咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 735 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,359 篇 工学
    • 1,056 篇 计算机科学与技术...
    • 886 篇 软件工程
    • 242 篇 信息与通信工程
    • 224 篇 控制科学与工程
    • 136 篇 生物工程
    • 99 篇 电气工程
    • 93 篇 机械工程
    • 93 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 57 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 46 篇 土木工程
    • 44 篇 建筑学
  • 604 篇 理学
    • 315 篇 数学
    • 158 篇 生物学
    • 118 篇 系统科学
    • 116 篇 物理学
    • 98 篇 统计学(可授理学、...
    • 43 篇 化学
  • 391 篇 管理学
    • 274 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 109 篇 医学
    • 100 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 45 篇 公共卫生与预防医...
  • 62 篇 法学
    • 46 篇 社会学
  • 45 篇 经济学
    • 45 篇 应用经济学
  • 45 篇 教育学
    • 43 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 137 篇 computer science
  • 63 篇 deep learning
  • 62 篇 machine learning
  • 58 篇 laboratories
  • 53 篇 computational mo...
  • 52 篇 software systems
  • 52 篇 accuracy
  • 51 篇 application soft...
  • 50 篇 artificial intel...
  • 47 篇 cloud computing
  • 46 篇 training
  • 42 篇 computer archite...
  • 42 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 36 篇 security
  • 35 篇 data mining
  • 35 篇 feature extracti...

机构

  • 31 篇 beijing key labo...
  • 25 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 institute for so...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 department of so...
  • 10 篇 computing and so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of softwa...
  • 9 篇 school of intell...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 35 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 24 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,062 篇 英文
  • 211 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2280 条 记 录,以下是1371-1380 订阅
排序:
A comparison of executable model based approaches for embedded systems
A comparison of executable model based approaches for embedd...
收藏 引用
2nd International Workshop on software engineering for Embedded systems, SEES 2012
作者: Fant, Julie Street Gomaa, Hassan Pettit IV, Robert G. Software Systems Engineering Department Aerospace Corporation Chantilly United States Department of Computer Science George Mason University Fairfax United States Flight Software and Embedded Systems Office Aerospace Corporation Chantilly United States
Designing and building embedded systems is a challenging problem. Designers must ensure that the software architecture meets its functional requirements and also, since embedded systems often have real-time constraint... 详细信息
来源: 评论
Safe adaptation in context-aware feature models  12
Safe adaptation in context-aware feature models
收藏 引用
4th International Workshop on Feature-Oriented software Development, FOSD'12
作者: Marinho, Fabiana G. Andrade, Rossana M.C. Costa, Paulo A.S. Maia, Paulo H.M. Vidal, Vania M.P. Werner, Claudia Department of Computer Science Federal University of Ceará Fortaleza Brazil Group of Computer Network Software Engineering and Systems - GREat Federal University of Ceará Fortaleza Brazil Systems Engineering and Computer Science Program Federal University of Rio de Janeiro Rio de Janeiro Brazil
software product lines, usually described using feature models, have proven to be a feasible solution to develop mobile and context-aware applications. These applications use con- text information to provide services ... 详细信息
来源: 评论
Reports of the AAAI 2011 fall symposia
收藏 引用
AI Magazine 2012年 第1期33卷 71-78页
作者: Blisard, Sam Carmichael, Ted Ding, Li Finin, Tim Frost, Wende Graesser, Arthur Hadzikadic, Mirsad Kagal, Lalana Kruijff, Geert-Jan M. Langley, Pat Lester, James McGuinness, Deborah L. Mostow, Jack Papadakis, Panagiotis Pirri, Fiora Prasad, Rashmi Stoyanchev, Svetlana Varakantham, Pradeep Interactive Systems Section Naval Research Laboratory Washington DC United States Department of Software and Information Systems University of North Carolina Charlotte United States Qualcomm Inc. United States Department of Computer Science and Electrical Engineering University of Maryland Baltimore County United States Department of Psychology Institute of Intelligent Systems University of Memphis United States Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology United States Germany Department of Computer Science and Engineering Arizona State University Tempe AZ United States Department of Computer Science North Carolina State University United States Department of Computer Science and Cognitive Science Rensselaer Polytechnic Institute United States School of Computer Science Carnegie Mellon University United States Department of Informatics and Systems University of Sapienza Rome Italy Department of Informatics and Systems ALCOR Lab University of Sapienza Rome Italy Department of Health Informatics and Administration University of Wisconsin-Milwaukee United States Columbia University United States School of Information Systems Singapore Management University Singapore Singapore
The Association for the Advancement of Artificial Intelligence was pleased to present the 2011 Fall Symposium Series, held Friday through Sunday, November 4-6, at the Westin Arlington Gateway in Arlington, Virginia. T... 详细信息
来源: 评论
Multi-level controlled signature  13th
Multi-level controlled signature
收藏 引用
13th International Workshop on Information Security Applications, WISA 2012
作者: Thorncharoensri, Pairat Susilo, Willy Mu, Yi School of Computer Science & Software Engineering University of Wollongong Australia Department of Information Systems Faculty of Business City University of Hong Kong Hong Kong
In this work, we present and establish a new primitive called Multi-level Controlled Signature. This primitive allows a signer to specify a security level to limit the verifiability of the signature. This primitive wo... 详细信息
来源: 评论
A complex adaptive model of information foraging and preferential attachment dynamics in global participatory science
A complex adaptive model of information foraging and prefere...
