咨询与建议

限定检索结果

文献类型

  • 1,236 篇 会议
  • 193 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 934 篇 工学
    • 783 篇 计算机科学与技术...
    • 677 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 生物医学工程(可授...
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 385 篇 理学
    • 230 篇 数学
    • 108 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 48 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 computer archite...
  • 18 篇 quality of servi...
  • 18 篇 predictive model...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,404 篇 英文
  • 49 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1465 条 记 录,以下是1281-1290 订阅
排序:
Decomposition techniques for a loosely-coupled resource allocation problem
Decomposition techniques for a loosely-coupled resource allo...
收藏 引用
2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology
作者: Plamondon, Pierrick Chaib-draa, Brahim Benaskeur, Abder Rezak Computer Science and Software Engineering Dept. Laval University Ste-Foy Que. Canada Decision Support Systems Section Defence R and D Canada - Valcartier Val-Bélair Que. Canada
We are interested by contributing to stochastic problems of which the main distinction is that some tasks may create other tasks. In particular, we present a first approach which represent the problem by an acyclic gr... 详细信息
来源: 评论
Energy-aware broadcasting method for wireless sensor network
收藏 引用
EUC 2005 Workshops: 2nd International Symposium on Ubiquitous Intelligence and Smart Worlds, UISW 2005, IFIP International Symposium on Network-Centric Ubiquitous Systems, NCUS 2005, 1st International Workshop on Security in Ubiquitous Computing Systems, SecUbiq 2005, 1st International Workshop on RFID and Ubiquitous Sensor Networks, USN 2005 and International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems, TAUES 2005 held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, 2005
作者: Park, Cheol-Min Kim, Dae-Won Hwang, Jun Chung-Ang Univ System Software Lab Dept. of Computer Science and Engineering Bobst-Hall 5 floor Seoul 221156-756 Korea Republic of Seoul Woman’s Univ Dept. of Information and Media Seoul 126139-774 Korea Republic of
The communicative behaviors in Wireless Sensor Networks(WSNs) can be characterized by two different types: routing and broadcasting. The broadcasting is used for effective route discoveries and packet delivery. A blin... 详细信息
来源: 评论
A Taxonomy of Model Transformations
A Taxonomy of Model Transformations
收藏 引用
Language engineering for Model-Driven software Development 2004
作者: Mens, Tom Czarnecki, Krzysztof Van Gorp, Pieter Software Engineering Lab Université de Mons-Hainaut Av. du champ de Mars 6 Mons7000 Belgium Dept. Electrical and Computer Engineering University of Waterloo 200 University Ave. West WaterlooONN2L 3G1 Canada Dept. Mathematics and Computer Science Universiteit Antwerpen Middelheimlaan 1 Antwerpen2020 Belgium
This report summarises the results of the discussions of a working group on model transformation of the Dagstuhl Seminar on Language engineering for Model-Driven software Development. The main contribution is a taxono... 详细信息
来源: 评论
A study of service composition with QoS management
A study of service composition with QoS management
收藏 引用
2005 IEEE International Conference on Web Services, ICWS 2005
作者: Fung, Casey K. Hung, Patrick C. K. Wang, Guijun Linger, Richard C. Walton, Gwendolyn H. Engineering and Information Technology Boeing Phantom Works United States Faculty of Business and Information Technology University of Ontario Institute of Technology Canada Software Engineering Institute Carnegie Mellon University United States Mathematics and Computer Science Dept. Florida Southern College United States
Quality of Services (QoS) management in compositions of services requires careful consideration of QoS characteristics of the services and effective QoS management in their execution. A Web service is a software syste... 详细信息
来源: 评论
A BDD-representation for the logic of equality and uninterpreted functions
A BDD-representation for the logic of equality and uninterpr...
收藏 引用
30th International Symposium on Mathematical Foundations of computer science 2005, MFCS 2005
