咨询与建议

限定检索结果

文献类型

  • 1,825 篇 会议
  • 273 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,140 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,309 篇 工学
    • 1,052 篇 计算机科学与技术...
    • 892 篇 软件工程
    • 300 篇 信息与通信工程
    • 173 篇 控制科学与工程
    • 136 篇 生物工程
    • 122 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 58 篇 光学工程
    • 52 篇 安全科学与工程
    • 47 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 37 篇 交通运输工程
    • 35 篇 仪器科学与技术
    • 35 篇 化学工程与技术
  • 573 篇 理学
    • 337 篇 数学
    • 149 篇 生物学
    • 111 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 387 篇 管理学
    • 224 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 82 篇 医学
    • 80 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 feature extracti...
  • 47 篇 computational mo...
  • 46 篇 training
  • 40 篇 real-time system...
  • 36 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 32 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 29 篇 internet of thin...
  • 29 篇 predictive model...
  • 29 篇 data models
  • 23 篇 support vector m...
  • 23 篇 monitoring

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 ericsson canada

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 10 篇 an beongku
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,078 篇 英文
  • 48 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2140 条 记 录,以下是1911-1920 订阅
排序:
A multiple-view meta-modeling approach for variability management in software product lines
A multiple-view meta-modeling approach for variability manag...
收藏 引用
8th International Conference on software Reuse, ICSR 2004
作者: Gomaa, Hassan Shin, Michael E. Dept. of Information and Software Engineering George Mason University FairfaxVA22030-4444 United States Dept. of Computer Science Texas Tech University Lubbock79409-3104 United States
This paper describes a multiple-view meta-modeling approach for managing variability in software product lines using the Unified Modeling Language notation (UML). A multiple-view meta-model for software product lines ... 详细信息
来源: 评论
THEMIS: Threat evaluation metamodel for information systems
THEMIS: Threat evaluation metamodel for information systems
收藏 引用
2nd Symposium on Intelligence and Security Informatics, ISI 2004
作者: Farkas, Csilla Wingfield, Thomas C. Michael, James B. Wijesekera, Duminda Dept. of Computer Science and Engineering USC ColumbiaSC29208 United States The Potomac Institute for Policy Studies ArlingtonVA22203 United States Dept. of Computer Science Naval Postgraduate School MontereyCA93943 United States Dept. of Information and Software Engineering GMU FairfaxVA22030 United States
THEMIS (Threat Evaluation Metamodel for Information Systems) is a description logic-based framework to apply state, federal, and international law to reason about the intent of computer network attacks with respect to... 详细信息
来源: 评论
A Distributed Locking Protocol
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3314卷 225-230页
作者: No, Jaechun Park, Sung Soon Dept. of Computer Software College of Electronics and Information Engineering Sejong University Seoul Korea Republic of Dept. of Computer Science and Engineering College of Science and Engineering Anyang University Anyang Korea Republic of
Concurrent accesses to a file frequently occur in a distributed computing environment where a few number of network-attached servers are designated as a data storage pool and the clients are physically connected to th... 详细信息
来源: 评论
Reducing spike train variability: a computational theory of spike-timing dependent plasticity  04
Reducing spike train variability: a computational theory of ...
收藏 引用
Proceedings of the 17th International Conference on Neural Information Processing Systems
作者: Sander M. Bohte Michael C. Mozer Dept. Software Engineering CWI Amsterdam The Netherlands and Dept. of Computer Science University of Colorado Boulder Dept. of Computer Science University of Colorado Boulder
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron fires shortly after. The dependence of...
来源: 评论
Performance of optical flow techniques for indoor navigation with a mobile robot
Performance of optical flow techniques for indoor navigation...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: C. McCarthy N. Bames Dept. Computer Science & Software Engineering The University of Melbourne Parkville VIC AUSTRALIA
We present a comparison of four optical flow methods and three spatio-temporal filters for mobile robot navigation in corridor-like environments. Previous comparisons of optical flow methods have evaluated performance... 详细信息
来源: 评论
A complexity measure for Ontology based on UML
A complexity measure for Ontology based on UML
收藏 引用
Proceedings - 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
作者: Kang, Dazhou Xu, Baowen Lu, Jianjiang Chu, William C. Dept. of Comp. Sci. and Engineering Southeast University Nanjing 210096 China Jiangsu Inst. of Software Quality Nanjing 210096 China State Key Laboratory of Software Wuhan University Wuhan 430072 China Department of Computer Science TungHai University Taiwan
UML is a good tool to represent ontologies. When using UML for Ontology development, one of the principal goals is to assure the quality of ontologies. UML class diagrams provide a static modeling capability that is w... 详细信息
来源: 评论
An adaptive security model for heterogeneous networks using MAUT and simple heuristics
An adaptive security model for heterogeneous networks using ...
收藏 引用
International Conference on Computational Science and its Applications, ICCSA 2004
作者: Chae, Jongwoo Mostéfaoui, Ghita Kouadri Chung, Mokdong Dept. of Computer Engineering Pukyong National University 599-1 Daeyeon-3Dong Nam-Gu Busan Korea Republic of Software Engineering Group University of Fribourg Rue Faucigny 2 FribourgCH-1700 Switzerland
In this paper, we present an adaptive security model that aims at securing resources in heterogeneous networks. Traditional security model usually work according to a static decision-making approach. However, we may e... 详细信息
来源: 评论
Configuring real-time aspects in component middleware
收藏 引用
On the Move to Meaningful Internet Systems 2004: International Conference on Cooperative Information Systems, CoopIS 2004, International Conference on Distributed Objects and Applications, DOA 2004 and International Conference on Ontologies, Databases and Applications of Semantics, ODBASE 2004
作者: Wang, Nanbor Gill, Chris Schmidt, Douglas C. Subramonian, Venkita Tech-X Corp Boulder United States Dept. of Computer Science and Engineering Washington University St. Louis United States Institute for Software Integrated Systems Vanderbilt University Nashville United States
This paper makes two contributions to the study of configuring real-time aspects into quality of service (QoS)-enabled component middleware for distributed real-time and embedded (DRE) systems. First, it compares and ... 详细信息
来源: 评论
Service selection in dynamic demand-driven Web services
Service selection in dynamic demand-driven Web services
收藏 引用
Proceedings - IEEE International Conference on Web Services
作者: Wang, Xiaoling Yue, Kun Huang, Joshua Zhexue Zhou, Aoying Dept. of Comp. Sci. and Engineering Fudan University ShangHai 200433 China E-Business Technology Institute University of Hong Kong Hong Kong Hong Kong Laboratory of Computer Science Institute of Software Chinese Academy of Science China
Recently, Web services have become a new technology trend for Enterprise Application Integration (EAI) and more and more applications based on Web services are emerging. One of the problems in using Web services in bu... 详细信息
来源: 评论
Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams
Vulnerability analysis of AIS-based intrusion detection syst...
收藏 引用
Congress on Evolutionary Computation
作者: G. Dozier D. Brown J. Hurley K. Cain Dept. of computer Science & Software Engineering Auburn University AL Dept. of Computer Science Clark-Atlanta University Atlanta GA USA Boeing Aerospace Company Seattle WA USA
Artificial immune systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). In this paper we compare a genetic hacker with 12 evolutionary hackers... 详细信息
来源: 评论