咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,376 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,982 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 490 篇 信息与通信工程
    • 370 篇 控制科学与工程
    • 275 篇 生物工程
    • 227 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 168 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,197 篇 理学
    • 647 篇 数学
    • 319 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 161 篇 系统科学
    • 93 篇 化学
  • 821 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 212 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 128 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 75 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 80 篇 artificial intel...
  • 73 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,887 篇 英文
  • 187 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Engineering"
4107 条 记 录,以下是3921-3930 订阅
排序:
Contract-based mutation for testing components
Contract-based mutation for testing components
收藏 引用
21st IEEE International Conference on software Maintenance, ICSM 2005
作者: Jiang, Ying Hou, Shan-Shan Shan, Jin-Hui Zhang, Lu Xie, Bing Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming 650093 China
Testing plays an important role in the maintenance of Component Based software Development. Test adequacy for component testing is one of the hardest issues for component testing. To tackle this problem, it is a natur... 详细信息
来源: 评论
A 2D/3D hybrid geographical information system  05
A 2D/3D hybrid geographical information system
收藏 引用
GRAPHITE 2005 - 3rd International Conference on computer Graphics and Interactive Techniques in Australasia and Southeast Asia
作者: Brooks, Stephen Whalley, Jacqueline L. Faculty of Computer Science Dalhousie University Halifax NS Canada Department of Computer and Information Sciences Software Engineering Research Laboratory Auckland University of Technology New Zealand
We present a unique Geographical Information System (GIS) that seamlessly integrates 2D and 3D views of the same spatial and aspatial data. Multiple layers of information are continuously transformed between the 2D an... 详细信息
来源: 评论
From Ad-hoc to engineered collaboration in virtual workspaces
From Ad-hoc to engineered collaboration in virtual workspace...
收藏 引用
11th Americas Conference on Information Systems, AMCIS 2005
作者: Biuk-Aghai, Robert P. Simoff, Simeon J. Debenham, John Department of Computer and Information Science Faculty of Science and Technology University of Macau China Department of Computer Systems Faculty of Information Technology University of Technology Sydney Australia Department of Software Engineering Faculty of Information Technology University of Technology Sydney Australia
Distributed collaboration over the Internet has become increasingly common in recent years, supported by various technologies such as virtual workspace systems. Often such collaboration is ad-hoc, and virtual workspac... 详细信息
来源: 评论
Meeting the Information Assurance Crisis in the U.S. Now
收藏 引用
EDPACS 2006年 第6期28卷 1-14页
作者: Corey Schou Deborah Frincke Charles Reynolds James Frost The Associate Dean of Information Systems Programs at Idaho State University (ISU) in Pocatello and the director of the Center for Decision Support. Currently he serves as the Chair of the National Colloquium on Information System Security Education. Schou also directs the ISU National Center of Excellence in Information Assurance Education and the ISU Technology Innovation Center. Contact Corey Schou one of the authors of this article and the Chair of the NCISSE by email at Schou@*** for help in finding additional ways to address the issues raised in this article. A member of the University of Idaho College of Engineering faculty. She graduated from the University of California at Davis. Frincke is the co-director and co-founder of the university's Center for Secure and Dependable Software (CSDS). She was the program chair for the 2nd International Workshop on Recent Advances in Intrusion Detection (RAID). A professor of Computer Science at the College of Integrated Science and Technology at James Madison University in Harrisonburg Virginia. He holds a Ph.D. in computer science from the University of Texas at Austin and a BA in philosophy from the University of Houston. Reynolds is the Director of Information System Security Education at James Madison University. Since 1997 Reynolds has led the development of the first remote Internet-based curriculum that leads to an M.S. degree in computer science with a concentration in information security. Thus far 160 students have completed this program. A professor of computer information systems at Idaho State University and the manager of its Simplot Decision Support Center.
T he only difference etween evolution and revolution is the speed at which each occurs.
