咨询与建议

限定检索结果

文献类型

  • 1,344 篇 会议
  • 213 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,011 篇 工学
    • 849 篇 计算机科学与技术...
    • 733 篇 软件工程
    • 221 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 63 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 421 篇 理学
    • 253 篇 数学
    • 115 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 55 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 internet of thin...
  • 22 篇 data mining
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,440 篇 英文
  • 144 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1596 条 记 录,以下是1031-1040 订阅
排序:
On the side-effects of introducing e-voting
On the side-effects of introducing e-voting
收藏 引用
3rd International Conference on E-Voting and Identity, VoteID 2011
作者: Heather, James Llewellyn, Morgan Teague, Vanessa Wen, Roland Department of Computing University of Surrey Guildford Surrey GU2 7XH United Kingdom IMT Lucca Italy Dept. Computer Science and Software Engineering University of Melbourne Australia University of New South Wales Sydney NSW Australia
The literature abounds with discussions on the relative security merits of various voting systems, and on whether a move towards electronic voting is, from a security perspective, something to be encouraged or discour... 详细信息
来源: 评论
Systematic Literature Review of Missing Data Imputation Techniques for Effort Prediction
Systematic Literature Review of Missing Data Imputation Tech...
收藏 引用
2012 International Conference on Smart Grid Systems(ICSGS 2012)
作者: Beatrice Andrew Ali Selamat Dept. of Software Engineering Faculty of Computer Science and Information System Universiti Teknologi Malaysia Skudai Johor 81310 Malaysia
Background:The occurrences of missing data in software project data set bring significant impact on effort *** significant impacts of this problem are wasted information and biased *** common studies conducted to inve... 详细信息
来源: 评论
Measures for Clustering and Anomaly Detection in Sets of Higher Dimensional Ellipsoids
Measures for Clustering and Anomaly Detection in Sets of Hig...
收藏 引用
International Joint Conference on Neural Networks
作者: Sutharshan Rajasegarar James C. Bezdek Masud Moshtaghi Christopher Leckie Timothy C. Havens Marimuthu Palaniswami Dept. of Electrical and Electronic Engineering Dept. of Computer Science and Software Eng. The University of Melbourne Dept. of Comp. Science and Eng. Michigan State University
One of the applications that motivates this research is a system for detection of the anomalies in wireless sensor networks (WSNs). Individual sensor measurements are converted to ellipsoidal summaries;a data matrix D... 详细信息
来源: 评论
Selective opening chosen ciphertext security directly from the DDH assumption
Selective opening chosen ciphertext security directly from t...
收藏 引用
6th International Conference on Network and System Security, NSS 2012
作者: Liu, Shengli Zhang, Fangguo Chen, Kefei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Chosen-ciphertext security has been well-accepted as a standard security notion for public key encryption. But in a multi-user surrounding, it may not be sufficient, since the adversary may corrupt some users to get t... 详细信息
来源: 评论
Stabilization of Interactive Differential Evolution for Generating Natural Facial Images
Stabilization of Interactive Differential Evolution for Gene...
收藏 引用
International Conference on Awareness science and Technology
作者: Dylan Kessler Qiangfu Zhao Dept. of Computer Science and Software Engineering Rose-Hulman Institute of Technology Terre Haute Indiana United States Dept. of Computer and Information Systems The University of Aizu Aizuwakamatsu Fukushima Japan
In today's society, information security and hiding is a key mechanism to protecting one's identity. Image morphing can hide a secret image in a morphed image using a second, reference image. One of the primar... 详细信息
来源: 评论
Impact of User Interface Generation on Maintenance
Impact of User Interface Generation on Maintenance
收藏 引用
2012 IEEE International Conference on computer science and Automation engineering(CSAE 2012)
作者: Tomas Cerny Vaclav Chalupa Michael J.Donahoo dept.Computer Science and Engineering Czech Technical University Charles Square 13PragueCzech Republic dept.Software Engineering Czech Technical University Charles Square 13PragueCzech Republic dept.Computer Science Baylor UniversityWacoTXUSA
User interface development and maintenance is one of the most time consuming parts of software application *** interfaces provide numerous graphical visualizations of user data,these are often influenced by multiple f... 详细信息
来源: 评论
Improving HCCA using Automatic Summarization
Improving HCCA using Automatic Summarization
收藏 引用
The 2012 4th International Conference on Machine Learning and Computing(ICMLC 2012)
作者: Seemab Latif Mary McGee Wood Goran Nenadic Dept.of Computer Software Engineering MCSNational University of Sciences and Technology (NUST)IslamabadPakistan Assessment21 SheffieldUK School of Computer Science University of ManchesterUK
Assessment is an important and widely used element of the taught ***-Assisted Assessment (CAA) systems are helping teachers by automatic marking of assessments of low-stake high volume exams (e.g.,school level).Fo... 详细信息
来源: 评论
Free Roll Decay Modeling of a Trimaran Based on Least Square Support Vector Machine
Free Roll Decay Modeling of a Trimaran Based on Least Square...
收藏 引用
OCEANS Conference
作者: Jinlong Li Songlin Yang Shuo Pang National Key Lab of AUV Technology Harbin Engineering University School of Naval Architecture and Ocean Engineering Jiangsu University of Science and Technology Dept. of Electrical Computer Software Systems Engineering Embry-Riddle Aeronautical University
A trimaran is a multihulled boat consisting of a main hull and two smaller outrigger hulls, attached to the main hull with lateral struts. There have been many studies highlighting that a trimaran takes many advantage... 详细信息
来源: 评论
Machine-driven Code Inspection to Reduce Restated Information
Machine-driven Code Inspection to Reduce Restated Informatio...
收藏 引用
2012 International Conference on Artificial Intelligence and Soft Computing(ICAISC 2012)
作者: Tomas Cerny Vaclav Chalupa Lukas Rychtecky Tomas Linhart Czech Technical University dept. Computer Science and Engineering FEE Charles Square 13 Prague 2 Czech Republic Czech Technical University dept. Software Engineering FIT Thakurova 9 Prague 6 Czech Republic
Production level software applications consist of thousands lines of source code. Although, the "main information" is captured by a small amount of code, it must be restated and extended on multiple places a... 详细信息
来源: 评论
Do data dependencies in source code complement call dependencies for understanding requirements traceability?
Do data dependencies in source code complement call dependen...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Hongyu Kuang Patrick Mäder Hao Hu Achraf Ghabi LiGuo Huang Lv Jian Alexander Egyed State Key Lab for Novel Software Technology Nanjing University Nanjing Jiangsu China Institute of Systems Engineering and Automation Johannes Kepler University Linz Austria Dept. of Computer Science and Engineering Southern Methodist University Dallas TX USA
It is common practice for requirements traceability research to consider method call dependencies within the source code (e.g., fan-in/fan-out analyses). However, current approaches largely ignore the role of data. Th... 详细信息
来源: 评论