作者: Van De Pol, Jaco Tveretina, Olga Centrum voor Wiskunde en Informatica Dept. of Software Engineering P.O.-Box 94.079 1090 GB Amsterdam Netherlands Department of Computer Science TU Eindhoven P.O. Box 513 5600 MB Eindhoven Netherlands
The logic of equality and uninterpreted functions (EUF) has been proposed for processor verification. This paper presents a new data structure called Binary Decision Diagrams for representing EUF formulas (EUF-BDDs). ... 详细信息
来源: 评论
Development of an intelligent information security evaluation indices system for an enterprise organization
Development of an intelligent information security evaluatio...
收藏 引用
9th International Conference on Knowledge-Based Intelligent Information and engineering Systems, KES 2005
作者: Ko, Il Seok Lee, Geuk Na, Yun Ji Dept. of e-commerce Chungbuk Provincial University of Science and Technology 40 Geumgu-Ri Okchon-Eup Okchon-GunChungbuk Korea Republic of Dept. of Computer Engineering Hannam University 133 Ojeong-Dong Daedeok-Gu Daejon Korea Republic of Dept. of Internet Software Honam University 59-1 Seobong-Dong Gwangsan-Gu Gwangju Korea Republic of
For effectively facing information security threats under rapidly changing information-oriented environment, we need intelligent measuring the information security level of the whole enterprise organization. Most of t... 详细信息
来源: 评论
A mobile agent-based P2P Autonomous Security Hole Discovery system
A mobile agent-based P2P Autonomous Security Hole Discovery ...
收藏 引用
First International Conference on Natural Computation, ICNC 2005
作者: Zheng, Ji Wang, Xin Xue, Xiangyang Toh, C.K. Software School Fudan University Shanghai 200433 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 200433 China Department of Computer Science and Engineering Fudan University Shanghai 200433 China Dept. of Electronic Engineering Queen Mary University of London United Kingdom
A general or agent-based security system is usually constructed hierarchically and has a central manager acting as head of the whole system. However, the manager becomes a bottleneck for being connected by each client... 详细信息
来源: 评论
Testing and Certification of Trustworthy Systems introduction to Minitrack
Testing and Certification of Trustworthy Systems introductio...
收藏 引用
38th Annual Hawaii International Conference on System sciences, HICSS 2005
作者: Hevner, Alan R. Linger, Richard C. Walton, Gwendolyn H. Information Systems and Decision Sciences Dept. Univ. of South Florida Tampa FL 33620 United States CERT Research Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213 United States Dept. of Mathematics and Computer Science Florida Southern College Lakeland FL 33801 United States
来源: 评论
SPC-XML: A structured representation for nested-parallel programming languages
SPC-XML: A structured representation for nested-parallel pro...
收藏 引用
11th International Euro-Par Conference, Euro-Par 2005
作者: González-Escribano, Arturo Van Gemund, Arjan J. C. Cardeñoso-Payo, Valentín Dept. de Informática Universidad de Valladolid E.T.I.T. Campus Miguel Delibes 47011 - Valladolid Spain Embedded Software Lab. Software Technology Department Faculty of Electrical Engineering Mathematics and Computer Science P.O.Box 5031 NL-2600 GA Delft Netherlands
Nested-parallelism programming models, where the task graph associated to a computation is series-parallel, present good analysis properties that can be exploited for scheduling, cost estimation or automatic mapping t... 详细信息
来源: 评论
Enforcing semantics-aware security in multimedia surveillance
收藏 引用
作者: Kodali, Naren Farkas, Csilla Wijesekera, Duminda Center for Secure Information Systems United States Dept of Info. Systems and Software Eng. George Mason University Fairfax VA 22030-4444 United States Information Security Laboratory United States Dept. of Computer Science and Engineering University of South Carolina Columbia SC 29208 United States
Continuous audio-visual surveillance is utilized to ensure the physical safety of critical infrastructures such as airports, nuclear power plants and national laboratories. In order to do so, traditional surveillance ... 详细信息
来源: 评论