咨询与建议

限定检索结果

文献类型

  • 126 篇 会议
  • 98 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 227 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 145 篇 工学
    • 111 篇 计算机科学与技术...
    • 90 篇 软件工程
    • 29 篇 控制科学与工程
    • 21 篇 信息与通信工程
    • 14 篇 生物工程
    • 13 篇 电气工程
    • 10 篇 生物医学工程(可授...
    • 9 篇 电子科学与技术(可...
    • 8 篇 机械工程
    • 7 篇 光学工程
    • 7 篇 安全科学与工程
    • 6 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 3 篇 建筑学
  • 78 篇 理学
    • 44 篇 数学
    • 23 篇 系统科学
    • 20 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 生物学
    • 3 篇 海洋科学
  • 44 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 11 篇 医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
    • 4 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 法学
  • 1 篇 艺术学

主题

  • 19 篇 computer science
  • 17 篇 mathematics
  • 13 篇 software systems
  • 13 篇 laboratories
  • 12 篇 systems engineer...
  • 12 篇 data mining
  • 10 篇 software enginee...
  • 8 篇 internet of thin...
  • 8 篇 xml
  • 7 篇 machine learning
  • 6 篇 software testing
  • 6 篇 students
  • 5 篇 adaptive systems
  • 5 篇 deep learning
  • 5 篇 itemsets
  • 4 篇 information syst...
  • 4 篇 lattices
  • 4 篇 application soft...
  • 4 篇 information tech...
  • 4 篇 artificial intel...

机构

  • 7 篇 department of in...
  • 6 篇 software systems...
  • 6 篇 computing and so...
  • 6 篇 department of co...
  • 6 篇 state key labora...
  • 5 篇 mathematics and ...
  • 5 篇 beijing key labo...
  • 5 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 academy of mathe...
  • 4 篇 department of co...
  • 4 篇 school of inform...
  • 4 篇 school of electr...
  • 3 篇 college of compu...
  • 3 篇 dept. of softwar...
  • 3 篇 lmib school of m...
  • 3 篇 dept. of compute...
  • 3 篇 peking universit...
  • 3 篇 software systems...
  • 3 篇 department of el...

作者

  • 10 篇 sarun intakosum
  • 10 篇 veera boonjing
  • 7 篇 zander carol
  • 7 篇 mccartney robert
  • 7 篇 eckerdal anna
  • 7 篇 sanders kate
  • 6 篇 ahmed bestoun s.
  • 6 篇 thomas lynda
  • 6 篇 zamli kamal z.
  • 5 篇 boustedt jonas
  • 5 篇 nengkun yu
  • 5 篇 bei zeng
  • 5 篇 moström jan erik
  • 5 篇 sutheetutt vacha...
  • 5 篇 junping du
  • 5 篇 zhengfeng ji
  • 5 篇 fashan yu
  • 5 篇 yingmin jia
  • 4 篇 lü jinhu
  • 4 篇 boonjing veera

