咨询与建议

限定检索结果

文献类型

  • 1,855 篇 会议
  • 279 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,332 篇 工学
    • 1,069 篇 计算机科学与技术...
    • 903 篇 软件工程
    • 307 篇 信息与通信工程
    • 182 篇 控制科学与工程
    • 138 篇 生物工程
    • 130 篇 电气工程
    • 117 篇 电子科学与技术(可...
    • 102 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 机械工程
    • 53 篇 安全科学与工程
    • 48 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 36 篇 仪器科学与技术
    • 36 篇 化学工程与技术
    • 36 篇 交通运输工程
  • 580 篇 理学
    • 341 篇 数学
    • 149 篇 生物学
    • 115 篇 物理学
    • 98 篇 统计学(可授理学、...
    • 72 篇 系统科学
  • 392 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 134 篇 工商管理
  • 87 篇 医学
    • 84 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 41 篇 教育学
    • 41 篇 教育学
  • 27 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 63 篇 software enginee...
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 machine learning
  • 50 篇 computational mo...
  • 50 篇 feature extracti...
  • 48 篇 training
  • 44 篇 deep learning
  • 41 篇 real-time system...
  • 36 篇 semantics
  • 35 篇 computer science
  • 34 篇 analytical model...
  • 33 篇 artificial intel...
  • 32 篇 predictive model...
  • 31 篇 computer archite...
  • 30 篇 internet of thin...
  • 30 篇 data mining
  • 30 篇 data models
  • 25 篇 testing
  • 23 篇 reliability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 rahman shafiur
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 nisar ali

