咨询与建议

限定检索结果

文献类型

  • 39,245 篇 会议
  • 172 篇 期刊文献
  • 43 册 图书
  • 1 篇 学位论文

馆藏范围

  • 39,461 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,529 篇 工学
    • 20,570 篇 计算机科学与技术...
    • 17,966 篇 软件工程
    • 5,176 篇 信息与通信工程
    • 4,582 篇 控制科学与工程
    • 3,725 篇 电气工程
    • 3,067 篇 电子科学与技术(可...
    • 2,520 篇 机械工程
    • 1,771 篇 生物工程
    • 1,616 篇 仪器科学与技术
    • 1,454 篇 生物医学工程(可授...
    • 1,437 篇 动力工程及工程热...
    • 1,089 篇 光学工程
    • 1,088 篇 化学工程与技术
    • 1,086 篇 安全科学与工程
    • 994 篇 交通运输工程
    • 888 篇 土木工程
    • 842 篇 材料科学与工程(可...
  • 10,692 篇 理学
    • 6,351 篇 数学
    • 2,742 篇 物理学
    • 1,921 篇 生物学
    • 1,485 篇 统计学(可授理学、...
    • 1,087 篇 化学
    • 1,078 篇 系统科学
  • 7,081 篇 管理学
    • 4,971 篇 管理科学与工程(可...
    • 2,519 篇 图书情报与档案管...
    • 2,334 篇 工商管理
  • 1,283 篇 医学
    • 1,045 篇 临床医学
    • 954 篇 基础医学(可授医学...
  • 950 篇 法学
  • 922 篇 经济学
    • 916 篇 应用经济学
  • 889 篇 教育学
    • 879 篇 教育学
  • 384 篇 农学
  • 258 篇 文学
  • 124 篇 军事学
  • 87 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 1,746 篇 computer science
  • 1,623 篇 software
  • 1,436 篇 application soft...
  • 1,292 篇 software enginee...
  • 597 篇 computer archite...
  • 555 篇 hardware
  • 526 篇 computational mo...
  • 473 篇 data mining
  • 461 篇 conferences
  • 430 篇 software systems
  • 430 篇 educational inst...
  • 416 篇 costs
  • 410 篇 testing
  • 403 篇 software testing
  • 388 篇 feature extracti...
  • 359 篇 semantics
  • 350 篇 training
  • 341 篇 deep learning
  • 334 篇 internet of thin...
  • 324 篇 programming

机构

  • 155 篇 school of inform...
  • 143 篇 college of compu...
  • 113 篇 university of el...
  • 104 篇 school of comput...
  • 88 篇 school of softwa...
  • 82 篇 state key labora...
  • 75 篇 school of comput...
  • 71 篇 huazhong univers...
  • 63 篇 nanjing univ sta...
  • 62 篇 ieee
  • 54 篇 school of comput...
  • 44 篇 university of sc...
  • 42 篇 department of co...
  • 41 篇 school of big da...
  • 36 篇 college of infor...
  • 34 篇 institute of inf...
  • 34 篇 software college...
  • 33 篇 college of compu...
  • 33 篇 faculty of infor...
  • 32 篇 school of automa...

作者

  • 54 篇 li li
  • 43 篇 liu yang
  • 39 篇 zhang lei
  • 36 篇 baowen xu
  • 31 篇 li yang
  • 28 篇 lei wang
  • 25 篇 zhang tao
  • 25 篇 wang jian
  • 25 篇 wei li
  • 24 篇 qing wang
  • 23 篇 wang hui
  • 22 篇 xiao liu
  • 22 篇 wang lei
  • 22 篇 wei liu
  • 22 篇 liu xin
  • 21 篇 zhang chao
  • 20 篇 rehman attique u...
  • 19 篇 li jin
  • 19 篇 baojian hua
  • 18 篇 min huang

