咨询与建议

限定检索结果

文献类型

  • 682,416 篇 会议
  • 11,817 篇 期刊文献
  • 6,244 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 700,482 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 413,512 篇 工学
    • 304,595 篇 计算机科学与技术...
    • 244,026 篇 软件工程
    • 84,209 篇 信息与通信工程
    • 56,729 篇 控制科学与工程
    • 46,535 篇 电气工程
    • 36,399 篇 机械工程
    • 35,387 篇 电子科学与技术(可...
    • 35,234 篇 生物工程
    • 29,473 篇 生物医学工程(可授...
    • 21,614 篇 光学工程
    • 21,253 篇 仪器科学与技术
    • 19,341 篇 动力工程及工程热...
    • 18,252 篇 化学工程与技术
    • 15,345 篇 安全科学与工程
    • 14,427 篇 材料科学与工程(可...
    • 13,540 篇 交通运输工程
    • 12,981 篇 土木工程
  • 167,884 篇 理学
    • 93,824 篇 数学
    • 41,269 篇 物理学
    • 37,978 篇 生物学
    • 26,763 篇 统计学(可授理学、...
    • 19,393 篇 系统科学
    • 17,337 篇 化学
  • 102,851 篇 管理学
    • 66,250 篇 管理科学与工程(可...
    • 41,707 篇 图书情报与档案管...
    • 31,353 篇 工商管理
  • 24,799 篇 医学
    • 20,871 篇 临床医学
    • 19,468 篇 基础医学(可授医学...
  • 16,060 篇 法学
    • 13,040 篇 社会学
  • 14,922 篇 教育学
    • 14,297 篇 教育学
  • 12,416 篇 经济学
  • 8,627 篇 农学
  • 4,548 篇 文学
  • 1,783 篇 军事学
  • 1,542 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,348 篇 computer science
  • 20,255 篇 application soft...
  • 19,016 篇 computational mo...
  • 17,975 篇 software
  • 16,205 篇 feature extracti...
  • 16,158 篇 accuracy
  • 16,124 篇 computer archite...
  • 15,858 篇 software enginee...
  • 13,754 篇 training
  • 11,275 篇 deep learning
  • 11,140 篇 data mining
  • 10,394 篇 hardware
  • 10,161 篇 machine learning
  • 9,779 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,467 篇 testing
  • 8,909 篇 costs
  • 8,841 篇 data models
  • 8,670 篇 support vector m...
  • 8,413 篇 artificial intel...

机构

  • 1,906 篇 chitkara univers...
  • 1,370 篇 school of comput...
  • 1,148 篇 school of comput...
  • 1,090 篇 school of comput...
  • 874 篇 school of comput...
  • 811 篇 department of co...
  • 720 篇 college of compu...
  • 687 篇 school of comput...
  • 664 篇 school of comput...
  • 644 篇 department of co...
  • 627 篇 university of ch...
  • 587 篇 state key labora...
  • 582 篇 lovely professio...
  • 545 篇 college of compu...
  • 541 篇 school of comput...
  • 516 篇 maharishi school...
  • 499 篇 department of co...
  • 432 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 422 篇 school of comput...

作者

  • 459 篇 wang wei
  • 339 篇 liu yang
  • 336 篇 yang yang
  • 265 篇 li li
  • 265 篇 china
  • 261 篇 yang liu
  • 244 篇 li wei
  • 242 篇 zhang lei
  • 238 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 195 篇 liu wei
  • 183 篇 wei wang
  • 180 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 169 篇 zhang yan
  • 167 篇 lei wang