语言

  • 1,993 篇 英文
  • 169 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2176 条 记 录,以下是1821-1830 订阅
Profiling self-propagating worms via behavioral footprinting
Profiling self-propagating worms via behavioral footprinting
收藏 引用
4th ACM Workshop on Recurring Malcode, WORM'06. Co-located with the 13th ACM Conference on computer and Communications Security, CCS'06
作者: Jiang, Xuxian Xu, Dongyan Dept. of Information and Software Engineering George Mason University Fairfax VA 22030 CERIAS Dept. of Computer Science Purdue University West Lafayette IN 47907
This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm's infection session contains a number of steps (e.g., for probing, exploitation, and replicat... 详细信息
来源: 评论
ARCATS - A Scalable Compositional Analysis Tool Suite
ARCATS - A Scalable Compositional Analysis Tool Suite
收藏 引用
2006 ACM Symposium on Applied Computing
作者: Cheng, Yung-Pin Cheng, Yu-Ru Wang, Hong-Yi Software Engineering Lab. Dept. Information and Computer Education National Taiwan Normal University Taipei City Taiwan
Automatic verification techniques, which analyze all processes at once, typically do not scale well for large, complex concurrent software systems because of the theoretic barrier - PSPACE complexity in worst case. In... 详细信息
来源: 评论
DRM enabled P2P architecture
DRM enabled P2P architecture
收藏 引用
8th International Conference Advanced Communication Technology, ICACT 2006
作者: Sung, Jae-Youn Jeong, Jeong-Yeon Yoon, Ki-Song UST Computer and Software Engineering Dept. Korea Republic of ETRI Digital Contents Distribution Research Team Korea Republic of
Recently, P2P (Peer to Peer) systems, direct file sharing systems among the peers, are one of the most attractive file sharing system. P2P architectures have high scalability and high performance due to the fact that ... 详细信息
来源: 评论
Using decision trees to predict the certification result of a build  06
Using decision trees to predict the certification result of ...
收藏 引用
21st IEEE/ACM International Conference on Automated software engineering, ASE 2006
作者: Hassan, Ahmed E. Ken, Zhang Dept. of Electrical and Computer Engineering University of Victoria Vic. Canada Toronto Software Lab. IBM Canada Toronto Canada
Large teams of practitioners (developers, testers, etc.) usually work in parallel on the same code base. A major concern when working in parallel is the introduction of integration bugs in the latest shared code. Thes... 详细信息
来源: 评论
Design and implementation of Linux-based application which supports CDMA and WiBro network
Design and implementation of Linux-based application which s...
收藏 引用
8th International Conference Advanced Communication Technology, ICACT 2006
作者: Kim, Dohyung Yun, Minhong Kim, Sunja Lee, Cheol-Hoon Embedded S/W Research Division Electronics and Telecommunications Research Institute Dept. of Computer Engineering System Software Lab. Chungnam National University
This paper describes the design and implementations of the first application service based on embedded Linux;Mobile Teller which uses WiBro network for data communications and CDMA network for voice communications. Wh... 详细信息
来源: 评论
Image inpainting and segmentation using hierarchical level set method
Image inpainting and segmentation using hierarchical level s...
收藏 引用
3rd Canadian Conference on computer and Robot Vision, CRV 2006
作者: Du, Xiaojun Cho, Dongwook Bui, Tien D. Dept. Computer Science and Software Engineering Concordia University Montreal Que. H4V 2H8 Canada
Image inpainting is an artistic procedure to recover a damaged painting or picture. In this paper, we propose a novel approach for image inpainting. In this approach, the Mumford-Shah (MS) model and the level set meth... 详细信息
来源: 评论
The consistent data replication service for distributed computing environments
The consistent data replication service for distributed comp...
收藏 引用
16th International Symposium on Methodologies for Intelligent Systems, ISMIS 2006
作者: No, Jaechun Chang, Won Park Sung, Soon Park Dept. of Computer Software College of Electronics and Information Engineering Sejong University Seoul Korea Republic of Intelligent IT System Research Center Korea Electronics Technology Institute Bundang-gu Seongnam-si Korea Republic of Dept. of Computer Science and Engineering College of Science and Engineering Anyang University Anyang Korea Republic of
This paper describes a data replication service for large-scale, data intensive applications whose results can be shared among geographically distributed scientists. We introduce two kinds of data replication techniqu... 详细信息
来源: 评论
LLM: Low latency MAC protocol for wireless sensor networks
LLM: Low latency MAC protocol for wireless sensor networks
收藏 引用
2006 3rd Annual IEEE Communications Society on Sensor and Ad hoc Communications and Networks, Secon 2006
作者: Parmar, Sumeet N. Nandi, Sukumar Chowdhury, Atanu Roy Dept. of Computer Science and Engineering Indian Institute of Technology Guwahati 781 039 India Software Engineering and Technology Labs. Infosys Technologies Ltd. Bangalore 560 100 India
Wireless sensor networks aim at a special kind of ad hoc networks, exposing an energy-constrained distributed computing environment. Proposed protocols have tried to incorporate power management schemas of the likes o... 详细信息
来源: 评论
Towards better understanding of agile values in global software development
Towards better understanding of agile values in global softw...
收藏 引用
11th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, EMMSAD 2006 - Held in Conjunction with the 18th Conference on Advanced Information Systems, CAiSE 2006
作者: Ågerfalk, Pär J. Lero - The Irish Software Engineering Research Centre Dept. of Computer Science and Information Systems University of Limerick Ireland Örebro University SE-701 82 Örebro Sweden
Globally distributed software development (GSD) and agile methods are two current and important trends in software and systems engineering. While agile methods seem to cope well with increasingly changing business env... 详细信息
来源: 评论
A predictive approach to achieving consistency in cooperative caching in MANET
A predictive approach to achieving consistency in cooperativ...
收藏 引用
1st International Conference on Scalable Information Systems, InfoScale '06
作者: Huang, Yu Cao, Jiannong Jin, Beihong Dept. of Computer Science Univ. of Science and Technology of China Hefei China Internet and Mobile Computing Lab. Dept. of Computing Hong Kong Polytechnic Univ. Kawloon Hong Kong Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing China
Cooperative caching is a very important technique for efficient data dissemination and sharing in mobile ad hoc networks (MANETs). Many applications have requirements on the consistency of the content cached on differ... 详细信息
来源: 评论