咨询与建议

限定检索结果

文献类型

  • 80 篇 会议
  • 52 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 140 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 73 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 14 篇 控制科学与工程
    • 11 篇 信息与通信工程
    • 10 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 安全科学与工程
    • 5 篇 机械工程
    • 5 篇 网络空间安全
    • 4 篇 土木工程
    • 4 篇 石油与天然气工程
    • 4 篇 交通运输工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 化学工程与技术
    • 2 篇 船舶与海洋工程
    • 2 篇 生物工程
  • 54 篇 理学
    • 33 篇 数学
    • 10 篇 系统科学
    • 8 篇 统计学(可授理学、...
    • 6 篇 生物学
    • 5 篇 物理学
    • 2 篇 化学
    • 2 篇 海洋科学
  • 23 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 5 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 教育学
    • 4 篇 教育学
  • 1 篇 法学
  • 1 篇 农学

主题

  • 9 篇 artificial intel...
  • 8 篇 computer science
  • 6 篇 software enginee...
  • 4 篇 logic programmin...
  • 4 篇 dipper throated ...
  • 3 篇 grey wolf optimi...
  • 3 篇 computational in...
  • 3 篇 data mining and ...
  • 3 篇 java
  • 3 篇 semantics
  • 3 篇 unified modeling...
  • 3 篇 information stor...
  • 2 篇 compilers
  • 2 篇 access control
  • 2 篇 information syst...
  • 2 篇 metaheuristics
  • 2 篇 object oriented ...
  • 2 篇 decision support...
  • 2 篇 operating system...
  • 2 篇 concurrent compu...

机构

  • 9 篇 department of sy...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 computer enginee...
  • 3 篇 department of ap...
  • 3 篇 zuse institute b...
  • 3 篇 university of tw...
  • 3 篇 rwth aachen univ...
  • 3 篇 friedrich-alexan...
  • 3 篇 department of in...
  • 3 篇 department of in...
  • 3 篇 institute of sof...
  • 3 篇 institute for so...
  • 3 篇 technische unive...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 dr fusco is a ch...

作者

  • 6 篇 mostafa abotaleb
  • 6 篇 abdelhameed ibra...
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 doaa sami khafag...
  • 4 篇 choe km
  • 4 篇 kapur deepak
  • 4 篇 raschke alexande...
  • 3 篇 serrano felipe
  • 3 篇 scholz sven-bodo
  • 3 篇 mondal shyamal k...
  • 3 篇 narendran paliat...
  • 3 篇 maiti manoranjan
  • 3 篇 weninger dieter
  • 3 篇 reem alkanhel
  • 3 篇 hojny christophe...
  • 3 篇 chmiela antonia
  • 3 篇 mühmer erik
  • 3 篇 mozhaiev mykhail...
  • 3 篇 halbig katrin

