咨询与建议

限定检索结果

文献类型

  • 670 篇 会议
  • 286 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 975 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 591 篇 工学
    • 428 篇 计算机科学与技术...
    • 345 篇 软件工程
    • 128 篇 信息与通信工程
    • 79 篇 电气工程
    • 68 篇 电子科学与技术(可...
    • 61 篇 控制科学与工程
    • 41 篇 光学工程
    • 38 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 22 篇 动力工程及工程热...
    • 22 篇 土木工程
    • 21 篇 建筑学
    • 18 篇 网络空间安全
    • 17 篇 安全科学与工程
    • 16 篇 交通运输工程
    • 15 篇 环境科学与工程(可...
  • 213 篇 理学
    • 108 篇 数学
    • 49 篇 物理学
    • 45 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 23 篇 系统科学
  • 153 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 39 篇 医学
    • 36 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 24 篇 法学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 6 篇 教育学
  • 5 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 49 篇 software enginee...
  • 34 篇 computer science
  • 30 篇 software
  • 20 篇 computer archite...
  • 20 篇 semantics
  • 19 篇 context
  • 19 篇 protocols
  • 18 篇 computational mo...
  • 18 篇 unified modeling...
  • 17 篇 application soft...
  • 17 篇 monitoring
  • 16 篇 runtime
  • 16 篇 data mining
  • 16 篇 wireless sensor ...
  • 16 篇 software testing
  • 16 篇 artificial intel...
  • 16 篇 testing
  • 15 篇 java
  • 14 篇 software systems
  • 14 篇 wireless communi...

机构

  • 17 篇 software systems...
  • 15 篇 school of comput...
  • 15 篇 alibaba group
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 9 篇 school of comput...
  • 8 篇 school of softwa...
  • 8 篇 school of comput...
  • 7 篇 software enginee...
  • 7 篇 peking universit...
  • 7 篇 key laboratory o...
  • 6 篇 kingdee research...
  • 6 篇 faculty of elect...
  • 6 篇 shandong branch ...
  • 6 篇 state key labora...
  • 6 篇 department of co...
  • 6 篇 service oriented...
  • 5 篇 institute of com...
  • 5 篇 automated softwa...
  • 5 篇 national enginee...

作者

  • 12 篇 sheldon s. willi...
  • 12 篇 padma iyenghar
  • 11 篇 elke pulvermuell...
  • 10 篇 vahid garousi
  • 10 篇 ghasem mirjalily
  • 9 篇 zündorf albert
  • 9 篇 andrade rossana ...
  • 9 篇 liming zhu
  • 9 篇 clemens westerka...
  • 8 篇 lu qinghua
  • 8 篇 juergen wuebbelm...
  • 8 篇 zhang liang-jie
  • 8 篇 zhang haijun
  • 7 篇 xu xiwei
  • 7 篇 zhu liming
  • 7 篇 qinghua lu
  • 6 篇 len bass
  • 6 篇 ladan tahvildari
  • 6 篇 kaklamani dimitr...
  • 6 篇 jamshidi p.

