咨询与建议

限定检索结果

文献类型

  • 1,343 篇 会议
  • 213 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 1,595 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,013 篇 工学
    • 851 篇 计算机科学与技术...
    • 735 篇 软件工程
    • 221 篇 信息与通信工程
    • 116 篇 控制科学与工程
    • 106 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 64 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 安全科学与工程
    • 39 篇 光学工程
    • 38 篇 机械工程
    • 29 篇 交通运输工程
    • 28 篇 动力工程及工程热...
    • 28 篇 建筑学
    • 25 篇 土木工程
    • 24 篇 仪器科学与技术
  • 422 篇 理学
    • 253 篇 数学
    • 116 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 57 篇 系统科学
  • 317 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 60 篇 医学
    • 58 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 59 篇 法学
    • 42 篇 社会学
  • 37 篇 教育学
    • 37 篇 教育学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 19 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 56 篇 software
  • 54 篇 software enginee...
  • 38 篇 machine learning
  • 37 篇 feature extracti...
  • 36 篇 computer science
  • 36 篇 accuracy
  • 33 篇 computational mo...
  • 30 篇 real-time system...
  • 30 篇 semantics
  • 29 篇 deep learning
  • 29 篇 artificial intel...
  • 28 篇 training
  • 23 篇 data models
  • 22 篇 data mining
  • 21 篇 internet of thin...
  • 21 篇 analytical model...
  • 20 篇 support vector m...
  • 20 篇 wireless sensor ...
  • 20 篇 predictive model...
  • 20 篇 machine learning...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 9 篇 school of softwa...
  • 9 篇 nicta victoria r...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 university of re...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 stuckey peter j.
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain

语言

  • 1,530 篇 英文
  • 53 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=dept of Computer Science and Software Engineering"
1595 条 记 录,以下是881-890 订阅
排序:
QoS-aware Service Composition over Graphplan through Graph Reachability
QoS-aware Service Composition over Graphplan through Graph R...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Min Chen Yuhong Yan Dept. of Computer Science and Software Engineering Concordia University Montreal Canada
QoS-aware service composition is a bi-objectivetask for the generation of a business process: to fulfill functional goals and to optimize the QoS criteria. Planning algorithms are frequently used for the generation of... 详细信息
来源: 评论
Nuclear norm minimization in subspace based continuous-time Hammerstein system identification
Nuclear norm minimization in subspace based continuous-time ...
收藏 引用
11th IEEE International Conference on Control and Automation, IEEE ICCA 2014
作者: Dai, Mingxiang Zhang, Jingxin Chai, Li Science and Technology on Transient Physics Laboratory Nanjing University of Science and Technology Nanjing 210094 China School of Software and Electrical Engineering Swinburne University of Technology VIC3211 Australia School of Information Science and Engineering Wuhan University of Science and Technology Wuhan 430081 China Dept of Electrical and Computer Systems Engineering Monash University VIC 3800 Australia
A novel method combining the nuclear norm minimization (NNM) and continuous-time (CT) subspace identification method (CSIM) is proposed to identify the CT Hammerstein model with little priori information. The nuclear ... 详细信息
来源: 评论
Similarity calculation method for user-define functions to detect malware variants  14
Similarity calculation method for user-define functions to d...
收藏 引用
2014 Conference on Research in Adaptive and Convergent Systems, RACS 2014
作者: Kim, TaeGuen Park, Jung Bin Cho, In Gyeom Im, Eul Gyu Kang, Boojoong Kang, SooYong Dept. of Computer and Software Hanyang University Seoul Korea Republic of Div. of Computer Science and Engineering Hanyang University Seoul Korea Republic of Institute of Electronics Communications and Information Technology Queen's University of Belfast Belfast United Kingdom
The number of malware has sharply increased over years, and it caused various damages on computing systems and data. In this paper, we propose techniques to detect malware variants. Malware authors usually reuse malwa... 详细信息
来源: 评论
SYNCEYE: An Availability Measurement Tool for Embedded Systems
SYNCEYE: An Availability Measurement Tool for Embedded Syste...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Junghwan Lee Kwangyong Lee Dept. of Computer Software and Engineering Korea University of Science and Technology (UST) Korea
In case of safety-critical embedded systems, software must have high availability to provide non-stop and reliable service. Therefore, we want to measure the availability of our system. However, using past methods, it... 详细信息
来源: 评论
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Scalable Security Models for Assessing Effectiveness of Movi...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Jin B. Hong Dong Seong Kim Computer Science and Software Engineering Dept. University of Canterbury Christchurch New Zealand
Moving Target Defense (MTD) changes the attack surface of a system that confuses intruders to thwart attacks. Various MTD techniques are developed to enhance the security of a networked system, but the effectiveness o... 详细信息
来源: 评论
Wiki-supported distributed requirements engineering for big stakeholder groups
Wiki-supported distributed requirements engineering for big ...
收藏 引用
Gemeinschaften in Neuen Medien, GeNeMe 2007 - Communities in New Media, GeNeMe 2007
作者: Hagen, Mariele Jungmann, Berit Lauenroth, Kim PRO DV Software AG Hauert 6 Dortmund Germany T-Systems Multimedia Solutions GmbH Riesaer Str. 5 Dresden Germany Dept. of Software Systems Engineering Institut for Computer Science and Business Information System University of Duisburg-Essen Essen Germany
来源: 评论
A Novel Approach to Perform Reversible Addition/Subtraction Operations Using Deoxyribonucleic Acid
A Novel Approach to Perform Reversible Addition/Subtraction ...
收藏 引用
IEEE International Symposium on Circuits and Systems
作者: Ankur Sarker Hafiz Md. Hasan Babu Saiful Islam Dept. of Computer Science and Engineering University of Dhaka Dhaka 1000 Bangladesh Dept. of Computer Science and Software Engineering Swinburne University of Technology VIC 3122 Australia
Reversible logic transforms logic signal in a way that allows the original input signals to be recovered from the produced outputs, has attracted great attention because of its application in many areas. Traditional s... 详细信息
来源: 评论
Mining contrast subspaces
Mining contrast subspaces
收藏 引用
18th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2014
作者: Duan, Lei Tang, Guanting Pei, Jian Bailey, James Dong, Guozhu Campbell, Akiko Tang, Changjie School of Computer Science Sichuan University China School of Computing Science Simon Fraser University Canada Dept. of Computing and Information Systems University of Melbourne Australia Dept. of Computer Sci. and Engr. Wright State University United States Pacific Blue Cross Canada State Key Laboratory of Software Engineering Wuhan University China
In this paper, we tackle a novel problem of mining contrast subspaces. Given a set of multidimensional objects in two classes C+ and C - and a query object o, we want to find top-k subspaces S that maximize the ratio ... 详细信息
来源: 评论
Weighted Combination of Q&A Retrieval Models Based on Part-of-Speech of Question Word
Weighted Combination of Q&A Retrieval Models Based on Part-o...
收藏 引用
International Conference on Information science and Applications (ICISA)
作者: Doo soo Chang Yong suk Choi Dept. of Computer and Software Hanyang University Seoul Korea Division of Computer Science and Engineering Hanyang University Seoul Korea
Question and answer archives have become useful information resources with increase of community based question and answer service. For effective question and answering system, it is important to find semantically sim... 详细信息
来源: 评论
FB+-tree: Indexing based on key ranges
FB+-tree: Indexing based on key ranges
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Cui Yu Josef Boyd Dept. Computer Science & Software Engineering Monmouth University West Long Branch NJ USA
The present idea is a fast indexing technique that builds an indexing structure based on multi-level key ranges typically for large data storage systems. It is explained based on the B + -tree and designed to reside i... 详细信息
来源: 评论