语言

  • 137 篇 英文
  • 3 篇 其他
检索条件"机构=Institute for Programming and Logics Department of computer science"
140 条 记 录,以下是71-80 订阅
排序:
Cross-language code analysis and refactoring
Cross-language code analysis and refactoring
收藏 引用
2012 IEEE 12th International Working Conference on Source Code Analysis and Manipulation, SCAM 2012
作者: Mayer, Philip Schroeder, Andreas Department of Programming and Software Engineering Institute for Computer Science Ludwig-Maximilians-Universität München Germany
Software composed of artifacts written in multiple (programming) languages is pervasive in today's enterprise, desktop, and mobile applications. Since they form one system, artifacts from different languages refer... 详细信息
来源: 评论
Corrigendum to ‘A single period inventory model with imperfect production and stochastic demand under chance and imprecise constraints’ [Eur. J. Oper. Res. 188 (2008) 121–139]
收藏 引用
European Journal of Operational Research 2013年 第3期230卷 703-703页
作者: D. Panda S. Kar K. Maity M. Maiti Department of Engineering Science Haldia Institute of Technology Haldia Purba Medinipur Haldia West Bengal 721 657 India Department of Applied Mathematics with Oceanology and Computer Programming Vidyasagar University Midnapore 721 102 India
来源: 评论
Security goals assurance based on software active monitoring
Security goals assurance based on software active monitoring
收藏 引用
International Conference on Secure Software Integration and Reliability Improvement
作者: Zhao, Changzhi Dong, Wei Leucker, Martin Qi, Zhichang Department of Computer Science National University of Defense Technology Changsha 410073 China Institute of Software Technology and Programming Languages University of Lubeck Germany
Access control is a vital security mechanism in today's operating systems and the security policies dictating the security relevant behaviors is lengthy and complex for example in Security-Enhanced Linux (SELinux)... 详细信息
来源: 评论
Resource-aware programming and simulation of MPSoC architectures through extension of X10  11
Resource-aware programming and simulation of MPSoC architect...
收藏 引用
Proceedings of the 14th International Workshop on Software and Compilers for Embedded Systems
作者: Hannig, Frank Roloff, Sascha Snelting, Gregor Teich, Jürgen Zwinkau, Andreas Hardware/Software Co-Design Department of Computer Science University of Erlangen Nuremberg Germany Programming Paradigms Group Karlsruhe Institute of Technology - KIT Germany
The efficient use of future MPSoCs with f 000 or more processor cores requires new means of resource-aware programming to deal with increasing imperfections such as process variation, fault rates, aging effects, and p... 详细信息
来源: 评论
Fast RNA structure alignment for crossing input structures
Fast RNA structure alignment for crossing input structures
收藏 引用
作者: Backofen, Rolf Landau, Gad M. Möhl, Mathias Tsur, Dekel Weimann, Oren Bioinformatics Institute of Computer Science Albert-Ludwigs-Universität Freiburg Germany Department of Computer Science University of Haifa Haifa 31905 Israel Department of Computer Science and Engineering NYU-Poly Six MetroTech Center Brooklyn NY 11201-3840 United States Programming Systems Lab Saarland University Saarbrücken Germany Ben-Gurion University Beer-Sheva Israel Massachusetts Institute of Technology Cambridge MA 02139 United States
The complexity of pairwise RNA structure alignment depends on the structural restrictions assumed for both the input structures and the computed consensus structure. For arbitrarily crossing input and consensus struct... 详细信息
来源: 评论
Security Goals Assurance Based on Software Active Monitoring
Security Goals Assurance Based on Software Active Monitoring
收藏 引用
International Conference on Secure System Integration and Reliability Improvement, SSIRI
作者: Changzhi Zhao Wei Dong Martin Leucker Zhichang Qi Department of Computer Science National University of Defense Technology Changsha China Institute of Software Technology and Programming Languages University of Lübeck Germany
Access control is a vital security mechanism in today's operating systems, and the security policies dictating the security relevant behaviors is lengthy and complex, for example in Security-Enhanced Linux (SELinu... 详细信息
来源: 评论
Extraction of human mandible bones from multi-slice computed tomographic data
Extraction of human mandible bones from multi-slice computed...
收藏 引用
Middle East Conference on Biomedical Engineering (MECBME)
作者: Tamer M. Nassef Nahed H. Solouma Mohamed Alkhodary Mona K. Marei Yasser M. Kadah Computer and Programming Engineering Department Misr University for Science and Technology Six of October City Egypt Tissue Engineering Laboratory Alexandria University Alexandria Egypt National Institute of Laser Science Cairo University Giza Egypt Biomedical Engineering Department Cairo University Giza Egypt
A new approach for segmenting different anatomical regions in dental Computed Tomography (CT) studies is presented in this paper. It is expected that the proposed approach will help automate different tissues regions ... 详细信息
来源: 评论
computer assisted determination of mandibular cystic lesion volume from computed tomographic data
Computer assisted determination of mandibular cystic lesion ...
收藏 引用
Middle East Conference on Biomedical Engineering (MECBME)
作者: Tamer M. Nassef Reham M. Fliefel Mona K. Marei Nahed H. Solouma Yasser M. Kadah Computer and Programming Engineering Department Misr University for Science and Technology Six of October City Egypt Tissue Engineering Lab Alexandria University Alexandria Egypt National Institute of Laser Science Cairo University Giza Egypt Biomedical Engineering Department Cairo University Giza Egypt
In this paper, a new approach for computing different anatomical regions in dental Computed Tomography (CT) is presented. The approach consists of two steps. First, a HU threshold window sets to separate between diffe... 详细信息
来源: 评论
Designing modularity architecture for multithread programming
Designing modularity architecture for multithread programmin...
收藏 引用
4th International Conference on Communications and Information Technology, CIT'10
作者: Netinant, Paniti Computer Science Department Bangkok University Bangkok Thailand Concurrent Programming Research Group Illinois Institute of Technology Chicago IL United States
Multithreaded Object-Oriented programming in concurrency environment using object-oriented technology is a complex activity. Programmers need to be aware of issues unrelated to their domain of problem, and are often u... 详细信息
来源: 评论
Execution of UML state machines using modelica
Execution of UML state machines using modelica
收藏 引用
3rd International Workshop on Equation-Based Object-Oriented Modeling Languages and Tools, EOOLT 2010 - In Conjunction with the MODELS 2010 Conference
作者: Schamai, Wladimir Pohlmann, Uwe Fritzson, Peter Paredis, Christiaan J.J. Helle, Philipp Strobel, Carsten EADS Innovation Works Germany Department of Computer Science University of Paderborn Germany PELAB - Programming Environment Lab Linköping University Sweden Georgia Institute of Technology Atlanta United States
ModelicaML is a UML profile for the creation of executable models. ModelicaML supports the Model-Based Systems Engineering (MBSE) paradigm and combines the power of the OMG UML standardized graphical notation for syst... 详细信息
来源: 评论