咨询与建议

限定检索结果

文献类型

  • 1,495 篇 会议
  • 733 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,275 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,361 篇 工学
    • 1,065 篇 计算机科学与技术...
    • 891 篇 软件工程
    • 244 篇 信息与通信工程
    • 224 篇 控制科学与工程
    • 136 篇 生物工程
    • 98 篇 电气工程
    • 93 篇 机械工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 57 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 46 篇 土木工程
    • 45 篇 建筑学
    • 44 篇 网络空间安全
  • 604 篇 理学
    • 313 篇 数学
    • 158 篇 生物学
    • 118 篇 系统科学
    • 116 篇 物理学
    • 96 篇 统计学(可授理学、...
  • 395 篇 管理学
    • 278 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 109 篇 医学
    • 100 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 45 篇 公共卫生与预防医...
  • 62 篇 法学
    • 46 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 45 篇 教育学
    • 43 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 138 篇 computer science
  • 63 篇 deep learning
  • 61 篇 machine learning
  • 58 篇 laboratories
  • 54 篇 computational mo...
  • 52 篇 software systems
  • 51 篇 application soft...
  • 51 篇 accuracy
  • 50 篇 artificial intel...
  • 46 篇 cloud computing
  • 44 篇 training
  • 43 篇 software
  • 42 篇 computer archite...
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 35 篇 security
  • 34 篇 support vector m...
  • 34 篇 systems engineer...

