咨询与建议

限定检索结果

文献类型

  • 243 篇 会议
  • 127 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 229 篇 工学
    • 181 篇 计算机科学与技术...
    • 149 篇 软件工程
    • 31 篇 信息与通信工程
    • 29 篇 控制科学与工程
    • 25 篇 生物工程
    • 23 篇 生物医学工程(可授...
    • 19 篇 机械工程
    • 17 篇 电气工程
    • 15 篇 光学工程
    • 14 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 电子科学与技术(可...
    • 8 篇 土木工程
    • 8 篇 交通运输工程
    • 7 篇 建筑学
  • 93 篇 理学
    • 40 篇 数学
    • 28 篇 物理学
    • 25 篇 生物学
    • 15 篇 统计学(可授理学、...
    • 14 篇 系统科学
    • 8 篇 化学
  • 85 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 39 篇 工商管理
    • 36 篇 图书情报与档案管...
  • 23 篇 医学
    • 22 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 10 篇 公共卫生与预防医...
    • 9 篇 药学(可授医学、理...
  • 7 篇 法学
    • 7 篇 社会学
  • 7 篇 教育学
    • 7 篇 教育学
  • 6 篇 经济学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 24 篇 software enginee...
  • 14 篇 informatics
  • 14 篇 artificial intel...
  • 10 篇 software
  • 9 篇 software systems
  • 9 篇 computer archite...
  • 9 篇 data mining
  • 9 篇 machine learning
  • 8 篇 computer science
  • 8 篇 training
  • 8 篇 information stor...
  • 7 篇 systems engineer...
  • 7 篇 control systems
  • 7 篇 unified modeling...
  • 6 篇 reliability
  • 6 篇 information syst...
  • 6 篇 object oriented ...
  • 6 篇 deep learning
  • 6 篇 software archite...
  • 6 篇 computer communi...

机构

  • 7 篇 software enginee...
  • 6 篇 department of co...
  • 6 篇 computer and inf...
  • 5 篇 department of so...
  • 5 篇 beijing key labo...
  • 5 篇 department of so...
  • 5 篇 key laboratory o...
  • 5 篇 department of co...
  • 5 篇 intelligent syst...
  • 4 篇 institute of com...
  • 4 篇 electrical and c...
  • 4 篇 school of electr...
  • 4 篇 media informatic...
  • 4 篇 vienna universit...
  • 4 篇 institute of sof...
  • 4 篇 university of zu...
  • 4 篇 department of in...
  • 4 篇 school of engine...
  • 4 篇 processes and sy...
  • 3 篇 department of so...

作者

  • 7 篇 praschl christop...
  • 7 篇 yingmin jia
  • 6 篇 syed khuram shah...
  • 6 篇 muhammad waseem ...
  • 6 篇 andreas rausch
  • 6 篇 rausch andreas
  • 6 篇 capel manuel i.
  • 5 篇 a l zolkin
  • 5 篇 junping du
  • 5 篇 a. l. zolkin
  • 5 篇 t. g. aygumov
  • 5 篇 shahar yuval
  • 5 篇 t g aygumov
  • 5 篇 fashan yu
  • 4 篇 zwettler gerald ...
  • 4 篇 akbar muhammad a...
  • 4 篇 zolkin a.l.
  • 4 篇 rafi saima
  • 4 篇 binder alexander
  • 4 篇 gonzalo cuevas

