咨询与建议

限定检索结果

文献类型

  • 725 篇 会议
  • 368 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 1,108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 648 篇 工学
    • 463 篇 计算机科学与技术...
    • 388 篇 软件工程
    • 123 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 56 篇 电气工程
    • 44 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 40 篇 生物工程
    • 29 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 26 篇 光学工程
    • 22 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 土木工程
    • 17 篇 化学工程与技术
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 285 篇 理学
    • 160 篇 数学
    • 57 篇 系统科学
    • 51 篇 统计学(可授理学、...
    • 50 篇 生物学
    • 49 篇 物理学
    • 21 篇 化学
  • 185 篇 管理学
    • 115 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 35 篇 医学
    • 31 篇 临床医学
    • 27 篇 基础医学(可授医学...
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 18 篇 教育学
    • 18 篇 教育学
  • 17 篇 法学
  • 8 篇 农学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 84 篇 laboratories
  • 71 篇 computer science
  • 64 篇 software enginee...
  • 45 篇 application soft...
  • 42 篇 grid computing
  • 33 篇 software systems
  • 33 篇 quality of servi...
  • 33 篇 computational mo...
  • 32 篇 resource managem...
  • 29 篇 systems engineer...
  • 29 篇 software quality
  • 27 篇 costs
  • 26 篇 distributed comp...
  • 26 篇 cloud computing
  • 25 篇 unified modeling...
  • 24 篇 software testing
  • 21 篇 computer archite...
  • 20 篇 data mining
  • 20 篇 processor schedu...
  • 20 篇 semantics

机构

  • 31 篇 beijing key labo...
  • 28 篇 state key labora...
  • 26 篇 grid computing a...
  • 21 篇 software enginee...
  • 21 篇 school of electr...
  • 21 篇 seventh research...
  • 20 篇 state key labora...
  • 19 篇 college of compu...
  • 16 篇 key laboratory o...
  • 16 篇 software enginee...
  • 15 篇 college of compu...
  • 15 篇 zhongguancun lab...
  • 14 篇 jiangsu institut...
  • 13 篇 school of comput...
  • 11 篇 state key labora...
  • 11 篇 state key labora...
  • 9 篇 state key labora...
  • 9 篇 cloud computing ...
  • 9 篇 zhengzhou univer...
  • 9 篇 decision systems...

作者

  • 47 篇 rajkumar buyya
  • 34 篇 junping du
  • 33 篇 yingmin jia
  • 23 篇 fashan yu
  • 20 篇 buyya rajkumar
  • 18 篇 ismail leila
  • 13 篇 m. parashar
  • 13 篇 materwala huned
  • 13 篇 labiche yvan
  • 12 篇 l.c. briand
  • 12 篇 veera boonjing
  • 11 篇 y. labiche
  • 10 篇 cheng betty h. c...
  • 10 篇 p.k. mckinley
  • 10 篇 parashar manish
  • 10 篇 jianwei niu
  • 9 篇 baowen xu
  • 9 篇 sarun intakosum
  • 9 篇 xinjun mao
  • 9 篇 selamat ali

