咨询与建议

限定检索结果

文献类型

  • 1,236 篇 会议
  • 193 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 934 篇 工学
    • 783 篇 计算机科学与技术...
    • 677 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 生物医学工程(可授...
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 385 篇 理学
    • 230 篇 数学
    • 108 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 48 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 computer archite...
  • 18 篇 quality of servi...
  • 18 篇 predictive model...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,404 篇 英文
  • 49 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1465 条 记 录,以下是1201-1210 订阅
排序:
Economics-driven software mining
Economics-driven software mining
收藏 引用
1st International Workshop on the Economics of software and Computation, ESC'07
作者: Bahsoon, Rami Emmerich, Wolfgang School of Engineering and Applied Science Computer Sc Aston University Birmingham Aston Triangle B4 7ET Birmingham United Kingdom London Software Systems Dept. of Computer Science University College London Gower Street WC1E 6BT London United Kingdom
Economics-driven software mining (EDSM) sifts through the repository data to extract information that could be useful for reasoning about not only the technical aspects but also the economics properties related to the... 详细信息
来源: 评论
A connection degree-based rough sets model and its application to knowledge reduction
A connection degree-based rough sets model and its applicati...
收藏 引用
SNPD 2007: 8th ACIS International Conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Liuling, Dai Bing, Huang Dongxiao, Yang School of Software Beijing Institute of Technology Beijing 100081 China School of Computer Science and Technology Nanjing Audit University Nanjing 210029 China School of Management and Engineering Nanjing University Nanjing 210093 China Dept. of Information Science and Technology Jining Medical College Jining 272013 China
Knowledge reduction is one of the most important issues in rough sets theory. Many works are related to connection-degree-based rough sets model to treat incomplete information systems. However, the model is not used ... 详细信息
来源: 评论
Achieving dependable systems by synergistic development of architectures and assurance cases
Achieving dependable systems by synergistic development of a...
收藏 引用
Workshop on Architecting Dependable Systems, WADS 2006
作者: Graydon, Patrick J. Knight, John C. Strunk, Elisabeth A. Department of Computer Science University of Virginia 151 Engineer's Way Charlottesville VA 22904-4740 United States Software Systems Engineering Dept. Aerospace Corporation 15049 Conference Center Drive CH3/320 Chantilly VA 20151-3824 United States
Assurance Based Development (ABD) is an approach to the construction of critical computing systems in which the system and an argument that it meets its assurance goals are developed simultaneously. ABD touches all as... 详细信息
来源: 评论
A study of the contributors of PostgreSQL
A study of the contributors of PostgreSQL
收藏 引用
2006 International Workshop on Mining software Repositories, MSR '06, Co-located with the 28th International Conference on software engineering, ICSE 2006
作者: German, Daniel M. Software Engineering Group Dept. of Computer Science University of Victoria Canada
This report describes some characteristics of the development team of PostgreSQL that were uncovered by analyzing the history of its software artifacts as recorded by the project's CVS repository.
来源: 评论
Managing Web service quality
Managing Web service quality
收藏 引用
6th International Workshop on software engineering and Middleware
作者: Emmerich, Wolfgang Software Systems Engineering Dept. of Computer Science University College London
The IT industry is beginning to mirror a trend of specialization and outsourcing that has been present for decades in other industries, such as the automotive industry. We are beginning to see the emergence of special... 详细信息
来源: 评论
Uncertainty reasoning in description logics: A generic approach
Uncertainty reasoning in description logics: A generic appro...
收藏 引用
FLAIRS 2006 - 19th International Florida Artificial Intelligence Research Society Conference
作者: Haarslev, Volker Pai, Hsueh-Ieng Shiri, Nematollaah Concordia University Dept. of Computer Science and Software Engineering Montreal Que. Canada
Description Logics (DLs) are gaining more popularity as the foundation of ontology languages for the Semantic Web. As most information in real life is imperfect, there has been an increasing interest recently in exten... 详细信息
来源: 评论
An evaluation of negative selection algorithm with constraint-based detectors  44
An evaluation of negative selection algorithm with constrain...
收藏 引用
44th Annual ACM Southeast Conference, ACMSE 2006
作者: Hou, Haiyu Dozier, Gerry Applied Computational Intelligence Lab. Dept. Computer Science and Software Engineering Auburn University
The Negative Selection Algorithm is an immunology-inspired algorithm for anomaly detection application. This algorithm has been implemented with different pattern representations and various matching rules and success... 详细信息
来源: 评论
Classifying noisy data streams
收藏 引用
3rd International Conference on Fuzzy Systems and Knowledge Discovery
作者: Wang, Yong Li, Zhanhuai Zhang, Yang Dept. Computer Science and Software Northwestern Polytechnical University China School of Information Engineering Northwest A and F University China
The two main challenges associated with mining data streams are concept drifting and data noise. Current algorithms mainly depend on the robust of the base classifier or learning ensembles, and have no active mechanis... 详细信息
来源: 评论
Uncontrollable privacy - The right that every attacker desires
Uncontrollable privacy - The right that every attacker desir...
收藏 引用
4th Australian Information Security Management Conference, AISM
作者: Antoniou, Giannakis Gritzalis, Stefanos Dept. of Computer Science and Software Engineering University of Melbourne Australia Dept. of Information and Communication Systems Engineering University of the Aegean Samos 83200 Greece
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs... 详细信息
来源: 评论
Network Forensics and Privacy Enhancing Technologies "living" together in harmony
Network Forensics and Privacy Enhancing Technologies "living...
收藏 引用
4th Australian Information Security Management Conference, AISM
作者: Antoniou, Giannakis Gritzalis, Stefanos Dept. of Computer Science and Software Engineering University of Melbourne Australia Dept. of Information and Communication Systems Engineering University of the Aegean Samos 83200 Greece
Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who p... 详细信息
来源: 评论