来源: 评论
Modelling code mobility and migration: An OPM/Web approach
收藏 引用
International Journal of Web engineering and Technology 2005年 第1期2卷 6-28页
作者: Reinhartz-Berger, Iris Dori, Dov Katz, Shmuel Technion Israel Institute of Technology Technion City Haifa 32000 Israel Department of Management Information Systems University of Haifa Israel Information Systems Engineering Area Faculty of Industrial Engineering and Management Technion Israel Institute of Technology Israel MIT Cambridge United States Computer Science Department Technion Israel Institute of Technology Israel Systems and Software Development Laboratory Israel
Web applications exhibit dynamic behaviour through such features as animation, rapidly changing presentations, and interactive forms. The growing complexity of web applications requires a rigorous modelling approach c... 详细信息
来源: 评论
A component-based approach to specify hazards in the design of safety-critical systems
A component-based approach to specify hazards in the design ...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: S. Lu W.A. Halang H.W. Schmidt R. Gumzej Faculty of Electrical and Computer Engineering Fern Universitat Hagen Hagen Germany School of Computer Science and Software Engineering Monash University VIC Australia Faculty of Electrical Engineering and Computer Science University of Maribor Maribor Slovenia
Fault tree analyses (FTA) are embedded into UML component models. The UML component models are constructed by employing UML's extension mechanisms in conjunction with component-based software techniques. Taking an... 详细信息
来源: 评论
A study of service composition with QoS management
A study of service composition with QoS management
收藏 引用
2005 IEEE International Conference on Web Services, ICWS 2005
作者: Fung, Casey K. Hung, Patrick C. K. Wang, Guijun Linger, Richard C. Walton, Gwendolyn H. Engineering and Information Technology Boeing Phantom Works United States Faculty of Business and Information Technology University of Ontario Institute of Technology Canada Software Engineering Institute Carnegie Mellon University United States Mathematics and Computer Science Dept. Florida Southern College United States
Quality of Services (QoS) management in compositions of services requires careful consideration of QoS characteristics of the services and effective QoS management in their execution. A Web service is a software syste... 详细信息
来源: 评论
A complex linear feedback shift register design for the A5 keystream generator
A complex linear feedback shift register design for the A5 k...
收藏 引用
National Conference on Radio Science (NSRC)
作者: M. Sharaf H.A.K. Mansour H.H. Zayed M.L. Shore Lieutenant Colonel Engineering General Police Communication Faculty of Engineering Banha Branch Zagazig University Egypt Department of Computer Science and Software Engineering Canterbury University New Zealand
A5 encryption/decryption algorithm depends on the use of linear feedback shift registers (LFSR) in order to generate the key-stream bits. The A5-1 algorithm uses three different LFSRs with a majority function to add n... 详细信息
来源: 评论
Assignment marking via online self assess
Assignment marking via online self assess
收藏 引用
11th Australasian World Wide Web Conference, AusWeb 2005
作者: Schuhmacher, Margot Redpath, Robert Lecturer Higher Education Development Unit Centre for Learning and Teaching Support Monash University Clayton Campus Victoria 3800 Australia Lecturer School of Computer Science and Software Engineering Faculty of Information Technology Monash University Caulfield Campus Victoria 3174 Australia
This paper explores the use of online self assessment as a tool for guiding the assignment marking process. The study was motivated by a desire to assist staff in more efficiently completing assessment and to involve ... 详细信息
来源: 评论
Applying machine learning using Case-Based Reasoning (CBR) and Rule-Based Reasoning (RBR) approaches to object-oriented application framework documentation
Applying machine learning using Case-Based Reasoning (CBR) a...
收藏 引用
3rd International Conference on Information Technology and Applications, ICITA 2005
作者: Jani, Hajar Mat Peck, Lee Sai College of Information Technology Universiti Tenaga Nasional Km. 7 Jalan Kajang-Puchong 43009 Kajang Selangor Darul Ehsan Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University Malaya 50603 Kuala Lumpur Malaysia
Several challenges and problems of developing, using and maintaining object-oriented application frameworks have been identified. It was discovered that companies attempting to build or use large-scale reusable framew... 详细信息
来源: 评论