语言

  • 672,696 篇 英文
  • 22,613 篇 其他
  • 6,518 篇 中文
  • 83 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 44 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
700513 条 记 录,以下是451-460 订阅
排序:
Ensuring IoT Controller Reliability with Colored Generalized Stochastic Petri Net  28
Ensuring IoT Controller Reliability with Colored Generalized...
收藏 引用
28th international computer science and engineering conference, ICSEC 2024
作者: Samngamnoi, Kruntarat Pomsiri, Sutinun Kamput, Apipath Dechsupa, Chanon College of Computing Khon Kaen University Intelligent Software Engineering Research Group Department of Computer Science Khon Kaen40002 Thailand
In IoT systems managing multiple devices simultaneously, errors in system controllers often undermine intended operations. Formal verification offers a method to assess system reliability. Colored Generalized Stochast... 详细信息
来源: 评论
Research and Application of software Reuse Identification Method Based on Code Similarity Analysis  4
Research and Application of Software Reuse Identification Me...
收藏 引用
4th international conference on Electronic Information engineering and computer Communication, EIECC 2024
作者: Ding, Zongjie Li, Hao Zheng, Min Han, Yu Ma, Dingkun Xi'an China
software reuse techniques have become a pervasive research hotspot in today's software engineering field. The most researched and widely applied is combinatorial technology, which is software reuse technology base... 详细信息
来源: 评论
Emerging Trends and Challenges in Cybersecurity Data science: A State-of-the-Art Review  6
Emerging Trends and Challenges in Cybersecurity Data Science...
收藏 引用
6th Parul international conference on engineering and Technology, PICET 2024
作者: Datta, Nippon Mahmud, Tanjim Aziz, Mohammad Tarek Das, Rahul Kanti Hossain, Mohammad Shahadat Andersson, Karl Department of Computer Science and Engineering Chittagong University of Engineering & Technology Chittagong Bangladesh Department of Computer Science and Engineering Rangamati Science and Technology University Rangamati4500 Bangladesh Department of Computer Science and Engineering University of Chittagong Chittagong4331 Bangladesh Cybersecurity Laboratory Luleå University of Technology Luleå97187 Sweden
Cybersecurity is the process of defending computer networks, systems, and digital data from intrusions, hacks, damage, and other cyber threats. It also prevents illegal access, and exploitation of sensitive and person... 详细信息
来源: 评论
Model Checking Based Test Adaptation in Changing Business software  24
Model Checking Based Test Adaptation in Changing Business So...
收藏 引用
6th international conference on software engineering and Development, ICSED 2024
作者: Hallal, Hicham Faizan, Alisha Department Of Computer Science & Engineering American University Of Sharjah United Arab Emirates Department Of Computer Science and Engineering American University Of Sharjah United Arab Emirates
Testing large software applications poses a major challenge, especially in the presence of changes that are usually introduced after the initial deployment of said applications. This makes it rather difficult to antic... 详细信息
来源: 评论
Privacy federation learning framework based on principal component analysis
Privacy federation learning framework based on principal com...
收藏 引用
2024 international conference on computer Network Security and software engineering, CNSSE 2024
作者: Yang, Jiaheng Feng, Xia Liu, Yueming Faculty of Data Science City University of Macau China
Federal learning is an effective distributed learning technology that allows machine learning model training while protecting data privacy. However, with the increase of the number of user -side devices, the calculati... 详细信息
来源: 评论
FDSE: Enhance Symbolic Execution by Fuzzing-based Pre-Analysis (Competition Contribution)  27th
FDSE: Enhance Symbolic Execution by Fuzzing-based Pre-Analys...
收藏 引用
27th international conference on Fundamental Approaches to software engineering (FASE)
作者: Zhang, Guofeng Shuai, Ziqi Ma, Kelin Liu, Kunlin Chen, Zhenbang Wang, Ji Natl Univ Def Technol Coll Comp Changsha Peoples R China Natl Univ Def Technol State Key Lab Complex & Crit Software Environm Changsha Peoples R China Natl Univ Def Technol State Key Lab High Performance Comp Changsha Peoples R China
FDSE serves as an automatic test generation tool designed for C programs based on symbolic execution. FDSE employs fuzzing-based pre-analysis and combines static symbolic execution and dynamic symbolic execution to im... 详细信息
来源: 评论
Creation of a software tool for monitoring and forecasting the process of transport and diffusion of harmful substances in the atmosphere  3
Creation of a software tool for monitoring and forecasting t...
收藏 引用
3rd international conference on Digital Technologies, Optics, and Materials science, DTIEE 2024
作者: Shafiev, Tursun Bobozhonova, Madina Bukhara State University 11 M. Iqbol Bukhara City200100 Uzbekistan
The development of software for computer modeling of the transport and diffusion of harmful substances in the atmospheric air is a valuable contribution to environmental monitoring and forecasting. The developed softw... 详细信息
来源: 评论
Local Optimisation Based Detection of Weak Targets in Isolated Forests  24
Local Optimisation Based Detection of Weak Targets in Isolat...
收藏 引用
8th international conference on Electronic Information Technology and computer engineering, EITCE 2024
作者: Hu, Jurong Xing, Yanxiao Li, Yuxiao School of Information Science and Engineering Hohai University Jiangsu Nanjing China School of Computer and Software Hohai University Jiangsu Nanjing China
Aiming at the problem that the iForest algorithm is not sensitive enough to local anomalies and produces a large number of false alarms in the detection results on some low sea state datasets, this paper proposes the ... 详细信息
来源: 评论
Challenges of Using Pre-trained Models: The Practitioners' Perspective  31
Challenges of Using Pre-trained Models: The Practitioners' P...
收藏 引用
31st IEEE international conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Tan, Xin Li, Taichuan Chen, Ruohe Liu, Fang Zhang, Li School of Computer Science and Engineering State Key Laboratory of Complex & Critical Software Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China School of Economics and Management Beihang University Beijing China
The challenges associated with using pre-trained models (PTMs) have not been specifically investigated, which hampers their effective utilization. To address this knowledge gap, we collected and analyzed a dataset of ... 详细信息
来源: 评论
Early Results of an AI Multiagent System for Requirements Elicitation and Analysis  25th
Early Results of an AI Multiagent System for Requirements El...
收藏 引用
25th international conference on Product Focused software Process Improvement
作者: Sami, Malik Abdul Waseem, Muhammad Zhang, Zheying Rasheed, Zeeshan Systa, Kari Abrahamsson, Pekka Tampere Univ Tampere Finland Univ Jyvaskyla Jyvaskyla Finland
In agile software development, user stories capture requirements from the user's perspective, emphasizing their needs and each feature's value. Writing concise and quality user stories is necessary for guiding... 详细信息
来源: 评论