咨询与建议

限定检索结果

文献类型

  • 36,260 篇 会议
  • 594 篇 期刊文献
  • 548 册 图书
  • 1 篇 学位论文

馆藏范围

  • 37,401 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 24,563 篇 工学
    • 15,691 篇 计算机科学与技术...
    • 12,637 篇 软件工程
    • 3,753 篇 电气工程
    • 3,572 篇 信息与通信工程
    • 3,125 篇 控制科学与工程
    • 2,479 篇 化学工程与技术
    • 2,414 篇 机械工程
    • 2,214 篇 材料科学与工程(可...
    • 1,783 篇 电子科学与技术(可...
    • 1,533 篇 土木工程
    • 1,323 篇 建筑学
    • 1,308 篇 动力工程及工程热...
    • 1,279 篇 生物工程
    • 1,181 篇 生物医学工程(可授...
    • 1,003 篇 力学(可授工学、理...
    • 925 篇 仪器科学与技术
    • 915 篇 交通运输工程
    • 900 篇 安全科学与工程
  • 9,395 篇 理学
    • 4,429 篇 数学
    • 2,897 篇 物理学
    • 1,783 篇 化学
    • 1,490 篇 生物学
    • 1,189 篇 统计学(可授理学、...
    • 972 篇 系统科学
  • 6,004 篇 管理学
    • 4,198 篇 管理科学与工程(可...
    • 2,248 篇 图书情报与档案管...
    • 2,142 篇 工商管理
  • 1,108 篇 医学
    • 999 篇 临床医学
    • 912 篇 基础医学(可授医学...
  • 986 篇 教育学
    • 977 篇 教育学
  • 913 篇 经济学
  • 649 篇 法学
  • 242 篇 农学
  • 71 篇 军事学
  • 65 篇 文学
  • 16 篇 艺术学
  • 3 篇 历史学

主题

  • 1,823 篇 software enginee...
  • 1,324 篇 software
  • 665 篇 knowledge engine...
  • 506 篇 computer science
  • 415 篇 training
  • 404 篇 computational mo...
  • 386 篇 data mining
  • 378 篇 covid-19
  • 368 篇 application soft...
  • 352 篇 feature extracti...
  • 352 篇 artificial intel...
  • 327 篇 software design
  • 320 篇 computer archite...
  • 309 篇 software systems
  • 287 篇 deep learning
  • 278 篇 programming
  • 269 篇 semantics
  • 259 篇 mathematical mod...
  • 255 篇 conferences
  • 255 篇 knowledge manage...

机构

  • 52 篇 school of inform...
  • 48 篇 school of comput...
  • 46 篇 college of compu...
  • 46 篇 nanjing univ sta...
  • 41 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 school of comput...
  • 32 篇 univ chinese aca...
  • 23 篇 college of infor...
  • 22 篇 institute of inf...
  • 21 篇 school of inform...
  • 20 篇 software enginee...
  • 19 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 tsinghua univ sc...
  • 18 篇 university of mi...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 17 篇 department of el...
  • 16 篇 school of softwa...

作者

  • 26 篇 bernady o. apduh...
  • 25 篇 li li
  • 24 篇 lei wei
  • 22 篇 liu yang
  • 21 篇 jin zhi
  • 19 篇 li yang
  • 19 篇 wang qing
  • 18 篇 wang jian
  • 17 篇 qing wang
  • 17 篇 wnuk krzysztof
  • 16 篇 wang lei
  • 16 篇 li xin
  • 16 篇 wang hui
  • 16 篇 wei jun
  • 15 篇 zhang hongyu
  • 14 篇 liu bo
  • 14 篇 wang jing
  • 13 篇 singh bhim
  • 13 篇 zhang dongmei
  • 13 篇 liang peng

