咨询与建议

限定检索结果

文献类型

  • 119 篇 会议
  • 103 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 149 篇 工学
    • 124 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 25 篇 电气工程
    • 21 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 5 篇 材料科学与工程(可...
    • 4 篇 土木工程
    • 3 篇 机械工程
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 3 篇 船舶与海洋工程
    • 3 篇 安全科学与工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 生物医学工程(可授...
  • 63 篇 理学
    • 47 篇 数学
    • 10 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 4 篇 生物学
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 海洋科学
  • 20 篇 管理学
    • 10 篇 图书情报与档案管...
    • 8 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 13 篇 医学
    • 9 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
  • 4 篇 农学
    • 3 篇 作物学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 哲学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 23 篇 laboratories
  • 11 篇 hardware
  • 10 篇 computer archite...
  • 8 篇 software enginee...
  • 6 篇 concurrent compu...
  • 6 篇 interference
  • 6 篇 computational mo...
  • 6 篇 costs
  • 6 篇 performance anal...
  • 6 篇 formal specifica...
  • 6 篇 algebra
  • 5 篇 computer science
  • 5 篇 operating system...
  • 5 篇 program processo...
  • 5 篇 semantics
  • 5 篇 protocols
  • 5 篇 functional progr...
  • 5 篇 delay
  • 5 篇 heuristic algori...
  • 4 篇 parallel algorit...

机构

  • 21 篇 programming rese...
  • 6 篇 oxford universit...
  • 4 篇 german research ...
  • 4 篇 department of ap...
  • 4 篇 industrial mathe...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 programming rese...
  • 3 篇 oxford universit...
  • 3 篇 oxford universit...
  • 3 篇 fund for scienti...
  • 3 篇 programming rese...
  • 3 篇 computing labora...
  • 3 篇 department of co...
  • 2 篇 oxford universit...
  • 2 篇 programming rese...
  • 2 篇 international in...
  • 2 篇 programming rese...
  • 2 篇 ibm thomas j. wa...

作者

  • 7 篇 hoare car
  • 6 篇 youfeng wu
  • 5 篇 felix wolf
  • 4 篇 cheng wang
  • 4 篇 bowen jonathan
  • 4 篇 w. luk
  • 4 篇 he jf
  • 4 篇 sanders j.w.
  • 4 篇 j. e. nicholls
  • 4 篇 he jifeng
  • 4 篇 luk w
  • 3 篇 noeiaghdam samad
  • 3 篇 de meuter wolfga...
  • 3 篇 todd bs
  • 3 篇 dedecker jessie
  • 3 篇 m.y.h. low
  • 3 篇 van cutsem tom
  • 3 篇 mostinckx stijn
  • 3 篇 jifeng he
  • 3 篇 wolf felix

