咨询与建议

限定检索结果

文献类型

  • 2,212 篇 会议
  • 479 篇 期刊文献
  • 5 篇 学位论文
  • 2 册 图书
  • 2 篇 科技报告

馆藏范围

  • 2,700 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,643 篇 工学
    • 2,409 篇 计算机科学与技术...
    • 2,213 篇 软件工程
    • 211 篇 电气工程
    • 207 篇 信息与通信工程
    • 126 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 37 篇 生物工程
    • 25 篇 安全科学与工程
    • 22 篇 仪器科学与技术
    • 22 篇 建筑学
    • 21 篇 生物医学工程(可授...
    • 20 篇 土木工程
    • 19 篇 航空宇航科学与技...
    • 18 篇 材料科学与工程(可...
    • 18 篇 环境科学与工程(可...
    • 17 篇 动力工程及工程热...
    • 17 篇 化学工程与技术
  • 491 篇 理学
    • 366 篇 数学
    • 42 篇 统计学(可授理学、...
    • 40 篇 生物学
    • 40 篇 系统科学
    • 38 篇 物理学
    • 17 篇 化学
  • 414 篇 管理学
    • 221 篇 图书情报与档案管...
    • 218 篇 管理科学与工程(可...
    • 128 篇 工商管理
  • 121 篇 教育学
    • 121 篇 教育学
  • 30 篇 法学
    • 21 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 24 篇 医学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 2,700 篇 java programming...
  • 255 篇 java
  • 44 篇 computer softwar...
  • 33 篇 software
  • 21 篇 codes
  • 20 篇 libraries
  • 18 篇 computer personn...
  • 16 篇 software systems
  • 16 篇 software enginee...
  • 16 篇 semantics
  • 16 篇 graphical user i...
  • 16 篇 language
  • 15 篇 source code
  • 14 篇 analysis program...
  • 14 篇 open source soft...
  • 13 篇 runtime
  • 13 篇 extensible marku...
  • 13 篇 testing
  • 13 篇 computer program...
  • 12 篇 computer program...

机构

  • 6 篇 unisys corporati...
  • 6 篇 kth royal instit...
  • 5 篇 graduate school ...
  • 5 篇 ibm corp thomas ...
  • 5 篇 ibm t.j. watson ...
  • 4 篇 ibm ottawa
  • 4 篇 dipartimento di ...
  • 4 篇 singapore manage...
  • 4 篇 inria sophia ant...
  • 4 篇 department of co...
  • 4 篇 univ york dept c...
  • 4 篇 carnegie mellon ...
  • 3 篇 univ york york y...
  • 3 篇 université de mo...
  • 3 篇 cwi
  • 3 篇 school of comput...
  • 3 篇 utrecht universi...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of ma...
  • 3 篇 indiana univ dep...

作者

  • 16 篇 bettini lorenzo
  • 15 篇 inoue katsuro
  • 14 篇 binder walter
  • 11 篇 leavens gary t.
  • 9 篇 schoeberl martin
  • 9 篇 ernst michael d.
  • 8 篇 ishio takashi
  • 8 篇 monperrus martin
  • 8 篇 carpenter bryan
  • 8 篇 wellings andy
  • 7 篇 visser willem
  • 7 篇 baudry benoit
  • 7 篇 fox geoffrey
  • 7 篇 damiani ferrucci...
  • 7 篇 poll erik
  • 7 篇 poetzsch-heffter...
  • 7 篇 bal henri e.
  • 7 篇 vitek jan
  • 6 篇 kielmann thilo
  • 6 篇 milanova ana

