咨询与建议

限定检索结果

文献类型

  • 1,242 篇 会议
  • 196 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,474 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 938 篇 工学
    • 787 篇 计算机科学与技术...
    • 677 篇 软件工程
    • 213 篇 信息与通信工程
    • 108 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 生物医学工程(可授...
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 384 篇 理学
    • 230 篇 数学
    • 107 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 291 篇 管理学
    • 169 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 58 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 26 篇 公共卫生与预防医...
  • 55 篇 法学
    • 38 篇 社会学
  • 35 篇 教育学
    • 35 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 49 篇 software enginee...
  • 36 篇 feature extracti...
  • 35 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 27 篇 artificial intel...
  • 26 篇 real-time system...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 internet of thin...
  • 18 篇 computer archite...
  • 18 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,286 篇 英文
  • 176 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1474 条 记 录,以下是861-870 订阅
排序:
Challenges in flexible safety-critical software development - An industrial qualitative survey
收藏 引用
14th International Conference on Product-Focused software Process Improvement, PROFES 2013
作者: Pedersen Notander, Jesper Höst, Martin Runeson, Per Software Engineering Research Group Dept. of Computer Science Lund University Sweden
Context. Development of safety-critical systems is mostly governed by process-heavy paradigms, while increasing demands on flexibility and agility also reach this domain. Objectives. We wanted to explore in more detai... 详细信息
来源: 评论
PEP-side caching: An insider threat port
PEP-side caching: An insider threat port
收藏 引用
2013 IEEE 14th International Conference on Information Reuse and Integration, IEEE IRI 2013
作者: Yaseen, Qussai Althebyan, Qutaibah Jararweh, Yaser Dept. of Computer Science Yarmouk University Irbid Jordan Dept. of Software Engineering Jordan University of Science and Technology Irbid Jordan Dept. of Computer Science Jordan University of Science and Technology Irbid Jordan
PEP-side caching is used in request-response access control mechanisms to increase the availability and reduce the processing overhead on PDP. Nonetheless, this paper shows that using this approach may open an insider... 详细信息
来源: 评论
A spatial keyword evaluation framework for network-based spatial queries  13
A spatial keyword evaluation framework for network-based spa...
收藏 引用
21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2013
作者: Zhang, Ji Ku, Wei-Shinn Jiang, Xunfei Qin, Xiao Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
An increasing number of spatial keyword query techniques that return qualified objects based on a comprehensive consideration of spatial and keyword constraints have been presented in the literature. Due to the comple... 详细信息
来源: 评论
A dependency-sharing tool for global software engineering
A dependency-sharing tool for global software engineering
收藏 引用
2nd International Conference on Design, User Experience, and Usability: Web, Mobile, and Product Design, DUXU 2013, Held as Part of 15th International Conference on Human-computer Interaction, HCI International 2013
作者: Lee, Douglas Milewski, Allen E. Rosca, Daniela Dept. of Computer Science and Software Engineering Monmouth University West Long Branch NJ United States
This project explores the design of a tool to facilitate a common task that software engineers find difficult - the identification and management of dependencies between the many heterogeneous entities created in the ... 详细信息
来源: 评论
Cloud computing in electric vehicles charging control and dispatch optimization
Cloud computing in electric vehicles charging control and di...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Dan Wu Bo Liu Zhijian Chen Wenyan Xie Xiang Huang Shuwei Pei Bin Sheng Donghan Feng Information Center China Southern Power Grid Co. Ltd. Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Network & Information Branch Guangdong Electric Power Design Institute Guangzhou China Chinese Academy of Sciences Institute of Software Beijing China Dept. of Electrical Engineering Shanghai Jiao Tong University Shanghai China
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in in... 详细信息
来源: 评论
Efficient geometric re-ranking for mobile visual search
Efficient geometric re-ranking for mobile visual search
收藏 引用
11th Asian Conference on computer Vision, ACCV 2012
作者: Luo, Junwu Lang, Bo State Key Laboratory of Software Development Environment Dept. of Computer Science and Engineering Beihang University Beijing China
The state-of-the-art mobile visual search approaches are based on the bag-of-visual-word (BoW). As BoW representation ignores geometric relationship among the local features, a full geometric constraint like RANSAC is... 详细信息
来源: 评论
Measuring similarity of windows applications using static and dynamic birthmarks  13
Measuring similarity of windows applications using static an...
收藏 引用
28th Annual ACM Symposium on Applied Computing, SAC 2013
作者: Kim, Dongjin Han, Yongman Cho, Seong-Je Yoo, Haeyoung Woo, Jinwoon Nah, Yunmook Park, Minkyu Chung, Lawrence Dept. of Computer Science and Software Science Dankook University Yongin 448-701 Korea Republic of Dept. of Computer Engineering Konkuk University Chungbuk 380-701 Korea Republic of Dept. of Computer Science University of Texas Dallas TX 75080 United States
A software birthmark is unique, as certain native characteristics of a program, hence can be used to measure the similarity between programs. In general, a static software birthmark does not need program execution, bu... 详细信息
来源: 评论
Requirements-driven software service evolution
Requirements-driven software service evolution
收藏 引用
2012 International Conference on Service-Oriented Computing, ICSOC 2012
作者: Li, Feng-N Dept. of Information Engineering and Computer Science University of Trento Trento Italy School of Software Tsinghua University Beijing China
Evolution is of key importance for software services as they need to satisfy ever-changing customer requirements under open and dynamic operating environment. The majority of current research on service evolution is f... 详细信息
来源: 评论
Malware analysis method using visualization of binary files  13
Malware analysis method using visualization of binary files
收藏 引用
2013 Research in Adaptive and Convergent Systems, RACS 2013
作者: Han, Kyoungsoo Lim, Jae Hyun Im, Eul Gyu Dept. of Computer and Software Hanyang University Seoul Korea Republic of Div. of Computer Science and Engineering Hanyang University Seoul Korea Republic of
Malware authors have been generating and disseminating malware variants through various ways, such as reusing modules or using automated malware generation tools. With the help of the malware generation techniques, th... 详细信息
来源: 评论
Requirements management in a combined process for safety and security assessments
Requirements management in a combined process for safety and...
收藏 引用
2013 8th International Conference on Availability, Reliability and Security, ARES 2013
作者: Katta, Vikash Raspotnig, Christian Karpati, Peter Stalhane, Tor Dept. Software Engineering Institute for Energy Technology Halden Norway Dept. Computer and Information Science Norwegian University of Science and Technology Trondheim Norway Dept. Information Science and Media Studies University of Bergen Bergen Norway
Combined Harm Assessment of Safety and Security for Information Systems (CHASSIS) method defines a unified process for safety and security assessments to address both the safety and security aspects during system deve... 详细信息
来源: 评论