咨询与建议

限定检索结果

文献类型

  • 1,498 篇 会议
  • 738 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,283 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,359 篇 工学
    • 1,058 篇 计算机科学与技术...
    • 887 篇 软件工程
    • 243 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 136 篇 生物工程
    • 99 篇 电气工程
    • 93 篇 机械工程
    • 93 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 57 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 46 篇 土木工程
    • 44 篇 建筑学
  • 604 篇 理学
    • 314 篇 数学
    • 158 篇 生物学
    • 118 篇 系统科学
    • 116 篇 物理学
    • 97 篇 统计学(可授理学、...
    • 43 篇 化学
  • 392 篇 管理学
    • 275 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 109 篇 医学
    • 100 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 45 篇 公共卫生与预防医...
  • 62 篇 法学
    • 46 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 45 篇 教育学
    • 43 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 137 篇 computer science
  • 63 篇 deep learning
  • 62 篇 machine learning
  • 58 篇 laboratories
  • 53 篇 computational mo...
  • 52 篇 software systems
  • 52 篇 accuracy
  • 51 篇 application soft...
  • 50 篇 artificial intel...
  • 47 篇 cloud computing
  • 46 篇 training
  • 43 篇 software
  • 42 篇 computer archite...
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 36 篇 security
  • 35 篇 data mining
  • 35 篇 feature extracti...

