咨询与建议

限定检索结果

文献类型

  • 278 篇 会议
  • 154 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 293 篇 工学
    • 236 篇 计算机科学与技术...
    • 204 篇 软件工程
    • 60 篇 信息与通信工程
    • 53 篇 控制科学与工程
    • 40 篇 生物工程
    • 21 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 18 篇 光学工程
    • 15 篇 仪器科学与技术
    • 14 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 9 篇 土木工程
    • 9 篇 化学工程与技术
    • 9 篇 环境科学与工程(可...
    • 8 篇 建筑学
  • 130 篇 理学
    • 70 篇 数学
    • 39 篇 生物学
    • 22 篇 系统科学
    • 20 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
  • 96 篇 管理学
    • 62 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 26 篇 医学
    • 25 篇 基础医学(可授医学...
    • 24 篇 临床医学
    • 14 篇 公共卫生与预防医...
    • 9 篇 药学(可授医学、理...
  • 20 篇 法学
    • 14 篇 社会学
  • 8 篇 教育学
  • 6 篇 经济学
  • 3 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 17 篇 software enginee...
  • 12 篇 semantics
  • 12 篇 software
  • 10 篇 reinforcement le...
  • 8 篇 edge computing
  • 7 篇 software systems
  • 7 篇 wireless sensor ...
  • 7 篇 analytical model...
  • 7 篇 machine learning
  • 7 篇 artificial intel...
  • 6 篇 internet of thin...
  • 6 篇 conferences
  • 6 篇 ecosystems
  • 6 篇 computer archite...
  • 6 篇 security
  • 5 篇 deep learning
  • 5 篇 decision making
  • 5 篇 accuracy
  • 5 篇 cloud computing
  • 5 篇 open source soft...

机构

  • 8 篇 state key labora...
  • 7 篇 national enginee...
  • 7 篇 shenzhen key lab...
  • 6 篇 the state key la...
  • 6 篇 guangdong labora...
  • 6 篇 state key labora...
  • 6 篇 university of ch...
  • 6 篇 state key lab fo...
  • 6 篇 national water a...
  • 5 篇 national enginee...
  • 5 篇 school of comput...
  • 5 篇 pca lab key lab ...
  • 4 篇 college of compu...
  • 4 篇 information syst...
  • 4 篇 the hong kong po...
  • 4 篇 software enginee...
  • 4 篇 school of comput...
  • 4 篇 institute for so...
  • 4 篇 state key lab of...
  • 4 篇 school of comput...

作者

  • 15 篇 ismail leila
  • 11 篇 buyya rajkumar
  • 9 篇 leila ismail
  • 8 篇 guangming xie
  • 8 篇 wang chen
  • 8 篇 chen wang
  • 7 篇 rabiser rick
  • 7 篇 xie guangming
  • 7 篇 yang jian
  • 6 篇 ghose aditya k.
  • 6 篇 ying he
  • 5 篇 lochau malte
  • 5 篇 lê lam-son
  • 5 篇 feichtinger kevi...
  • 5 篇 xia xin
  • 5 篇 choo kim-kwang r...
  • 5 篇 ghose aditya
  • 5 篇 schmidt-thieme l...
  • 5 篇 f. richard yu
  • 4 篇 jin zhi