语言

  • 932 篇 英文
  • 31 篇 其他
  • 12 篇 中文
  • 1 篇 德文
检索条件"机构=Research Group on Computer Networks and Software Engineering"
975 条 记 录,以下是211-220 订阅
排序:
An autonomous middleware model for essential services in distributed mobile applications
收藏 引用
4th International ICST Conference on Mobile Wireless Middleware, Operating Systems, and Applications, MobilWare 2011
作者: Maia, Marcio E. F. Rocha, Lincoln S. Maia, Paulo Henrique M. Andrade, Rossana M. C. Group of Computer Networks Software Engineering and Systems Federal University of Ceara Campus Do Pici Av. Mister Hull s/n - Bloco 942-A Fortaleza CE CEP: 60455-760 Brazil
The evolution and popularization of mobile devices and wireless networks give rise to the creation of a new interaction paradigm, where the devices cooperate to execute short tasks. In this scenario, the problem of ho... 详细信息
来源: 评论
Intelligent environments with entangled quality properties
收藏 引用
Journal of Reliable Intelligent Environments 2022年 第3期8卷 223-226页
作者: Rodríguez-Domínguez, Carlos Santokhee, Aditya Hornos, Miguel J. Research Group Software Engineering Department Higher Technical School of Computer and Telecommunication Engineering Campus de Aynadamar University of Granada Granada18071 Spain School of Digital Technologies Middlesex University Mauritius Flic en Flac Mauritius
来源: 评论
On infrastructure for facilitation of inner source in small development teams
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8892卷 149-163页
作者: Linåker, Johan Krantz, Maria Höst, Martin Software Engineering Research Group Computer Science Lund University Lund Sweden
The phenomenon of adopting open source software development practices in a corporate environment is known by many names, one being inner source. The objective of this study is to investigate how an organization consis... 详细信息
来源: 评论
An empirical investigation of single-objective and multiobjective evolutionary algorithms for developer's assignment to bugs
An empirical investigation of single-objective and multiobje...
收藏 引用
作者: Karim, Muhammad Rezaul Ruhe, Günther Rahman, Md. Mainur Garousi, Vahid Zimmermann, Thomas Software Engineering Decision Support Laboratory University of Calgary CalgaryAB Canada MNP LLP CalgaryAB Canada Software Engineering Research Group Department of Computer Engineering Hacettepe University Ankara Turkey Microsoft Research One Microsoft Way RedmondWA98052 United States
In this paper, the modeling of developers’ assignment to bugs (DAB) is studied. The problem is modeled both as a single objective (minimize bug fix time) and as a bi-objective (minimize bug fix time and cost) combina... 详细信息
来源: 评论
Experience with maintenance of a functional GUI test suite using IBM Rational Functional Tester
Experience with maintenance of a functional GUI test suite u...
收藏 引用
作者: Shewchuk, Yuri Garousi, Vahid InUnison Technology Calgary AB Canada Dept. of Electrical and Computer Engineering Software Quality Engineering Research Group University of Calgary Calgary AB Canada
Most of the modern software systems are being maintained and evolved through numerous versions. Thus, effective co-maintenance and co-evolution of their test suites along with their source code becomes an important an... 详细信息
来源: 评论
Applying Reinforcement Learning to Packet Scheduling in Routers  15
Applying Reinforcement Learning to Packet Scheduling in Rout...
收藏 引用
15th AAAI Conference on Innovative Applications of Artificial Intelligence IAAI 2003
作者: Ferra, Herman Lau, Ken Leckie, Christopher Tang, Anderson Telstra Research Laboratories 770 Blackburn Road Clayton3186 Australia ARC Special Research Centre for Ultra-Broadband Information Networks Department of Computer Science and Software Engineering The University of Melbourne Parkville3010 Australia
An important problem for the Internet is how to provide a guaranteed quality of service to users, in contrast to the current "best-effort" service. A key aspect of this problem is how routers should share ne... 详细信息
来源: 评论
Adjusted probabilistic packet marking for IP traceback  2nd
收藏 引用
2nd International IFIP-TC6 Networking Conference, NETWORKING 2002
作者: Peng, Tao Leckie, Christopher Ramamohanarao, Kotagiri ARC Special Research Center for Ultra-Broadband Information Networks Department of Electrical and Electronic Engineering The University of Melbourne VIC3010 Australia Department of Computer Science and Software Engineering The University of Melbourne VIC3010 Australia
Distributed denial-of-service attack is one of the greatest threats to the Internet today. One of the biggest difficulties in defending against this attack is that attackers always use incorrect, or "spoofed"... 详细信息
来源: 评论
A Novel Low Power and High Speed 9-Transistors Dynamic Full-Adder Cell Simulation and Design  28
A Novel Low Power and High Speed 9-Transistors Dynamic Full-...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Rahimi, Parisa Tabany, Myasar Pourmoafi, Seyedali School of Physics Engineering Networks Computer Science University of Hertfordshire ALI0 9AB Hatfield Security and Systems Research Group Hertfordshire United Kingdom
In this paper, a novel Full-Adder cell, named pseudo dynamic has been proposed and designed through an intensive simulation. The circuit has only 9 transistors and no internal nodes connected to ground. The circuit ha... 详细信息
来源: 评论
Physical Adversarial Attack Scheme on Object Detectors using 3D Adversarial Object  2
Physical Adversarial Attack Scheme on Object Detectors using...
收藏 引用
2nd International Conference on Digital Futures and Transformative Technologies, ICoDT2 2022
作者: Toheed, Abeer Yousaf, Muhammad Haroon Rabnawaz Javed, Ali Uet Taxila Swarm Robotics Lab-NCRA Pakistan Uet Taxila Department of Computer Engineering Pakistan Cust VisPRS Research Group Pakistan Uet Taxila Department of Software Engineering Pakistan
Adversarial attacks are being frequently used these days to exploit different machine learning models including the deep neural networks (DNN) either during the training or testing stage. DNN under such attacks make t... 详细信息
来源: 评论
Metaheuristic design pattern: Preference  15
Metaheuristic design pattern: Preference
收藏 引用
17th Genetic and Evolutionary Computation Conference, GECCO 2015
作者: Aljawawdeh, Hamzeh J. Simons, Christopher L. Odeh, Mohammed Software Engineering Research Group Department of Computer Science and Creative Technologies University of the West of England BristolBS16 1QY United Kingdom
In interactive metaheuristic search, the human helps to steer the trajectory of the search by providing qualitative evaluation to assist in the selection of solution individuals. It can be challenging to design mechan... 详细信息
来源: 评论