咨询与建议

限定检索结果

文献类型

  • 1,343 篇 会议
  • 213 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,013 篇 工学
    • 851 篇 计算机科学与技术...
    • 735 篇 软件工程
    • 221 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 64 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 422 篇 理学
    • 253 篇 数学
    • 116 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 54 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 data mining
  • 21 篇 internet of thin...
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 university of re...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,530 篇 英文
  • 53 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1595 条 记 录,以下是871-880 订阅
排序:
Exposing image forgery by detecting traces of feather operation  20
Exposing image forgery by detecting traces of feather operat...
收藏 引用
20th International Conference on Distributed Multimedia Systems, DMS 2014
作者: Zheng, Jiang Bin Zhu, Ting Ge Li, Zhe Xing, Wei Wei Ren, Jin Chang Dept of Computer Science and Engineering School of Computer Northwestern Polytechnical University Xi’an China School of Software Engineering Beijing Jiaotong University Beijing China Dept of Electronic and Electrical Engineering University of Strathclyde GlasgowG1 1XW United Kingdom
Powerful digital image editing tools make it very easy to produce a perfect image forgery. The feather operation is necessary when tampering an image by copy-paste operation because it can help the boundary of pasted ... 详细信息
来源: 评论
Fast range query processing with strong privacy protection for cloud computing  40th
Fast range query processing with strong privacy protection f...
收藏 引用
Proceedings of the 40th International Conference on Very Large Data Bases, VLDB 2014
作者: Li, Rui Liu, Alex X. Wang, Ann L. Bruhadeshwar, Bezawada College of Computer Science and Electronic Engineering Hunan university ChangSha China Dept. of Computer Science and Engineering Michigan State University East LansingMI United States National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
Privacy has been the key road block to cloud computing as clouds may not be fully trusted. This paper concerns the problem of privacy preserving range query processing on clouds. Prior schemes are weak in privacy prot... 详细信息
来源: 评论
REED: A Reliable Energy-Efficient RAID
REED: A Reliable Energy-Efficient RAID
收藏 引用
International Conference on Parallel Processing (ICPP)
作者: Shu Yin Xuewu Li Kenli Li Jianzhong Huang Xiaojun Ruan Xiaomin Zhu Wei Cao Xiao Qin School of Information Science & Engineering National Supercomputing Center in Changsha Changsha China Dept. of Computer Science Huazhong Univ. of Sci. and Tech. Wuhan China Dept. of Computer Science West Chester Univ. of Pennsylvania PA Sci. & Tech. on Information System Eng. Lab National University of Defense Technology Changsha China Hubei Meteorological Information. & Technology Support Center Wuhan China Dept. of Compter Sci. & Software Eng. Auburn University AL
Recent studies indicate that the energy cost and carbon footprint of data centers have become exorbitant. It is a demanding and challenging task to reduce energy consumption in large-scale storage systems in modern da... 详细信息
来源: 评论
What special about Top-N recommendation for mobile app stores  2
What special about Top-N recommendation for mobile app store...
收藏 引用
2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014
作者: Zhu, Taojiang Yan, Jiabao Zhao, Ying Dept. of Computer Science and Technology Tsinghua University Beijing China Dept. of Software Engineering Tsinghua University Beijing China Research Institute Tsinghua University in Shenzhen China
As the number of mobile applications grows rapidly, personalized recommendation for mobile apps becomes more and more important to mobile App stores. While most of the current works focused on proposing novel recommen... 详细信息
来源: 评论
A hybrid tracking system for ZigBee WSNs
A hybrid tracking system for ZigBee WSNs
收藏 引用
2014 6th International Conference on computer science and Information Technology, CSIT 2014
作者: Alhmiedat, Tareq Omar, Firas Taleb, Anas Abu Dept. of Information Technology Tabuk University Tabuk Saudi Arabia Dept. of Software Engineering Zarqa University Zarqa Jordan Dept. of Computer Science Isra University Amman Jordan