语言

  • 1,016 篇 英文
  • 78 篇 其他
  • 13 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Software Quality Engineering Laboratory Systems and Computer Engineering"
1108 条 记 录,以下是451-460 订阅
排序:
Review on requirements modeling and analysis for self-adaptive systems: A ten-year perspective
arXiv
收藏 引用
arXiv 2017年
作者: Yang, Zhuoqun Lib, Zhi Jin, Zhi Zhang, He Institute of Mathematics Academy of Mathematics and Systems Science Chinese Academy of Sciences Haidian Dstr. Beijing100190 China Software Engineering Dept. College of Computer Science and Information Technology Guangxi Normal University Guilin Guangxi541004 China Peking University Haidian Dstr. Beijing100871 China State Key Laboratory of Novel Software Technology Software Institute Nanjing University Hankou Road Nanjing Jiangsu210093 China
Context: Over the last decade, software researchers and engineers have developed a vast body of methodologies and technologies in requirements engineering for self-adaptive systems. Although existing studies have expl... 详细信息
来源: 评论
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable Computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论
Combined Cloud: A Mixture of Voluntary Cloud and Reserved Instance Marketplace
收藏 引用
Journal of computer Science & Technology 2016年 第6期31卷 1110-1123页
作者: Wei Shen Wan-Chun Dou Fan Wu Shaojie Tang Qiang Ni State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210046 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Information Systems University of Texas at Dallas Texas TX 75080 U.S.A. School of Computing and Communications Lancaster University Lancaster LA1 4WA U.K.
Voluntary cloud is a new paradigm of cloud computing. It provides an alternative selection along with some well-provisioned clouds. However, for the uncertain time span that participants share their computing resource... 详细信息
来源: 评论
7.3: Compare Variation of User's EEG Owing to Parallax Cue
收藏 引用
SID Symposium Digest of Technical Papers 2018年 第S1期49卷
作者: Haichen Hu Danli Wang Kang Yue Xinpan Yang Steve C. Chiu Beijing Key Lab of Human-Computer Interaction Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China The State Key Laboratory of Management and Control of Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China College of Science and Engineering Idaho State University Pocatello America
3D display has become increasingly popular in many fields. It can provide incredible immersion compared with 2D display. There are many researches referring to the change of user about no matter subjective experience ... 详细信息
来源: 评论
Data collection in open ended learning environment for learning analytics
Data collection in open ended learning environment for learn...
收藏 引用
24th International Conference on computers in Education - Workshop, ICCE 2016
作者: Tscholl, Michael Rajendran, Ramkumar Biswas, Gautam Goldberg, Benjamin S. Sottilare, Robert A. Department of Electrical Engineering and Computer Science Institute for Software Integrated Systems Vanderbilt University 1025 16th Avenue South NashvilleTN37212 United States U.S. Army Research Laboratory - Human Research and Engineering Simulation and Training Technology Center OrlandoFL32826 United States
As the development and use of Open-Ended Learning Environments (OELEs) continues to increase, supporting students' learning in these environments with Intelligent Tutoring is rapidly becoming an important area of ... 详细信息
来源: 评论
Towards computational fluorescence microscopy: Machine learning-based integrated prediction of morphological and molecular tumor profiles
arXiv
收藏 引用
arXiv 2018年
作者: Binder, Alexander Bockmayr, Michael Hägele, Miriam Wienert, Stephan Heim, Daniel Hellweg, Katharina Stenzinger, Albrecht Parlow, Laura Budczies, Jan Goeppert, Benjamin Treue, Denise Kotani, Manato Ishii, Masaru Dietel, Manfred Hocke, Andreas Denkert, Carsten Müller, Klaus-Robert Klauschen, Frederick Machine-Learning Group Department of Software Engineering and Theoretical Computer Science Technical University of Berlin Marchstr. 23 Berlin10587 Germany Systems Pathology Lab Institute of Pathology Charité University Hospital Charitéplatz 1 Berlin10117 Germany Department of Internal Medicine Infectious Diseases and Pulmology Charitéplatz 1 Berlin10117 Germany Institute of Pathology University of Heidelberg Im Neuenheimer Feld 224 Heidelberg Germany Laboratory of Cellular Dynamics Immunology Frontier Research Center Osaka University 2-2 Yamada-oka Suita Osaka565-0871 Japan ISTD Pillar Singapore University of Technology and Design 8 Somapah Road Singapore487372 Singapore Charité Berlin Charitéplatz 1 Berlin10117 Germany Department of Brain and Cognitive Engineering Korea University 145 Anam-ro Seongbukgu Seoul136-713 Korea Republic of Max-Planck-Institute for Informatics Saarbrücken Germany Department of Pediatric Hematology and Oncology University Medical Center Hamburg-Eppendorf Hamburg Germany
Recent advances in cancer research largely rely on new developments in microscopic or molecular profiling techniques offering high level of detail with respect to either spatial or molecular features, but usually not ... 详细信息
来源: 评论
Learning with only multiple instance positive bags
Learning with only multiple instance positive bags
收藏 引用
2016 International Joint Conference on Neural Networks, IJCNN 2016
作者: Wang, Zhigang Zhao, Zengshun Zhang, Changshui Computer and Communication Engineering School Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education China College of Electronics Communication and Physics Shandong University of Science and Technology China Automation Department Tsinghua University State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology China
In traditional multiple instance learning (MIL), both positive and negative bags are required to learn a prediction function. However, a high human cost is needed to know the label of each bag - positive or negative. ...
来源: 评论
Event identification in social networks
收藏 引用
Encyclopedia with Semantic Computing and Robotic Intelligence 2017年 第1期1卷
作者: Fattane Zarrinkalam Ebrahim Bagheri Laboratory for Systems Software and Semantics (LS3) Ryerson University Toronto Canada Department of Computer Engineering Ferdowsi University of Mashhad Mashhad Iran
Social networks enable users to freely communicate with each other and share their recent news, ongoing activities or views about different topics. As a result, they can be seen as a potentially viable source of infor... 详细信息
来源: 评论
Proactive Healthcare and an Early Warning Mechanism for Coronary Artery Disease Patients using Internet-of-Thing Devices
Proactive Healthcare and an Early Warning Mechanism for Coro...
收藏 引用
IEEE International Conference on systems, Man, and Cybernetics
作者: Shao-Jie Hsu Shih-Syun Lin Tun-Wen Pai Hamido Fujita Dept. of Computer Science and Engineering National Taiwan Ocean University Keelung Taiwan Intelligent Software Systems Laboratory Iwate Prefectural University Japan
Ubiquitous Internet environment and matured key technologies of sensing devices provide diversified applications of Internet of Thing (IoT). IoT in intelligent healthcare is one of the major topics for convincing powe... 详细信息
来源: 评论
Confining Wi-Fi Coverage: A Crowdsourced Method Using Physical Layer Information
Confining Wi-Fi Coverage: A Crowdsourced Method Using Physic...
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: Bingxian Lu Zhicheng Zeng Lei Wang Brian Peck Daji Qiao Michael Segal Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology China Department of Electrical and Computer Engineering Iowa State University USA Communication Systems Engineering Department Ben-Gurion University of the Negev Israel
Many small businesses and public areas offer free Wi-Fi access, but may wish to restrict network access only to their customers or patrons inside the physical property. Unfortunately, due to the nature of wireless net... 详细信息
来源: 评论