咨询与建议

限定检索结果

文献类型

  • 362 篇 会议
  • 178 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 546 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 326 篇 工学
    • 230 篇 计算机科学与技术...
    • 196 篇 软件工程
    • 66 篇 控制科学与工程
    • 47 篇 信息与通信工程
    • 28 篇 机械工程
    • 24 篇 电气工程
    • 21 篇 生物工程
    • 19 篇 生物医学工程(可授...
    • 15 篇 光学工程
    • 15 篇 电子科学与技术(可...
    • 13 篇 动力工程及工程热...
    • 13 篇 安全科学与工程
    • 12 篇 土木工程
    • 10 篇 仪器科学与技术
    • 8 篇 建筑学
  • 157 篇 理学
    • 86 篇 数学
    • 42 篇 系统科学
    • 29 篇 生物学
    • 27 篇 物理学
    • 26 篇 统计学(可授理学、...
    • 9 篇 化学
  • 89 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 39 篇 工商管理
    • 28 篇 图书情报与档案管...
  • 23 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 10 篇 药学(可授医学、理...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 11 篇 法学
    • 8 篇 社会学
  • 8 篇 教育学
    • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学

主题

  • 53 篇 computer science
  • 53 篇 laboratories
  • 38 篇 software enginee...
  • 36 篇 grid computing
  • 27 篇 application soft...
  • 25 篇 quality of servi...
  • 25 篇 cloud computing
  • 24 篇 software systems
  • 23 篇 resource managem...
  • 19 篇 processor schedu...
  • 18 篇 computational mo...
  • 17 篇 costs
  • 16 篇 distributed comp...
  • 14 篇 computer archite...
  • 13 篇 systems engineer...
  • 11 篇 data mining
  • 11 篇 middleware
  • 11 篇 computer network...
  • 11 篇 training
  • 10 篇 mathematics

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 9 篇 cloud computing ...
  • 8 篇 college of compu...
  • 8 篇 school of electr...
  • 8 篇 state key labora...
  • 7 篇 grid computing a...
  • 6 篇 software systems...
  • 6 篇 intelligent dist...
  • 6 篇 state key labora...
  • 6 篇 national water a...
  • 6 篇 service oriented...
  • 5 篇 software systems...
  • 5 篇 shanghai key lab...
  • 5 篇 the seventh rese...

作者

  • 46 篇 rajkumar buyya
  • 35 篇 junping du
  • 34 篇 yingmin jia
  • 24 篇 fashan yu
  • 18 篇 ismail leila
  • 17 篇 buyya rajkumar
  • 13 篇 materwala huned
  • 12 篇 veera boonjing
  • 11 篇 p.k. mckinley
  • 10 篇 cheng betty h. c...
  • 8 篇 sarun intakosum
  • 8 篇 bei zeng
  • 8 篇 zhengfeng ji
  • 7 篇 deyuan meng
  • 7 篇 jun zhang
  • 6 篇 wenling li
  • 6 篇 boonjing veera
  • 6 篇 leila ismail
  • 6 篇 s.m. sadjadi
  • 5 篇 guan haibing

