咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 735 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,280 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,359 篇 工学
    • 1,056 篇 计算机科学与技术...
    • 886 篇 软件工程
    • 242 篇 信息与通信工程
    • 224 篇 控制科学与工程
    • 136 篇 生物工程
    • 99 篇 电气工程
    • 93 篇 机械工程
    • 93 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 57 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 46 篇 土木工程
    • 44 篇 建筑学
  • 604 篇 理学
    • 315 篇 数学
    • 158 篇 生物学
    • 118 篇 系统科学
    • 116 篇 物理学
    • 98 篇 统计学(可授理学、...
    • 43 篇 化学
  • 391 篇 管理学
    • 274 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 109 篇 医学
    • 100 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 45 篇 公共卫生与预防医...
  • 62 篇 法学
    • 46 篇 社会学
  • 45 篇 经济学
    • 45 篇 应用经济学
  • 45 篇 教育学
    • 43 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 137 篇 computer science
  • 63 篇 deep learning
  • 62 篇 machine learning
  • 58 篇 laboratories
  • 53 篇 computational mo...
  • 52 篇 software systems
  • 52 篇 accuracy
  • 51 篇 application soft...
  • 50 篇 artificial intel...
  • 47 篇 cloud computing
  • 46 篇 training
  • 42 篇 computer archite...
  • 42 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 36 篇 security
  • 35 篇 data mining
  • 35 篇 feature extracti...

机构

  • 31 篇 beijing key labo...
  • 25 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 institute for so...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 department of so...
  • 10 篇 computing and so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of softwa...
  • 9 篇 school of intell...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 35 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 24 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,062 篇 英文
  • 211 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2280 条 记 录,以下是1391-1400 订阅
排序:
Synchronous Collaboration with Virtual and Remote Labs in Moodle
收藏 引用
IFAC Proceedings Volumes 2012年 第11期45卷 270-275页
作者: Carlos A. Jara Ruben Heradio Luis de la Torre Jose Sanchez Sebastian Dormido Fernando Torres Francisco A. Candelas Physics Systems Engineering and Signal Theory Department University of Alicante Spain Software Engineering and Computer Systems Department Spanish Open University Madrid Spain Computer Science and Automatic Department Spanish Open University Madrid Spain
This work presents the tools and procedure developed by the authors to create synchronous collaborative virtual and remote laboratories within a web course produced with a learning management system. Thanks to them, a... 详细信息
来源: 评论
Constraint programming for path planning with uncertainty: Solving the optimal search path problem
Constraint programming for path planning with uncertainty: S...
收藏 引用
18th International Conference on Principles and Practice of Constraint Programming, CP 2012
作者: Morin, Michael Papillon, Anika-Pascale Abi-Zeid, Irène Laviolette, François Quimper, Claude-Guy Department of Computer Science and Software Engineering Université Laval Québec QC Canada Department of Mathematics and Statistics Université Laval Québec QC Canada Department of Operations and Decision Systems Université Laval Québec QC Canada
The optimal search path (OSP) problem is a single-sided detection search problem where the location and the detectability of a moving object are uncertain. A solution to this -hard problem is a path on a graph that ma... 详细信息
来源: 评论
Medical Ontology in the Dynamic Healthcare Environment
收藏 引用
Procedia computer science 2012年 10卷 340-348页
作者: Furkh Zeshan Radziah Mohamad Department of Software Engineering Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia (UTM) 81310 Skudai Johor Malaysia
Advances in medical care and computer technology in recent decades have expanded the parameters of the traditional domain of medical services. This scenario has created new opportunities for building applications to p... 详细信息
来源: 评论
Comparing six modeling approaches
收藏 引用
Workshops and Symposia on Models in software engineering, MODELS 2011
作者: Mussbacher, Gunter Al Abed, Wisam Alam, Omar Ali, Shaukat Beugnard, Antoine Bonnet, Valentin Bræk, Rolv Capozucca, Alfredo Cheng, Betty H.C. Fatima, Urooj France, Robert Georg, Geri Guelfi, Nicolas Istoan, Paul Jézéquel, Jean-Marc Kienzle, Jörg Klein, Jacques Lézoray, Jean-Baptiste Malakuti, Somayeh Moreira, Ana Phung-Khac, An Troup, Lucy Department of Systems and Computer Engineering Carleton University Canada Software Engineering Laboratory McGill University Montreal Canada Simula Research Laboratory Norway Département Informatique TELECOM Bretagne France Department of Telematics Norwegian University of Science and Technology Norway LASSY Research Team University of Luxembourg Luxembourg Department of Computer Science and Engineering Michigan State University United States Computer Science Department Colorado State University Fort Collins United States ISC Department CRP Gabriel Lippmann Luxembourg INRIA Centre Rennes - Bretagne Atlantique Rennes France Laboratory for Advanced Software Systems University of Luxembourg Luxembourg Software Engineering Group University of Twente Netherlands Universidade Nova de Lisboa Lisbon Portugal Department of Psychology Colorado State University Fort Collins United States
