咨询与建议

限定检索结果

文献类型

  • 36,317 篇 会议
  • 550 册 图书
  • 543 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 37,409 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 24,514 篇 工学
    • 15,677 篇 计算机科学与技术...
    • 12,631 篇 软件工程
    • 3,752 篇 电气工程
    • 3,572 篇 信息与通信工程
    • 3,125 篇 控制科学与工程
    • 2,480 篇 化学工程与技术
    • 2,412 篇 机械工程
    • 2,187 篇 材料科学与工程(可...
    • 1,783 篇 电子科学与技术(可...
    • 1,532 篇 土木工程
    • 1,322 篇 建筑学
    • 1,307 篇 动力工程及工程热...
    • 1,276 篇 生物工程
    • 1,182 篇 生物医学工程(可授...
    • 1,003 篇 力学(可授工学、理...
    • 925 篇 仪器科学与技术
    • 915 篇 交通运输工程
    • 900 篇 安全科学与工程
  • 9,381 篇 理学
    • 4,429 篇 数学
    • 2,887 篇 物理学
    • 1,782 篇 化学
    • 1,487 篇 生物学
    • 1,186 篇 统计学(可授理学、...
    • 972 篇 系统科学
  • 5,998 篇 管理学
    • 4,192 篇 管理科学与工程(可...
    • 2,248 篇 图书情报与档案管...
    • 2,139 篇 工商管理
  • 1,108 篇 医学
    • 999 篇 临床医学
    • 912 篇 基础医学(可授医学...
  • 987 篇 教育学
    • 978 篇 教育学
  • 911 篇 经济学
  • 649 篇 法学
  • 242 篇 农学
  • 71 篇 军事学
  • 65 篇 文学
  • 16 篇 艺术学
  • 3 篇 历史学

主题

  • 1,848 篇 software enginee...
  • 1,335 篇 software
  • 671 篇 knowledge engine...
  • 508 篇 computer science
  • 424 篇 training
  • 411 篇 computational mo...
  • 393 篇 data mining
  • 378 篇 covid-19
  • 370 篇 application soft...
  • 352 篇 feature extracti...
  • 350 篇 artificial intel...
  • 325 篇 software design
  • 323 篇 computer archite...
  • 312 篇 software systems
  • 288 篇 deep learning
  • 282 篇 semantics
  • 272 篇 programming
  • 259 篇 mathematical mod...
  • 255 篇 conferences
  • 254 篇 knowledge manage...

机构

  • 53 篇 school of inform...
  • 48 篇 school of comput...
  • 46 篇 college of compu...
  • 46 篇 nanjing univ sta...
  • 42 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 school of comput...
  • 32 篇 univ chinese aca...
  • 24 篇 institute of inf...
  • 23 篇 college of infor...
  • 21 篇 school of inform...
  • 20 篇 software enginee...
  • 19 篇 university of el...
  • 18 篇 school of comput...
  • 18 篇 tsinghua univ sc...
  • 18 篇 university of mi...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 17 篇 department of el...
  • 16 篇 school of softwa...

作者

  • 26 篇 bernady o. apduh...
  • 25 篇 li li
  • 24 篇 lei wei
  • 22 篇 liu yang
  • 21 篇 jin zhi
  • 19 篇 li yang
  • 19 篇 wang qing
  • 18 篇 wang jian
  • 17 篇 qing wang
  • 17 篇 wnuk krzysztof
  • 16 篇 wang lei
  • 16 篇 li xin
  • 16 篇 wang hui
  • 16 篇 wei jun
  • 15 篇 zhang hongyu
  • 14 篇 liu bo
  • 14 篇 wang jing
  • 14 篇 liang peng
  • 13 篇 singh bhim
  • 13 篇 zhang dongmei

