咨询与建议

限定检索结果

文献类型

  • 1,695 篇 会议
  • 252 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 1,985 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,240 篇 工学
    • 1,027 篇 计算机科学与技术...
    • 869 篇 软件工程
    • 287 篇 信息与通信工程
    • 167 篇 控制科学与工程
    • 131 篇 生物工程
    • 105 篇 电气工程
    • 88 篇 电子科学与技术(可...
    • 87 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 53 篇 安全科学与工程
    • 51 篇 机械工程
    • 47 篇 动力工程及工程热...
    • 37 篇 建筑学
    • 37 篇 交通运输工程
    • 33 篇 土木工程
  • 529 篇 理学
    • 321 篇 数学
    • 142 篇 生物学
    • 94 篇 统计学(可授理学、...
    • 90 篇 物理学
    • 66 篇 系统科学
  • 381 篇 管理学
    • 221 篇 管理科学与工程(可...
    • 186 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 79 篇 医学
    • 72 篇 临床医学
    • 69 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
    • 37 篇 公共卫生与预防医...
  • 76 篇 法学
    • 56 篇 社会学
  • 43 篇 经济学
    • 43 篇 应用经济学
  • 42 篇 教育学
    • 42 篇 教育学
  • 26 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 software
  • 61 篇 software enginee...
  • 58 篇 accuracy
  • 57 篇 machine learning
  • 46 篇 feature extracti...
  • 46 篇 training
  • 41 篇 computational mo...
  • 39 篇 deep learning
  • 39 篇 real-time system...
  • 34 篇 computer science
  • 33 篇 semantics
  • 32 篇 artificial intel...
  • 30 篇 predictive model...
  • 29 篇 internet of thin...
  • 29 篇 data mining
  • 28 篇 data models
  • 27 篇 analytical model...
  • 24 篇 computer archite...
  • 23 篇 support vector m...
  • 23 篇 testing

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 shafiur rahman
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 dong min

