咨询与建议

限定检索结果

文献类型

  • 1,497 篇 会议
  • 737 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,366 篇 工学
    • 1,069 篇 计算机科学与技术...
    • 891 篇 软件工程
    • 244 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 136 篇 生物工程
    • 100 篇 电气工程
    • 95 篇 机械工程
    • 93 篇 生物医学工程(可授...
    • 74 篇 电子科学与技术(可...
    • 61 篇 安全科学与工程
    • 57 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 46 篇 土木工程
    • 45 篇 建筑学
    • 44 篇 网络空间安全
  • 606 篇 理学
    • 314 篇 数学
    • 158 篇 生物学
    • 118 篇 系统科学
    • 117 篇 物理学
    • 96 篇 统计学(可授理学、...
  • 396 篇 管理学
    • 279 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 109 篇 医学
    • 100 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 45 篇 公共卫生与预防医...
  • 63 篇 法学
    • 46 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 45 篇 教育学
    • 43 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 138 篇 computer science
  • 64 篇 deep learning
  • 60 篇 machine learning
  • 58 篇 laboratories
  • 55 篇 computational mo...
  • 54 篇 artificial intel...
  • 52 篇 software systems
  • 51 篇 application soft...
  • 51 篇 accuracy
  • 46 篇 cloud computing
  • 44 篇 training
  • 43 篇 software
  • 42 篇 computer archite...
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 35 篇 security
  • 34 篇 support vector m...
  • 34 篇 systems engineer...

