches to debugging for logic and functional programs. This paper extends a previously defined scheme for declarative debugging in which computations wer... 详细信息
来源: 评论
Optimizing tableau reasoning in ALC extended with uncertainty
Optimizing tableau reasoning in ALC extended with uncertaint...
收藏 引用
20th International Workshop on Description Logics, DL 2007
作者: Haarslev, Volker Pai, Hsueh-Ieng Shiri, Nematollaah Dept. of Computer Science and Software Engineering Concordia University Montreal QC Canada
There has been an increased interest in recent years to incorporate uncertainty in Description Logics (DLs), and a number of proposals have been put forward for modeling uncertainty in DL frameworks. While much progre... 详细信息
来源: 评论
HARMs: Hierarchical attack representation models for network security analysis  10
HARMs: Hierarchical attack representation models for network...
收藏 引用
10th Australian Information Security Management Conference, AISM 2012
作者: Hong, Jin Kim, Dong-Seong Dept. of Computer Science and Software Engineering University of Canterbury Christchurch New Zealand
Attack models can be used to assess network security. Purely graph based attack representation models (e.g., attack graphs) have a state-space explosion problem. Purely tree-based models (e.g., attack trees) cannot ca... 详细信息
来源: 评论