收藏 引用
2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2012
作者: Ozmen, Ozgur Yilmaz, Levent Smith, Jeffrey Smith, Alice E. Industrial and Systems Engineering Department Auburn University Auburn AL 36849 United States Computer Science and Software Engineering Auburn University Auburn AL 36849 United States
Recent developments in cyber-infrastructure and emerging virtual science collaboratories are enabling scientists to transparently co-develop, share, and communicate diverse forms of knowledge artifacts in real-time. U... 详细信息
来源: 评论
software product line engineering of space flight software
Software product line engineering of space flight software
收藏 引用
2012 3rd International Workshop on Product LinE Approaches in software engineering, PLEASE 2012
作者: Fant, Julie Street Gomaa, Hassan Pettit, Robert G. Software Systems Engineering Department Aerospace Corporation Chantilly VA United States Department of Computer Science George Mason University Fairfax VA United States Flight Software and Embedded Systems Office Aerospace Corporation Chantilly VA United States
This paper presents a practical solution to a reallife industrial problem in the unmanned space flight software (FSW) domain using software product lines and software architectural design patterns. In the FSW domain, ... 详细信息
来源: 评论
C to O-O translation: Beyond the easy stuff
C to O-O translation: Beyond the easy stuff
收藏 引用
19th Working Conference on Reverse engineering, WCRE 2012
作者: Trudel, Marco Furia, Carlo A. Nordio, Martin Meyer, Bertrand Oriol, Manuel Department of Software Engineering ETH Zurich Switzerland Dept. of Computer Science University of York York United Kingdom ABB Corporate Research Industrial Software Systems Baden-Dättwil Switzerland
Can we reuse some of the huge code-base developed in C to take advantage of modern programming language features such as type safety, object-orientation, and contracts? This paper presents a source-to-source translati... 详细信息
来源: 评论
Managing implicit requirements using semantic case-based reasoning research preview
Managing implicit requirements using semantic case-based rea...
收藏 引用
18th Working Conference on Requirements engineering: Foundation for software Quality, REFSQ 2012
作者: Daramola, Olawande Moser, Thomas Sindre, Guttorm Biffl, Stefan Department of Computer and Information Science Norwegian University of Science and Technology Trondheim Norway Christian Doppler Laboratory for Software Engineering Integration for Flexible Automation Systems Vienna University of Technology Austria
[Context and motivation] Implicit requirements (ImRs) are defined as requirements of a system which are not explicitly expressed during requirements elicitation, often because they are considered so basic that develop... 详细信息
来源: 评论
Editorial
收藏 引用
International Journal of Bio-Inspired Computation 2013年 第4期5卷 197-198页
作者: Camacho, David Badica, Costin Bein, Doina Warnier, Martijn Computer Science Department Escuela Politecnica Superior Universidad Autonoma de Madrid C/Francisco Tomás y Valiente 28049 Madrid Spain Software Engineering Department Faculty of Automatics Computers and Electronics University of Craiova Bvd. Decebal 107 200440 Craiova Romania Applied Research Laboratory Information Science and Technology Division Pennsylvania State University 204 V Applied Science Building University Park PA 16802 United States Systems Engineering Section Faculty of Technology Policy and Management Delft University of Technology Jaffalaan 5 2628BX Delft Netherlands
来源: 评论
A Liskov principle for delta-oriented programming
A Liskov principle for delta-oriented programming
收藏 引用
5th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation: Technologies for Mastering Change, ISoLA 2012
作者: Hähnle, Reiner Schaefer, Ina Department of Computer Science Technische Universität Darmstadt 64289 Darmstadt Germany Institute for Software Systems Engineering Technical University of Braunschweig D-38106 Braunschweig Germany
In formal verification of software product families one not only analyses programs, but must act on the artifacts and components which are reused to obtain software products. As the number of products is exponential i... 详细信息
来源: 评论