咨询与建议

限定检索结果

文献类型

  • 1,825 篇 会议
  • 273 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,140 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,309 篇 工学
    • 1,052 篇 计算机科学与技术...
    • 892 篇 软件工程
    • 300 篇 信息与通信工程
    • 173 篇 控制科学与工程
    • 136 篇 生物工程
    • 122 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 99 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 58 篇 光学工程
    • 52 篇 安全科学与工程
    • 47 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 37 篇 交通运输工程
    • 35 篇 仪器科学与技术
    • 35 篇 化学工程与技术
  • 573 篇 理学
    • 337 篇 数学
    • 149 篇 生物学
    • 111 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 73 篇 系统科学
  • 387 篇 管理学
    • 224 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 82 篇 医学
    • 80 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 59 篇 software enginee...
  • 59 篇 accuracy
  • 56 篇 machine learning
  • 48 篇 feature extracti...
  • 47 篇 computational mo...
  • 46 篇 training
  • 40 篇 real-time system...
  • 36 篇 deep learning
  • 36 篇 semantics
  • 35 篇 computer science
  • 33 篇 analytical model...
  • 32 篇 artificial intel...
  • 31 篇 computer archite...
  • 30 篇 data mining
  • 29 篇 internet of thin...
  • 29 篇 predictive model...
  • 29 篇 data models
  • 23 篇 support vector m...
  • 23 篇 monitoring

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 ericsson canada

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 10 篇 an beongku
  • 9 篇 ben liang
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali

