咨询与建议

限定检索结果

文献类型

  • 745 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 1,075 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 659 篇 工学
    • 519 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 118 篇 信息与通信工程
    • 100 篇 控制科学与工程
    • 67 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 53 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 36 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 网络空间安全
    • 21 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 299 篇 理学
    • 157 篇 数学
    • 83 篇 物理学
    • 83 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 217 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 55 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 31 篇 法学
    • 23 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 15 篇 教育学
  • 12 篇 农学
  • 5 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 36 篇 software enginee...
  • 27 篇 deep learning
  • 25 篇 computers
  • 22 篇 machine learning
  • 21 篇 feature extracti...
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 accuracy
  • 19 篇 computational mo...
  • 19 篇 software
  • 18 篇 optimization
  • 18 篇 software testing
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 artificial intel...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 13 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 department of co...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 jasni mohamad za...
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,040 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems Software Engineering"
1075 条 记 录,以下是1051-1060 订阅
排序:
A Comparative Study of Interface Design Approaches for Service-Oriented software
A Comparative Study of Interface Design Approaches for Servi...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Hui Ming Teo Wan M.N. Wan Kadir Software Engineering Department Faculty of Computer Science and Information systems Universiti Teknologi Malaysia Johor Malaysia
In the service-oriented software environment, interactions between components are highly dependent on the exposed service interfaces. Therefore, designing an appropriate service interface is essential. In this paper, ... 详细信息
来源: 评论
Minimal-power, delay-balanced smart repeaters for interconnects in the nanometer regime  06
Minimal-power, delay-balanced smart repeaters for interconne...
收藏 引用
SLIP'06 - 2006 International Workshop on System Level Interconnect Prediction
作者: Weerasekera, Roshan Pamunuwa, Dinesh Zheng, Li-Rong Tenhunen, Hannu Department of Electronic Computer and Software Systems KTH Information and Communication Technology ELECTRUM 229 164 40 Kista Sweden Centre for Microsystems Engineering Faculty of Applied Sciences Lancaster University Lancaster LA1 4YR United Kingdom
In this paper we propose a smart repeater that consumes less energy and is suitable for driving global interconnections in nanometre technologies. When there is coupling between interconnects, the effective capacitanc... 详细信息
来源: 评论
Securing UML information flow using flowUML
Securing UML information flow using flowUML
收藏 引用
作者: Alghathbar, Khaled Farkas, Csilla Wijesekera, Duminda Information Systems Department College of Computer and Information Sciences King Saud University P.O. Box 51178 Riyadh 11543 Saudi Arabia Information Security Laboratory Dept. of Computer Science and Engineering University of South Carolina Columbia SC 29208 Dept. of Information and Software Engineering CSIS George Mason University Fairfax VA 22030 Faculty of Information Systems Kind Saud University Riyadh Saudi Arabia Department of Computer Science and Engineering University of South Carolina Columbia Department of Information and Software Engineering George Mason University Fairfax VA George Mason University
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against ... 详细信息
来源: 评论
Simplification and analysis of transitive trust networks
收藏 引用
Web Intelligence and Agent systems 2006年 第2期4卷 139-161页
作者: Jøsang, Audun Gray, Elizabeth Kinateder, Michael School of Software Engineering and Data Communications Queensland University of Technology Australia Computer Science Department Trinity College Dublin Ireland Institute of Parallel and Distributed Systems Faculty of Computer Science University of Stuttgart Germany
When transacting and interacting through open computer networks, traditional methods used in the physical world for establishing trust can no longer be used. Creating virtual network substitutes with which people, org... 详细信息
来源: 评论
Multi-institutional teaching communities in computer education
Conferences in Research and Practice in Information Technolo...
收藏 引用
Conferences in Research and Practice in Information Technology Series 2006年 52卷 7-10页
作者: Fincher, Sally Lister, Raymond Pears, Arnold Sheard, Judy Tenenberg, Josh Young, Alison Computing Laboratory University of Kent United Kingdom Faculty of Information Technology University of Technology Sydney Australia Dept of Information Technology Uppsala University Sweden School of Computer Science and Software Engineering Monash University Australia Computing and Software Systems Institute of Technology University of Washington United States Computing and Information Technology Unitec Auckland New Zealand
