咨询与建议

限定检索结果

文献类型

  • 86,124 篇 会议
  • 2,723 册 图书
  • 1,726 篇 期刊文献
  • 4 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 90,573 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 46,771 篇 工学
    • 38,459 篇 计算机科学与技术...
    • 31,975 篇 软件工程
    • 6,391 篇 控制科学与工程
    • 6,351 篇 信息与通信工程
    • 5,584 篇 电气工程
    • 3,219 篇 机械工程
    • 2,960 篇 电子科学与技术(可...
    • 2,058 篇 生物工程
    • 1,600 篇 生物医学工程(可授...
    • 1,488 篇 安全科学与工程
    • 1,408 篇 动力工程及工程热...
    • 1,374 篇 仪器科学与技术
    • 1,271 篇 建筑学
    • 1,203 篇 土木工程
    • 1,161 篇 材料科学与工程(可...
    • 1,037 篇 光学工程
    • 1,031 篇 交通运输工程
  • 13,183 篇 理学
    • 7,373 篇 数学
    • 2,662 篇 物理学
    • 2,365 篇 系统科学
    • 2,244 篇 生物学
    • 1,768 篇 统计学(可授理学、...
  • 11,156 篇 管理学
    • 7,852 篇 管理科学与工程(可...
    • 4,112 篇 工商管理
    • 4,085 篇 图书情报与档案管...
  • 2,145 篇 教育学
    • 2,119 篇 教育学
  • 1,384 篇 医学
    • 1,180 篇 临床医学
    • 1,034 篇 基础医学(可授医学...
  • 1,377 篇 法学
    • 1,076 篇 社会学
  • 1,312 篇 经济学
    • 1,303 篇 应用经济学
  • 382 篇 农学
  • 257 篇 文学
  • 194 篇 军事学
  • 62 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 8,329 篇 application soft...
  • 7,111 篇 software enginee...
  • 5,921 篇 computer archite...
  • 5,292 篇 software
  • 5,225 篇 computer science
  • 4,425 篇 software systems
  • 4,162 篇 hardware
  • 3,534 篇 computer aided s...
  • 3,262 篇 control systems
  • 2,660 篇 computational mo...
  • 2,223 篇 costs
  • 2,093 篇 programming
  • 1,809 篇 artificial intel...
  • 1,744 篇 computer softwar...
  • 1,740 篇 real time system...
  • 1,619 篇 testing
  • 1,508 篇 real-time system...
  • 1,418 篇 software design
  • 1,371 篇 protocols
  • 1,350 篇 information syst...

机构

  • 197 篇 college of compu...
  • 114 篇 school of comput...
  • 59 篇 school of comput...
  • 56 篇 college of compu...
  • 54 篇 school of comput...
  • 49 篇 department of co...
  • 40 篇 college of compu...
  • 37 篇 department of el...
  • 37 篇 school of comput...
  • 36 篇 school of electr...
  • 36 篇 department of el...
  • 34 篇 institute of inf...
  • 33 篇 state key labora...
  • 32 篇 school of comput...
  • 32 篇 department of el...
  • 31 篇 department of co...
  • 31 篇 department of el...
  • 29 篇 department of co...
  • 28 篇 school of comput...
  • 27 篇 department of co...

作者

  • 49 篇 anon
  • 37 篇 bernady o. apduh...
  • 35 篇 bosch jan
  • 34 篇 o'connor rory v.
  • 28 篇 shaoying liu
  • 28 篇 li yang
  • 26 篇 dubinsky yael
  • 26 篇 ebrahim babaei
  • 22 篇 zhu huibiao
  • 21 篇 lei wang
  • 21 篇 dong jin song
  • 20 篇 katz guy
  • 19 篇 zhang lei
  • 17 篇 levent yilmaz
  • 17 篇 rui wang
  • 17 篇 wenyun zhao
  • 17 篇 shahar maoz
  • 17 篇 vardi moshe y.
  • 16 篇 weiming shen
  • 16 篇 noraziah a.