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 10 篇 computing and so...
  • 10 篇 department of so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of intell...
  • 8 篇 department of co...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 32 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,173 篇 英文
  • 95 篇 其他
  • 7 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2275 条 记 录,以下是1711-1720 订阅
排序:
Retrieving Design Patterns by Case-Based Reasoning and Formal Concept Analysis
Retrieving Design Patterns by Case-Based Reasoning and Forma...
收藏 引用
2009 2nd IEEE International Conference on computer science and Information Technology(ICCSIT 2009)
作者: Weenawadee Muangon Sarun Intakosum Software Systems Engineering Laboratory Department of Mathematics and Computer Science Faculty of ScienceKing Mongkut's Institute of Technology LadkrabangBangkokThailand
Design patterns are applied to solve the recurring software design problems,Unfortunately,choosing appropriate design patterns for the specific design problem is considered a difficult task.A search tool is,therefore,... 详细信息
来源: 评论
Threats Identification in Healthcare Information systems using Genetic Algorithm and Coz Regression
Threats Identification in Healthcare Information Systems usi...
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Rabiah Ahmad Ganthan Narayana Samy Nuzulha Khilwani Ibrahim Peter A.Bath Zuraini Ismail Centre for Advanced Software Engineering (CASE) Faculty of Computer Science and Information Systems Department of Computer Systems and Communications Faculty of Computer Science and Information System Department of Information Studies University of Sheffield UK Department of Science College of Science and Technology Universiti Teknologi Malaysia (UTM) Malaysia
Threats to information security for healthcare information system increased tremendously. There are various factors contribute to information security threats, many researchers focused only to certain factors which in... 详细信息
来源: 评论
Adaptation of Design Pattern Retrieval Using CBR and FCA
Adaptation of Design Pattern Retrieval Using CBR and FCA
收藏 引用
International Conference on computer sciences and Convergence Information Technology (ICCIT)
作者: Weenawadee Muangon Sarun Intakosum Software Systems Engineering Laboratory Department of Mathematics and Computer Science Faculty of Science King Mongkut's Institute of Technology Ladkrabang Bangkok Thailand
software developers currently find design patterns through search tools for solving software design problem. However, these search tools still have keyword-search problem. In this paper, we introduce the elementary id... 详细信息
来源: 评论
A utility model for peering of multi-provider content delivery services
A utility model for peering of multi-provider content delive...
收藏 引用
Conference on Local computer Networks (LCN)
作者: Mukaddim Pathan Rajkumar Buyya Grid Computing and Distributed Systems GRIDS Laboratory Department of Computer Science and Software Engineering University of Melbourne Parkville VIC Australia
Peering of Content Delivery Networks (CDNs) allow providers to rapidly scale-out to meet both flash crowds and anticipated increases in demand. Recent trends foster the need for a utility model for content delivery se... 详细信息
来源: 评论
Three-layer architecture model (TLAM) for energy conservation in wireless sensor networks
Three-layer architecture model (TLAM) for energy conservatio...
收藏 引用
International Conference on Ultra Modern Telecommunications and Workshops (ICUMT)
作者: Sugam Sharma Mamta Rani Department of Computer Science Iowa State University Ames IA USA Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contai... 详细信息
来源: 评论
A Heuristic Approach for Capacity Control in Clouds
A Heuristic Approach for Capacity Control in Clouds
收藏 引用
IEEE International Conference on E-Commerce Technology Workshops
作者: Arun Anandasivam Stefan Buschek Rajkumar Buyya Institute for Information Systems and Management University of Karlsruhe Germany Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne Australia
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud reso... 详细信息
来源: 评论
Using Quality Audits to Assess software Course Projects
Using Quality Audits to Assess Software Course Projects
收藏 引用
Conference on software engineering Education & Training (CSEE&T)
作者: Wilson Pádua Synergia Systems and Software Engineering Laboratory Computer Science Department Federal University of Minas Gerais Belo Horizonte Minas Gerais Brazil
Assessing software engineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might require the examination of a significant vo... 详细信息
来源: 评论
Newborn screening system based on adaptive feature selection and support vector machines
Newborn screening system based on adaptive feature selection...
收藏 引用
2009 9th IEEE International Conference on Bioinformatics and Bioengineering, BIBE 2009
作者: Hsieh, Sung-Huai Chien, Yin-Hsiu Shen, Chia-Ping Chen, Wei-Hsin Chen, Po-Hao Hsieh, Sheau-Ling Cheng, Po-Hsun Lai, Feipei Information Systems Office National Taiwan University Hospital Taipei Taiwan Department of Computer Science and Information Engineering National Taiwan University Taiwan Department of Electrical Engineering National Taiwan University Taipei Taiwan Network and Computer Centre National Chiao Tung University Hsin Chu Taiwan Graduate Institute of Biomedical Electronics and Bioinformatics National Taiwan University Taiwan Department of Software Engineering National Kaohsiung Normal University Taiwan Department of Medical Genetics National Taiwan University Hospital Taiwan
The clinical symptoms of metabolic disorders during neonatal period are often not apparent, if not treated early irreversible damages such as mental retardation may occur, even death. Therefore, practicing newborn scr... 详细信息
来源: 评论
Towards the development of an autonomic network management architecture
Towards the development of an autonomic network management a...
收藏 引用
International Conference on Communications and Networking in China (CHINACOM)
作者: John Strassner James Won-Ki Hong Department of Computer Science and Engineering Pohang University of Science and Technology Pohang South Korea Telecommunications Systems & Software Group Waterford Institute of Technology Waterford Ireland
The current Internet did not define any inherent management constructs and mechanisms; such concepts were added after networking standards and architectures were constructed. This also influenced network management fo... 详细信息
来源: 评论
The design of an Autonomic Element for managing emerging networks and services
The design of an Autonomic Element for managing emerging net...
收藏 引用
International Conference on Ultra Modern Telecommunications and Workshops (ICUMT)
作者: John Strassner James Won-Ki Hong Sven van der Meer Department of Computer Science and Engineering Pohang University of Science and Technology Pohang South Korea Telecommunications Software & Systems Group Waterford Institute of Technology Waterford Ireland
Next generation networks, as well as the future Internet, aim to provide context-sensitive business services that adapt to changing user needs, business goals, and environmental conditions. This paper describes the co... 详细信息
来源: 评论