语言

  • 216 篇 英文
  • 10 篇 其他
检索条件"机构=Laboratory of Research in Programming"
226 条 记 录,以下是61-70 订阅
排序:
Ambient-oriented exception handling
收藏 引用
作者: Mostinckx, Stijn Dedecker, Jessie Boix, Elisa Gonzalez Van Cutsem, Tom De Meuter, Wolfgang Programming Technology Laboratory Vrije Universiteit Brussel Belgium Fund for Scientific Research Flanders Belgium
Writing ambient-oriented software for mobile devices connected through wireless network connections provides new challenges in the field of exception handling. It involves dealing with issues such as asynchronous comm... 详细信息
来源: 评论
AmbientTalk: Language support for mobile computing
AmbientTalk: Language support for mobile computing
收藏 引用
International Workshop on System Support for Future Mobile Computing Applications, FUMCA 2006
作者: Dedecker, Jessie Van Cutsem, Tom Mostinckx, Stijn De Meuter, Wolfgang D'Hondt, Theo Fund for Scientific Research Flanders Belgium Belgium Programming Technology Laboratory Department of Computer Science Vrije Universiteit Brussel Belgium
An important aspect of system support for mobile computing involves alleviating the issues related to programming the underlying distributed system. Our approach to dealing with these issues is by means of programming... 详细信息
来源: 评论
Computations and relational bundles
收藏 引用
9th International Conference on Relational Methods in Computer Science and 4th International Workshop on Applications of Kleene Algebra, RelMiCS/AKA 2006
作者: Sanders, J.W. Computing Laboratory Programming Research Group Oxford University Parks Road Oxford OX1 3QD United Kingdom
We explore the view of a computation as a relational section of a (trivial) fibre bundle: initial states lie in the base of the bundle and final states lie in the fibres located at their initial states. This leads us ... 详细信息
来源: 评论
Characterization and analysis of HMMER and SVM-RFE parallel bioinformatics applications
Characterization and analysis of HMMER and SVM-RFE parallel ...
收藏 引用
IEEE International Workshop/Symposium on Workload Characterization
作者: U. Srinivasan Peng-Sheng Chen Qian Diao Chu-Cheow Lim E. Li Yongjian Chen R. Ju Yimin Zhang Programming Systems Laboratoryoratory Microprocessor Technology Laboratory Intel Corporation Santa Clara CA USA Architecture Research Laboratoryoratory Microprocessor Technology Laboratory Intel Corporation Santa Clara CA USA
Bioinformatics applications constitute an emerging data-intensive, high-performance computing (HPC) domain. While there is much research on algorithmic improvements, (2004), the actual performance of an application al... 详细信息
来源: 评论
Exploiting semantic clustering in the eDonkey P2P network
Exploiting semantic clustering in the eDonkey P2P network
收藏 引用
11th Workshop on ACM SIGOPS European Workshop, EW 11
作者: Handurukande, S.B. Kermarrec, A.-M. Fessant, F. Le Massoulié, L. Distributed Programming Laboratory EPFL Switzerland INRIA Rennes France INRIA-Futurs and Lix Palaiseau France Microsoft Research Cambridge United Kingdom
Peer-to-peer file sharing now represents a significant portion of the Internet traffic and has generated a lot of interest from the research community. Some recent measurements studies of peer-to-peer workloads have d... 详细信息
来源: 评论
EkSarva: an intelligent collaboration framework
EkSarva: an intelligent collaboration framework
收藏 引用
International IEEE Conference on Intelligent Systems, IS
作者: R. Reddy S. Selliah V. Bharadwaj Jinqiao Yu S. Kankanahalli S. Reddy Smart Internet Programming Laboratory Concurrent Engineering Research Center Lane Department of Computer Science and Electrical Engineering West Virginia University Morgantown WV USA
Ubiquitous computing and universal network connectivity have given rise to expectations of building a Digital Society, where many aspects of business and social activities may be accomplished by remote participants. I... 详细信息
来源: 评论
Performance potentials of compiler-directed data speculation
Performance potentials of compiler-directed data speculation
收藏 引用
IEEE International Symposium on Performance Analysis of Systems and Software
作者: Youfeng Wu Li-Ling Chen R. Ju J. Fang Programming Systems Research Laboratory INTEL Research Laboratory Santa Clara CA USA
Compiler-directed data speculation has been implemented on Itanium systems to allow for a compiler to move a load across a store even when the two operations are potentially aliased This not only breaks data dependenc... 详细信息
来源: 评论
How to prevent type flaw attacks on security protocols
How to prevent type flaw attacks on security protocols
收藏 引用
作者: Heather, James Lowe, Gavin Schneider, Steve Department of Computing Sch. of Electron. Comp./Mathematics University of Surrey Guildford Surrey GU2 7XH United Kingdom Programming Research Group Computing Laboratory Oxford University Parks Road Oxford OX1 3QD United Kingdom Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX United Kingdom
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number of type flaw attacks have appeared in the... 详细信息
来源: 评论
From fault tolerance to security and back
收藏 引用
IEEE Distributed Systems Online 2003年 第9期4卷
作者: Gartner, Felix C. Buttyan, Levente Kursawe, Klaus Swiss Fed. Institute of Technology Switzerland Budapest Univ. of Technol./Economics Hungary IBM Research Distributed Programming Laboratory Swiss Fed. Institute of Technology Lausanne Switzerland Lab. of Cryptography/System Security Budapest Univ. of Technol./Economics Hungary Department of Computer Switzerland
No abstract available
来源: 评论
How to prevent type flaw attacks on security protocols
收藏 引用
Journal of Computer Security 2003年 第2期11卷 217-244页
作者: Heather, James Lowe, Gavin Schneider, Steve Department of Computing School of Electronics Computing and Mathematics University of Surrey Guildford Surrey GU2 7XH UK. E-mail: Programming Research Group Oxford University Computing Laboratory Wolfson Building Parks Road Oxford OX1 3QD UK. E-mail: Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX UK. E-mail:
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number of type flaw attacks have appeared in the...
来源: 评论