咨询与建议

限定检索结果

文献类型

  • 2,236 篇 会议
  • 1,261 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,185 篇 工学
    • 1,742 篇 计算机科学与技术...
    • 1,416 篇 软件工程
    • 466 篇 信息与通信工程
    • 313 篇 控制科学与工程
    • 234 篇 生物工程
    • 183 篇 电气工程
    • 153 篇 机械工程
    • 150 篇 生物医学工程(可授...
    • 134 篇 电子科学与技术(可...
    • 95 篇 安全科学与工程
    • 85 篇 光学工程
    • 85 篇 仪器科学与技术
    • 78 篇 化学工程与技术
    • 76 篇 网络空间安全
    • 73 篇 建筑学
    • 65 篇 土木工程
  • 937 篇 理学
    • 460 篇 数学
    • 264 篇 生物学
    • 190 篇 物理学
    • 143 篇 统计学(可授理学、...
    • 121 篇 系统科学
    • 88 篇 化学
  • 705 篇 管理学
    • 463 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 261 篇 工商管理
  • 160 篇 医学
    • 144 篇 临床医学
    • 128 篇 基础医学(可授医学...
    • 67 篇 公共卫生与预防医...
  • 137 篇 法学
    • 108 篇 社会学
  • 95 篇 经济学
    • 94 篇 应用经济学
  • 64 篇 教育学
  • 44 篇 农学
  • 9 篇 军事学
  • 8 篇 文学
  • 7 篇 艺术学

主题

  • 156 篇 software enginee...
  • 114 篇 information syst...
  • 88 篇 machine learning
  • 86 篇 software
  • 74 篇 deep learning
  • 66 篇 software systems
  • 66 篇 accuracy
  • 61 篇 systems engineer...
  • 61 篇 training
  • 59 篇 semantics
  • 59 篇 artificial intel...
  • 58 篇 security
  • 57 篇 data mining
  • 57 篇 computational mo...
  • 55 篇 computer science
  • 54 篇 computer archite...
  • 53 篇 feature extracti...
  • 46 篇 internet of thin...
  • 44 篇 application soft...
  • 44 篇 cloud computing

机构

  • 57 篇 department of so...
  • 27 篇 department of so...
  • 25 篇 china industrial...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 21 篇 school of softwa...
  • 18 篇 school of inform...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 15 篇 institute of inf...
  • 14 篇 school of comput...
  • 14 篇 college of compu...
  • 13 篇 school of electr...
  • 12 篇 school of inform...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 11 篇 department of so...

作者

  • 66 篇 shabtai asaf
  • 60 篇 elovici yuval
  • 28 篇 puzis rami
  • 26 篇 ismail leila
  • 19 篇 rokach lior
  • 17 篇 ruisheng zhang
  • 17 篇 jakimi abdeslam
  • 17 篇 abdeslam jakimi
  • 16 篇 fire michael
  • 15 篇 buyya rajkumar
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 13 篇 shahar yuval
  • 12 篇 h. gomaa
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai
  • 12 篇 lin lin