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 10 篇 computing and so...
  • 10 篇 department of so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of intell...
  • 8 篇 department of co...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 leung victor c.m...
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,180 篇 英文
  • 94 篇 其他
  • 7 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2281 条 记 录,以下是1061-1070 订阅
排序:
Dynamic reconfiguration of cloud application architectures
Dynamic reconfiguration of cloud application architectures
收藏 引用
作者: Zúñiga-Prieto, Miguel González-Huerta, Javier Insfran, Emilio Abrahão, Silvia Department of Information Systems and Computation Universitat Politècnica de València Camino de Vera s/n Valencia46022 Spain Department of Computer Science Universidad de Cuenca Av. 12 de Abril y Agustín Cueva 01.01.168 Cuenca Ecuador Software Engineering Research Lab Sweden Blekinge Institute of Technology Campus Gräsvik Karlskrona371 79 Sweden
Service-based cloud applications are software systems that continuously evolve to satisfy new user requirements and technological changes. This kind of applications also require elasticity, scalability, and high avail... 详细信息
来源: 评论
Enhancing Secure software Development Education Through Relevant Active Learning
Enhancing Secure Software Development Education Through Rele...
收藏 引用
IEEE SoutheastCon
作者: Lixin Tao Fan Wu Kai Qian Dan Lo Reza M. Parizi Bei-Tseng Chu Department of Computer Science Pace University 861 Bedford Road Pleasantville NY USA Department of Computer Science Tuskegee University 1200 W. Montgomery Rd. Tuskegee AL USA Department of Computer Science Department of Software Engineering and Game Development Kennesaw State University 1100 South Marietta Pkwy SE Marietta GA USA Department of Software and Information Systems University of North Carolina at Charlotte 9201 University City Blvd Charlotte NC
While the mobile applications are increasing dramatically, the mobile security threat landscape is also growing explosively. The malicious malware may attack vulnerable mobile apps to get personal or enterprise confid... 详细信息
来源: 评论
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing
Using Sparse Matrices to Prevent Information Leakage in Clou...
收藏 引用
International Conference on Future Internet of Things and Cloud (FiCloud)
作者: Khaled Khan Mahboob Shaheen Yongge Wang Computer Science and Engineering KINDI Computing Lab Qatar University Qatar Department of Math and Physics North South University Dhaka Bangladesh Software and Information Systems University of North Carolina Charlotte USA
Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or u... 详细信息
来源: 评论
A fine-grained data set and analysis of tangling in bug fixing commits
arXiv
收藏 引用
arXiv 2020年
作者: Herbold, Steffen Trautsch, Alexander Ledel, Benjamin Aghamohammadi, Alireza Ghaleb, Taher Ahmed Chahal, Kuljit Kaur Bossenmaier, Tim Nagaria, Bhaveet Makedonski, Philip Ahmadabadi, Matin Nili Szabados, Kristof Spieker, Helge Madeja, Matej Hoy, Nathaniel G. Lenarduzzi, Valentina Wang, Shangwen Rodríguez-Pérez, Gema Colomo-Palacios, Ricardo Verdecchia, Roberto Singh, Paramvir Qin, Yihao Chakroborti, Debasish Davis, Willard Walunj, Vijay Wu, Hongjun Marcilio, Diego Alam, Omar Aldaeej, Abdullah Amit, Idan Turhan, Burak Eismann, Simon Wickert, Anna-Katharina Malavolta, Ivano Sulír, Matúš Fard, Fatemeh Henley, Austin Z. Kourtzanidis, Stratos Tuzun, Eray Treude, Christoph Shamasbi, Simin Maleki Pashchenko, Ivan Wyrich, Marvin Davis, James C. Serebrenik, Alexander Albrecht, Ella Aktas, Ethem Utku Strüber, Daniel Erbel, Johannes Institute for Software and Systems Engineering TU Clausthal Clausthal-Zellefeld Germany Institute of Computer Science University of Goettingen Goettingen Germany Department of Computer Engineering Sharif University of Technology Tehran Iran School of Computing Queen's University Kingston Canada Department of Computer Science Guru Nanak Dev University Amritsar India Karlsruhe Germany Brunel University London Uxbridge United Kingdom Institute of Computer Science University of Goettingen Germany University of Tehran Tehran Iran Ericsson Hungary Ltd. Budapest Hungary Simula Research Laboratory Fornebu Norway Technical University of Košice Košice Slovakia LUT University Finland National University of Defense Technology Changsha China University of British Columbia Kelowna Canada Østfold University College Halden Norway Vrije Universiteit Amsterdam Amsterdam Netherlands University of Auckland Auckland New Zealand University of Saskatchewan Saskatoon Canada IBM Boulder United States University of Missouri-Kansas City Kansas City United States Università della Svizzera italiana Lugano Switzerland Trent University Peterborough Canada University of Maryland Baltimore County United States Imam Abdulrahman Bin Faisal University Saudi Arabia The Hebrew University Acumen Jerusalem Israel University of Oulu Oulu Finland Monash University Melbourne Australia University of Würzburg Würzburg Germany Technische Universität Darmstadt Darmstadt Germany University of Tennessee Knoxville United States University of Macedonia Thessaloniki Greece Department of Computer Engineering Bilkent University Ankara Turkey University of Melbourne Melbourne Australia Independent Researcher Tehran Iran University of Trento Trento Italy University of Stuttgart Stuttgart Germany Purdue University West LafayetteIN United States Eindhoven University of Technology Eindhoven Netherlands Softtech Inc. Research and Development Center Istanbul34947 Turkey Radboud Universi
Context: Tangled commits are changes to software that address multiple concerns at once. For researchers interested in bugs, tangled commits mean that they actually study not only bugs, but also other concerns irrelev... 详细信息
来源: 评论
Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies
收藏 引用
Journal of Information systems Education 2017年 第1期28卷 11-19页
作者: Yuan, Xiaohong Williams, Kenneth Yu, Huiming Rorrer, Audrey Chu, Bei-Tseng Yang, Li Winters, Kathy Kizza, Joseph Department of Computer Science North Carolina A&T State University GreensboroNC27411 United States Charlotte NC28223 United States Software and Information Systems University of North Carolina – Charlotte CharlotteNC28223 United States Department of Computer Science and Engineering University of Tennessee – Chattanooga ChattanoogaTN37403 United States
Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop th... 详细信息
来源: 评论
Managing IoT-Based Smart Healthcare systems Traffic with software Defined Networks
Managing IoT-Based Smart Healthcare Systems Traffic with Sof...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Farag Sallabi Faisal Naeem Mamoun Awad Khaled Shuaib Department of Computer and Network Engineering United Arab Emirates University Al Ain UAE Department of Computing and Technology Abasyn University Peshawar Pakistan Department of Computer Science and Software Engineering United Arab Emirates University Al Ain UAE Department of Information Systems and Security United Arab Emirates University Al Ain UAE
Internet of things (IoT) aims to connect billions of devices to the Internet. These devices generate an enormous amount of traffic. A Wireless Body Area Network (WBAN) aggregates the data generated from the body senso... 详细信息
来源: 评论
A framework for automated corpus compilation for KeyXtract: Twitter model  17
A framework for automated corpus compilation for KeyXtract: ...
收藏 引用
17th International Conference on Advances in ICT for Emerging Regions, ICTer 2017
作者: Weerasooriya, Tharindu Perera, Nandula Liyanage, S.R. Department of Statistics and Computer Science University of Kelaniya Kelaniya Sri Lanka Department of English Language Teaching University of Kelaniya Kelaniya Sri Lanka Department of Software Engineering University of Kelaniya Kelaniya Sri Lanka
The corpus is a limiting factor for a keyword extraction process with a word matching stage. This paper proposes a framework to automate the corpus generation stage required for the Twitter Model of KeyXtract, an algo... 详细信息
来源: 评论
Decision support for search and rescue response planning  14
Decision support for search and rescue response planning
收藏 引用
14th International Conference on Information systems for Crisis Response and Management, ISCRAM 2017
作者: Morin, Michael Abi-Zeid, Irène Quimper, Claude-Guy Nilo, Oscar Department of Mechanical and Industrial Engineering University of Toronto ON Canada Department of Operations and Decision Systems Université Laval Québec Canada Department of Computer Science and Software Engineering Université Laval Québec Canada
Planning, controlling and coordinating search and rescue operations is complex and time is crucial for survivors who must be found quickly. The search planning phase is especially important when the location of the in... 详细信息
来源: 评论
Empirical vulnerability analysis of automated smart contracts security testing on blockchains
arXiv
收藏 引用
arXiv 2018年
作者: Parizi, Reza M. Dehghantanha, Ali Choo, Kim-Kwang Raymond Singh, Amritraj Department of Software Engineering and Game Development Kennesaw State University GA United States School of Computer Science University of Guelph ON Canada Department of Information Systems and Cyber Security University of Texas San AntonioTX United States
The emerging blockchain technology supports decentralized computing paradigm shift and is a rapidly approaching phenomenon. While blockchain is thought primarily as the basis of Bitcoin, its application has grown far ... 详细信息
来源: 评论
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
A privacy-aware two-factor authentication protocol based on ...
收藏 引用
作者: Jiang, Qi Kumar, Neeraj Ma, Jianfeng Shen, Jian He, Debiao Chilamkurti, Naveen School of Cyber Engineering Xidian University Xi'an China Co-innovation Center for Information Supply and Assurance Technology Anhui University Hefei China Department of Computer Science and Engineering Thapar University Patiala India School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Lab of Software Engineering Computer School Wuhan University Wuhan China Department of Computer Systems and Computer Science La Trobe University Melbourne Australia
As one of the enabling components of Internet of things (IoT), wireless sensor networks (WSNs) have found applications in a wide range of fields, in which outside users need to directly interact with sensors to obtain... 详细信息
来源: 评论