Target localization and tracking problems in Wireless Sensor Networks (WSNs) have received considerable attention recently, driven by the need to achieve high localization accuracy, with the minimum cost possible. A w... 详细信息
来源: 评论
API document quality for resolving deprecated APIs  21
API document quality for resolving deprecated APIs
收藏 引用
21st Asia-Pacific software engineering Conference, APSEC 2014
作者: Ko, Deokyoon Ma, Kyeongwook Park, Sooyong Kim, Suntae Kim, Dongsun Traon, Yves Le Dept. of Computer Science and Engineering Sogang University Seoul Korea Republic of Dept. of Software Engineering Cheonbuk National University Jeonju Si Jeollabuk Do Korea Republic of University of Luxembourg SnT Luxembourg Luxembourg
Using deprecated APIs often results in security vulnerability or performance degradation. Thus, invocations to deprecated APIs should be immediately replaced by alternative APIs. To resolve deprecated APIs, most devel... 详细信息
来源: 评论
A systematic view of agent-supported simulation: Past, present, and promising future  4
A systematic view of agent-supported simulation: Past, prese...
收藏 引用
4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, SIMULTECH 2014
作者: Ören, Tuncer Yilmaz, Levent Ghasem-Aghaee, Nasser School of Electrical Eng. and Computer Science Univ. of Ottawa OttawaON Canada Computer Science and Software Engineering Samuel Ginn College of Engineering Auburn University AuburnAL United States Computer Eng. Dept. Sheikh Bahaei Univ. Baharestan Iran Univ. of Isfahan Isfahan Iran
Agent-supported simulation involves the use of intelligent agents to enhance modeling and simulation (M&S) infrastructures and consists of support by software agents: (1) to provide computer assistance for front-e... 详细信息
来源: 评论
Optimizing preemption-overhead accounting in multiprocessor real-time systems  14
Optimizing preemption-overhead accounting in multiprocessor ...
收藏 引用
22nd International Conference on Real-Time Networks and Systems, RTNS 2014
作者: Ward, Bryan C. Thekkilakattil, Abhilash Anderson, James H. Dept. of Computer Science University of North Carolina at Chapel Hill United States Div. of Software Engineering Mälardalen University Västerås Sweden
There exist two general techniques to account for preemption-related overheads on multiprocessors. This paper presents a new preemption-related overhead-accounting technique, called analytical redistribution of preemp... 详细信息
来源: 评论
Effect of temporal collaboration network, maintenance activity, and experience on defect exposure  14
Effect of temporal collaboration network, maintenance activi...
收藏 引用
8th ACM/IEEE International Symposium on Empirical software engineering and Measurement, ESEM 2014
作者: Miranskyy, Andriy Caglayan, Bora Bener, Ayse Cialini, Enzo Dept. of Computer Science Ryerson University Canada Dept. of Mathematics Ryerson University Canada Dept. of Mechanical and Industrial Engineering Ryerson University Canada IBM Toronto Software Laboratory India
Context: Number of defects fixed in a given month is used as an input for several project management decisions such as release time, maintenance effort estimation and software quality assessment. Past activity of deve... 详细信息
来源: 评论
Towards energy-aware optimisation of business processes
Towards energy-aware optimisation of business processes
收藏 引用
3rd International Conference on Smart Grids and Green IT Systems, SMARTGREENS 2014
作者: López, Beatriz Ghose, Aditya Savarimuthu, Tony Nowostawski, Mariusz Winikoff, Michael Cranefield, Stephen EXiT research group University of Girona Girona Spain School of Computer Science and Software Engineering University of Wollongong Wollongong Australia Dept. of Information Science University of Otago Dunedin New Zealand Faculty of Computer Science and Media Technology Gjøvik University College Gjøvik Norway
Time dependent energy tariffs are a matter of concern to managers in organisations, who need to rethink how to allocate resources to business processes so that they take into account energy costs. However, due to the ... 详细信息
来源: 评论