咨询与建议

限定检索结果

文献类型

  • 299 篇 会议
  • 191 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 312 篇 工学
    • 240 篇 计算机科学与技术...
    • 198 篇 软件工程
    • 52 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 18 篇 仪器科学与技术
    • 17 篇 光学工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 14 篇 交通运输工程
    • 13 篇 生物医学工程(可授...
    • 11 篇 建筑学
    • 11 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 安全科学与工程
  • 153 篇 理学
    • 83 篇 数学
    • 44 篇 物理学
    • 24 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 12 篇 化学
  • 113 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 21 篇 医学
    • 19 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 18 篇 法学
    • 16 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 17 篇 computer science
  • 17 篇 accuracy
  • 13 篇 laboratories
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 testing
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 deep learning
  • 8 篇 information syst...
  • 8 篇 information secu...
  • 7 篇 educational tech...
  • 7 篇 wireless sensor ...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 7 篇 ontology
  • 6 篇 internet of thin...

机构

  • 72 篇 department of co...
  • 54 篇 school of softwa...
  • 41 篇 tsinghua nationa...
  • 25 篇 key laboratory f...
  • 14 篇 key laboratory f...
  • 12 篇 national enginee...
  • 10 篇 national key lab...
  • 9 篇 college of compu...
  • 9 篇 science & techno...
  • 8 篇 university of ch...
  • 7 篇 department of co...
  • 7 篇 computer vision ...
  • 6 篇 inria
  • 6 篇 guangdong provin...
  • 5 篇 school of softwa...
  • 5 篇 moe key laborato...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 department of au...

作者

  • 13 篇 yunhao liu
  • 12 篇 qiang wenwen
  • 12 篇 zheng changwen
  • 11 篇 wang bin
  • 10 篇 wang jianmin
  • 9 篇 xiong hui
  • 9 篇 herawan tutut
  • 8 篇 sun fuchun
  • 8 篇 yong jun-hai
  • 7 篇 wang chaokun
  • 7 篇 li jiangmeng
  • 7 篇 palaiahnakote sh...
  • 6 篇 ming gu
  • 6 篇 paul jean-claude
  • 6 篇 tong lu
  • 6 篇 shen linlin
  • 6 篇 poomrittigul suv...
  • 6 篇 zhang hui
  • 5 篇 xiang-yang li
  • 5 篇 sun jiaguang