While there are many aspect-oriented modeling (AOM) approaches, from requirements to low-level design, it is still difficult to compare them and know under which conditions different approaches are most applicable. Th... 详细信息
来源: 评论
Threshold concepts and threshold skills in computing  12
Threshold concepts and threshold skills in computing
收藏 引用
9th Annual International Conference on International Computing Education Research, ICER 2012
作者: Sanders, Kate Boustedt, Jonas Eckerdal, Anna Mccartney, Robert Moström, Jan Erik Thomas, Lynda Zander, Carol Mathematics and Computer Science Department Rhode Island College Providence RI United States Faculty of Engineering and Sustainable Development University of Gävle Gävle Sweden Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT United States Department of Computing Science Umeå University 901 87 Umeå Sweden Department of Computer Science Aberystwyth University Aberystwyth United Kingdom Computing and Software Systems University of Washington Bothell WA United States
Threshold concepts can be used to both organize disciplinary knowledge and explain why students have difficulties at certain points in the curriculum. Threshold concepts transform a student's view of the disciplin... 详细信息
来源: 评论
Self-directed learning: Stories from industry  12
Self-directed learning: Stories from industry
收藏 引用
12th Koli Calling International Conference on Computing Education Research, Koli Calling 2012
作者: Zander, Carol Boustedt, Jonas Eckerdal, Anna Mccartney, Robert Moström, Jan Erik Sanders, Kate Thomas, Lynda Computing and Software Systems University of Washington Bothell Bothell WA United States Faculty of Engineering and Sustainable Development University of Gävle Gävle Sweden Department of InformationTechnology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT United States Department of Computing Science Umeå University 901 87 Umeå Sweden Mathematics and Computer Science Department Rhode Island College Providence RI United States Department of Computer Science Aberystwyth University Aberystwyth United Kingdom
We report preliminary results from an ongoing investigation of how computing professionals perceive and value selfdirected learning, based on a qualitative analysis of interviews with ten computing professionals. The ... 详细信息
来源: 评论
WLAR-Viz: Weighted least association rules visualization
WLAR-Viz: Weighted least association rules visualization
收藏 引用
3rd International Conference on Information Computing and Applications, ICICA 2012
作者: Noraziah, A. Abdullah, Zailani Herawan, Tutut Deris, Mustafa Mat Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang Malaysia Department of Computer Science Universiti Malaysia Terengganu 21030 Kuala Terengganu Terengganu Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Parit Raja Batu Pahat 86400 Johor Malaysia
Mining weighted least association rules has been an increasing demand in data mining research. However, mining these types of rules often facing with difficulties especially in identifying which rules are really inter... 详细信息
来源: 评论
Scalable technique to discover items support from trie data structure
Scalable technique to discover items support from trie data ...
收藏 引用
3rd International Conference on Information Computing and Applications, ICICA 2012
作者: Noraziah, A. Abdullah, Zailani Herawan, Tutut Deris, Mustafa Mat Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang Malaysia Department of Computer Science Universiti Malaysia Terengganu 21030 Kuala Terengganu Terengganu Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Parit Raja Batu Pahat 86400 Johor Malaysia
One of the popular and compact trie data structure to represent frequent patterns is via frequent pattern tree (FP-Tree). There are two scanning processes involved in the original database before the FP-Tree can be co... 详细信息
来源: 评论
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
DFP-growth: An efficient algorithm for mining frequent patte...
收藏 引用
3rd International Conference on Information Computing and Applications, ICICA 2012
作者: Abdullah, Zailani Herawan, Tutut Noraziah, A. Deris, Mustafa Mat Department of Computer Science University Malaysia Terengganu 21030 Kuala Terengganu Terengganu Malaysia Faculty of Computer Systems and Software Engineering University Malaysia Pahang Lebuhraya Tun Razak 26300 Kuantan Pahang Malaysia Faculty of Computer Science and Information Technology University Tun Hussein Onn Malaysia Parit Raja Batu Pahat 86400 Johor Malaysia
Mining frequent patterns in a large database is still an important and relevant topic in data mining. Nowadays, FP-Growth is one of the famous and benchmarked algorithms to mine the frequent patterns from FP-Tree data... 详细信息
来源: 评论
Hybrid modeling and simulation for trustworthy software process management: A stakeholder-oriented approach
Hybrid modeling and simulation for trustworthy software proc...
收藏 引用
作者: Bai, Xu Huang, LiGuo Zhang, He Koolmanojwong, Supannika Department of Computer Science and Engineering Southern Methodist University Dallas TX 75205 United States National ICT Australia University of New South Wales Sydney Australia Center for Systems and Software Engineering University of Southern California Los Angeles CA 90089 United States
Process Management Model (PMM) and Process Simulation Model (PSM) are the critical infrastructural components of the Trustworthy Process Management Framework (TPMF), which involves a large and heterogeneous group of s... 详细信息
来源: 评论