来源: 评论
Clinical Evaluation of Watermarked Medical Images
Clinical Evaluation of Watermarked Medical Images
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society (EMBC)
作者: Jasni M Zain Abdul R M Fauzi Azian A Aziz Faculty of Computer Systems and Software Engineering University College of Engineering and Technology Malaysia Kuantan Pahang Malaysia chest physician at Kulliyyah of Medicine International Islamic University of Malaysia Kuantan Pahang Malaysia radiologist at Kulliyyah of Medicine International Islamic University of Malaysia Kuantan Pahang Malaysia
Digital watermarking medical images provides security to the images. The purpose of this study was to see whether digitally watermarked images changed clinical diagnoses when assessed by radiologists. We embedded 256 ... 详细信息
来源: 评论
Multi-institutional teaching communities in computer education  06
Multi-institutional teaching communities in computer educati...
收藏 引用
ACM SIGCSE-SIGCUE Technical Symposium on computer Science and Education
作者: Sally Fincher Raymond Lister Arnold Pears Judy Sheard Josh Tenenberg Alison Young Computing Laboratory University of Kent United Kingdom Faculty of Information Technology University of Technology Sydney Australia Dept of Information Technology Uppsala University Sweden School of Computer Science and Software Engineering Monash University Australia Computing and Software Systems Institute of Technology University of Washington United States of America Computing and Information Technology Unitec Auckland New Zealand
来源: 评论
Meeting the Information Assurance Crisis in the U.S. Now
收藏 引用
EDPACS 2006年 第6期28卷 1-14页
作者: Corey Schou Deborah Frincke Charles Reynolds James Frost The Associate Dean of Information Systems Programs at Idaho State University (ISU) in Pocatello and the director of the Center for Decision Support. Currently he serves as the Chair of the National Colloquium on Information System Security Education. Schou also directs the ISU National Center of Excellence in Information Assurance Education and the ISU Technology Innovation Center. Contact Corey Schou one of the authors of this article and the Chair of the NCISSE by email at Schou@*** for help in finding additional ways to address the issues raised in this article. A member of the University of Idaho College of Engineering faculty. She graduated from the University of California at Davis. Frincke is the co-director and co-founder of the university's Center for Secure and Dependable Software (CSDS). She was the program chair for the 2nd International Workshop on Recent Advances in Intrusion Detection (RAID). A professor of Computer Science at the College of Integrated Science and Technology at James Madison University in Harrisonburg Virginia. He holds a Ph.D. in computer science from the University of Texas at Austin and a BA in philosophy from the University of Houston. Reynolds is the Director of Information System Security Education at James Madison University. Since 1997 Reynolds has led the development of the first remote Internet-based curriculum that leads to an M.S. degree in computer science with a concentration in information security. Thus far 160 students have completed this program. A professor of computer information systems at Idaho State University and the manager of its Simplot Decision Support Center.
T he only difference etween evolution and revolution is the speed at which each occurs.
来源: 评论
Three-way two-dimensional deterministic finite automata with rotated inputs
Three-way two-dimensional deterministic finite automata with...
收藏 引用
作者: Hirakawa, Hisao Inoue, Katsushi Ito, Akira Hitachi Software Engineering Ltd. Tokyo 140-0002 Japan Department of Computer Science and Systems Engineering Faculty of Engineering Yamaguchi University Ube-shi 755-8611 Japan Hitachi Software Engineering Ltd. Japan Yamaguchi University Japan Faculty of Engineering Japan
Inoue et al. introduced an automaton on a two-dimensional tape, which decides acceptance or rejection of an input tape by scanning the tape from various sides by various automata which move one way, and investigated t... 详细信息
来源: 评论
The analysis and design strategy in the deployment of wireless communications for innovative campus networks
The analysis and design strategy in the deployment of wirele...
收藏 引用
作者: Sallim, Jamaludin Faculty of Computer Systems and Software Engineering University College of Engineering and Technology Malaysia Locked Bag 12 25000 Kuantan Pahang Malaysia
This paper describes the fundamental concept of analysis and design strategy for an effective deployment of wireless communications for innovative universities or colleges campus that insistently deploys the wireless ... 详细信息
来源: 评论