语言

  • 37,616 篇 英文
  • 1,344 篇 其他
  • 493 篇 中文
  • 5 篇 土耳其文
  • 4 篇 西班牙文
  • 2 篇 法文
  • 1 篇 葡萄牙文
检索条件"任意字段=IEEE International Conference on Software - Science, Technology and Engineering 2005"
39461 条 记 录,以下是61-70 订阅
排序:
Assessing software Interface Quality in the Humanmachine Interaction Systems  6
Assessing Software Interface Quality in the Humanmachine Int...
收藏 引用
6th international Youth conference on Radio Electronics, Electrical and Power engineering, REEPE 2024
作者: Tarkhov, Sergey V. Tarkhova, Lyaylya M. Minasova, Anastasia Sh. Ufa University of Science and Technology Ufa Russia Bashkir State Agrarian University Ufa Russia Bauman Moscow State Technical University Moscow Russia
This paper considers issues of conducting research to assess the software interface quality level. The list of criteria for assessing the interface quality is determined in accordance with the generally accepted inter... 详细信息
来源: 评论
Contributing Back to the Ecosystem: A User Survey of NPM Developers  22
Contributing Back to the Ecosystem: A User Survey of NPM Dev...
收藏 引用
22nd ieee/ACIS international conference on software engineering Research, Management and Applications, SERA 2024
作者: Wattanakriengkrai, Supatsara Treude, Christoph Kula, Raula Gaikovina Nara Institute of Science and Technology Japan Singapore Management University Singapore Singapore
With the rise of the library ecosystem (such as NPM for JavaScript and PyPI for Python), a developer has access to a multitude of library packages that they can adopt as dependencies into their application. Prior work... 详细信息
来源: 评论
Accuracy Prediction of Ensemble Deep Learning Model through software Defect Prediction  2
Accuracy Prediction of Ensemble Deep Learning Model through ...
收藏 引用
2nd international conference on Data science and Information System, ICDSIS 2024
作者: Charan, S. Sinha, Sumana Sujan, S.M. Nayak, Ullal Akshatha Nitte Meenakshi Institute Of Technology Information Science And Engineering Bangalore India
Defect detection and repair are critical to the performance and dependability of modern software development. To evaluate large software repositories and find errors early in the development process, this study propos... 详细信息
来源: 评论
B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests  24
B<SUP>4</SUP>: Towards Optimal Assessment of Plausible Code ...
收藏 引用
39th ACM/ieee international conference on Automated software engineering (ASE)
作者: Chen, Mouxiang Liu, Zhongxin Tao, He Hong, Yusu Lo, David Xia, Xin Sun, Jianling Zhejiang Univ State Key Lab Blockchain & Data Secur Hangzhou Peoples R China Zhejiang Univ Hangzhou Peoples R China Singapore Management Univ Singapore Singapore Hangzhou High Tech Zone Binjiang Inst Blockchain Hangzhou Peoples R China
Selecting the best code solution from multiple generated ones is an essential task in code generation, which can be achieved by using some reliable validators (e.g., developer-written test cases) for assistance. Since... 详细信息
来源: 评论
Electromagnetic-Thermal-Stress Multiphysics Modeling of a TD-LTE Triple Band Patch Antenna
Electromagnetic-Thermal-Stress Multiphysics Modeling of a TD...
收藏 引用
2024 ieee international conference on Computational Electromagnetics, ICCEM 2024
作者: Liao, Zhengwen Chen, Yifan Liang, Ruihua Zhu, Jian Wan, Ting Nanjing University of Posts and Telecommunications Department of Communication Engineering Nanjing China
In this work, A multi-physics field simulation method based on the finite element method is developed for reliability analysis of multi-band antennas. The Multiphysics field simulation describes the multidisciplinary ... 详细信息
来源: 评论
Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness Detection  24
Combining Coverage and Expert Features with Semantic Represe...
收藏 引用
39th ACM/ieee international conference on Automated software engineering (ASE)
作者: Xie, Huan Lei, Yan Li, Maojin Yan, Meng Zhang, Sheng Chongqing Univ Sch Big Data & Software Engn Chongqing Peoples R China Peng Cheng Lab Shenzhen Peoples R China
Coincidental correctness (CC) can be misleading for developers because it gives the impression that the code is functioning correctly when there are hidden faults. To mitigate the negative impacts of CC test cases, ex... 详细信息
来源: 评论
Key Logger for Recording the Keystroke of the Targeted Machine  1
Key Logger for Recording the Keystroke of the Targeted Machi...
收藏 引用
1st ieee international conference on Computing and Data science, ICCDS 2024
作者: Gnanavel, S. Sreekrishna, M. Shivaramakrishnan, P. Yaswanth, R. Gopika, G.S. Supriya, S. SRM Institute of Science and Technology Faculty of Engineering and Technology Dept of Computing Technologies Kattankulathur603203 India Sathyabama Institute of Science and Technology Dept of Computer Science Engineering Chennai600119 India
In the recent digital era security has become more challenging. There is a plethora of ways to find solution to ensure monitor the system and provide required security. Key logger is one of the cyber attacks which rec... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/ieee international conference on software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
RSAGEL: A Hybrid Graph Neural Network Based Intrusion Detection Model for software Defined Networking  9
RSAGEL: A Hybrid Graph Neural Network Based Intrusion Detect...
收藏 引用
9th international conference on Information science, Computer technology and Transportation, ISCTT 2024
作者: Zhang, Yue Liu, Wanxiao Chen, Jue Ma, Yurui College of Electronic and Electric Engineering Shanghai University of Engineering Science Shanghai China
software Defined Networking (SDN) has emerged as a revolutionary network architecture aimed at surpassing the constraints inherent in traditional network infrastructures. As SDN adoption increases, it brings additiona... 详细信息
来源: 评论
Design of a Magnetic Loop Antenna Suitable for High Frequency Communication in Moving Vehicle
Design of a Magnetic Loop Antenna Suitable for High Frequenc...
收藏 引用
2024 ieee international conference on Computational Electromagnetics, ICCEM 2024
作者: Liu, Kewei Zhao, Yingyan Cao, Qunsheng College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing China
In this paper, a near vertical incident skywave (NVIS) shortwave magnetic loop antenna suitable for engineering applications is proposed and designed, and the effects of its structural form, size, and impedance matchi... 详细信息
来源: 评论