语言

  • 375 篇 英文
  • 8 篇 其他
  • 3 篇 中文
检索条件"机构=Software Engineering and Informatics Systems Department"
385 条 记 录,以下是301-310 订阅
排序:
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Two types of key-compromise impersonation attacks against on...
收藏 引用
作者: Chalkias, K. Baldimtsi, F. Hristu-Varsakelis, D. Stephanides, G. Computational Systems and Software Engineering Laboratory Department of Applied Informatics University of Macedonia 156 Egnatia St. Thessaloniki Greece
Key establishment protocols are among the most important security mechanisms via which two or more parties can encrypt their communications over an insecure network. This paper is concerned with the vulnerability of o... 详细信息
来源: 评论
An automatic elaborate requirement specification by using hierarchical text classification
An automatic elaborate requirement specification by using hi...
收藏 引用
International Conference on Computer Science and software engineering, CSSE 2008
作者: Polpinij, Jantima Ghose, Aditya Department of Computer Science Faculty of Informatics Mahasarakham University Kantarawichai Mahasarakham 44150 Thailand Decision Systems Lab. School of Computer Science and Software Engineering Faculty of Informatics Wollongong 2500 Australia
Ambiguity is a major problem of software errors because much of the requirements specification is written in a natural language format. Therefore, it is hard to identify consistencies because this format is too ambigu... 详细信息
来源: 评论
Using the TSPi defined process and improving the project management process
Using the TSPi defined process and improving the project man...
收藏 引用
6th ACIS International Conference on software engineering Research, Management and Applications, SERA 2008
作者: Sussy, Bayona Oré Antonio, Calvo-Manzano Jose Gonzalo, Cuevas Tomás, San Feliu Languages Informatics Systems and Software Engineering Department School of Computer Science Polytechnic University of Madrid Campus Montegancedo 28660 Boadilla del Monte Madrid Spain
Team software Process is an integrated framework that guides development teams in producing highquality software-intensive systems. This paper analyzes the effects of TSPi training and the improvements achieved by 44 ... 详细信息
来源: 评论
Data mining-driven analysis and decomposition In agent supply chain management networks
Data mining-driven analysis and decomposition In agent suppl...
收藏 引用
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Workshops, WI-IAT Workshops 2008
作者: Chatzidimitriou, Kyriakos C. Symeonidis, Andreas L. Mitkas, Pericles A. Department of Electrical and Computer Engineering Aristotle University of Thessaloniki GR541 24 Thessaloniki Greece Intelligent Systems and Software Engineering Laboratory Informatics and Telematics Institute CERTH 57001 Thessaloniki Greece
In complex and dynamic environments where interdependencies cannot monotonously determine causality, data mining techniques may be employed in order to analyze the problem, extract key features and identify pivotal fa... 详细信息
来源: 评论
An empirical study on views of importance of change impact analysis issues
An empirical study on views of importance of change impact a...
收藏 引用
作者: Rovegård, Per Angelis, Lefteris Wohlin, Claes Ericsson AB Ölandsg. 1 SE-37123 Karlskrona Sweden Department of Informatics Aristotle University of Thessaloniki 54124 Thessaloniki Greece Department of Systems and Software Engineering School of Engineering Blekinge Institute of Technology Box 520 SE-37225 Ronneby Sweden
Change impact analysis is a change management activity that previously has been studied much from a technical perspective. For example, much work focuses on methods for determining the impact of a change. In this pape... 详细信息
来源: 评论
First international workshop on the model-based design of trustworthy health information systems
First international workshop on the model-based design of tr...
收藏 引用
Models in software engineering, MoDELS 2007
作者: Lédeczi, Ákos Breu, Ruth Malin, Bradley Sztipanovits, Janos Institute for Software Integrated Systems Vanderbilt University Nashville TN United States Research Group Quality Engineering University of Innsbruck Innsbruck Austria Department of Biomedical Informatics Vanderbilt University Nashville TN United States
The objective of the MOTHIS workshop was to discuss model-based methods for the design of Health Information systems (HIS) offering a revolutionary new way for the interaction between medical patients and Health Care ... 详细信息
来源: 评论
An Implementation Infrastructure for Server-Passive Timed-Release Cryptography
An Implementation Infrastructure for Server-Passive Timed-Re...
收藏 引用
International Symposium on Information Assurance and Security (IAS)
作者: Konstantinos Chalkias Foteini Baldimtsi Dimitrios Hristu-Varsakelis George Stephanides Computational Systems and Software Engineering Laboratory Department of Applied Informatics University of Macedonia Thessaloniki Greece
As online transactions become increasingly practical, a broad range of industrial and e-government applications have emerged which depend on time-based protection of confidential data. Despite theoretical progress in ... 详细信息
来源: 评论
Service-Oriented Commonality Analysis Across Existing systems
Service-Oriented Commonality Analysis Across Existing System...
收藏 引用
International software Product Line Conference (SPLC)
作者: Alexander Harhurin Judith Hartmann Department of Informatics Chair of Software and Systems Engineering Technische Universität München Garching Germany
This paper introduces an extractive approach to building-up a product line based on existing systems. Thereby, we focus on the analysis of common functionalities across different systems. Our commonality analysis is p... 详细信息
来源: 评论
Improved robust 𝒟𝒰-stability measures via S-procedure
Improved robust 𝒟𝒰-stability measures via S-procedure
收藏 引用
American Control Conference (ACC)
作者: Bilal Sari Olivier Bachelier Driss Mehdi Toufic Al Chaer Languages Informatics Systems and Software Engineering Department Faculty of Computer Science University of Poitiers Poitiers France
In this paper we focus on the notion of robust matrix root-clustering analysis in a union of regions that are possibly disjoint and non symmetric. Indeed this work aims at computing a bound on the size of the uncertai... 详细信息
来源: 评论
Random black hole particle swarm optimization and its application
Random black hole particle swarm optimization and its applic...
收藏 引用
International Conference on Neural Networks and Signal Processing
作者: Junqi Zhang Kun Liu Ying Tan Xingui He Languages Informatics Systems and Software Engineering Department Faculty of Computer Science Peking University Beijing China
This paper introduces a novel particle swarm optimization algorithm based on the concept of black holes in physics, called random black hole particle swarm optimization (RBH-PSO) for the first time. In each dimension ... 详细信息
来源: 评论