语言

  • 1,714 篇 英文
  • 257 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=dept. of Computer and Software Engineering"
1985 条 记 录,以下是1741-1750 订阅
排序:
Configuration strategies for evolutionary testing
Configuration strategies for evolutionary testing
收藏 引用
29th Annual International computer software and Applications Conference, COMPSAC 2005
作者: Xiaoyuan, Xie Baowen, Xu Changhai, Nie Liang, Shi Lei, Xu Dept. of Computer Science and Engineering Southeast University 210096 Nanjing China Jiangsu Institute of Software Quality 210096 Nanjing China Computer School National University of Defense Technology 410073 Changsha China Key Laboratory of Software Engineering Wuhan University 430072 Wuhan China
Evolutionary Testing (ET) is a kind of efficient method of automatically test case generation, ET uses a kind of meta-heuristic search technique, the Genetic Algorithm, to convert the task of test case generation into... 详细信息
来源: 评论
An interactive distributed evolutionary algorithm (IDEA) for design
An interactive distributed evolutionary algorithm (IDEA) for...
收藏 引用
IEEE Systems, Man and Cybernetics Society, Proceedings - 2005 International Conference on Systems, Man and Cybernetics
作者: Dozier, Gerry Carnahan, Brian Seals, Cheryl Kuntz, Lois-Ann Fu, Ser-Geon Dept. of Computer Science and Software Engineering Auburn University Auburn AL 36849-5347 Dept. of Industrial Systems Engineering Auburn University Auburn AL 36849-5347 Dept. of Psychology University of Maine at Machias 9 O'Brien Avenue Machias ME 04654-1397
Evolutionary computation (EC) has been successfully applied to a wide range of design problems. There has also been an abundant amount of work in applying interactive ECs in the design of displays, robot behavior, bit... 详细信息
来源: 评论
Panel: Using peer review in teaching computing
Panel: Using peer review in teaching computing
收藏 引用
Proceedings of the Thirty-Sixth SIGCSE Technical Symposium on computer Science Education, SIGCSE 2005
作者: Gehringer, Edward F. Chinn, Donald D. Ardis, Mark A. Pérez-Quinones, Manuel A. North Carolina State University Depts. of Computer Science and ECE Raleigh NC 27695-7256 Univ. of Washington at Tacoma Dept. of Computing and Software Systems Tacoma WA 98402 Rose-Hulman Institute of Technology Dept. of Computer Science and Software Engineering Terre Haute IN 47803 Department of Computer Science Virginia Tech Blacksburg VA 24061
For generations, the academic community has relied on peer review as a way of encouraging scholarship and enhancing the knowledge base. Peer review has been widely used in the classroom since at least the 1970s, with ... 详细信息
来源: 评论
Analysis of breast cancer using data mining & statistical techniques
Analysis of breast cancer using data mining & statistical te...
收藏 引用
6th International Conference on software engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and 1st ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005
作者: Xiong, Xiangchun Kim, Yangon Baek, Yuncheol Rhee, Dae Wong Kim, Soo-Hong Computer and Information Sciences Towson University Towson MD 21252 College of Software Sciences and Media Technology Sangmyung University Seoul Korea Republic of Dept. of Computer Sogftware Engineering College of Engineering Sangmyung University Seoul Korea Republic of
Data Mining & Statistics Analysis is the search for valuable information in large volumes of data. It is now widely used in health care industry. Especially breast cancer is the second most cause of cancer and the... 详细信息
来源: 评论
Hardware support: A cache lock mechanism without retry
Hardware support: A cache lock mechanism without retry
收藏 引用
6th International Conference on software engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and 1st ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005
作者: Hong, Chuleui Park, Kyeongmo Song, Yeong-Tae Software School Sangmyung University Seoul Korea Republic of School of Computer Science and Information Engineering Catholic University Korea Republic of Dept. of Computer and Information Science Towson University MD United States
A lock mechanism is essential for synchronization on the multiprocessor systems. The conventional queuing lock has two bus traffics that are the initial and retry of the lock-read This paper proposes the new locking p... 详细信息
来源: 评论
Requirements for CBD products and process quality
Requirements for CBD products and process quality
收藏 引用
3rd ACIS International Conference on software engineering Research, Management and Applications, SERA 2005
作者: Kim, Haeng-Kon Lee, Roger Y. Yang, Hae-Sool Dept. of Computer Information and Engineering Catholic University of Deagu Korea Republic of Software Engineering and Information Technology Institute Central Michigan University United States Hoseo Graduate School of Venture Korea Republic of
This position paper presents arguments for including the properties of processes involved in various approaches to component-based software development in predicting systems properties. It discusses how processes impa... 详细信息
来源: 评论
Client authentication model using duplicated authentication server systems
Client authentication model using duplicated authentication ...
收藏 引用
13th International Conference on AIS 2004
作者: Lee, Jae-Woo Software System Lab. Dept. of Computer Science and Engineering Korea University 1 5-ka Anam-dong SungBuk-ku 136-701 Seoul Korea Republic of
In the Internet and distributed systems, we can always access many application servers for gaining many information or electronic business processing, etc. Despite of those advantages of information technology, there ... 详细信息
来源: 评论
Security agent model using interactive authentication database
Security agent model using interactive authentication databa...
收藏 引用
13th International Conference on AIS 2004
作者: Lee, Jae-Woo Software System Lab. Dept. of Computer Science and Engineering Korea University 1 5-ka Anam-dong SungBuk-ku 136-701 Seoul Korea Republic of
Authentication agent enables an authorized user to gain authority in the Internet or distributed computing systems. It is one of the most important problems that application server systems can identify many clients au... 详细信息
来源: 评论
Evaluation of three methods to predict project success: A case study  1
收藏 引用
6th International Conference on Product Focused software Process Improvement, PROFES 2005
作者: Wohlin, Claes Amschler Andrews, Anneliese Dept. of Systems and Software Engineering Blekinge Institute of Technology School of Engineering SE-372 25 Ronneby Sweden School of Electrical Engineering and Computer Science Washington State University Pullman WA 99164-2752 United States
To increase the likelihood for software project success, it is important to be able to identify the drivers of success. This paper compares three methods to identify similar projects with the objective to predict proj... 详细信息
来源: 评论
Non-null references by default in the Java Modeling Language
Non-null references by default in the Java Modeling Language
收藏 引用
2005 Conference on Specification and Verification of Component-Based Systems, SAVCBS 2005
作者: Chalin, Patrice Rioux, Frédéric Dept. of Computer Science and Software Engineering Dependable Software Research Group Concordia University 1455 de Maisonneuve Blvd. West MontréalQCH3G 1M8 Canada
Based on our experiences and those of our peers, we hypothesized that in Java code, the majority of declarations that are of reference types are meant to be non-null. Unfortunately, the Java Modeling Language (JML), l... 详细信息
来源: 评论