语言

  • 217 篇 英文
  • 7 篇 其他
  • 3 篇 中文
检索条件"机构=Software Systems Engineering LaboratoryDepartment of Mathematics and Computer Science"
227 条 记 录,以下是71-80 订阅
排序:
XML Document Recommendation by Using Case Based Reasoning
XML Document Recommendation by Using Case Based Reasoning
收藏 引用
ACIS International Conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Sutheetutt Vacharaskunee Sarun Intakosum Software Systems Engineering Laboratory Department of Mathematics and Computer Science Faculty of Science King Mongkut''s Institute of Technology Ladkrabang Bangkok Thailand
Case Based Reasoning (CBR) is the process of solving new problem based on the solutions of similar previous problems. XML is a markup language that allows document owners describe their data in their own formats. Ther... 详细信息
来源: 评论
From Limen to Lumen: Computing students in liminal spaces  07
From Limen to Lumen: Computing students in liminal spaces
收藏 引用
3rd International Computing Education Research Workshop, ICER'07
作者: Eckerdal, Anna McCartney, Robert Moström, Jan Erik Sanders, Kate Thomas, Lynda Zander, Carol Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT United States Department of Computing Science Umeå University 901 87 Umeå Sweden Mathematics and Computer Science Department Rhode Island College Providence RI United States Department of Computer Science University of Wales Aberystwyth Wales Computing and Software Systems University of Washington Bothell Bothell WA United States
This paper is part of an ongoing series of projects in which we are investigating "threshold concepts": concepts that, among other things, transforms the way a student looks as the discipline and are often t... 详细信息
来源: 评论
Graduating students' designs - Through a phenomenographic lens  14
Graduating students' designs - Through a phenomenographic le...
收藏 引用
10th Annual International Conference on International Computing Education Research, ICER 2014
作者: Thomas, Lynda Eckerdal, Anna McCartney, Robert Moström, Jan Erik Sanders, Kate Zander, Carol Department of Computer Science Aberystwyth University Aberystwyth United Kingdom Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT United States Department of Computing Science Umeå University 901 87 Umeå Sweden Mathematics and Computer Science Department Rhode Island College Providence RI United States Computing and Software Systems University of Washington Bothell Bothell WA United States
We expand upon previous research that looked at the question: \Can graduating students design software systems?" Specifically we want to examine students' understanding of the phenomenon\produce a design.&quo... 详细信息
来源: 评论
2M-SELAR: A Model for Mining Sequential Least Association Rules  2nd
2M-SELAR: A Model for Mining Sequential Least Association Ru...
收藏 引用
2nd International Conference on Advanced Data and Information engineering, DaEng 2015
作者: Abdullah, Zailani Adam, Omer Herawan, Tutut Noraziah, Ahmad Saman, Md Yazid Mohd Hamdan, Abdul Razak School of Informatics and Applied Mathematics Universiti Malaysia Terengganu Kuala Terengganu21030 Malaysia Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur50603 Malaysia Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang KuantanPahang26300 Malaysia Faculty of Information Science and Technology Universiti Kebangsaan Malaysia BangiSelangor43600 Malaysia
Recently, mining least association rule from the sequential data becomes more important in certain domain areas such as education, healthcare, text mining, etc. due to its uniqueness and usefulness. However, discoveri... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
Understanding Quantum Protocols Using Information Visualization
Understanding Quantum Protocols Using Information Visualizat...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Xin Huang Quanlong Wang Department of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University Suzhou China School of Mathematics and Systems Science Beihang University Beijing China
There are many cases where people need to be aware of the security status of their network in order to be able to respond effectively to security risks. Most security mechanisms are however too complex and most users ... 详细信息
来源: 评论
Efficient specialisation in prolog using the hand-written compiler generator LOGEN
Efficient specialisation in prolog using the hand-written co...
收藏 引用
WOID'99, Workshop on Optimization and Implementation of Declarative Programs (in Connetion with ICLP'99, International Conference on Logic)
作者: Leuschel, Michael Jørgensen, Jesper Declarative Systems and Software Engineering Dept. of Electronics and Computer Science University of Southampton Southampton SO17 1BJ United Kingdom Dept. of Mathematics and Physics Royal Veterinary and Agricultural University Thorvaldsensvej 40 DK-1871 Frederiksberg C Denmark
The so called "cogen approach" to program specialisation, writing a compiler generator instead of a specialiser, has been used with considerable success in partial evaluation of both functional and imperativ... 详细信息
来源: 评论
Integrating simulation and numerical analysis in the evaluation of generalized stochastic petri nets
Integrating simulation and numerical analysis in the evaluat...
收藏 引用
作者: Zimmermann, Armin Hotz, Thomas Department of Computer Science and Automation Systems and Software Engineering Group Technische Universität Ilmenau Helmholtzplatz 5 Ilmenau98693 Germany Institute for Mathematics Group for Probability Theory and Mathematical Statistics Technische Universität Ilmenau Weimarer Straße 25 Ilmenau98693 Germany
The standard existing performance evaluation methods for discrete-state stochastic models such as Petri nets either generate the reachability graph followed by a numerical solution of equations or use some variant of ... 详细信息
来源: 评论
Students' perceptions of the differences between formal and informal learning  11
Students' perceptions of the differences between formal and ...
收藏 引用
7th International Computing Education Research Workshop, ICER 2011
作者: Boustedt, Jonas Eckerdal, Anna McCartney, Robert Sanders, Kate Thomas, Lynda Zander, Carol Division of Technology and Environment University of Gävle Gävle Sweden Department of Information Technology Uppsala University Uppsala Sweden Department of Computer Science and Engineering University of Connecticut Storrs CT United States Mathematics and Computer Science Department Rhode Island College Providence RI United States Department of Computer Science Aberystwyth University Aberystwyth United Kingdom Computing and Software Systems University of Washington Bothell Bothell WA United States
Research has shown that most learning in the workplace takes place outside of formal training and, given the swiftly changing nature of the field, computer science graduates more than most workers, need to be able to ... 详细信息
来源: 评论
Joint product numerical range and geometry of reduced density matrices
收藏 引用
science China(Physics,Mechanics & Astronomy) 2017年 第2期60卷 9-17页
作者: Jianxin Chen Cheng Guo Zhengfeng Ji Yiu-Tung Poon Nengkun YU Bei Zeng Jie Zhou Joint Center for Quantum Information and Computer Science University of Maryland College Park 20740 USA Institute for Advanced Study Tsinghua University Beijing 100084 China Centre for Quantum Computation & Intelligent Systems School of Software Faculty of Engineering and Information Technology University of Technology Sydney Sydney 2007 Australia State Key Laboratory of Computer Science.Institute of Software Chinese Academy of Sciences Beijing 100084 China Department of Mathematics Iowa State University Ames 50011-2140 USA Institute for Quantum Computing University of Waterloo Waterloo N2L 3G1 Canada Department of Mathematics & Statistics University of Guelph Guelph N1G 2 W1 Canada Perimeter Institute for Theoretical Physics Waterloo N2L 2Y5 Canada
The reduced density matrices of a many-body quantum system form a convex set, whose three-dimensional projection is convex in R3. The boundary of may exhibit nontrivial geometry, in particular ruled surfaces. T... 详细信息
来源: 评论