咨询与建议

限定检索结果

文献类型

  • 2,218 篇 会议
  • 476 篇 期刊文献
  • 2 册 图书
  • 2 篇 学位论文

馆藏范围

  • 2,698 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,646 篇 工学
    • 2,414 篇 计算机科学与技术...
    • 2,214 篇 软件工程
    • 211 篇 电气工程
    • 208 篇 信息与通信工程
    • 126 篇 控制科学与工程
    • 59 篇 电子科学与技术(可...
    • 42 篇 机械工程
    • 38 篇 生物工程
    • 25 篇 安全科学与工程
    • 22 篇 仪器科学与技术
    • 22 篇 建筑学
    • 21 篇 生物医学工程(可授...
    • 20 篇 土木工程
    • 19 篇 航空宇航科学与技...
    • 18 篇 环境科学与工程(可...
    • 17 篇 材料科学与工程(可...
    • 17 篇 动力工程及工程热...
    • 17 篇 化学工程与技术
  • 491 篇 理学
    • 364 篇 数学
    • 43 篇 统计学(可授理学、...
    • 41 篇 生物学
    • 40 篇 物理学
    • 40 篇 系统科学
    • 17 篇 化学
  • 413 篇 管理学
    • 220 篇 图书情报与档案管...
    • 218 篇 管理科学与工程(可...
    • 128 篇 工商管理
  • 121 篇 教育学
    • 121 篇 教育学
  • 30 篇 法学
    • 21 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 23 篇 医学
  • 8 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 2,698 篇 java programming...
  • 255 篇 java
  • 44 篇 computer softwar...
  • 33 篇 software
  • 22 篇 codes
  • 20 篇 libraries
  • 18 篇 computer personn...
  • 16 篇 software systems
  • 16 篇 software enginee...
  • 16 篇 semantics
  • 16 篇 graphical user i...
  • 16 篇 language
  • 15 篇 source code
  • 14 篇 analysis program...
  • 14 篇 open source soft...
  • 13 篇 runtime
  • 13 篇 extensible marku...
  • 13 篇 computer program...
  • 12 篇 program diagnost...
  • 12 篇 security

机构

  • 6 篇 unisys corporati...
  • 6 篇 kth royal instit...
  • 5 篇 graduate school ...
  • 5 篇 ibm corp thomas ...
  • 5 篇 ibm t.j. watson ...
  • 4 篇 ibm ottawa
  • 4 篇 dipartimento di ...
  • 4 篇 inria sophia ant...
  • 4 篇 department of co...
  • 4 篇 univ york dept c...
  • 4 篇 carnegie mellon ...
  • 3 篇 univ york york y...
  • 3 篇 université de mo...
  • 3 篇 cwi
  • 3 篇 school of comput...
  • 3 篇 utrecht universi...
  • 3 篇 iit dept comp sc...
  • 3 篇 department of ma...
  • 3 篇 singapore manage...
  • 3 篇 indiana univ dep...

作者

  • 16 篇 bettini lorenzo
  • 15 篇 inoue katsuro
  • 14 篇 binder walter
  • 11 篇 leavens gary t.
  • 9 篇 schoeberl martin
  • 9 篇 ernst michael d.
  • 8 篇 ishio takashi
  • 8 篇 monperrus martin
  • 8 篇 carpenter bryan
  • 8 篇 wellings andy
  • 7 篇 visser willem
  • 7 篇 baudry benoit
  • 7 篇 fox geoffrey
  • 7 篇 damiani ferrucci...
  • 7 篇 poll erik
  • 7 篇 poetzsch-heffter...
  • 7 篇 bal henri e.
  • 7 篇 vitek jan
  • 6 篇 kielmann thilo
  • 6 篇 milanova ana

