咨询与建议

限定检索结果

文献类型

  • 1,242 篇 会议
  • 196 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,474 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 938 篇 工学
    • 787 篇 计算机科学与技术...
    • 677 篇 软件工程
    • 213 篇 信息与通信工程
    • 108 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 生物医学工程(可授...
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 291 篇 管理学
    • 169 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 58 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 26 篇 公共卫生与预防医...
  • 55 篇 法学
    • 38 篇 社会学
  • 35 篇 教育学
    • 35 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 35 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 27 篇 artificial intel...
  • 26 篇 real-time system...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,286 篇 英文
  • 176 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1474 条 记 录,以下是811-820 订阅
排序:
A replication case study to measure the architectural quality of a commercial system  14
A replication case study to measure the architectural qualit...
收藏 引用
8th ACM/IEEE International Symposium on Empirical software engineering and Measurement, ESEM 2014
作者: Reimanis, Derek Izurieta, Clemente Luhr, Rachael Xiao, Lu Cai, Yuanfang Rudy, Gabe Software Engineering Laboratory Computer Science Dept BozemanMT United States Computer Science Dept. Drexel University PhiladelphiaPA United States Golden Helix Inc. 203 Enterprise Blvd BozemanMT United States
Context: Long-term software management decisions are directly impacted by the quality of the software's architecture. Goal: Herein, we present a replication case study where structural information about a commerci... 详细信息
来源: 评论
Optimizing preemption-overhead accounting in multiprocessor real-time systems  14
Optimizing preemption-overhead accounting in multiprocessor ...
收藏 引用
22nd International Conference on Real-Time Networks and Systems, RTNS 2014
作者: Ward, Bryan C. Thekkilakattil, Abhilash Anderson, James H. Dept. of Computer Science University of North Carolina at Chapel Hill United States Div. of Software Engineering Mälardalen University Västerås Sweden
There exist two general techniques to account for preemption-related overheads on multiprocessors. This paper presents a new preemption-related overhead-accounting technique, called analytical redistribution of preemp... 详细信息
来源: 评论
Fast range query processing with strong privacy protection for cloud computing  40th
Fast range query processing with strong privacy protection f...
收藏 引用
Proceedings of the 40th International Conference on Very Large Data Bases, VLDB 2014
作者: Li, Rui Liu, Alex X. Wang, Ann L. Bruhadeshwar, Bezawada College of Computer Science and Electronic Engineering Hunan university ChangSha China Dept. of Computer Science and Engineering Michigan State University East LansingMI United States National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
Privacy has been the key road block to cloud computing as clouds may not be fully trusted. This paper concerns the problem of privacy preserving range query processing on clouds. Prior schemes are weak in privacy prot... 详细信息
来源: 评论
QoS-aware Service Composition over Graphplan through Graph Reachability
QoS-aware Service Composition over Graphplan through Graph R...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Min Chen Yuhong Yan Dept. of Computer Science and Software Engineering Concordia University Montreal Canada
QoS-aware service composition is a bi-objectivetask for the generation of a business process: to fulfill functional goals and to optimize the QoS criteria. Planning algorithms are frequently used for the generation of... 详细信息
来源: 评论
A systematic view of agent-supported simulation: Past, present, and promising future  4
A systematic view of agent-supported simulation: Past, prese...
收藏 引用
4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, SIMULTECH 2014
作者: Ören, Tuncer Yilmaz, Levent Ghasem-Aghaee, Nasser School of Electrical Eng. and Computer Science Univ. of Ottawa OttawaON Canada Computer Science and Software Engineering Samuel Ginn College of Engineering Auburn University AuburnAL United States Computer Eng. Dept. Sheikh Bahaei Univ. Baharestan Iran Univ. of Isfahan Isfahan Iran
Agent-supported simulation involves the use of intelligent agents to enhance modeling and simulation (M&S) infrastructures and consists of support by software agents: (1) to provide computer assistance for front-e... 详细信息
来源: 评论
SYNCEYE: An Availability Measurement Tool for Embedded Systems
SYNCEYE: An Availability Measurement Tool for Embedded Syste...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Junghwan Lee Kwangyong Lee Dept. of Computer Software and Engineering Korea University of Science and Technology (UST) Korea
In case of safety-critical embedded systems, software must have high availability to provide non-stop and reliable service. Therefore, we want to measure the availability of our system. However, using past methods, it... 详细信息
来源: 评论
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Scalable Security Models for Assessing Effectiveness of Movi...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Jin B. Hong Dong Seong Kim Computer Science and Software Engineering Dept. University of Canterbury Christchurch New Zealand
Moving Target Defense (MTD) changes the attack surface of a system that confuses intruders to thwart attacks. Various MTD techniques are developed to enhance the security of a networked system, but the effectiveness o... 详细信息
来源: 评论
Towards energy-aware optimisation of business processes
Towards energy-aware optimisation of business processes
收藏 引用
3rd International Conference on Smart Grids and Green IT Systems, SMARTGREENS 2014
作者: López, Beatriz Ghose, Aditya Savarimuthu, Tony Nowostawski, Mariusz Winikoff, Michael Cranefield, Stephen EXiT research group University of Girona Girona Spain School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Dept. of Information Science University of Otago Dunedin New Zealand Faculty of Computer Science and Media Technology Gjøvik University College Gjøvik Norway
Time dependent energy tariffs are a matter of concern to managers in organisations, who need to rethink how to allocate resources to business processes so that they take into account energy costs. However, due to the ... 详细信息
来源: 评论
A Novel Approach to Perform Reversible Addition/Subtraction Operations Using Deoxyribonucleic Acid
A Novel Approach to Perform Reversible Addition/Subtraction ...
收藏 引用
IEEE International Symposium on Circuits and Systems
作者: Ankur Sarker Hafiz Md. Hasan Babu Saiful Islam Dept. of Computer Science and Engineering University of Dhaka Dhaka 1000 Bangladesh Dept. of Computer Science and Software Engineering Swinburne University of Technology VIC 3122 Australia
Reversible logic transforms logic signal in a way that allows the original input signals to be recovered from the produced outputs, has attracted great attention because of its application in many areas. Traditional s... 详细信息
来源: 评论
Similarity calculation method for user-define functions to detect malware variants  14
Similarity calculation method for user-define functions to d...
收藏 引用
2014 Conference on Research in Adaptive and Convergent Systems, RACS 2014
作者: Kim, TaeGuen Park, Jung Bin Cho, In Gyeom Im, Eul Gyu Kang, Boojoong Kang, SooYong Dept. of Computer and Software Hanyang University Seoul Korea Republic of Div. of Computer Science and Engineering Hanyang University Seoul Korea Republic of Institute of Electronics Communications and Information Technology Queen's University of Belfast Belfast United Kingdom
The number of malware has sharply increased over years, and it caused various damages on computing systems and data. In this paper, we propose techniques to detect malware variants. Malware authors usually reuse malwa... 详细信息
来源: 评论