语言

  • 3,418 篇 英文
  • 109 篇 其他
  • 19 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering and Information Systems Engineering Team"
3553 条 记 录,以下是3421-3430 订阅
排序:
Temporal modules: an approach toward federated temporal databases  93
Temporal modules: an approach toward federated temporal data...
收藏 引用
Proceedings of the 1993 ACM SIGMOD international conference on Management of data
作者: X. Sean Wang Sushil Jajodia V. S. Subrahmanian Department of Information and Software Systems Engineering George Mason University Fairfax VA Department of Computer Science University of Maryland College Park MD
In a federated database environment, different constituents of the federation may use different temporal models or physical representations for temporal information. This paper introduces a new concept, called a tempo...
来源: 评论
A rigorous review technique: Using formal notations within conventional development methods
A rigorous review technique: Using formal notations within c...
收藏 引用
1993 software engineering Standards Symposium, SESS 1993
作者: Aujla, S. Bryant, T. Semmens, L. BT Labs. Syst. and Software Eng. Martlesham Heath IpswichIP5 7RE United Kingdom Leeds Metropolitan University Faculty of Information and Engineering Systems Beckett Park LeedsLS6 3QS United Kingdom
The introduction and use of formal (mathematically based) specification in substantial systems development has been hampered by the additional burdens it places on practitioners. BT and Leeds Metropolitan University, ... 详细信息
来源: 评论
Achieving stricter correctness requirements in multilevel secure databases
Achieving stricter correctness requirements in multilevel se...
收藏 引用
IEEE Computer Society Symposium on Research in Security and Privacy
作者: V. Atluri E. Bertino S. Jajodia Center for Secure Information Systems Department of Information and Software Systems Engineering George Mason University Fairfax VA USA Dipartmento Di Informatica E Scienze Dell'Informazione Universitä Di Genova Genoa Italy
The concurrency control protocol that has been implemented in the commercially available Trusted Oracle multilevel secure database management system (DBMS) generates histories that are level-wise serializable. Level-w... 详细信息
来源: 评论
Limitations of relational data base access controls
收藏 引用
information systems Security 1993年 第1期2卷 57-72页
作者: Sandhu, Ravi S. Jajodia, Sushil The information and software systems engineering department George Mason University Fairfax VA United States The Center for Secure Information Systems George Mason University Fairfax VA United States
This article discusses data security and controls, primarily in the context of data base management systems (DBMSs), with an emphasis on basic principles and mechanisms that have been successfully used by practitioner...
来源: 评论
Temporal modules
收藏 引用
SIGMOD Record 1993年 第2期22卷 227-236页
作者: Sean Wang, X. Jajodia, Sushil Subrahmanian, V.S. Department of Information and Software Systems Engineering George Mason University FairfaxVA22030 United States Department of Computer Science University of Mardland College ParkMD29742 United States
In a federated database environment, different constituents of the federation may use different temporal models or physical representations for temporal information. This paper introduces a new concept, called a tempo... 详细信息
来源: 评论
Solid‐liquid interface of an inductively heated metal sphere
收藏 引用
European Transactions on Electrical Power 1993年 第6期3卷 407-414页
作者: Bex, H. Greuel, K. Prof. Dr.-Ing. Hans Bex (1937) VDE VDI IEEE is head of the department of High-Frequency Techniques at the Fachhochschule of Aachen Germany. He received his degrees at the Technical University of Aachen Germany in 1965 and 1969. From 1965 to 1980 he was with the Philips Research Laboratories in Aachen as a research scientist where he was engaged in research on lumped element circulators YIG-filters linear and non-linear microstrip circuits for microwave subsystems. Since 1981 he has been a professor for high-frequency techniques at the Fachhoch-schule Aachen Germany teaching electromagnetics and microwaves. His areas of interest include microwave and millimeter wave integrated circuits and devices non-linear analysis techniques device modelling planar transmission line modelling and electromagnetic field theory applied to isotropic and anisotropic materials. (FH Aachen Abteilung fur Theoretische Nachrichtentechnik und Hochstfrequenztechnik. Eupener Str. 70 D-52066 Aachen T + 492 41/60 09 21 08 Fax + 49 241/60 09 21 91) Dipl.-Ing. Karl Greuel (1960) VDE studied Electrical Engineering at the FH Aachen Germany and got his degree there in 1988. After his study he designed software for industry-furnaces with stored-program controllers at the Otto Junker GmbH. Since 1990 he works at the Datus GmbH for electrical information-systems in software development. (Datus GmbH Abteilung Software-Entwicklung Tempelhofer Str. 4-6 D-52068 Aachen T +49241/1 6802-0 Fax + 492 41/168 02-80)
In this paper inductive melting in a metal sphere is investigated, whereby the temperature dependence of the sample 's most important material parameters is considered. The solid‐liquid interface in the sphere is...
来源: 评论
UNDECIDABILITY OF SAFETY FOR THE SCHEMATIC PROTECTION MODEL WITH CYCLIC CREATES
收藏 引用
JOURNAL OF COMPUTER AND SYSTEM SCIENCES 1992年 第1期44卷 141-159页
作者: SANDHU, RS Department of Information and Software Systems Engineering George Mason University Fairfax Virginia 22030-4444 USA
In the schematic protection model subjects are classified into protection types. Creation is authorized by a can-create binary relation on types. It is shown that with arbitrary cycles in can-create safety is undecida... 详细信息
来源: 评论
Knowledge-based approach to domain modeling: Application to nasa's payload operations control centers
收藏 引用
Telematics and Informatics 1992年 第3-4期9卷 281-296页
作者: Gomaa, Hassan Kerschberg, Larry Sugumaran, Vijayan Center for Software Systems Engineering Department of Information and Software Systems Engineering George Mason University Fairfax Virginia 22030-4444 United States
Several institutions in industry and academia are pursuing research efforts in domain modeling to address unresolved issues in software reuse. To demonstrate the concepts of domain modeling and software reuse, a proto...
来源: 评论
The extended schematic protection model
收藏 引用
Journal of Computer Security 1992年 第3-4期1卷 335-383页
作者: Ammann, Paul E. Sandhu, Ravi S. Center for Secure Information Systems Department of Information and Software Systems Engineering George Mason University Fairfax VA 22030 United States
Access control models provide a formalism and framework for specifying control over access to information and other resources in multi-user computer systems. Useful access control models must balance expressive power ...
来源: 评论
Eliminating polyinstantiation securely
收藏 引用
Computers and Security 1992年 第6期11卷 547-562页
作者: Sandhu, Ravi S. Jajodia, Sushil Center for Secure Information Systems Department of Information and Software Systems Engineering George Mason University Fairfax VA 22030 United States
Polyinstantiation has generated a great deal of controversy lately. Some have argued that polyinstantiation and integrity are fundamentally incompatible, and have proposed alternatives to polyinstantiation. Others hav... 详细信息
来源: 评论