语言

  • 410 篇 英文
  • 23 篇 其他
  • 5 篇 中文
检索条件"机构=Software and Systems Engineering Lab"
438 条 记 录,以下是361-370 订阅
排序:
Embeded smart sensor: System design and application
Embeded smart sensor: System design and application
收藏 引用
作者: Yang, Kehu Yu, Wensheng School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China School of Software Engineering East China Normal University Shanghai 200062 China Lab. of Complex Systems and Intelligent Science Institute of Automation CAS Beijing 100190 China
This paper proposed an embedded smart sensor which is consisted of a 6 DOF (Degree Of Free) IMU (Inertial Measurement Unit), a 3-axis magnetic compass, a monocular camera and a DSP processor which is high performance ... 详细信息
来源: 评论
Proceedings - International Conference on software engineering: Foreword
Proceedings - International Conference on Software Engineeri...
收藏 引用
Proceedings - International Conference on software engineering 2010年
作者: Dubinsky, Yael Kruchten, Philippe Finkelstein, Anthony Bass, Len Chulani, Sunita Prikladnicki, Rafael IBM Haifa Research Lab. Israel University of British Columbia Canada University College London United Kingdom Carnegie Mellon Software Engineering Institute United States Cisco Systems United States Pontifícia Universidade Do Rio Grande Do Sul Brazil
来源: 评论
Industry traction for MAS technology: Would a rose by any other name smell as sweet?
收藏 引用
International Journal of Agent-Oriented software engineering 2009年 第4期3卷 397-401页
作者: Ghose, Aditya Lab. School of Computer Science and Software Engineering Decision Systems Lab. University of Wollongong Wollongong NSW 2522 Australia
The Multi-Agent systems (MAS) community faces a crisis that many are unwilling to acknowledge. We are all acutely aware of how MAS concepts and technologies seem to have failed to gain significant industry traction (a... 详细信息
来源: 评论
Business process integration: Method and analysis
Business process integration: Method and analysis
收藏 引用
6th Asia-Pacific Conference on Conceptual Modelling, APCCM 2009
作者: Morrison, Evan D. Menzies, Alex Koliadis, George Ghose, Aditya K. Decision Systems Lab. School of Computer Science and Software Engineering University of Wollongong Wollongong NSW 2522 Australia
In the study of business management, process integration has become an interesting area of research that affects analysts studying and working on existing system plans. Process integration aims to investigate relation... 详细信息
来源: 评论
Reports of the AAAI 2010 conference workshops
Reports of the AAAI 2010 conference workshops
收藏 引用
作者: Aha, David W. Boddy, Mark Bulitko, Vadim D'Avila Garcez, Artur S. Doshi, Prashant Edelkamp, Stefan Geib, Christopher Gmytrasiewicz, Piotr Goldman, Robert P. Halevy, Alon Hitzler, Pascal Isbell, Charles Josyula, Darsana Kaelbling, Leslie Pack Kersting, Kristian Kunda, Maithilee Lamb, Luis C. Marthi, Bhaskara McGreggor, Keith Mihalkova, Lilyana Nastase, Vivi Natarajan, Sriraam Provan, Gregory Raja, Anita Ram, Ashwin Riedl, Mark Russell, Stuart Sabharwal, Ashish Smaus, Jan-Georg Sukthankar, Gita Tuyls, Karl Van Der Meyden, Ron Adaptive Systems Section Naval Research Laboratory Washington DC United States Adventium Labs. Minneapolis MN United States Department of Computer Science University of Alberta Canada City University London United Kingdom University of Georgia United States University of Bremen Germany School of Informatics University of Edinburgh United Kingdom University of Illinois Chicago United States Smart Information Flow Technologies LLC Minneapolis MN United States Structured Data Group Google Research United States Department of Computer Science Wright State University Dayton OH United States School of Interactive Computing Georgia Institute of Technology Atlanta GA United States Department of Computer Science Bowie State University United States Department of Computer Science and Engineering Massachusetts Institute of Technology United States Statistical Relational Mining Group Fraunhofer IAIS Germany Department of Computer Science Federal University of Rio Grande Do sul Brazil Willow Garage Inc. CA United States Computer Science Department University of Maryland College Park United States Heidelberg Institute for Theoretical Studies Heidelberg Germany Department of Computer Science University of Wisconsin Madison United States University College Cork Ireland Cork Complex Systems Lab. Ireland Department of Software and Information Systems University of North Carolina Charlotte United States Department of Computer Science and Engineering University of California Berkeley United States Department of Computer Science Cornell University United States Institute for Computational Sustainability United States University of Freiburg Germany School of Electrical Engineering and Computer Science University of Central Florida United States Maastricht University Netherlands University of New South Wales NICTA Australia
The AAAI-10 workshop program was held on July 11-12, 2010, at the Westin Peachtree Plaza in Atlanta, Georgia. The workshop program included 13 workshops covering a wide range of topics in artificial intelligence. Ther... 详细信息
来源: 评论
Challenges in model-driven software engineering
Challenges in model-driven software engineering
收藏 引用
Models in software engineering, MODELS 2008
作者: Straeten, Ragnhild Van Der Mens, Tom Baelen, Stefan Van Software and Systems Engineering Lab Vrije Universiteit Brussel Belgium Service de Génie Logiciel Université de Mons Belgium DistriNet Department of Computer Science K.U. Leuven Belgium
After more than a decade of research in Model-Driven engineering(MDE), the state-of-the-art and the state-of-the-practice in MDEhas significantly progressed. Therefore, during this workshop we raised the question of h... 详细信息
来源: 评论
Exposure-path prevention in directional sensor networks using sector model based percolation
Exposure-path prevention in directional sensor networks usin...
收藏 引用
2009 IEEE International Conference on Communications, ICC 2009
作者: Liang, Liu Xi, Zhang Huadong, Ma Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX 77843 United States Beijing Key Lab. of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing 100876 China
In wireless sensor networks, most existing works on region coverage mainly concentrate on the omnidirectional sensor based full coverage, which ensures that all points in the sensor-deployed region are covered. In con... 详细信息
来源: 评论
Minimal exposure path algorithms for directional sensor networks
Minimal exposure path algorithms for directional sensor netw...
收藏 引用
2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
作者: Liu, Liang Zhang, Xi Ma, Huadong Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX 77843 United States Beijing Key Lab. of Intelligent Telecomm. Software and Multimedia Beijing University of Posts and Telecomm. Beijing 100876 China
As a fundamental problem of wireless sensor networks, the minimal exposure path problem corresponding to the sensor network's worst-case coverage plays an important role in the applications for detecting intrusion... 详细信息
来源: 评论
FastCluster: a graph theory based algorithm for removing redundant sequences
收藏 引用
Journal of Biomedical Science and engineering 2009年 第8期2卷 621-625页
作者: Peng-Fei Liu Yu-Dong Cai Zi-Liang Qian Sheng-Yu Ni Liu-Huan Dong Chang-Hong Lu Jin-Long Shu Zhen-Bing Zeng Wen-Cong Lu Institute of Systems Biology Shanghai University Software Engineering Institute of East China Normal University East China Normal University Bioinformatics Center Key Lab of Systems Biology Shanghai Institutes for Biological Sciences Chinese Academ
In many cases, biological sequence databases contain redundant sequences that make it difficult to achieve reliable statistical analysis. Removing the redundant sequences to find all the real protein families and thei... 详细信息
来源: 评论
Group based access control scheme: Proof of method for secure access control architecture in mobile ad-hoc networks  09
Group based access control scheme: Proof of method for secur...
收藏 引用
7th International Conference on Advances in Mobile Computing and Multimedia, MoMM2009
作者: Bakar, Asmidar Abu Ismail, Roslan Ahmad, Abdul Rahim Abdul Manan, Jamalul-Lail Jais, Jamilin Dept. of Systems Networking College of Information Technology Universiti Tenaga Nasional Malaysia Dept. of Software Engineering College of Information Technology Universiti Tenaga Nasional Malaysia Cyber Security Lab. MIMOS Berhad Malaysia Imam Muhammad Ibn Saud Islamic University Riyadh Saudi Arabia
In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and requi... 详细信息
来源: 评论