语言

  • 466 篇 英文
  • 17 篇 其他
  • 8 篇 中文
  • 1 篇 日文
检索条件"机构=Web Information System and Department of Software Technology"
491 条 记 录,以下是341-350 订阅
排序:
Detecting infeasible traces in process models
Detecting infeasible traces in process models
收藏 引用
14th International Conference on Enterprise information systems, ICEIS 2012
作者: Wang, Zhaoxia Wen, Lijie Zhu, Xiaochen Liu, Yingbo Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Lab. for Information System Security Ministry of Education Beijing 100084 China National Laboratory for Information Science and Technology Beijing 100084 China Logistical Engineering University Chongqing 400016 China
Workflow testing is an important method of workflow analysis in design time. A challenging problem with trace-oriented test data generation in particular and trace-based workflow analysis in general is the existence o... 详细信息
来源: 评论
Towards energy-fairness in asynchronous duty-cycling sensor networks
Towards energy-fairness in asynchronous duty-cycling sensor ...
收藏 引用
IEEE Conference on Computer Communications, INFOCOM 2012
作者: Li, Zhenjiang Mo, Li Liu, Yunhao School of Computer Engineering Nanyang Technological University Singapore Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong MOE Key Lab. for Information System Security School of Software Tsinghua University China
In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. We propose a mathematical model to describe the ... 详细信息
来源: 评论
Enhancing Discrete Event Simulation in multi-core processors environments using Multi-Dimensional Queue Mechanism
Enhancing Discrete Event Simulation in multi-core processors...
收藏 引用
International Conference on New Trends in information and Service Science, NISS
作者: Wong Ming Tat Chong Chun Yong Ling Teck Chaw Department of Computer System & Technology Faculty of Computer Science &Information Technology University Malaya Kuala Lumpur Malaysia Department of Software Engineering Faculty of Computer Science &Information Technology University Malaya Kuala Lumpur Malaysia
Discrete Event Simulation (DES) is a popular technique use in network simulation tools. Some of the popular queuing methods in DES are linked list, heap, splay tree and calendar based queue. Due to the design characte... 详细信息
来源: 评论
A Convertibility Study on the Conversion between FPA and COSMIC for Real Time systems
A Convertibility Study on the Conversion between FPA and COS...
收藏 引用
Joint Conference of the Int'l Workshop on and International Conference on software Process and Product Measurement software Measurement
作者: Abedallah Zaid Abualkishik Mohd Hasan Selamat Abdul Azim Abd Ghani Rodziah Atan Jean Marc Desharnais Adel Khelifi Department of Information System Faculty of Computer Science and Information Technology University Putra Malaysia Serdang Selangor Darul Ehsan Malaysia Software Engineering and IT Department École de Technologie Supérieure Montreal Canada Software Engineering Department ALHOSN University Abu Dhabi UAE
Function Point Analysis (FPA) measurement method was proposed primarily to measure the functional size of management information systems. The method has been criticized as an inadequate method to measure the functiona... 详细信息
来源: 评论
Decision making model for Electronic Tender Evaluation (eTE) using fuzzy AHP with extent analysis method
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content technology and its Applications 2012年 第22期6卷 79-89页
作者: Alias, Ros Haslinda Noor, Noor Maizura Mohamad Selamat, Ali Saman, Md. Yazid Mohd Abdullah, Mohd Lazim Computer Science Department Universiti Malaysia Terengganu Malaysia Software Engineering Department Faculty of Computer Science and Information System Universiti Teknologi Malaysia Malaysia Department of Mathematics Faculty of Science and Technology Universiti Malaysia Terengganu Malaysia
Transformation in procurement technique aims to create a sustainability development and innovative outsourcing strategy. It can increase the probability of project success with quality and give an added value in money... 详细信息
来源: 评论
Theoretical and Probabilistic Conversion Model between FPA and COSMIC Measurement Method
Theoretical and Probabilistic Conversion Model between FPA a...
收藏 引用
Joint Conference of the Int'l Workshop on and International Conference on software Process and Product Measurement software Measurement
作者: Abedallah Zaid Abualkishik Mohd Hasan Selamat Abdul Azim Abd Ghani Rodziah Atan Jean Marc Desharnais Adel Khelifi Department of Information System Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang Selangor Darul Ehsan Malaysia Software Engineering and IT Department École de Technologie Supérieure Montreal Canada Software Engineering Department ALHOSN University Abu Dhabi UAE
Functional Size Measurement (FSM) has been widely adopted by software organizations over the past years. In particular, Function Point Analysis (FPA) measurement method as the eldest and the most globally FSM method u... 详细信息
来源: 评论
Design Pattern Usage in Grid Computing
Design Pattern Usage in Grid Computing
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Markus Aleksy Makoto Takizawa Leonard Barolli Industrial Software System Program ABB Corporate Research Center Germany Germany Department of Computer and Information Science Seikei University Tokyo Japan Department of Information and Communication Engineering Fukuoka Institute of Technology Fukuoka Japan
The recent advances in Grid and Cloud computing make new types of applications possible. At the same time, they require an infrastructure to implement heterogeneous computing resources time and cost-savely. Here, appr... 详细信息
来源: 评论
Sherlock is around: Detecting network failures with local evidence fusion
Sherlock is around: Detecting network failures with local ev...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Qiang Ma Kebin Liu Xin Miao Yunhao Liu Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China
Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct centralized analysis at the powerful back-end. ... 详细信息
来源: 评论
On affirmative adaptive failure detection
On affirmative adaptive failure detection
收藏 引用
12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012
作者: Noor, Ahmad Shukri Mohd Deris, Mustafa Mat Herawan, Tutut Hassan, Mohamad Nor Department of Computer Science Faculty of Science and Technology Universiti Malaysia Terengganu 21030 Kuala Terengganu Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia 86400 Parit Raja Batu Pahat Johor Darul Takzim Malaysia Faculty of Computer System and Software Engineering Universiti Malaysia Pahang Lebuh Raya Tun Razak 26300 Gambang Kuantan Pahang Malaysia
Fault detection methodology is a crucial part in providing a scalable, dependable and high availability of grid computing environment. The most popular technique that used in detecting fault is heartbeat mechanism whe... 详细信息
来源: 评论
Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks
Priv-Code: Preserving privacy against traffic analysis throu...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Zhiguo Wan Kai Xing Yunhao Liu MOE Key Laboratory for Information System Security School of Software Tsinghua National Laboratory for Information Science and Technology Tsinghua University China School of Computer Science and Technology University of Science and Technology China Department of Computer Science and Engineering HKUST Hong Kong China
Traffic analysis presents a serious threat to wireless network privacy due to the open nature of wireless medium. Traditional solutions are mainly based on the mix mechanism proposed by David Chaum, but the main drawb... 详细信息
来源: 评论