咨询与建议

限定检索结果

文献类型

  • 34,475 篇 会议
  • 635 篇 期刊文献
  • 476 册 图书

馆藏范围

  • 35,584 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 23,074 篇 工学
    • 15,087 篇 计算机科学与技术...
    • 12,184 篇 软件工程
    • 3,157 篇 信息与通信工程
    • 3,060 篇 电气工程
    • 2,881 篇 控制科学与工程
    • 2,154 篇 化学工程与技术
    • 1,865 篇 材料科学与工程(可...
    • 1,799 篇 机械工程
    • 1,602 篇 电子科学与技术(可...
    • 1,229 篇 土木工程
    • 1,217 篇 建筑学
    • 1,212 篇 生物工程
    • 1,208 篇 动力工程及工程热...
    • 1,021 篇 生物医学工程(可授...
    • 911 篇 环境科学与工程(可...
    • 873 篇 力学(可授工学、理...
    • 858 篇 交通运输工程
    • 848 篇 安全科学与工程
    • 836 篇 光学工程
    • 806 篇 仪器科学与技术
  • 8,177 篇 理学
    • 3,866 篇 数学
    • 2,315 篇 物理学
    • 1,426 篇 化学
    • 1,363 篇 生物学
    • 1,108 篇 统计学(可授理学、...
    • 928 篇 系统科学
  • 5,293 篇 管理学
    • 3,784 篇 管理科学与工程(可...
    • 1,854 篇 图书情报与档案管...
    • 1,768 篇 工商管理
  • 830 篇 教育学
    • 821 篇 教育学
  • 775 篇 法学
  • 748 篇 医学
  • 609 篇 经济学
  • 243 篇 农学
  • 75 篇 文学
  • 67 篇 艺术学
  • 55 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 1,647 篇 software enginee...
  • 1,233 篇 software
  • 637 篇 knowledge engine...
  • 469 篇 computer science
  • 444 篇 training
  • 440 篇 computational mo...
  • 377 篇 conferences
  • 376 篇 application soft...
  • 370 篇 data mining
  • 357 篇 mathematical mod...
  • 337 篇 feature extracti...
  • 334 篇 computer archite...
  • 318 篇 testing
  • 293 篇 semantics
  • 290 篇 software design
  • 278 篇 artificial intel...
  • 276 篇 software systems
  • 259 篇 deep learning
  • 258 篇 machine learning
  • 249 篇 knowledge manage...

机构

  • 65 篇 school of inform...
  • 59 篇 school of comput...
  • 58 篇 nanjing univ sta...
  • 48 篇 school of comput...
  • 38 篇 university of el...
  • 37 篇 univ chinese aca...
  • 36 篇 college of compu...
  • 35 篇 school of comput...
  • 27 篇 university of el...
  • 24 篇 department of el...
  • 22 篇 college of infor...
  • 22 篇 school of comput...
  • 22 篇 department of el...
  • 21 篇 university of mi...
  • 20 篇 school of softwa...
  • 19 篇 school of electr...
  • 19 篇 school of inform...
  • 19 篇 universitas sang...
  • 18 篇 school of automa...
  • 17 篇 software enginee...

作者

  • 32 篇 li li
  • 29 篇 bernady o. apduh...
  • 22 篇 liu yang
  • 21 篇 jin zhi
  • 21 篇 wang qing
  • 19 篇 qing wang
  • 19 篇 li yang
  • 18 篇 wang lei
  • 15 篇 lee s.
  • 14 篇 wnuk krzysztof
  • 14 篇 wei jun
  • 13 篇 xiangjun xin
  • 13 篇 zhang hongyu
  • 13 篇 zhang lei
  • 13 篇 wu huisi
  • 12 篇 bin wang
  • 12 篇 wang jing
  • 12 篇 li zhang
  • 11 篇 jazdi nasser
  • 11 篇 hironori washiza...