语言

  • 89,054 篇 英文
  • 1,053 篇 其他
  • 436 篇 中文
  • 32 篇 西班牙文
  • 18 篇 葡萄牙文
  • 15 篇 德文
  • 14 篇 土耳其文
  • 13 篇 俄文
  • 9 篇 法文
  • 4 篇 捷克文
  • 4 篇 日文
  • 2 篇 乌克兰文
  • 1 篇 朝鲜文
检索条件"任意字段=Israel Conference on Computer Systems and Software Engineering"
90579 条 记 录,以下是281-290 订阅
排序:
Towards Large Language Model Guided Kernel Direct Fuzzing  28th
Towards Large Language Model Guided Kernel Direct Fuzzing
收藏 引用
28th International conference on Fundamental Approaches to software engineering, FASE 2025, which was held as part of the International Joint conferences on Theory and Practice of software, ETAPS 2025
作者: Li, Xie Yuan, Zhaoyue Zhang, Zhenduo Sun, Youcheng Zhang, Lijun and State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China MBZUAI Abu Dhabi United Arab Emirates Automotive Software Innovation Center Chongqing China The University of Manchester Manchester United Kingdom
Direct kernel fuzzing is a targeted approach that focuses on specific areas of the kernel, effectively addressing the challenges of frequent updates and the inherent complexity of operating systems, which are critical... 详细信息
来源: 评论
Unfolding a Hidden Risk of Direct 3D software Usage for Animation Character Design  5th
Unfolding a Hidden Risk of Direct 3D Software Usage for Anim...
收藏 引用
5th International conference on Innovative Product Design and Intelligent Manufacturing systems, ICIPDIMS 2023
作者: Karmakar, Ananda Chowdhury, Anirban School of Design Graphic Ear Hill University Dehradun248002 India Alliance School of Design Alliance University Karnataka Bengaluru562106 India
In general, animation character design exercise done by designers using design process, in which they draw character concept first and then they generate the 3D model of the character. However, Gen-Z design students l... 详细信息
来源: 评论
Intelligent Hybrid System with Bidirectional Energy Flow in PEMFC Powered BLDCM Drive and Batteries  1
Intelligent Hybrid System with Bidirectional Energy Flow in ...
收藏 引用
1st International conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Anand, Garima Ranjan Yadav, K.B. National Institute of Technology Department of Electrical Engineering Jamshedpur India
The promise of increased efficiency and dependability has drawn much attention to hybrid energy systems combining several energy sources. This study suggests integrating a fuel cell, a battery system through a bidirec... 详细信息
来源: 评论
Optimizing Bevy-ECS Using Predictive JSSP Approach  5
Optimizing Bevy-ECS Using Predictive JSSP Approach
收藏 引用
5th IEEE International conference on Power, Electronics and computer Applications, ICPECA 2025
作者: Ma, Benchi Du, Yugen Software Engineering Institution East China Normal University Shanghai China Shanghai Key Laboratory of Trustworthy Computing Shanghai200062 China
Entity-Component-System (ECS) is a fundamental architecture of game engines. It consists of entities (identities), components (data), and systems (logical units). It schedules the system graph to drive the update loop... 详细信息
来源: 评论
AMuLeT: Automated Design-Time Testing of Secure Speculation Countermeasures  25
AMuLeT: Automated Design-Time Testing of Secure Speculation ...
收藏 引用
30th ACM International conference on Architectural Support for Programming Languages and Operating systems, ASPLOS 2025
作者: Fu, Bo Tenenbaum, Leo Adler, David Klein, Assaf Gogia, Arpit Alameldeen, Alaa R. Guarnieri, Marco Silberstein, Mark Oleksenko, Oleksii Saileshwar, Gururaj University of Toronto TorontoON Canada Technion - Israel Institute of Technology Haifa Israel Imdea Software Institute Madrid Spain Simon Fraser University BurnabyBC Canada Azure Research Microsoft Cambridge United Kingdom
In recent years, several hardware-based countermeasures proposed to mitigate Spectre attacks have been shown to be insecure. To enable the development of effective secure speculation countermeasures, we need easy-to-u... 详细信息
来源: 评论
RDM: A Light Field Super-Resolution Model Improved with Retinex Decomposition  16
RDM: A Light Field Super-Resolution Model Improved with Reti...
收藏 引用
16th International conference on Signal Processing systems, ICSPS 2024
作者: Lyu, Wenqi Ke, Wei Sheng, Hao Ma, Xiao Liu, Lixue Faculty of Applied Sciences Macao Polytechnic University China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing100191 China
Light field cameras hold significant value in applications such as depth estimation, 3D video acquisition, and image super-resolution. Compared to traditional single-image super-resolution methods, light field images ... 详细信息
来源: 评论
Enhancing CQRS Implementation Through AI-Driven Refactoring: Query and Command Classification
Enhancing CQRS Implementation Through AI-Driven Refactoring:...
收藏 引用
International conference on Smart Business and technology, ICSBT 2024
作者: EL Boukhari, Mohamed Kharmoum, Nassim Lagmiri, Souad Najoua Ziti, Soumia IPSS Research Team Faculty of Sciences Mohammed V University Rabat Morocco Rabat Morocco IRSM Laboratory Higher Institute of Management Administration and Computer Engineering Rabat Morocco
A strategy driven by AI is suggested for refactoring legacy systems. This involves categorizing system functions into commands and queries for implementing CQRS. A key-value AI transformer is utilized to examine the s... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Enhancing TrUStAPIS Methodology in the Web of Things with LLM-Generated IoT Trust Semantics  26th
Enhancing TrUStAPIS Methodology in the Web of Things with LL...
收藏 引用
26th International conference on Information and Communications Security, ICICS 2024
作者: Ferraris, Davide Kotis, Konstantinos Kalloniatis, Christos Network Information and Computer Security Lab University of Malaga Malaga Spain Department of Cultural Technology and Communication University of the Aegean Mytilene Greece
In the Internet of Things (IoT) there are ecosystems where their physical’smart’ entities virtually interact with each other. Often, this interaction occurs among unknown entities, making trust an essential requirem... 详细信息
来源: 评论
Enhancing the Efficiency of the Grouping-Scoring-Modeling Framework with Statistical Pre-Scoring Component for Transcriptomic Data Analysis
Enhancing the Efficiency of the Grouping-Scoring-Modeling Fr...
收藏 引用
18th International Joint conference on Biomedical engineering systems and Technologies, BIOSTEC 2025
作者: Khokhar, Maham Bakir-Gungor, Burcu Yousef, Malik Department of Data Science Social Sciences Institute Abdullah Gul University Kayseri38080 Turkey Department of Computer Engineering Faculty of Engineering Abdullah Gul University Kayseri38080 Turkey Department of Information Systems Galilee Digital Health Research Center Zefat Academic College Zefat13206 Israel
The advent of high-throughput transcriptomic technologies has generated vast transcriptomic datasets, challenging current analytical methodologies with their sheer volume and complexity. The Grouping-Scoring Modeling ... 详细信息
来源: 评论