语言

  • 2,078 篇 英文
  • 48 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2140 条 记 录,以下是1951-1960 订阅
排序:
Fault injection system for automatic testing system
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2003年 第3期10卷 321-324页
作者: 王胜文 洪炳熔 Dept. of Computer Science and Engineering Harbin Institute of Technology Harbin 150001 China Dept. of Computer Science and Engineering Harbin Institute of Technology Harbin 150001 Chinaonsidering the deficiency of the means for confirming the attribution of fault redundancy in the research of Automatic Testing System(ATS) a fault-injection system has been proposed to study fault redundancy of automatic testing system through compurison. By means of a fault-imbeded environmental simulation the faults injected at the input level of the software are under test. These faults may induce inherent failure mode thus bringing about unexpected output and the anticipated goal of the test is attained. The fault injection consists of voltage signal generator current signal generator and rear drive circuit which are specially developed and the ATS can work regularly by means of software simulation. The experimental results indicate that the fault injection system can find the deficiency of the automatic testing software and identify the preference of fault redundancy. On the other hand some soft deficiency never exposed before can be identified by analyzing the testing results.
Considering the deficiency of the means for confirming the attribution of fault redundancy in the re-search of Automatic Testing System(ATS) , a fault-injection system has been proposed to study fault redundancyof aut... 详细信息
来源: 评论
AN ALGORITHM FOR FAULT DIAGNOSIS BASED ON COMBINATORIAL DESIGN APPROACH FOR TESTING
收藏 引用
Journal of Electronics(China) 2003年 第3期20卷 224-226页
作者: Nie Changhai Xu Baowen Shi Liang (dept. of computer Science & Eng., Southeast Univ., Nanjing 210096) (State Key Laboratory of software engineering, Wuhan University, Wuhan 430072) (Jiangsu Key Lab. of computer Info. Proc. Tech., Soochow Univ., Suzhou 215006) Dept. of Computer Science & Eng. Southeast Univ. Nanjing State Key Laboratory of Software Engineering Wuhan University Wuhan Jiangsu Key Lab. of Computer Info. Proc. Tech. Soochow Univ. Suzhou
Much research has been done mainly in testcase generation and its effect for com-binatorial design approach for testing. This letter presents an algorithm for fault diagnosis basedon the approach. It can conclude that... 详细信息
来源: 评论
TEST COVERAGE ANALYSIS BASED ON PROGRAM SLICING
收藏 引用
Journal of Electronics(China) 2003年 第3期20卷 232-236页
作者: Chen Zhenqiang Xu Baowen Guanjie (dept. of computer Science & Eng., Southeast Univ., Nanjing 210096) (State Key Laboratory of software engineering, Wuhan University, Wuhan 430072) (Jiangsu Key Lab. of computer Info. Proc. Tech., Soochow Univ., Suzhou 215006) Dept. of Computer Science & Eng. Southeast Univ. Nanjing State Key Laboratory of Software Engineering Wuhan University Wuhan Jiangsu Key Lab. of Computer Info. Proc. Tech. Soochow Univ. Suzhou
Coverage analysis is a structural testing technique that helps to eliminate gaps in atest suite and determines when to stop testing. To compute test coverage, this letter proposes anew concept coverage about variables... 详细信息
来源: 评论
MEASURING STRUCTURE COMPLEXITY OF UML CLASS DIAGRAMS
收藏 引用
Journal of Electronics(China) 2003年 第3期20卷 227-231页
作者: Zhou Yuming Xu Baowen (dept. of computer Science & Eng., Southeast Univ., Nanjing 210096) (State Key Laboratory of software engineering, Wuhan University, Wuhan 430072) (Jiangsu Key Lab. of computer Info. Proc. Tech., Soochow Univ., Suzhou 215006) Dept. of Computer Science & Eng. Southeast Univ. Nanjing State Key Laboratory of Software Engineering Wuhan University Wuhan Jiangsu Key Lab. of Computer Info. Proc. Tech. Soochow Univ. Suzhou
To provide system designer a valid measure to evaluate the structure complexityof class diagrams objectively, this letter first proposes a method to transform a class diagramsinto a weighted class dependence graph, th... 详细信息
来源: 评论
Mobile data management: 4th International conference, MDM 2003 Melbourne, Australia, january 21–24, 2003 proceedings  4th
收藏 引用
4th International Conference on Mobile Data Management, MDM 2003
作者: Chen, Ming-Syan Chrysanthis, Panos K. Sloman, Morris Zaslavsky, Arkady National Taiwan University No. 1 Sec. 4 Roosevelt Road Taipei Taiwan University of Pittsburgh Dept. of Computer Science Sennott Square Building 210 S. Bouquet Street PittsburghPA United States Imperial College of Science Technology and Medicine Department of Computing 180 Queen’s Gate London United Kingdom Monash University School of Computer Science and Software Engineering 900 Dandenong Road Caulfield East MelbourneVIC Australia
来源: 评论
Testing and certification of trustworthy systems introduction to minitrack
Proceedings of the 36th Annual Hawaii International Conferen...
收藏 引用
Proceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003 2003年 336-336页
作者: Hevner, A.R. Linger, R.C. Walton, G. Information Systems and Decision Sciences Dept. Univ. of South Florida TampaFL33620 United States Software Engineering Institute Carnegie Mellon University PittsburghPA15213 United States Electrical and Computer Engineering Dept. Univ. of Central Florida OrlandoFL32816 United States
来源: 评论
An efficient filter for denial-of-service bandwidth attacks
An efficient filter for denial-of-service bandwidth attacks
收藏 引用
IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM)
作者: S. Abdelsayed D. Glimsholt C. Leckie S. Ryan S. Shami The University of Melbourne Melbourne VIC AU Dept. of Comput. Sci. & Software Eng. Melbourne Univ. Parkville Vic. Australia Telstra Research Laboratories Clayton Australia Department of Computer Science and Software Engineering University of Melbourne Parkville Australia
In this paper, we present an efficient method for detecting and filtering denial-of-service bandwidth attacks. Our system called TOPS (tabulated online packet statistics) can monitor a large number of network addresse... 详细信息
来源: 评论
Website evolution based on statistic data
Website evolution based on statistic data
收藏 引用
IEEE Workshop on Future Trends of Distributed Computing Systems
作者: Lei Xu Baowen Xu Zbenqiang Chen Huowang Chen Department of Computer Science & Engineering Southeast University Nanjing China State Key Laboratory of Software Engineering Wuhan University Wuhan China School of Computer Science National University of Defense Technology Changsha China Southeast University Nanjing Jiangsu CN Dept. of Comput. Sci. & Eng. Southeast Univ. Nanjing China
Maintenance and evolution are critical for website since the requirements often change, the developing cycle is short, while the life cycle is long. In order to make progress in this area, we focus on the users' r... 详细信息
来源: 评论
Using empirical studies during software courses
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2003年 2765卷 81-103页
作者: Carver, Jeffrey Jaccheri, Letizia Morasca, Sandro Shull, Forrest Experimental Software Engineering Group Dept. of Computer Science University of Maryland College Park MD 20742 United States Department of Computer and Information Science Norwegian University of Science and Technology Sem Sælands vei 7-9 7491 Trondheim Norway Dipartimento di Scienze Chimiche Fisiche e Matematiche Università degli Studi dell'Insubria Via Valleggio 11 I-22100 Como Italy Fraunhofer USA Center for Experimental Software Engineering Maryland 4321 Hartwick Road College Park MD 20742 United States
A number of empirical studies using students as subjects has been carried out in the last few years. These studies are usually conducted as pilot experiments that allow researchers to fine-tune an experiment before de... 详细信息
来源: 评论
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
Bisimulation-based non-deterministic admissible interference...
收藏 引用
作者: Lafrance, Stéphane Mullins, John Dept. of Computer and Software Engineering École Polytechnique de Montréal Montréal Canada
In this paper, we first define bisimulation-based non-deterministic admissible interference(BNAI), derive its process-theoretic characterization and present a compositional verification method with respect to the main... 详细信息
来源: 评论