咨询与建议

限定检索结果

文献类型

  • 662 篇 期刊文献
  • 619 篇 会议
  • 23 册 图书

馆藏范围

  • 1,304 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 798 篇 工学
    • 522 篇 计算机科学与技术...
    • 433 篇 软件工程
    • 153 篇 控制科学与工程
    • 127 篇 信息与通信工程
    • 85 篇 电气工程
    • 68 篇 生物工程
    • 57 篇 电子科学与技术(可...
    • 55 篇 机械工程
    • 55 篇 生物医学工程(可授...
    • 45 篇 光学工程
    • 36 篇 动力工程及工程热...
    • 32 篇 材料科学与工程(可...
    • 32 篇 化学工程与技术
    • 29 篇 仪器科学与技术
    • 25 篇 力学(可授工学、理...
    • 25 篇 土木工程
    • 24 篇 安全科学与工程
  • 513 篇 理学
    • 277 篇 数学
    • 128 篇 物理学
    • 115 篇 系统科学
    • 91 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 41 篇 化学
  • 186 篇 管理学
    • 132 篇 管理科学与工程(可...
    • 67 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 68 篇 医学
    • 56 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 28 篇 公共卫生与预防医...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 25 篇 法学
  • 18 篇 教育学
  • 14 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 68 篇 computer science
  • 68 篇 laboratories
  • 58 篇 software enginee...
  • 36 篇 grid computing
  • 35 篇 application soft...
  • 32 篇 software systems
  • 32 篇 cloud computing
  • 26 篇 quality of servi...
  • 26 篇 computational mo...
  • 26 篇 mathematics
  • 25 篇 resource managem...
  • 24 篇 machine learning
  • 23 篇 deep learning
  • 22 篇 systems engineer...
  • 21 篇 costs
  • 20 篇 processor schedu...
  • 18 篇 computer archite...
  • 18 篇 artificial intel...
  • 17 篇 distributed comp...
  • 17 篇 testing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 16 篇 school of mathem...
  • 16 篇 key laboratory o...
  • 15 篇 department of co...
  • 14 篇 college of compu...
  • 14 篇 software enginee...
  • 12 篇 state key labora...
  • 11 篇 university of ch...
  • 9 篇 academy of mathe...
  • 9 篇 cloud computing ...
  • 9 篇 school of electr...
  • 8 篇 school of softwa...
  • 8 篇 key laboratory o...
  • 7 篇 grid computing a...
  • 7 篇 computing and so...

作者

  • 48 篇 rajkumar buyya
  • 34 篇 junping du
  • 32 篇 yingmin jia
  • 22 篇 fashan yu
  • 20 篇 buyya rajkumar
  • 18 篇 ismail leila
  • 15 篇 veera boonjing
  • 14 篇 liu ya-feng
  • 11 篇 badri mourad
  • 10 篇 sarun intakosum
  • 10 篇 bei zeng
  • 10 篇 cheng betty h. c...
  • 10 篇 materwala huned
  • 10 篇 zhengfeng ji
  • 9 篇 p.k. mckinley
  • 8 篇 badri linda
  • 8 篇 bakas spyridon
  • 8 篇 liu xin
  • 8 篇 yu wei
  • 8 篇 yiguang hong

