咨询与建议

限定检索结果

文献类型

  • 19,890 篇 会议
  • 142 篇 期刊文献
  • 45 册 图书
  • 1 篇 学位论文

馆藏范围

  • 20,076 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 15,203 篇 工学
    • 10,525 篇 计算机科学与技术...
    • 8,770 篇 软件工程
    • 2,166 篇 电气工程
    • 2,066 篇 信息与通信工程
    • 1,920 篇 控制科学与工程
    • 1,363 篇 电子科学与技术(可...
    • 1,322 篇 机械工程
    • 1,193 篇 土木工程
    • 923 篇 材料科学与工程(可...
    • 876 篇 建筑学
    • 871 篇 动力工程及工程热...
    • 859 篇 仪器科学与技术
    • 848 篇 生物工程
    • 841 篇 化学工程与技术
    • 749 篇 生物医学工程(可授...
    • 728 篇 安全科学与工程
    • 689 篇 力学(可授工学、理...
    • 551 篇 光学工程
    • 531 篇 交通运输工程
  • 6,216 篇 理学
    • 3,556 篇 数学
    • 1,824 篇 物理学
    • 971 篇 生物学
    • 943 篇 统计学(可授理学、...
    • 765 篇 系统科学
    • 741 篇 化学
  • 3,601 篇 管理学
    • 2,412 篇 管理科学与工程(可...
    • 1,500 篇 图书情报与档案管...
    • 1,341 篇 工商管理
  • 688 篇 教育学
    • 684 篇 教育学
  • 590 篇 医学
    • 525 篇 临床医学
  • 466 篇 经济学
  • 425 篇 法学
  • 159 篇 农学
  • 103 篇 文学
  • 54 篇 艺术学
  • 52 篇 军事学

主题

  • 663 篇 software enginee...
  • 326 篇 application soft...
  • 303 篇 software
  • 262 篇 computer science
  • 225 篇 data mining
  • 222 篇 neural networks
  • 217 篇 knowledge engine...
  • 178 篇 educational inst...
  • 175 篇 knowledge based ...
  • 170 篇 computer archite...
  • 160 篇 software systems
  • 153 篇 knowledge manage...
  • 151 篇 software testing
  • 136 篇 programming
  • 128 篇 software archite...
  • 128 篇 software design
  • 118 篇 semantics
  • 111 篇 computational mo...
  • 109 篇 fuzzy logic
  • 109 篇 computer aided s...

机构

  • 37 篇 school of comput...
  • 33 篇 dmms core lab fl...
  • 32 篇 state key labora...
  • 29 篇 school of automa...
  • 29 篇 school of electr...
  • 26 篇 nanjing univ sta...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 college of compu...
  • 23 篇 school of reliab...
  • 22 篇 school of reliab...
  • 21 篇 national univers...
  • 20 篇 ieee
  • 18 篇 hunan university...
  • 17 篇 university of ch...
  • 15 篇 shenyang normal ...
  • 15 篇 school of softwa...
  • 15 篇 institute of inf...
  • 15 篇 chinese acad sci...
  • 15 篇 ku leuven depart...

作者

  • 21 篇 biffl stefan
  • 17 篇 liu yan
  • 16 篇 wang wei
  • 15 篇 wang tao
  • 14 篇 desmet w.
  • 14 篇 liu yang
  • 13 篇 liu jie
  • 11 篇 huang tao
  • 11 篇 wang lei
  • 11 篇 jin zhi
  • 11 篇 wang jian
  • 11 篇 li yong
  • 10 篇 zhang lin
  • 10 篇 li yang
  • 10 篇 li li
  • 10 篇 wei jun
  • 10 篇 wang qing
  • 10 篇 li juan
  • 10 篇 yang yang
  • 10 篇 zhang j.

