咨询与建议

限定检索结果

文献类型

  • 268 篇 会议
  • 201 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 324 篇 工学
    • 201 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 51 篇 土木工程
    • 41 篇 信息与通信工程
    • 39 篇 建筑学
    • 33 篇 控制科学与工程
    • 30 篇 电气工程
    • 22 篇 机械工程
    • 22 篇 动力工程及工程热...
    • 22 篇 船舶与海洋工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 力学(可授工学、理...
    • 16 篇 电子科学与技术(可...
    • 16 篇 化学工程与技术
    • 14 篇 仪器科学与技术
    • 14 篇 交通运输工程
    • 13 篇 安全科学与工程
    • 12 篇 生物工程
  • 161 篇 理学
    • 82 篇 数学
    • 35 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 海洋科学
    • 18 篇 化学
    • 18 篇 生物学
    • 18 篇 系统科学
  • 83 篇 管理学
    • 63 篇 管理科学与工程(可...
    • 24 篇 工商管理
    • 22 篇 图书情报与档案管...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 法学
  • 12 篇 医学
    • 12 篇 临床医学
  • 7 篇 教育学
  • 6 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学

主题

  • 17 篇 software enginee...
  • 15 篇 computer archite...
  • 14 篇 software
  • 11 篇 software archite...
  • 8 篇 computational mo...
  • 8 篇 analytical model...
  • 7 篇 runtime
  • 7 篇 data models
  • 6 篇 optimization
  • 6 篇 monitoring
  • 6 篇 testing
  • 5 篇 internet of thin...
  • 5 篇 interoperability
  • 5 篇 deep learning
  • 5 篇 quality of servi...
  • 5 篇 data mining
  • 5 篇 visualization
  • 5 篇 artificial intel...
  • 5 篇 data visualizati...
  • 5 篇 accuracy

机构

  • 15 篇 state key labora...
  • 10 篇 state key labora...
  • 10 篇 collaborative in...
  • 9 篇 china ship resea...
  • 9 篇 school of naval ...
  • 9 篇 advantest europe...
  • 8 篇 college of compu...
  • 8 篇 institute of sof...
  • 8 篇 department of el...
  • 8 篇 state key labora...
  • 7 篇 software archite...
  • 6 篇 state key labora...
  • 6 篇 school of softwa...
  • 5 篇 college of infor...
  • 5 篇 institute of com...
  • 5 篇 college of archi...
  • 5 篇 technical univer...
  • 4 篇 department of ma...
  • 4 篇 institute of arc...
  • 4 篇 school of comput...

作者

  • 10 篇 zhang guiyong
  • 8 篇 becker steffen
  • 7 篇 zhang zhifan
  • 7 篇 steffen becker
  • 6 篇 ilia polian
  • 6 篇 wang longkan
  • 6 篇 uwe zdun
  • 6 篇 chaudhry shehzad...
  • 6 篇 stefan wagner
  • 6 篇 idelfonso tafur ...
  • 5 篇 gonzalo pajares
  • 5 篇 matthias sauer
  • 5 篇 denis schwachhof...
  • 5 篇 zhou bo
  • 4 篇 liu jiren
  • 4 篇 onan aytuğ
  • 4 篇 guiyong zhang
  • 4 篇 zhang xia
  • 4 篇 obaidat mohammad...
  • 4 篇 buyang cao