语言

  • 36,281 篇 英文
  • 708 篇 其他
  • 396 篇 中文
  • 11 篇 葡萄牙文
  • 10 篇 西班牙文
  • 10 篇 乌克兰文
  • 9 篇 俄文
  • 7 篇 法文
  • 2 篇 德文
  • 1 篇 日文
  • 1 篇 斯洛伐克文
检索条件"任意字段=19th International Conference on Software Engineering and Knowledge Engineering"
37403 条 记 录,以下是571-580 订阅
排序:
thermal Optimization Design of a Intelligent Programmable Controller Based on CFD software  19
Thermal Optimization Design of a Intelligent Programmable Co...
收藏 引用
19th international conference on Future Networks and Communications, FNC 2024 / 21st international conference on Mobile Systems and Pervasive Computing, MobiSPC 2024 / 14th international conference on Sustainable Energy Information Technology, SEIT 2024
作者: Yang, Zhangbin Wang, Haoran Liao, Xiang Chen, Feiyu Cai, Hang Luo, Quan China Three Gorges Construction Engineering Corporation Chengdu610095 China Three Gorges Intelligent Industrial Control Technology Co. Ltd Wuhan430070 China
With the increasing functionality of intelligent programmable controllers and the continuous improvement in power and component density, the problem of rapidly rising temperatures during operation has become increasin... 详细信息
来源: 评论
Teenagers: A Social Media threat Vector
Teenagers: A Social Media Threat Vector
收藏 引用
19th international conference on Cyber Warfare and Security
作者: Collier, Henry Morton, Charlotte Norwich Univ Northfield VT 05663 USA Univ Chester Chester Cheshire England
Social media has grown significantly since the early days. During this time, social media has grown to be a mainstay in most teenagers' lives. Whether they are on Facebook, Snapchat, X (formerly Twitter), or TikTo... 详细信息
来源: 评论
19th EAI international conference on Security and Privacy in Communication Networks, SecureComm 2023
19th EAI International Conference on Security and Privacy in...
收藏 引用
19th EAI international conference on Security and Privacy in Communication Networks, SecureComm 2023
the proceedings contain 51 papers. the special focus in this conference is on Security and Privacy in Communication Networks. the topics include: CyberEA: An Efficient Entity Alignment Framework for Cybersecurity...
来源: 评论
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps  24
Same App, Different Behaviors: Uncovering Device-specific Be...
收藏 引用
39th ACM/IEEE international conference on Automated software engineering (ASE)
作者: Dong, Zikan Zhao, Yanjie Liu, Tianming Wang, Chao Xu, Guosheng Xu, Guoai Zhang, Lin Wang, Haoyu Beijing Univ Posts & Telecommun Beijing Peoples R China Huazhong Univ Sci & Technol Wuhan Peoples R China Monash Univ Melbourne Vic Australia Harbin Inst Technol Shenzhen Peoples R China Coordinat Ctr China CNCERT CC Natl Comp Emergency Response Team Beijing Peoples R China
the Android ecosystem is significantly challenged by fragmentation, arising from diverse system versions, device specifications, and manufacturer customizations. the growing divergence among devices leads to marked va... 详细信息
来源: 评论
Vulnerability Detection Based on Pre-trained Code Language Model and Convolutional Neural Network  36
Vulnerability Detection Based on Pre-trained Code Language M...
收藏 引用
36th international conference on software engineering and knowledge engineering, SEKE 2024
作者: Liao, Tingfeng Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
software vulnerabilities damage the reliability of software systems. Recently, many methods based on deep learning have been proposed for vulnerability detection by learning features from code sequences or various pro... 详细信息
来源: 评论
the Role of Team Composition in Agile software Development Education: A Gendered Perspective  25th
The Role of Team Composition in Agile Software Development E...
收藏 引用
25th international conference on Agile software Development (XP)
作者: Saeter, Gyda Elisa Stray, Viktoria Almas, Steffen Lindsjorn, Yngve Univ Oslo N-0373 Oslo Norway
Team composition is a critical factor influencing collaboration within agile software development. this study investigates the impact of gender distribution on teamwork quality in software engineering capstone courses... 详细信息
来源: 评论
New technologies in the educational process on the example of FlexSim® software - the digital twin solution  28th
New technologies in the educational process on the example o...
收藏 引用
28th international conference on knowledge Based and Intelligent information and engineering Systems, KES 2024
作者: Ubowska, Agnieszka Królikowski, Tomasz Faculty of Maritime Technology and Transport West Pomeranian University of Technology in Szczecin Szczecin71-065 Poland Faculty of Mechanical Engineering Koszalin University of Technology Koszalin75- 453 Poland
Access to new technologies in the educational process and developing digital competences enabling critical and responsible use of digital technologies, including future professional work is a challenge for universitie... 详细信息
来源: 评论
Experiences With Gap-Bridging software engineering Industry-Academia Collaborative Education Program  35
Experiences With Gap-Bridging Software Engineering Industry-...
收藏 引用
35th IEEE international conference on software engineering Education and Training, CSEE and T 2023
作者: Sabariah, Mira Kania Effendy, Veronikha Husen, Jati H. Fadhlurrohman, Daffa Hilmy Setyawansyah, Rony Telkom University Bachelor of Software Engineering Bandung Indonesia PT. Telkom Indonesia Bandung Indonesia
University-level software engineering education faces the challenge of providing both fundamental concepts while delivering to their students the latest trend in tools and practices. However, software engineering prog... 详细信息
来源: 评论
Building Up Green software Life Cycle Model  10
Building Up Green Software Life Cycle Model
收藏 引用
10th international conference on ICT for Sustainability
作者: Kivimaki, Lauri Partanen, Laura Porras, Jari Tarkkanen, Kimmo Tuikka, Anne-Marie Makela, Jari-Matti Makila, Tuoas Univ Turku Turku Finland LUT Univ Lahti Finland LUT Univ Lappeenranta Finland Turku Univ Appl Sci Turku Finland
With the increased focus and importance placed on the twin green and digital transition, also the development of digital products and software systems must take environmental sustainability into account. At present, t... 详细信息
来源: 评论
MDASC: Advanced Dual-Layered Code Cloning Technique for Identifying Reused Malicious Code  36
MDASC: Advanced Dual-Layered Code Cloning Technique for Iden...
收藏 引用
36th international conference on software engineering and knowledge engineering, SEKE 2024
作者: Glani, Yasir Ping, Luo Ke, Lin School of Software Tsinghua University China
Code cloning is a prevalent practice in software development, frequently exploited by adversaries to propagate malicious code, compromising user security and privacy. Recently proposed detection techniques often fail ... 详细信息
来源: 评论