语言

  • 19,621 篇 英文
  • 314 篇 其他
  • 106 篇 中文
  • 21 篇 西班牙文
  • 10 篇 葡萄牙文
  • 7 篇 土耳其文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 俄文
  • 2 篇 乌克兰文
  • 1 篇 捷克文
检索条件"任意字段=Proceedings of the 9th Knowledge-Based Software Engineering Conference"
20078 条 记 录,以下是291-300 订阅
排序:
Representative Dataset Generation Framework for AI-based Failure Analysis during real-time Validation of Automotive software Systems  57
Representative Dataset Generation Framework for AI-based Fai...
收藏 引用
57th Hawaii International conference on System Sciences (HICSS)
作者: Abboush, Mohammad Knieke, Christoph Rausch, Andreas Tech Univ Clausthal Inst Software & Syst Engn Clausthal Zellerfeld Germany
Recently, thanks to its ability of extracting knowledge from historical data, the data-driven approach has been widely used in various phases of the system development life cycle. In real-time system validation, remar... 详细信息
来源: 评论
Evaluating the Performance of PEFT and LoRA Approaches in Transformer-based Architecture for Handwritten Character Recognition  9
Evaluating the Performance of PEFT and LoRA Approaches in Tr...
收藏 引用
9th International conference on Computer Science and engineering, UBMK 2024
作者: Savci, Pinar Das, Bihter Das, Resul Arcelik A. S. Sütlüce Karaaǧaç St. No:2-6 Beyoglu Istanbul34445 Turkey Firat University Technology Faculty Department of Software Engineering Turkey
Handwritten character recognition poses significant challenges due to the variability in writing styles, inconsistencies in character shapes, and noise in the data. In this study, it was conducted a comparative analys... 详细信息
来源: 评论
the Impact of Feature Selection on Malware Classification Using Chi-Square and Machine Learning  9
The Impact of Feature Selection on Malware Classification Us...
收藏 引用
9th International conference on Computer and Communication engineering, ICCCE 2023
作者: Rasheed, Areeg Fahad Zarkoosh, M. Al-Azzawi, Sana Sabah Al-Nahrain University College of Information Engineering Baghdad Iraq Software Engineering Computiq Baghdad Iraq Luleå University of Technology Eislab Machine Learning Luleå Sweden
the Internet of things (IoT) is a network of physical objects, automobiles, household appliances, and other items that are integrated with sensors, software, and connections to gather and share data via the Internet. ... 详细信息
来源: 评论
A software Failure Mode Analysis Method based on Test knowledge Graph  9
A Software Failure Mode Analysis Method Based on Test Knowle...
收藏 引用
9th International conference on Dependable Systems and their Applications, DSA 2022
作者: Yang, Wansheng Hu, Chi Ma, Siyou Institute of Computer Application China Academy of Engineering Physics Sichuan Mianyang China
software failure mode analysis (SFMA) is an important process for analyzing failure propagation by identifying possible software failure points, and then summarizing software failure modes so as to improve software qu... 详细信息
来源: 评论
Digital Twin System for River Network based on Graph Neural Network  36
Digital Twin System for River Network Based on Graph Neural ...
收藏 引用
36th International conference on software engineering and knowledge engineering, SEKE 2024
作者: Jin, Zishuo Ye, Feng Zhang, Peng Hohai University NanJing China Jiangsu water Conservancy Engineering Planning Office NanJing China
River network management presents a significant challenge in the field of water conservancy, and the subsequent advancements in digital technology offer a promising avenue for addressing this challenge. However, the u... 详细信息
来源: 评论
A Review of Blockchain-based Privacy Computing Research  10
A Review of Blockchain-based Privacy Computing Research
收藏 引用
10th IEEE International conference on Cyber Security and Cloud Computing and 9th IEEE International conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Yang, Yang Jin, Kai Liang, Wei Liu, Yaqin Li, Yuhui Hosam, Osama Hunan University College of Computer Science and Electronic Engineering Changsha China
Blockchain technology offers unique advantages in terms of decentralization, transparency, and de-anonymization. However, it also poses challenges to user anonymity and data privacy protection. Consequently, researche... 详细信息
来源: 评论
Leveraging SDN: Empirical Evaluation of Privacy Enriched Data Communication over VANET Using software Defined Network Assistance  9
Leveraging SDN: Empirical Evaluation of Privacy Enriched Dat...
收藏 引用
9th International conference on Science, Technology, engineering and Mathematics, ICONSTEM 2024
作者: Ratheesh, R. Vijayalakshmi, S. Arunsundar, B. Swarna, M. Saranya, G. Agni College of Technology Department of Ece Chennai India R.M.K. Engineering College Department of Ece Chennai India School of Computing College of Engineering And Technology Srm Institute of Science And Technology Department of Data Science And Business Systems Kattankulathur India Dr. M.G.R. Educational And Research Institute University Department of Ece Chennai India Sri Krishna College of Engineering And Technology Department of Electronics And Communication Engineering Coimbatore Kuniyamuthur India
In the realm of modern transportation systems, Vehicular Ad Hoc Networks (VANETs) play a pivotal role in enabling efficient communication among vehicles and infrastructure elements for enhanced road safety and traffic... 详细信息
来源: 评论
theoretical Basis and Development of Short-Wave Underwater Radio Communication Systems  9
Theoretical Basis and Development of Short-Wave Underwater R...
收藏 引用
9th IEEE All-Russian Microwave conference, RMC 2024
作者: Tomilin, Aleksandr Panchelyuga, Victor Panchelyuga, Mariya National Research Tomsk Polytechnic University Department of Mechanical Engineering Tomsk Russia Institute of Theoretical and Experimental Biophysics RAS Pushchino Russia
the results of full-scale experiments on the transmission of high-frequency voice radio signals in an aquatic environment using ball antennas are presented. based on the generalized theory, the process of propagation ... 详细信息
来源: 评论
software Testing Effort Estimation based on Machine Learning Techniques: Single and Ensemble Methods  16
Software Testing Effort Estimation Based on Machine Learning...
收藏 引用
16th International conference on knowledge Discovery and Information Retrieval, KDIR 2024 as part of 16th International Joint conference on knowledge Discovery, knowledge engineering and knowledge Management, IC3K 2024
作者: Hosni, Mohamed Medarhri, Ibtissam Carrillo de Gea, Juan Manuel MOSI Research Team LM2S3 ENSAM Moulay Ismail University of Meknes Morocco MMCS Research Team LMAID ENSMR Rabat Morocco Department of Informatics and Systems Faculty of Computer Science University of Murcia Spain
Delivering an accurate estimation of the effort required for software system development is crucial for the success of any software project. However, the software development lifecycle (SDLC) involves multiple activit... 详细信息
来源: 评论
DR-DRL: Distributed Redundant Task Offloading based on Reinforcement Learning  9
DR-DRL: Distributed Redundant Task Offloading based on Reinf...
收藏 引用
9th International conference on Information Science, Computer Technology and Transportation, ISCTT 2024
作者: Lan, Shizhan Lin, Hongcai Liang, Huaqian Chen, Shan Wang, Zhenyu School of Software Engineering South China University of Technology Guangzhou China China Mobile Group Guangxi branch Co. Ltd Nanning China
Edge computing enhances task reliability by employing redundant task executions across edge nodes. Conventional decentralized task offloading strategies, based on heuristics and game theory, either focus on optimizati... 详细信息
来源: 评论