语言

  • 2,532 篇 英文
  • 131 篇 其他
  • 14 篇 中文
  • 10 篇 日文
  • 8 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛伐克文
  • 1 篇 塞尔维亚文
  • 1 篇 乌克兰文
检索条件"主题词=JAVA programming language"
2700 条 记 录,以下是221-230 订阅
排序:
How Effective Are Neural Networks for Fixing Security Vulnerabilities
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Yi Jiang, Nan Pham, Hung Viet Lutellier, Thibaud Davis, Jordan Tan, Lin Babkin, Petr Shah, Sameena Purdue University West Lafayette United States University of Alberta Camrose Canada York University Toronto Canada J.P. Morgan AI Research Palo Alto United States
Security vulnerability repair is a difficult task that is in dire need of automation. Two groups of techniques have shown promise: (1) large code language models (LLMs) that have been pre-trained on source code for ta... 详细信息
来源: 评论
Authoring Worked Examples for java programming with Human-AI Collaboration
arXiv
收藏 引用
arXiv 2023年
作者: Hassany, Mohammad Brusilovsky, Peter Ke, Jiaze Akhuseyinoglu, Kamil Narayanan, Arun Balajiee Lekshmi University of Pittsburgh PittsburghPA United States Carnegie Mellon University PittsburghPA United States
Worked examples (solutions to typical programming problems presented as a source code in a certain language and are used to explain the topics from a programming class) are among the most popular types of learning con... 详细信息
来源: 评论
Montsalvat: Intel SGX Shielding for GraalVM Native Images
arXiv
收藏 引用
arXiv 2023年
作者: Yuhala, Peterson Ménétrey, Jämes Felber, Pascal Schiavoni, Valerio Tchana, Alain Thomas, Gaël Guiroux, Hugo Lozi, Jean-Pierre University of Neuchâtel Neuchâtel Switzerland ENS Lyon France Télécom SudParis Institut Polytechnique de Paris France Oracle Labs Zürich Switzerland
The popularity of the java programming language has led to its wide adoption in cloud computing infrastructures. However, java applications running in untrusted clouds are vulnerable to various forms of privileged att... 详细信息
来源: 评论
Performance best practices using java AWS lambda
arXiv
收藏 引用
arXiv 2023年
作者: Menéndez, Juan Mera Bartlett, Martin
Despite its already widespread popularity, it continues to gain adoption. More and more developers and architects continue to adopt and apply the FaaS (Function as a Service) model in cloud solutions. The most extensi... 详细信息
来源: 评论
ChatGPT, Can You Generate Solutions for my Coding Exercises? An Evaluation on its Effectiveness in an undergraduate java programming Course
arXiv
收藏 引用
arXiv 2023年
作者: Ouh, Eng Lieh Gan, Benjamin Kok Siew Shim, Kyong Jin Wlodkowski, Swavek Singapore Management University Singapore
In this study, we assess the efficacy of employing the ChatGPT language model to generate solutions for coding exercises within an undergraduate java programming course. ChatGPT, a large-scale, deep learning-driven na... 详细信息
来源: 评论
JIRA PLUGIN for the ALICE INSTANCE  9
JIRA PLUGIN for the ALICE INSTANCE
收藏 引用
9th International Conference "Distributed Computing and Grid Technologies in Science and Education", GRID 2021
作者: Kondratyev, Andrey Bondyakov, Aleksey Meshcheryakov Laboratory of Information Technologies Joint Institute for Nuclear Research Russia Joliot-Curie 6 Dubna Moscow region 141980 Russia
As a bug tracking and project management system, the ALICE experiment uses Jira Software, which provides a wide range of configuration options. Jira also allows one to significantly expand the basic functionality with... 详细信息
来源: 评论
WALT PLATFORM for WEB APPLICATION DEVELOPMENT  9
WALT PLATFORM for WEB APPLICATION DEVELOPMENT
收藏 引用
9th International Conference "Distributed Computing and Grid Technologies in Science and Education", GRID 2021
作者: Korenkov, Vladimir Kuniaev, Sergey Semashko, Sergey Sokolov, Ivan Joint Institute for Nuclear Research 6 Joliot-Curie St. Dubna 141980 Russia
The article describes the Web Application Lego Toolkit (WALT), which is a template-oriented platform designed for the development of web applications of various degrees of complexity. Unlike some other platforms, whic... 详细信息
来源: 评论
M-Health Application for Managing a Patient's Medical Record based on the Cloud: Design and Implementation  2
M-Health Application for Managing a Patient's Medical Record...
收藏 引用
2nd International Workshop on Human-Centric Smart Environments for Health and Well-Being, IHSH 2020
作者: Souiki, Sihem Hadjila, Mourad Moussaoui, Djillali Ferdi, Soria Rais, Soumia Faculty of Technology Stic Lab. University of Ain-Temouchent Dept. of Telecom Algeria
Mobile health (MH) technologies and electronic medical record represent a powerful solution which can help both patients and doctors in daily health monitoring and treatment, especially for patient's leaves in rur... 详细信息
来源: 评论
Research on Parsing and Storage of BIM Information Based on IFC Standard  6
Research on Parsing and Storage of BIM Information Based on ...
收藏 引用
6th International Conference on Hydraulic and Civil Engineering, ICHCE 2020
作者: Wang, Ruoxiao Tang, Yongjing College of Civil Engineering Tongji University Shanghai200092 China College of Civil Engineering Tongji Zhejiang College Jiaxing314051 China
Industry Foundation Classes(IFC) defines the standard exchange data format of building information model. For making it possible to serve the whole life cycle of structure, it is necessary to parse and save BIM inform... 详细信息
来源: 评论
A Review on Distance Measure Formula for Enhancing Match Detection Process of Generic Code Clone Detection Model in java Application  7
A Review on Distance Measure Formula for Enhancing Match Det...
收藏 引用
7th International Conference on Software Engineering and Computer Systems and 4th International Conference on Computational Science and Information Management, ICSECS-ICOCSIM 2021
作者: Abdullah, Noormaizzattul Akmaliza Hamza, Mohd Azwan Mohamad Ali, Al-Fahim Mubarak Universiti Malaysia Pahang Faculty of Computing College of Computing and Applied Science Pahang Pekan Malaysia
Two code fragments that are identical to each other and repeatedly being implemented in a software program are called code clones. Code clones are classified into four different type which are clone Type-1, clone Type... 详细信息
来源: 评论