语言

  • 34,195 篇 英文
  • 1,036 篇 其他
  • 350 篇 中文
  • 15 篇 葡萄牙文
  • 13 篇 西班牙文
  • 6 篇 俄文
  • 5 篇 法文
  • 4 篇 德文
  • 2 篇 土耳其文
  • 1 篇 日文
  • 1 篇 斯洛伐克文
  • 1 篇 乌克兰文
检索条件"任意字段=18th International Conference on Software Engineering and Knowledge Engineering"
35586 条 记 录,以下是411-420 订阅
排序:
Attribution-based Personas in Virtual software engineering Education  23
Attribution-based Personas in Virtual Software Engineering E...
收藏 引用
IEEE/ACM 45th international conference on software engineering - software engineering Education and Training (ICSE-SEET)
作者: Madhi, Klaudia Reimer, Lara Marie Jonas, Stephan Tech Univ Munich Sch Computat Informat & Technol Munich Germany Univ Hosp Bonn Inst Digital Med Bonn Germany Slack Technol San Francisco CA USA Microsoft Redmont WA USA Zoom Video Commun San Jose CA USA
the COVID-19 pandemic and the consequent introduction of virtual collaboration have introduced educators to unexpected situations and challenges. One of these challenges is social distance, which minimizes knowledge o... 详细信息
来源: 评论
Integrating Clinical Expertise into software Development: Evaluating the Use of openEHR Archetypes for Requirements Elicitation in Healthcare Applications
Integrating Clinical Expertise into Software Development: Ev...
收藏 引用
18th international Joint conference on Biomedical engineering Systems and Technologies, BIOSTEC 2025
作者: Silva, José Araújo, André Computing Institute Federal University of Alagoas Av. Lourival Melo Mota S/N Cidade Universitária Maceió Brazil
OpenEHR archetypes are standardized frameworks designed to model clinical information in healthcare systems, enabling a consistent and integrated representation of complex data. these models encompass common clinical ... 详细信息
来源: 评论
Advanced Neural Network Approaches for Distinguishing Real from Synthetic in GAN-generated Data Authenticity Challenges  18
Advanced Neural Network Approaches for Distinguishing Real f...
收藏 引用
18th INDIAcom;11th international conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Subaranjani, T. Jayaraj, N. The Oxford College of Engineering Dept. of Artificial Intelligence and Machine Learning Bangalore India The Oxford College of Engineering Dept. of Electronics and Communication Engineering Bangalore India
Amid the transformative advancements of Generative Adversarial Networks (GANs) in machine learning, a pertinent challenge arises: discerning real instances from synthetic ones. this research introduces a novel neural ... 详细信息
来源: 评论
Cloud Cryptography: Mechanism of Different Encryption Standards  18
Cloud Cryptography: Mechanism of Different Encryption Standa...
收藏 引用
18th INDIAcom;11th international conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Lanke, Ravikumar Md Zubair Rahman, A.M.J. Bhardwaj, Rajat Somashekhara Reddy, D. Jain, Parth Mahesh, T.R. Dept. of Computer Science and Engineering Bangalore India Al-Ameen Engineering College Karundevanpalayam Erode India Aset Amity University Department of Computer Science and Engineering Bengaluru India
the term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. the provision of computing services, including sto... 详细信息
来源: 评论
ADAPTING thE software DESIGN PATTERN MODEL FOR AI-ENABLED DESIGN COMPUTING  29th
ADAPTING THE SOFTWARE DESIGN PATTERN MODEL FOR AI-ENABLED DE...
收藏 引用
29th international conference of the Association-for-Computer-Aided-Architectural-Design-Research-in-Asia (CAADRIA)
作者: Kimm, Geoff White, Marcus Burry, Mark Swinburne Univ Technol Hawthorn Vic 3122 Australia
Exponential AI development requires an adaptation to new technology by traditionally reluctant architects and allied practitioners. this paper examines the potential of the software design pattern (SDP) model, used in... 详细信息
来源: 评论
Decoding Student Feedback in engineering Education: A Latent Dirichlet Allocation and PyLDAvis Approach  4th
Decoding Student Feedback in Engineering Education: A Latent...
收藏 引用
4th international conference on Artificial Intelligence and knowledge Processing
作者: Alhassan, Ilyas Rege, Manjeet Univ St Thomas Dept Software Engn & Data Sci St Paul MN 55105 USA
this study investigates the efficacy of Latent Dirichlet Allocation (LDA) and PyLDAvis in analyzing feedback from final-year engineering students. By dissecting responses to strategically selected questions, we identi... 详细信息
来源: 评论
Compatibility Analysis of Construction and Demolished Waste in the Modern Era of Sustainable Road Infrastructure  18
Compatibility Analysis of Construction and Demolished Waste ...
收藏 引用
18th INDIAcom;11th international conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Kaur, Harshpreet Joshi, Mohendra Sood, Mona Singh, Sandeep Maan, Vikasdeep Singh Lpu Lovely School of Architecture and Design Punjab Phagwara India University Centre for Research and Development Chandigarh University Dept. of Civil Engineering Gharuan India
Construction waste is becoming a problem day by day, with ever changing human needs, architecture styles;wear 'n tear and many other reasons. Rapid industrial development and disregard towards the environmental he... 详细信息
来源: 评论
knowledge Graph Recommendation Algorithm Combined with PersonalRank Sampling  4
Knowledge Graph Recommendation Algorithm Combined with Perso...
收藏 引用
4th international conference on Consumer Electronics and Computer engineering, ICCECE 2024
作者: Jin, Haibo Feng, Yujing School of Software Engineering Liaoning University of Engineering and Technology Huludao China
In order to effectively solve the problem of model cold start, the recommendation system was introduced into the knowledge graph., but it is difficult to obtain accurately user's preference because of strong noise... 详细信息
来源: 评论
Linear Encryption Techniques for Counteracting Information-based Stealthy Attacks  18
Linear Encryption Techniques for Counteracting Information-b...
收藏 引用
18th international conference on Control Automation Robotics and Vision
作者: Shang, Jun Zhang, Hanwen Rao, Weixiong Hong, Yiguang Tongji Univ Frontiers Sci Ctr Intelligent Autonomous Syst Shanghai Inst Intelligent Sci & Technol Natl Key Lab Autonomous Intelligent Unmanned Syst Shanghai 200092 Peoples R China Tongji Univ Dept Control Sci & Engn Shanghai 200092 Peoples R China Univ Sci & Technol Beijing Sch Automat & Elect Engn Key Lab Knowledge Automat Ind Proc Minist Educ Beijing 100083 Peoples R China Tongji Univ Sch Software Engn Shanghai 200070 Peoples R China
this study explores linear encryption techniques to protect against information-based stealthy attacks on remote state estimation. Utilizing smart sensors equipped with local Kalman filters, the system transmits innov... 详细信息
来源: 评论
Abstract Interpretation for PLONKish Circuits  34
Abstract Interpretation for PLONKish Circuits
收藏 引用
34th Annual international conference on Collaborative Advances in software and Computing, CASCON 2024
作者: Soureshjani, Fatemeh Heidari Gorzny, Jan Polytechnique Montréal Computer Engineering and Software Engineering Department Canada Zircuit Canada
Zero-knowledge proof systems are becoming powerful tools in domains like blockchain networks. In this work, we improve abstract interpretation methods to sanity check PLONKish arithmetizations of computation, such as ... 详细信息
来源: 评论