咨询与建议

限定检索结果

文献类型

  • 285 篇 会议
  • 278 篇 期刊文献

馆藏范围

  • 563 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 257 篇 工学
    • 151 篇 计算机科学与技术...
    • 111 篇 电气工程
    • 74 篇 软件工程
    • 42 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 9 篇 动力工程及工程热...
    • 7 篇 石油与天然气工程
    • 5 篇 机械工程
    • 5 篇 交通运输工程
  • 92 篇 理学
    • 37 篇 生物学
    • 18 篇 数学
    • 14 篇 生态学
    • 11 篇 科学技术史(分学科...
  • 39 篇 法学
    • 30 篇 社会学
    • 18 篇 政治学
    • 7 篇 法学
  • 37 篇 医学
    • 21 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
    • 12 篇 临床医学
    • 11 篇 药学(可授医学、理...
  • 35 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 11 篇 公共管理
    • 8 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 26 篇 历史学
    • 21 篇 考古学
  • 17 篇 文学
    • 12 篇 外国语言文学
    • 5 篇 新闻传播学
  • 12 篇 经济学
    • 9 篇 理论经济学
    • 4 篇 应用经济学
  • 11 篇 哲学
    • 11 篇 哲学
  • 7 篇 农学
  • 6 篇 教育学
  • 6 篇 艺术学
  • 1 篇 军事学

主题

  • 563 篇 application prog...
  • 76 篇 api
  • 66 篇 axial power indi...
  • 65 篇 american petrole...
  • 58 篇 application prog...
  • 36 篇 software
  • 30 篇 mobile communica...
  • 24 篇 programming
  • 23 篇 mobile applicati...
  • 23 篇 java
  • 22 篇 libraries
  • 20 篇 apis
  • 20 篇 real-time system...
  • 18 篇 servers
  • 18 篇 security
  • 16 篇 testing
  • 16 篇 accuracy
  • 16 篇 documentation
  • 15 篇 semantics
  • 15 篇 protocols

机构

  • 10 篇 tech univ sofia ...
  • 3 篇 athens univ econ...
  • 2 篇 univ lubeck inst...
  • 2 篇 oxford
  • 2 篇 lawrence berkele...
  • 2 篇 univ montreal di...
  • 2 篇 brigham & womens...
  • 2 篇 hebrew univ jeru...
  • 2 篇 ibm corp tj wats...
  • 2 篇 ibm res div thom...
  • 2 篇 national institu...
  • 2 篇 mit csail cambri...
  • 2 篇 univ zilina fac ...
  • 2 篇 faculty of telec...
  • 2 篇 university of ch...
  • 2 篇 natl univ singap...
  • 2 篇 univ auckland de...
  • 2 篇 vienna univ tech...
  • 2 篇 mcgill univ sch ...
  • 1 篇 fed univ para br...

作者

  • 10 篇 pencheva evelina
  • 9 篇 atanasov ivaylo
  • 4 篇 spinellis diomid...
  • 4 篇 robillard martin...
  • 4 篇 cesare pautasso
  • 4 篇 trifonov ventsis...
  • 4 篇 kechagia maria
  • 3 篇 souhaila serbout
  • 3 篇 sahraoui houari
  • 3 篇 britz tj
  • 3 篇 uwe zdun
  • 3 篇 dundas p
  • 2 篇 carlson darren
  • 2 篇 almeida francisc...
  • 2 篇 mansfield scott
  • 2 篇 saxelin m
  • 2 篇 fischer stefan
  • 2 篇 mandl kenneth d.
  • 2 篇 grant ryan e.
  • 2 篇 mahmoodi toktam

