咨询与建议

限定检索结果

文献类型

  • 1,832 篇 会议
  • 276 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,315 篇 工学
    • 1,056 篇 计算机科学与技术...
    • 895 篇 软件工程
    • 302 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 136 篇 生物工程
    • 123 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 59 篇 光学工程
    • 52 篇 安全科学与工程
    • 49 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 37 篇 交通运输工程
    • 36 篇 化学工程与技术
    • 35 篇 仪器科学与技术
  • 577 篇 理学
    • 339 篇 数学
    • 149 篇 生物学
    • 113 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 389 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 83 篇 医学
    • 81 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 computational mo...
  • 48 篇 feature extracti...
  • 46 篇 training
  • 40 篇 real-time system...
  • 39 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 33 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 30 篇 predictive model...
  • 29 篇 internet of thin...
  • 29 篇 data models
  • 23 篇 scalability
  • 23 篇 support vector m...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,054 篇 英文
  • 82 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2150 条 记 录,以下是1891-1900 订阅
排序:
Exploring communities of practice for product family engineering
收藏 引用
3rd Biennial Conference on Professional Knowledge Management, WM 2005
作者: Fægri, Tor Erlend Decker, Björn Dingsøyr, Torgeir Jaccheri, Letizia Lago, Patricia Muthig, Dirk Van Vliet, Hans Sintef Information and Communication Technology Trondheim Norway Fraunhofer Institute for Experimental Software Engineering Kaiserslautern Germany Dept. of Computer and Information Science Norwegian University of Science and Technology Trondheim Norway Vrije Universiteit Amsterdam Netherlands
Product Family engineering (PFE) is an approach to software engineering that seeks to reduce the global effort in producing multiple software products by actively promoting and governing the reuse of assets between th... 详细信息
来源: 评论
Metrics, methodology, and tool for performance-considered web service composition
收藏 引用
20th International Symposium on computer and Information Sciences, ISCIS 2005
作者: Song, Hyung Gi Ryu, Yeonseung Chung, Taesun Jou, Wooseok Lee, Kangsun R and D Institute Netville Co. Ltd. 161-7 Yeomni Mapo Seoul 121874 Korea Republic of Dept. of Computer Software Myongji University San 38-2 Namdong Yongin Kyungki 449728 Korea Republic of Dept. of Computer Engineering Myongji University San 38-2 Namdong Yongin Kyungki 449728 Korea Republic of
Web service is a promising technology to efficiently integrate disparate software components over various types of systems and to exchange various business artifacts across business organizations. As many web services... 详细信息
来源: 评论
Development of an intelligent information security evaluation indices system for an enterprise organization
Development of an intelligent information security evaluatio...
收藏 引用
9th International Conference on Knowledge-Based Intelligent Information and engineering Systems, KES 2005
作者: Ko, Il Seok Lee, Geuk Na, Yun Ji Dept. of e-commerce Chungbuk Provincial University of Science and Technology 40 Geumgu-Ri Okchon-Eup Okchon-GunChungbuk Korea Republic of Dept. of Computer Engineering Hannam University 133 Ojeong-Dong Daedeok-Gu Daejon Korea Republic of Dept. of Internet Software Honam University 59-1 Seobong-Dong Gwangsan-Gu Gwangju Korea Republic of
For effectively facing information security threats under rapidly changing information-oriented environment, we need intelligent measuring the information security level of the whole enterprise organization. Most of t... 详细信息
来源: 评论
A study of service composition with QoS management
A study of service composition with QoS management
收藏 引用
2005 IEEE International Conference on Web Services, ICWS 2005
作者: Fung, Casey K. Hung, Patrick C. K. Wang, Guijun Linger, Richard C. Walton, Gwendolyn H. Engineering and Information Technology Boeing Phantom Works United States Faculty of Business and Information Technology University of Ontario Institute of Technology Canada Software Engineering Institute Carnegie Mellon University United States Mathematics and Computer Science Dept. Florida Southern College United States
Quality of Services (QoS) management in compositions of services requires careful consideration of QoS characteristics of the services and effective QoS management in their execution. A Web service is a software syste... 详细信息
来源: 评论