语言

  • 34,994 篇 英文
  • 2,009 篇 其他
  • 430 篇 中文
  • 10 篇 西班牙文
  • 10 篇 乌克兰文
  • 9 篇 俄文
  • 7 篇 法文
  • 7 篇 葡萄牙文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 斯洛伐克文
检索条件"任意字段=19th International Conference on Software Engineering and Knowledge Engineering"
37411 条 记 录,以下是821-830 订阅
排序:
Research on Method of On-Orbit Evolution for Aerospace Control software  1
收藏 引用
10th international conference on Signal and Information Processing, Network and Computers, ICSINC 2022
作者: Li, XiaoFeng Dong, XiaoGang Gu, Bin Zhao, Ming Zhong, RuiMing Li, Yi Wang, Jing Beijing Institute of Control Engineering Beijing100190 China Software College Northwestern Polytechnical University Xi’an710072 China
this paper summarizes the development of software evolution technology. Based on the fundamental concepts of software evolution, we deeply analyzed the motivation and evolution process of the on-orbit evolution for ae... 详细信息
来源: 评论
Vulnerability Detection Based on Adapter Tuning and Enhanced Feature Learning  36
Vulnerability Detection Based on Adapter Tuning and Enhanced...
收藏 引用
36th international conference on software engineering and knowledge engineering, SEKE 2024
作者: Luo, Hui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China PengCheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangdong Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China
Pre-trained code models have achieved promising results in the vulnerability detection field. the prevailing approach is to adapt these models with vulnerability datasets using inefficient full-model fine-tuning. thes... 详细信息
来源: 评论
the use of GeoGebra software to improve teaching in the field of marine electrical engineering  27
The use of GeoGebra software to improve teaching in the fiel...
收藏 引用
27th international conference on Information Technology, IT 2023
作者: Knezevic, Ilija Krcum, Maja Dlabac, Tatijana Gudelj, Anita University of Montenegro Faculty of Maritime Studies Kotor Put I Bokeljske brigade 44 Kotor85330 Montenegro University of Split Faculty of Maritime Studies Rudera Bo kovica 37 SplitHR-21000 Croatia
the development of computers and information technologies has made it possible to use various programs in the education process that facilitate the acquisition of knowledge. One of these software programs is GeoGebra,... 详细信息
来源: 评论
A COVID-19 Recognition Algorithm Based on Deep Transfer Learning  6
A COVID-19 Recognition Algorithm Based on Deep Transfer Lear...
收藏 引用
6th international conference on Electronic engineering and Informatics, EEI 2024
作者: Liu, Wanting Li, Yang Gu, Jian Zhou, Yuhang Dalian Minzu University Faculty of Science Dalian China School of Information Engineering Dalian Ocean University Dalian China
Since the end of 2019, the Corona Virus Disease 2019 (COVID-19) has spread rapidly around the world and the novel coronavirus pneumonia has become an infectious disease that poses a threat to global health. Rapid and ... 详细信息
来源: 评论
Homomorphic Encryption for AI-Based Applications: Challenges and Opportunities  15
Homomorphic Encryption for AI-Based Applications: Challenges...
收藏 引用
15th international conference on knowledge and Systems engineering, KSE 2023
作者: Hamza, Rafik Institute for International Strategy Tokyo International University 4-42-31 Higashi-Ikebukuro Toshima Tokyo170-0013 Japan
Homomorphic encryption is a technique that allows computations with encrypted data without revealing the data or requiring decryption. this technique has many potential applications in artificial intelligence (AI), wh... 详细信息
来源: 评论
Topic and Speaker-aware Hierarchical Encoder-Decoder Model for Dialogue Generation  35
Topic and Speaker-aware Hierarchical Encoder-Decoder Model f...
收藏 引用
35th international conference on software engineering and knowledge engineering, SEKE 2023
作者: Hu, Qitao Wei, Xiao School of Computer Engineering and Science Shanghai University China
As one of the most common social behavior in human society, communication in multi-turn conversation or dialogue system has always been a research focuses of natural language processing (NLP). the quality of downstrea... 详细信息
来源: 评论
A Tertiary Study on AI for Requirements engineering  30th
A Tertiary Study on AI for Requirements Engineering
收藏 引用
30th international Working conference on Requirements engineering - Foundation for software Quality (REFSQ)
作者: Mehraj, Ali Zhang, Zheying Systa, Kari Tampere Univ Tampere Finland
Context and Motivation: Rapid advancements in Artificial Intelligence (AI) have significantly influenced requirements engineering (RE) practices. Problem: While many recent secondary studies have explored AI's rol... 详细信息
来源: 评论
Design of a New Low-Voltage Low-Power Operational Transconductance Amplifier for OTA-C Filter Applications  19
Design of a New Low-Voltage Low-Power Operational Transcondu...
收藏 引用
19th Iranian conference on Intelligent Systems, ICIS 2024
作者: Mohammadali Zanjan, S. Saedi, Hamed Parvizi, Mostafa Islamic Azad University Smart Microgrid Research Center Najafabad Branch Najafabad Iran Islamic Azad University Najafabad Branch Department of Electrical Engineering Najafabad Iran
this study proposes a novel fully differential operational transconductance amplifier (FD-OTA) based on fully differential inverters. To reduce power consumption and improve performance at low voltages, the proposed a... 详细信息
来源: 评论
Intelligent Contract Timestamp Vulnerability Detection Based on Key Control Flow Graph  36
Intelligent Contract Timestamp Vulnerability Detection Based...
收藏 引用
36th international conference on software engineering and knowledge engineering, SEKE 2024
作者: Quan, Qing Yu Zeng, Cheng Wang, Yi Feng Wang, Jiao Ran School of Computer Science and Information Engineering Hubei University Wuhan China School of Artificial Intelligence Hubei University Wuhan China Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Wuhan China
the extensive application of smart contract technology in the blockchain domain has positioned it as a key component of the digital economy. However, as the application scope of smart contracts expands, security issue... 详细信息
来源: 评论
Power Transfer Function based Feedback Cancellation using Convex Combination of Adaptive Filters  19
Power Transfer Function based Feedback Cancellation using Co...
收藏 引用
19th international conference on Electrical engineering/Electronics, Computer, Telecommunications and Information Technology, ECTI-CON 2022
作者: Vanamadi, Ravi Kar, Asutosh Department of Electronics and Communication Engineering Chennai600127 India
this paper analysed the convex combination of adaptive filtering algorithms for single microphone and speaker hearing aid systems to cancel the acoustic feedback signal. the traditional hearing aid system is considere... 详细信息
来源: 评论