语言

  • 503 篇 英文
  • 39 篇 其他
  • 4 篇 中文
  • 1 篇 日文
检索条件"机构=Software Systems Engineering Laboratory.Department of Computer Science"
546 条 记 录,以下是471-480 订阅
排序:
Automated synthesis of multitolerance
Automated synthesis of multitolerance
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: S.S. Kulkarni A. Ebnenasir Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
We concentrate on automated synthesis of multitolerant programs, i.e., programs that tolerate multiple classes of faults and provide a (possibly) different level of fault-tolerance to each class. We consider three lev... 详细信息
来源: 评论
On quality-of-service and energy consumption tradeoffs in FEC-encoded audio streaming
On quality-of-service and energy consumption tradeoffs in FE...
收藏 引用
International Workshop on Quality of Service
作者: Z. Zhou P.K. McKinley S.M. Sadjadi Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
This paper addresses the energy consumption of forward error correction (FEC) protocols as used to improve quality-of-service (QoS) for wireless computing devices. The paper also characterizes the effect on energy con... 详细信息
来源: 评论
A distributed approach to topology-aware overlay path monitoring
A distributed approach to topology-aware overlay path monito...
收藏 引用
International Conference on Distributed Computing systems
作者: C. Tang P.K. McKinley Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Path probing is essential to maintain an efficient overlay network topology. However, the cost of complete probing can be as high as O(n/sup 2/), which is prohibitive in large-scale overlay networks. Recently we propo... 详细信息
来源: 评论
Transparent self-optimization in existing CORBA applications
Transparent self-optimization in existing CORBA applications
收藏 引用
International Conference on Autonomic Computing (ICAC)
作者: S.M. Sadjadi P.K. McKinley Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
This paper addresses the design of adaptive middleware to support autonomic computing in pervasive computing environments. The particular problem we address here is how to support self-optimization to changing network... 详细信息
来源: 评论
Automated analysis of timing information in UML diagrams  04
Automated analysis of timing information in UML diagrams
收藏 引用
IEEE International Conference on Automated software engineering (ASE)
作者: S. Konrad L.A. Campbell B.H.C. Cheng Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
This work introduces an approach to adding timing information to UML diagrams for modeling embedded systems. In order to perform automated formal analysis of these UML diagrams with timing information, we extend a pre... 详细信息
来源: 评论
Generation of self-optimizing wireless network applications
Generation of self-optimizing wireless network applications
收藏 引用
International Conference on Autonomic Computing (ICAC)
作者: S.M. Sadjadi P.K. McKinley R.E.K. Stirewalt B.H.C. Cheng Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East Lansing MI USA
Adaptable applications are difficult to develop and maintain especially if adaptive code, which implements the adaptive behavior, is tangled into functional code, which implements the imperative behavior. Our work inv... 详细信息
来源: 评论
Approximate caches for packet classification
Approximate caches for packet classification
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: F. Chang Wu-chang Feng Kang Li Systems Software Laboratory OGI School of Science and Engineering at OHSU Beaverton OR USA Department of Computer Science University of Georgia Athens GA USA
Many network devices such as routers and firewalls employ caches to take advantage of temporal locality of packet headers in order to speed up packet processing decisions. Traditionally, cache designs trade off time a... 详细信息
来源: 评论
An authorization model for multimedia digital libraries
收藏 引用
International Journal on Digital Libraries 2004年 第3期4卷 139-155页
作者: Kodali, Naren Farkas, Csilla Wijesekera, Duminda Department of Information and Software Engineering George Mason University Fairfax VA 22030-4444 United States Center for Secure Information Systems George Mason University Fairfax VA 22030-4444 United States Information Security Laboratory University of South Carolina Columbia SC 29208 United States Department of Computer Science and Engineering University of South Carolina Columbia SC 29208 United States
In this paper we present a generalized authorization model for multimedia digital libraries. Our aim is to support the enforcement of access control requirements of the original data sources without the need to create... 详细信息
来源: 评论
Image attachment using fuzzy-genetic algorithms
Image attachment using fuzzy-genetic algorithms
收藏 引用
IEEE International Conference on Fuzzy systems (FUZZ-IEEE)
作者: B. Resko P. Korondi Z. Petres J.F. Bourges H. Hashimoto Japanese-Hungarian Laboratory Budapest University슠of슠Technology슠and슠Economics Hungary Computer Science and Software Engineering Department Laval University Sainte Foy QUE Canada Institute of Industrial Sciences Integrated Intelligent Systems Japanese-Hungarian Laboratory University of Tokyo Tokyo Japan
This paper gives contribution to the construction of an image mosaic by pasting together a sequence of photographs taken by a regular digital camera from the same position but in different directions. In order to find... 详细信息
来源: 评论
On the cost-quality tradeoff in topology-aware overlay path probing  11
On the cost-quality tradeoff in topology-aware overlay path ...
收藏 引用
11th IEEE International Conference on Network Protocols, ICNP 2003
作者: Tang, Chiping McKinley, P.K. Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2), which is prohibitive in large-scale overlay networks. Several methods have... 详细信息
来源: 评论