Testing and Certification of Trustworthy Systems introduction to Minitrack
Testing and Certification of Trustworthy Systems introductio...
收藏 引用
38th Annual Hawaii International Conference on System Sciences, HICSS 2005
作者: Hevner, Alan R. Linger, Richard C. Walton, Gwendolyn H. Information Systems and Decision Sciences Dept. Univ. of South Florida Tampa FL 33620 United States CERT Research Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213 United States Dept. of Mathematics and Computer Science Florida Southern College Lakeland FL 33801 United States
来源: 评论
A BDD-representation for the logic of equality and uninterpreted functions
A BDD-representation for the logic of equality and uninterpr...
收藏 引用
30th International Symposium on Mathematical Foundations of computer Science 2005, MFCS 2005
作者: Van De Pol, Jaco Tveretina, Olga Centrum voor Wiskunde en Informatica Dept. of Software Engineering P.O.-Box 94.079 1090 GB Amsterdam Netherlands Department of Computer Science TU Eindhoven P.O. Box 513 5600 MB Eindhoven Netherlands
The logic of equality and uninterpreted functions (EUF) has been proposed for processor verification. This paper presents a new data structure called Binary Decision Diagrams for representing EUF formulas (EUF-BDDs). ... 详细信息
来源: 评论
A novel evolutionary algorithm based on an orthogonal design for dynamic optimization problems (ODEA)
A novel evolutionary algorithm based on an orthogonal design...
收藏 引用
2005 IEEE Congress on Evolutionary Computation, IEEE CEC 2005
作者: Zeng, SanYou De Garis, Hugo He, Jun Kang, LiShan Dept. of Computer Science Zhuzhou Institute of Technology 412008 Zhuzhou China Research Center for Space Science and Technology China China University of Geosciences 430074 Wuhan China Dept. of Computer Science Utah State University Logan UT 84322 United States School of Computer Science University of Birmingham Birmingham B15 2TT United Kingdom State Key Laboratory of Software Engineering Wuhan University 430072 Wuhan China
This paper introduces an orthogonal evolutionary algorithm for dynamic optimization problems with continuous variables (called ODEA). Its population does not consist of individuals, but rather of "niches". E... 详细信息
来源: 评论
NS-2 based IP traceback simulation against reflector based DDoS attack
NS-2 based IP traceback simulation against reflector based D...
收藏 引用
13th International Conference on AIS 2004
作者: Lee, Hyung-Woo Kwon, Taekyoung Kim, Hyung-Jong Dept. of Software Hanshin University Osan Gyunggi 447-791 Korea Republic of School of Computer Engineering Sejong University Seoul 143-747 Korea Republic of Korea Information and Security Agency Garak Songpa Seoul 138-803 Korea Republic of
Reflector attack belongs to one of the most serious types of Distributed Denial-of-Service (DDoS) attacks, which can hardly be traced by traceback techniques, since the marked information written by any routers betwee... 详细信息
来源: 评论
A mobile agent-based P2P Autonomous Security Hole Discovery system
A mobile agent-based P2P Autonomous Security Hole Discovery ...
收藏 引用
First International Conference on Natural Computation, ICNC 2005
作者: Zheng, Ji Wang, Xin Xue, Xiangyang Toh, C.K. Software School Fudan University Shanghai 200433 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 200433 China Department of Computer Science and Engineering Fudan University Shanghai 200433 China Dept. of Electronic Engineering Queen Mary University of London United Kingdom
A general or agent-based security system is usually constructed hierarchically and has a central manager acting as head of the whole system. However, the manager becomes a bottleneck for being connected by each client... 详细信息
来源: 评论
SPC-XML: A structured representation for nested-parallel programming languages
SPC-XML: A structured representation for nested-parallel pro...
收藏 引用
11th International Euro-Par Conference, Euro-Par 2005
作者: González-Escribano, Arturo Van Gemund, Arjan J. C. Cardeñoso-Payo, Valentín Dept. de Informática Universidad de Valladolid E.T.I.T. Campus Miguel Delibes 47011 - Valladolid Spain Embedded Software Lab. Software Technology Department Faculty of Electrical Engineering Mathematics and Computer Science P.O.Box 5031 NL-2600 GA Delft Netherlands
Nested-parallelism programming models, where the task graph associated to a computation is series-parallel, present good analysis properties that can be exploited for scheduling, cost estimation or automatic mapping t... 详细信息
来源: 评论