咨询与建议

限定检索结果

文献类型

  • 2,052 篇 会议
  • 871 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,979 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,741 篇 工学
    • 1,347 篇 计算机科学与技术...
    • 1,113 篇 软件工程
    • 333 篇 信息与通信工程
    • 301 篇 控制科学与工程
    • 165 篇 生物工程
    • 147 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 116 篇 机械工程
    • 83 篇 光学工程
    • 83 篇 安全科学与工程
    • 73 篇 动力工程及工程热...
    • 66 篇 建筑学
    • 66 篇 土木工程
    • 65 篇 仪器科学与技术
    • 65 篇 化学工程与技术
    • 56 篇 网络空间安全
  • 779 篇 理学
    • 414 篇 数学
    • 190 篇 生物学
    • 147 篇 系统科学
    • 145 篇 物理学
    • 124 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 128 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 81 篇 法学
    • 62 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 54 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 78 篇 computational mo...
  • 75 篇 application soft...
  • 72 篇 deep learning
  • 71 篇 accuracy
  • 70 篇 laboratories
  • 68 篇 software systems
  • 67 篇 machine learning
  • 67 篇 software
  • 63 篇 artificial intel...
  • 61 篇 computer archite...
  • 58 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 47 篇 security
  • 46 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of softwa...
  • 10 篇 department of so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,843 篇 英文
  • 119 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Systems Department"
2979 条 记 录,以下是2461-2470 订阅
排序:
A modal logic for beliefs and pro attitudes
A modal logic for beliefs and pro attitudes
收藏 引用
AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
作者: Su, Kaile Sattar, Abdul Lin, Han Reynolds, Mark Institute for Integrated and Intelligent Systems Griffith University Brisbane Australia Key Laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China Department of Computer Science Sun Yat-Sen University Guangzhou China School of Computer Science and Software Engineering University of Western Australia Perth Australia
Agents' pro attitudes such as goals, intentions, desires, wishes, and judgements of satisfactoriness play an important role in how agents act rationally. To provide a natural and satisfying formalization of these ... 详细信息
来源: 评论
Multi-Objective Genetic Algorithm to Support Class Responsibility Assignment
Multi-Objective Genetic Algorithm to Support Class Responsib...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Michael Bowman Lionel C. Briand Yvan Labiche Software Quality Engineering Laboratory Department of Systems and Computer Engineering Carleton University Ottawa ONT Canada
Class responsibility assignment is not an easy skill to acquire. Though there are many methodologies for assigning responsibilities to classes, they all rely on human judgment and decision making. Our objective is to ... 详细信息
来源: 评论
Mobile game development: Object-orientation or not
Mobile game development: Object-orientation or not
收藏 引用
31st Annual International computer software and Applications Conference, COMPSAC 2007
作者: Zhang, Weishan Han, Dong Kunz, Thomas Hansen, Klaus Marius School of Software Engineering Tongji University No. 1239 Siping Road Shanghai 200092 China Department of Computer Science Anhui Vocational College of Electronics and IT Anhui 233030 China Department of Systems and Computer Engineering Carleton University Ottawa K1S 5B6 Canada Computer Science Department University of Aarhus Aabogade 34 8200 Aarhus N Denmark
Mobile games are one of the primary entertainment applications at present. Limited by scarce resources, such as memory, CPU, input and output, etc, mobile game development is more difficult than desktop application de... 详细信息
来源: 评论
Testing Intrusion Detection systems in MANET: A Comprehensive Study
Testing Intrusion Detection Systems in MANET: A Comprehensiv...
收藏 引用
Annual Conference on Communication Networks and Services Research (CNSR)
作者: Hadi Otrok Joey Paquet Mourad Debbabi Prabir Bhattacharya Concordia Institute for Information Systems Engineering Department Computer Security Laboratory Computer Science and Software Engineering Department Concordia University Montreal QUE Canada
In this paper, we study the problem of testing intrusion detection systems (IDS) in mobile ad hoc networks (MANET). Testing is achieved by simulating different measurements. We modify the testing measurements of infra... 详细信息
来源: 评论
Can graduating students design software systems
Can graduating students design software systems
收藏 引用
37th SIGCSE Technical Symposium on computer Science Education
作者: Eckerdal, Anna McCartney, Robert Moström, Jan Erik Ratcliffe, Mark Zander, Carol Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT 06269 United States Department of Computing Science Umeå University 901 87 Umeå Sweden Department of Computer Science University of Wales Aberystwyth United Kingdom Computing and Software Systems University of Washington Bothell Bothell WA United States
This paper examines software designs produced by students nearing completion of their computer Science degrees. The results of this multi-national, multi institutional experiment present some interesting implications ... 详细信息
来源: 评论
JPEG encoder for low-cost FPGAs
JPEG encoder for low-cost FPGAs
收藏 引用
International Conference on computer engineering and systems
作者: Hossam Osman Waseim Mahjoup Azza Nabih Gamal M. Aly Department of Computer and Systems Engineering Ain Shams University Cairo Egypt Software Engineering Competence Center ITIDA Giza Egypt
This paper presents the implementation of a JPEG encoder that exploits minimal usage of FPGA resources. The encoder compresses an image as a stream of 8times8 blocks with each element of the block applied and processe... 详细信息
来源: 评论
Towards Re-engineering Legacy systems for Assured Dynamic Adaptation
Towards Re-engineering Legacy Systems for Assured Dynamic Ad...
收藏 引用
International Workshop on Modeling in software engineering (MISE)
作者: Ji Zhang Betty H.C. Cheng Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Increasingly, software must adapt its behavior in response to changes in the supporting computing, communication infrastructure, and in the surrounding physical environment. Since most existing software was not design... 详细信息
来源: 评论
On discrete event diagnosis methods for continuous systems
On discrete event diagnosis methods for continuous systems
收藏 引用
Mediterranean Conference on Control and Automation (MED)
作者: Matthew Daigle Xenofon Koutsoukos Gautam Biswas Institute for Software Integrated Systems Department of Electrical Engineering and Computer Science Vanderbilt University Nashville TN USA
Fault detection and isolation is a key component of any safety-critical system. Although diagnosis methods based on discrete event systems have been recognized as a promising framework, they cannot be easily applied t... 详细信息
来源: 评论
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Authentication in Reprogramming of Sensor Networks for Mote ...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to... 详细信息
来源: 评论
Integrated Risk Analysis for a Commercial Computing Service
Integrated Risk Analysis for a Commercial Computing Service
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Chee Shin Yeo Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne VIC Australia
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs whenever the need arises and simply pay... 详细信息
来源: 评论