语言

  • 529 篇 英文
  • 29 篇 其他
  • 4 篇 中文
  • 1 篇 斯洛伐克文
检索条件"主题词=Application programming interfaces"
563 条 记 录,以下是11-20 订阅
排序:
RanViz: Ransomware Visualization and Classification Based on Time-Series Categorical Representation of API Calls
收藏 引用
IEEE ACCESS 2025年 13卷 56237-56254页
作者: Mokoma, Vhuhwavho Singh, Avinash Univ Pretoria Dept Comp Sci ZA-0002 Pretoria South Africa
Ransomware continues to pose a significant threat to individuals and organizations worldwide, causing disruptions, financial losses, and reputational damage. As ransomware attacks grow in sophistication, understanding... 详细信息
来源: 评论
Web API Recommendation via Exploring Textual and Structural Semantics With Contrastive Learning and Joint Training
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2025年 第2期22卷 1558-1568页
作者: Kang, Guosheng Ren, Hongshuai Chen, Wanjun Liu, Jianxun Cao, Buqing Xu, Yu Hunan Univ Sci & Technol Sch Comp Sci & Engn Xiangtan 411199 Peoples R China Yunnan Univ Finance & Econ Yunnan Key Lab Serv Comp Kunming 650503 Peoples R China Hunan Univ Sci & Technol Hunan Prov Key Lab Serv Comp & Novel Software Tech Xiangtan 411199 Peoples R China Univ Cambridge Dept Publ Hlth & Primary Care Cambridge Baker Syst Genom Initiat Cambridge CB2 1TN England Univ Cambridge British Heart Fdn Cardiovasc Epidemiol Unit Dept Publ Hlth & Primary Care Cambridge CB2 1TN England
With the advancement of service computing technology, software developers tend to consume a variety of Web APIs (application programming interfaces, also named Web services) from Web API markets to create feature-rich... 详细信息
来源: 评论
Artificial intelligence boundary resources: a relational view on leveraging "AI-as-a-Service"
收藏 引用
EUROPEAN JOURNAL OF INFORMATION SYSTEMS 2025年
作者: Hanelt, Andre Firk, Sebastian Zapadka, Patryk Oehmichen, Jana Univ Kassel Chair Digital Transformat Management Kassel Germany Univ Groningen Dept Accounting & Auditing Groningen Netherlands Johannes Gutenberg Univ Mainz Human Resources & Management Studies Mainz Germany
In response to the increasing relevance of artificial intelligence (AI) for competitive advantage, firms can utilize the capabilities of AI-savvy partners via boundary resources. Due to AI facets, such as autonomy, in... 详细信息
来源: 评论
LLM-Driven, Self-Improving Framework for Security Test Automation: Leveraging Karate DSL for Augmented API Resilience
收藏 引用
IEEE ACCESS 2025年 13卷 56861-56886页
作者: Pasca, Emil Marian Delinschi, Daniela Erdei, Rudolf Matei, Oliviu Tech Univ Cluj Napoca North Univ Ctr Baia Mare Dept Elect Elect & Comp Engn Baia Mare 430122 Romania HOLISUN SRL Dept Res & Dev Baia Mare 430397 Romania
Modern software architectures heavily rely on APIs, yet face significant security challenges, particularly with Broken Object Level Authorization (BOLA) vulnerabilities, which remain the most critical API security ris... 详细信息
来源: 评论
DataPoll: A Tool Facilitating Big Data Research in Social Sciences
收藏 引用
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS 2025年 第2期12卷 511-524页
作者: Charalampous, Antonis Djouvas, Constantinos Christodoulou, Christos Cyprus Univ Technol Dept Commun & Internet Studies CY-3036 Limassol Cyprus
The computational analysis of big data has revolutionized social science research, offering unprecedented insights into societal behaviors and trends through digital data from online sources. However, existing tools o... 详细信息
来源: 评论
Facial recognition by cloud-based APIs following surgically assisted rapid maxillary expansion
收藏 引用
Journal of Orofacial Orthopedics 2025年 第2期86卷 98-107页
作者: Buyukcavus, Muhammed Hilmi Aydogan Akgun, Filiz Solak, Serdar Ucar, Mustafa Hikmet Bilgehan Fındık, Yavuz Baykul, Timucin Faculty of Dentistry Department of Orthodontics Antalya Bilim University Antalya Turkey Faculty of Dentistry Department of Orthodontics Burdur Mehmet Akif Ersoy University Burdur Turkey Faculty of Technology Department of Information Systems Engineering Kocaeli University Kocaeli Turkey Faculty of Dentistry Department of Department of Oral and Maxillofacial Surgery Süleyman Demirel University Isparta Turkey
Introduction: This study aimed to investigate whether the facial soft tissue changes of individuals who had undergone surgically assisted rapid maxillary expansion (SARME) would be detected by three different well-kno... 详细信息
来源: 评论
Label Space-Induced Pseudo Label Refinement for Multi-Source Black-Box Domain Adaptation
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 3181-3193页
作者: Yoo, Chaehwa Liu, Xiaofeng Xing, Fangxu Woo, Jonghye Kang, Je-Won Chungbuk National University School of Electrical Engineering Cheongju Korea Republic of Massachusetts General Hospital Harvard Medical School Gordon Center for Medical Imaging Dept. of Radiology BostonMA United States Yale University New Haven United States Ewha W. University Department of Electronic and Electrical Engineering Graduate Program in Smart Factory Seoul Korea Republic of
Conventional unsupervised domain adaptation (UDA) requires access to source data and/or source model parameters, prohibiting its practical application in terms of privacy, security, and intellectual property. Recent b... 详细信息
来源: 评论
Honeytrap Resilience: A Study of Malware Redirection Awareness
Honeytrap Resilience: A Study of Malware Redirection Awarene...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Eric Edge James H Jones Kathryn Laskey George Mason University
This research investigates the ability of self-propagating malware to detect network redirection, a technique that reroutes malicious traffic to a controlled environment for analysis. We hypothesized that malware prog... 详细信息
来源: 评论
Securing QR Codes Infrastructure Using AI to Detect Malicious Activity
Securing QR Codes Infrastructure Using AI to Detect Maliciou...
收藏 引用
IEEE Annual Computing and Communication Workshop and Conference (CCWC)
作者: Luis Rivas Varun Kumar Singh Vinayak Khandelwal Lanier Watkins US Army Johns Hopkins University Information Security Institute Johns Hopkins University
With the advent of QR Codes, mobile devices, and computers, users can exchange information quickly but not se-curely. QR Codes-based attacks are rising rapidly, threatening the trust of this extensively used technolog... 详细信息
来源: 评论
Patterns on Designing API Endpoint Operations  21
Patterns on Designing API Endpoint Operations
收藏 引用
Proceedings of the 28th Conference on Pattern Languages of Programs
作者: Apitchaka Singjai Uwe Zdun Olaf Zimmermann Mirko Stocker Cesare Pautasso University of Vienna Software Architecture Research Group Austria OST Eastern Switzerland University of Applied Sciences Switzerland Software Institute Faculty of Informatics USI Lugano Switzerland
Domain-driven design (DDD) is often applied when implementing microservices or communicating through APIs in distributed systems. APIs expose a published language that provides a view on entire domain models or subset... 详细信息
来源: 评论