语言

  • 1,167 篇 英文
  • 128 篇 其他
  • 8 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Software Systems Engineering Laboratory Department of Mathematics and Computer Science"
1304 条 记 录,以下是1121-1130 订阅
排序:
A New Flexible MPI Collective I/O Implementation
A New Flexible MPI Collective I/O Implementation
收藏 引用
IEEE International Conference on Cluster Computing
作者: Kenin Coloma Avery Ching Alok Choudhary Wei-keng Liao Rob Ross Rajeev Thakur Lee Ward Electrical and Computer Engineering Department Northwestern University USA Mathematics and Computer Science Division Argonne National Laboratory USA Scalable Computing Systems Sandia National Laboratories USA
The MPI-IO standard creates a huge opportunity to break out of the traditional file system I/O methods. As a software layer between the user and the file system, an MPI-IO library can potentially optimize I/O on behal... 详细信息
来源: 评论
Sufficient excitation conditions for system identification using binary-valued observations
Sufficient excitation conditions for system identification u...
收藏 引用
American Control Conference (ACC)
作者: Le Yi Wang G.G. Yin Yanlong Zhao Ji-Feng Zhang Department of Electrical and Computer Engineering Wayne State University Detroit MI USA Department of Mathematics Wayne State University Detroit MI USA Key Laboratory of Systems and Control Academy of Mathematics and Systems Science Chinese Academy and Sciences China
Conditions on input signals are derived that characterize their probing richness for system identification using binary-valued observations. Identification configurations in open-loop, filtering, and feedback systems ... 详细信息
来源: 评论
Economy-Based Data Replication Broker
Economy-Based Data Replication Broker
收藏 引用
IEEE International Conference on e-science and Grid Computing
作者: Henry Lin J.H. Abawajy Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne Melbourne VIC Australia Grid and Pervasive Computing Laboratory School of Engineering and Information Technology Deakin University Geelong VIC Australia
Data replication is one of the key components in data grid architecture as it enhances data access and reliability and minimises the cost of data transmission. In this paper, we address the problem of reducing the ove... 详细信息
来源: 评论
Segregated failures model for availability evaluation of fault-tolerant systems  06
Segregated failures model for availability evaluation of fau...
收藏 引用
Proceedings of the 29th Australasian computer science Conference - Volume 48
作者: Sergiy A. Vilkomir David L. Parnas Veena B. Mendiratta Eamonn Murphy Software Quality Research Laboratory (SQRL) Department of Computer Science and Information Systems University of Limerick Limerick Ireland Bell Laboratories Lucent Technologies Naperville IL Department of Mathematics and Statistics University of Limerick Limerick Ireland
This paper presents a method of estimating the availability of fault-tolerant computer systems with several recovery procedures. A segregated failures model has been proposed recently for this purpose. This paper prov... 详细信息
来源: 评论
Towards a Grid of Sensors for Telemedicine
Towards a Grid of Sensors for Telemedicine
收藏 引用
Annual IEEE Symposium on computer-Based Medical systems
作者: C.O. Rolim F.L. Koch M. Assuncao C.B. Westphall Network and Management Laboratory Federal University of Santa Catarina Florianopolis Santa Catarina Brazil Grid Computing and Distributed Systems Laboratory and NICTA Victoria Laboratory Department of Computer Science and Software Engineering University of Melbourne Melbourne VIC Australia
In this article, we describe a grid of sensors to collect patients' vital data and to allow real time monitoring of patients in heath-care centres. We analyse the problem scenario and identify the components invol... 详细信息
来源: 评论
Generating multi-scroll chaotic attractors via threshold control
Generating multi-scroll chaotic attractors via threshold con...
收藏 引用
IEEE International Symposium on Circuits and systems (ISCAS)
作者: Jinhu Lu K. Murali S. Sinha H. Leung Key Laboratory of Systems and Control Institute of Systems Science Academy of Mathematics and Systems Science슠Chinese Academy of Sciences Beijing China Department of Physics Anna University Chennai India Institute for Mathematical Sciences Chennai India Department of Electrical and Computer Engineering University of Calgary Calgary Canada
This paper proposes a novel threshold control approach for creating multi-scroll chaotic attractors. The general jerk circuit is used as an example to show the working principle of this method. The controlled jerk cir... 详细信息
来源: 评论
BlueGene/L Failure Analysis and Prediction Models
BlueGene/L Failure Analysis and Prediction Models
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Yinglung Liang Yanyong Zhang A. Sivasubramaniam M. Jette R. Sahoo Electrical & Computer Engineering Department Rutgers University USA Computational Resource Management Group Lawrence Livemore National Laboratory USA Computer Science & Engineering Department Pennslyvania State University USA Exploratory Systems Software Department IBM Thomas J. Watson Research Center USA
The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM's BlueGene/L which can accommodate as many as 128 K processors.... 详细信息
来源: 评论
Combining Probabilistic Ranking and Latent Semantic Indexing for Feature Identification
Combining Probabilistic Ranking and Latent Semantic Indexing...
收藏 引用
IEEE Workshop on Program Comprehension
作者: D. Poshyvanyk A. Marcus V. Rajlich Y.-G. Gueheneuc G. Antoniol Department of Computer Science Wayne State University Detroit MI USA GEODES-Research Group on Open Distributed Systems Experimental Software Engineering University of Montreal Canada Department of Mathematics and Computer Science Babeş-Bolyai University Cluj-Napoca Romania Département de Génie Informatique École Polytechnique de Montréal Canada
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature lo... 详细信息
来源: 评论
Semantic-based Grid Resource Discovery and its Integration with the Grid Service Broker
Semantic-based Grid Resource Discovery and its Integration w...
收藏 引用
International Conference on Advanced Computing and Communications (ADCOM)
作者: Thamarai Selvi Somasundaram R.A. Balachandar Vijayakumar Kandasamy Rajkumar Buyya Rajagopalan Raman N. Mohanram S. Varun Department of Information Technology Anna University Chennai India Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne VIC Australia Centre for Development of Advanced Computing Chennai India Centre for Development of Advanced Computing Bangalore India
This paper addresses the need of semantic component in the grid environment to discover and describe the grid resources semantically. We propose semantic grid architecture by introducing a knowledge layer at the top o... 详细信息
来源: 评论
Security analysis and improvement of hsu et al.'s threshold proxy signature scheme
收藏 引用
International Journal of Network Security 2006年 第1期2卷 69-72页
作者: Guo, Lifeng Cheng, Xiangguo Liu, Yang Institute of Systems Science Academy of Mathematics and System Sciences Chinese Academy of Sciences Graduate School of Chinese Academy of Sciences Beijing 100080 China 21 Heng Mui Keng Terrace Singapore State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 China Software Institute School of Electronic Engineering and Computer Science Peking University 100871 China
In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang's threshold proxy signature scheme. But in 2003 Hsu et al. pointed out that Sun's scheme suffered from a drawback and d... 详细信息
来源: 评论