语言

  • 454 篇 英文
  • 9 篇 其他
  • 8 篇 中文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Software Architecture"
471 条 记 录,以下是91-100 订阅
排序:
Discovering expert drivers from trajectories  34
Discovering expert drivers from trajectories
收藏 引用
34th IEEE International Conference on Data engineering, ICDE 2018
作者: Sun, Jiabao Xu, Jiajie Zhou, Rui Zheng, Kai Liu, Chengfei School of Computer Science and Technology Soochow University China State Key Laboratory of Software Architecture Neusoft Corporation China School of Software and Electrical Engineering Swinburne University of Technology Australia University of Electronic Science and Technology of China China
Discovering expert drivers is highly important for a broad range of location based services, but this issue is largely untouched in previous trajectory mining and search studies. In this paper, we study the problem of... 详细信息
来源: 评论
Solutions sharing in multi-agent system
Solutions sharing in multi-agent system
收藏 引用
2012 2nd International Conference on Computer Application and System Modeling, ICCASM 2012
作者: Deng, Hanbing Zhang, Xia Liu, Jiren Zhang, Qian College of Information Science and Engineering Northeastern University Shenyang China State Key Laboratory of Software Architecture Neusoft Incorporated Company Shenyang China
In this paper, we will do some researches on the relationship between action sequence and system efficiency in multi-agent system. Usually, when an agent gets a task, it will calculate all the feasible action sequence... 详细信息
来源: 评论
Inference of activities with unexpected actions using pattern mining
Inference of activities with unexpected actions using patter...
收藏 引用
ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2015 ACM International Symposium on Wearable Computers, UbiComp and ISWC 2015
作者: Nasreen, Shamila Azam, Muhammad Awais Naeem, Usman Ghazanfar, Mustansar Ali Department of Software Engineering University of Engineering and Technology Taxila Pakistan Department of Computer Engineering University of Engineering and Technology Taxila Pakistan School of Architecture Computing and Engineering University of East London United Kingdom
Recognition of activities in an unobtrusive manner has attracted the attention of context aware systems, which provide end users with services based on everyday activities that are recognised without infringing the pr... 详细信息
来源: 评论
Intelligence learning model of multi-agent system
Intelligence learning model of multi-agent system
收藏 引用
2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce, AIMSEC 2011
作者: Deng, Hanbing Zhang, Xia Liu, Jiren College of Information Science and Engineering Northeastern University Shenyang China State Key Laboratory of Software Architecture Neusoft Incorporated Company Shenyang China
In this paper, we do research based on the multi-agent system (MAS) with learning mechanism. Making use of agent perception ability, we enable the agents to collect environment information and store it into the shared... 详细信息
来源: 评论
Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2016年 第2期23卷 56-65,96页
作者: Kang Kai Wang Cong Luo Tao School of Software Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts Telecommunications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts Telecommunications
Vehicular Ad-hoc networks(VANETs) are kinds of mobile Ad-hoc networks(MANETs), which consist of mobile vehicles with on-board units(OBUs) and roadside units(RSUs). With the rapid development of computation and... 详细信息
来源: 评论
H2-MARL: Multi-Agent Reinforcement Learning for Pareto Optimality in Hospital Capacity Strain and Human Mobility during Epidemic
arXiv
收藏 引用
arXiv 2025年
作者: Luo, Xueting Deng, Hao Yang, Jihong Shen, Yao Guo, Huanhuan Sun, Zhiyuan Liu, Mingqing Wei, Jiming Zhao, Shengjie School of Computer Science and Technology Tongji University Shanghai201804 China China Land Surveying and Planning Institute Beijing100035 China College of Architecture and Urban Planning Tongji University Shanghai200092 China Chongqing Institute of Planning and Natural Resources Investigation and Monitoring Chongqing401121 China Li-Fi Research and Development Centre University of Cambridge CambridgeCB3 0FA United Kingdom Guangdong Urban-rural Planning and Design Research Institute Technology Group Co. Ltd. Guangzhou510290 China Engineering Research Center of Key Software Technologies for Smart City Perception and Planning Ministry of Education Shanghai201804 China
The necessity of achieving an effective balance between minimizing the losses associated with restricting human mobility and ensuring hospital capacity has gained significant attention in the aftermath of COVID-19. Re... 详细信息
来源: 评论
Examining OSGi from an ideal enterprise software component model
Examining OSGi from an ideal enterprise software component m...
收藏 引用
2010 IEEE International Conference on software engineering and Service Sciences, ICSESS 2010
作者: Zhou, Jingang Zhao, Dazhe Ji, Yong Liu, Jiren National Engineering Research Center for Computer Software Northeastern University 110004 Shenyang China State Key Laboratory of Advanced Software Architecture Neusoft Corporation 110179 Shenyang China School of Management Dalian University of Technology 116023 Dalian China
Component-based software development is becoming a discipline in software engineering community, but it still immature in enterprise application development. OSGi gives some insights for component-based development (C... 详细信息
来源: 评论
Integrated ship maneuverability simulation tool for very large crude oil carrier
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第13期6卷 542-548页
作者: Jaswar Maimun, Adi Selamat, Ali Priyanto, A. Zamani Pauzi Djuansjah, J.R.P. Naval Architecture and Offshore Engineering Department Faculty of Mechanical Engineering Universiti Teknologi Malaysia Johor Bahru Malaysia Software Engineering Department Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Johor Bahru Malaysia Material Engineering Department Faculty of Mechanical Engineering Universiti Teknologi Malaysia Johor Bahru Malaysia
A good systematic input and output management system is more essential for ship maneuvering simulation to eliminate unnecessary error due to many considered factors such as hull shapes, shallow water, narrow channel, ... 详细信息
来源: 评论
Model Reader Preferences for Semantically Duplicate Elements in BPMN  15
Model Reader Preferences for Semantically Duplicate Elements...
收藏 引用
15th Central European Workshop Services and their Composition, ZEUS 2023
作者: Lübke, Daniel Stiehl, Volker Digital Solution Architecture GmbH Hannover Germany Leibniz Universität Hannover FG Software Engineering Hannover Germany TH Ingolstadt Ingolstadt Germany
BPMN, which is the underlying modeling notation of many BPM endeavours and business information system development projects, is a rich modeling language, which also offers redundant constructs, i.e., different syntax ... 详细信息
来源: 评论
Security controls applied to Web service architectures
Security controls applied to Web service architectures
收藏 引用
19th International Conference on software engineering and Data engineering 2010, SEDE 2010
作者: Baird, R. Gamble, R. Software Engineering and Architecture Team Department of Computer Science University of Tulsa 800 S. Tucker Drive Tulsa OK 74104 United States
Security certification assesses the security posture of a software system to verify its compliance with diverse, pre-specified security controls identified by guidelines from NIST and the US Department of Defense. Ser... 详细信息
来源: 评论