机构

  • 31 篇 beijing key labo...
  • 25 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 10 篇 computing and so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of softwa...
  • 9 篇 school of intell...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,065 篇 英文
  • 211 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2283 条 记 录,以下是1511-1520 订阅
排序:
On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY
On the need for data flow graph visualization of Forensic Lu...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Serguei A. Mokhov Joey Paquet Mourad Debbabi Department of Computer Science and Software Engineering Concordia University Montreal Canada Concordia Institute for Information Systems Engineering Concordia University Montreal Canada
Lucid programs are data-flow programs and can be visually represented as data flow graphs (DFGs) and composed visually. Forensic Lucid, a Lucid dialect, is a language to specify and reason about cyberforensic cases. I... 详细信息
来源: 评论
Kernel Dimensionality Reduction Evaluation on Various Dimensions of Effective Subspaces for Cancer Patient Survival Analysis
收藏 引用
通讯和计算机(中英文版) 2011年 第8期8卷 619-623页
作者: Ito Wasito Yoon Chin Soon S.Z. Mohd Hashim Faculty of Computer Science University of Indonesia UI Campus Depok-Jakarta 16424 Indonesia Department of Software Engineering Faculty of Computer Science and Information Systems University Technology Malaysia Skudai Johor Bahru 81310 Malaysia
来源: 评论
Energy-aware data processing techniques for wireless sensor networks: A review
Energy-aware data processing techniques for wireless sensor ...
收藏 引用
3rd International Conference on Data Management in Grid and Peer-to-Peer systems, Globe 2010
作者: Chong, Suan Khai Gaber, Mohamed Medhat Krishnaswamy, Shonali Loke, Seng Wai Centre for Distributed Systems and Software Engineering Monash University 900 Dandenong Rd Caulfield EastVIC3145 Australia School of Computing University of Portsmouth Portsmouth HampshirePO1 3HE United Kingdom Department of Computer Science and Computer Engineering La Trobe University VIC3086 Australia
Extensive data generated by peers of nodes in wireless sensor networks (WSNs) needs to be analysed and processed in order to extract information that is meaningful to the user. Data processing techniques that achieve ... 详细信息
来源: 评论
A CSMA-based approach for detecting composite data aggregate events with collaborative sensors in WSN
A CSMA-based approach for detecting composite data aggregate...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yang, Chi Ren, Kaijun Yang, Zhimin Gong, Peng Liu, Chang School of Computer Science and Software Engineering University of Western Australia M002 35 Stirling Highway Crawley WA 6009 Australia College of Computer National University of Defense Technology Changsha Hunan 410073 China Department of Computer Shandong University at Weihai Weihai China Anhui Wenda Information and Technology College Hefei 231201 China CS3-Centre for Complex Software Systems and Services Swinburne University of Technology Melbourne 3122 Australia
Nowadays, wireless sensor networks are widely used to monitor real time events and answer the ad hoc queries from a certain member node. However, computing and maintaining the information of aggregate queries in event... 详细信息
来源: 评论
Evotec: Evolving the Best Testing Strategy for Contract-Equipped Programs
Evotec: Evolving the Best Testing Strategy for Contract-Equi...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Lucas Serpa Silva Yi Wei Bertrand Meyer Manuel Oriol Chair of Software Engineering ETH Zurich Switzerland Department of Computer Science University of York York UK Industrial Software Systems ABB Corporate Research Baden-Battwil Switzerland
Automated random testing is efficient at detecting faults but it is certainly not an optimal testing strategy for every given program. For example, an automated random testing tool ignores that some routines have stro... 详细信息
来源: 评论
Towards Succinctness in Mining Scenario-Based Specifications
Towards Succinctness in Mining Scenario-Based Specifications
收藏 引用
IEEE International Conference on engineering of Complex computer systems
作者: David Lo Shahar Maoz School of Information Systems Singapore Management University Singapore Department of Computer Science 3 (Software Engineering) RWTH Aachen University Aachen Germany
Specification mining methods are used to extract candidate specifications from system execution traces. A major challenge for specification mining is succinctness. That is, in addition to the soundness, completeness, ... 详细信息
来源: 评论
SeClone - A Hybrid Approach to Internet-Scale Real-Time Code Clone Search
SeClone - A Hybrid Approach to Internet-Scale Real-Time Code...
收藏 引用
IEEE Workshop on Program Comprehension
作者: Iman Keivanloo Juergen Rilling Philippe Charland Department of Computer Science and Software Engineering Concordia University Montreal Canada System of Systems Section Defence Research and Development Canada QUE Canada
Real-time code clone search is an emerging family of clone detection research that aims at finding clone pairs matching an input code fragment in fractions of a second. For these techniques to meet actual real world r... 详细信息
来源: 评论
SMICloud: A Framework for Comparing and Ranking Cloud Services
SMICloud: A Framework for Comparing and Ranking Cloud Servic...
收藏 引用
IEEE International Conference on Utility and Cloud Computing (UCC)
作者: Saurabh Kumar Garg Steve Versteeg Rajkumar Buyya Cloud Computing and Distributed Systems (CLOUDS) Laboratory Department of Computer Science and Software Engineering University of Melbourne Australia CA Technologies Melbourne Australia
With the growth of Cloud Computing, more and more companies are offering different cloud services. From the customer's point of view, it is always difficult to decide whose services they should use, based on users... 详细信息
来源: 评论
Automatic diagram layout support for the Marama meta-toolset
Automatic diagram layout support for the Marama meta-toolset
收藏 引用
IEEE Symposium on Visual languages and Human Centric Computing (VL/HCC)
作者: Pei Shan Yap John Hosking John Grundy Department of Computer Science University of Auckland Auckland New Zealand Centre of Computing and Engineering Software Systems Swinburne University of Technology Melbourne Australia
Automatic layout can be a crucial support feature for complex diagramming tools. Adding suitable layout algorithms to diagramming tools is a complex task and meta-tools should incorporate these for reuse. We present M... 详细信息
来源: 评论
Automatic speech recognition of Thai person names from dynamic name lists
Automatic speech recognition of Thai person names from dynam...
收藏 引用
International Conference on Electrical engineering/Electronics, computer, Telecommunications and Information Technology, ECTI-CON
作者: Atiwong Suchato Proadpran Punyabukkana Patanan Ariyakornwijit Teerat Namchaisawatwong Spoken Language Systems Research Group Department of Computer Engineering Chulalongkom University Bangkok Thailand School of Information Science Japan Advanced Institute of Science and Technology Ishikawa Japan
Automatic speech recognition tasks whose domains involve recognizing proper names are usually challenging due to the infinite number of possible lexical items. In some tasks such as automated directories, to avoid unc...
来源: 评论