语言

  • 2,416 篇 英文
  • 250 篇 其他
  • 12 篇 中文
  • 10 篇 日文
  • 8 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛伐克文
  • 1 篇 塞尔维亚文
  • 1 篇 乌克兰文
检索条件"主题词=Java Programming language"
2698 条 记 录,以下是41-50 订阅
排序:
An Implementation of Naming Rule Checking Function and Its Applications to java programming Codes
An Implementation of Naming Rule Checking Function and Its A...
收藏 引用
2025 IEEE International Conference on Consumer Electronics, ICCE 2025
作者: Wai, Khaing Hsu Funabiki, Nobuo Mentari, Mustika Aung, Soe Thandar Kyaw, Htoo Htoo Sandi Yamaguchi, Shingo Kao, Wen-Chung Graduate School of Science and Engineering Akita University Akita Japan Department of Information and Communication Systems Okayama University Okayama Japan Department of Computer and Information Science Tokyo University of Agriculture and Technology Tokyo Japan Graduate School of Sciences and Technology for Innovation Yamaguchi University Japan Department of Electrical Engineering National Taiwan Normal University Taipei Taiwan
Currently, a lot of universities are offering java programming courses for teaching the first-step object-oriented programming language. For novice students, to master writing readable codes using proper names for var... 详细信息
来源: 评论
FaultLLAMA2: A Fine Tuned Large language Model for Code Recommendations to Reduce java Lock Contention  34
FaultLLAMA2: A Fine Tuned Large Language Model for Code Reco...
收藏 引用
34th Annual International Conference on Collaborative Advances in Software and Computing, CASCON 2024
作者: Shawon, Ashadullah Liscano, Ramiro Azim, Akramul Sundaresan, Vijay Chang, Yee-Kang Ontario Tech University Electrical and Computer Engineering Oshawa Canada IBM IBM Toronto Lab Toronto Canada
Lock contention occurs when multiple threads or processes try to access the same lock simultaneously, often causing performance degradation in software that runs concurrent threads. In this paper, we propose a new rec... 详细信息
来源: 评论
Go vs. java: A Detailed Performance Analysis in Concurrent programming  1
Go vs. Java: A Detailed Performance Analysis in Concurrent P...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Morshed, Md. Neaz Roy, Prince MMDU Computer Science and Engineering Haryana India Fairleigh Dickinson University Applied Computer Science Vancouver Canada
Go, a programming language developed by Google, is relatively new but offers modern and powerful features, including similarities to java and an emphasis on rapid development and concurrency. This paper examines Go... 详细信息
来源: 评论
Anylogic and Python-Based Gunshot Detection System Using CNN and Trilateration
Anylogic and Python-Based Gunshot Detection System Using CNN...
收藏 引用
2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Shendre, Sanjivani P. Priya, M.Yagnasri Sridhar, Swetha Kamble, Samrudhi S. Khanna, Manju Amrita School of Computing Amrita Vishwa Vidyapeetham Dept. of Computer Science and Engineering Bengaluru India
Gunshot detection has been applied in fields such as defense and forensic sciences. This plays a very critical role in law enforcement and public safety. Detecting a gunshot begins with automatic detection of the pres... 详细信息
来源: 评论
APK Automated Analysis System Based on Machine Learning  14th
APK Automated Analysis System Based on Machine Learning
收藏 引用
14th International Conference on Computer Engineering and Networks, CENet 2024
作者: Tang, Keyan Liang, Guangjun Chen, Mengxuan Lu, You Zhang, Yang Xu, Zhongping Xu, Yiquan Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
This article first analyzes and compares the advantages and disadvantages of various traditional data mining methods and machine learning algorithms. Then, a new model for identifying Android malicious code was propos... 详细信息
来源: 评论
Design of java programming One-Time Pad Encryption System Based on DES Algorithm
Design of Java Programming One-Time Pad Encryption System Ba...
收藏 引用
作者: Gao, Shijuan Xinjiang University of Science & Technology Xinjiang China
With the increasingly severe situation of Internet security, how to effectively guarantee the information security in the network has become an important topic of current network security research. Traditional cryptog... 详细信息
来源: 评论
Implementation of Single Sign On (SSO) Technology on the SMART JABAR Portal Based on the Principles of Electronic Based Government System  24
Implementation of Single Sign On (SSO) Technology on the SMA...
收藏 引用
7th International Conference on Information Science and Systems, ICISS 2024
作者: Pratama, Aldy Dirga Abdurrahman, Lukman Saedudin, Rd Rohmat Information System Telkom University Indonesia
E-Government is a model of government system based on the power of digital technology. The form of Indonesia’s seriousness in improving public services based on the use of information and communication technology is ... 详细信息
来源: 评论
Quantifying the Impact of Non-Code Text Block on java Code Quality: Multi-Model Framework  3
Quantifying the Impact of Non-Code Text Block on Java Code Q...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Vvs, Sriharsha Nair, Pranav B. Akarsh, S.V. Narmada, Nakka Pati, Peeta Basa Amrita School of Computing Dept. of Computer Science & Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Non-code elements in programming, such as comments, documentation, and whitespace, play a crucial role in improving code readability, maintainability, and collaboration. However, their inclusion introduces overhead af... 详细信息
来源: 评论
An Introduction of Test Code Approach in Basic java programming Course  7
An Introduction of Test Code Approach in Basic Java Programm...
收藏 引用
7th International Conference on Vocational Education and Electrical Engineering, ICVEE 2024
作者: Mentari, Mustika Funabiki, Nobuo Wai, Khaing Hsu Aung, Soe Thandar Syaifudin, Yan Watequlis Noprianto Rahmadani, Alfiandi Aulia Okayama University Department of Information and Communication Systems Okayama Japan Politeknik Negeri Malang Department of Information Technology Malang Indonesia
Students and teachers in Computer Science field have considered java as an essential programming language to learn for many years. To support activities of teachers and students in programming learning, a web-based sy... 详细信息
来源: 评论
Securing Wireless Ad-Hoc Network Over Black Hole Attack Using Light Weight Approach
Securing Wireless Ad-Hoc Network Over Black Hole Attack Usin...
收藏 引用
2024 IEEE SmartBlock4Africa, SmartBlock4Africa 2024
作者: Doe, Martin Ferdinand, Alifo Kyereh, Richard Ansong, Edward Danso Dominic, Damoah Samuel, Sebuabe Yao Valley View University Computer Science and Engineering Department Oyibi Ghana Kwame Nkrumah University of Science and Technology Kumasi Ghana University of Ghana Computer Science Department Accra Ghana
Wireless Ad hoc Networks (WANETs) have gained significant attention due to their versatility in various applications. However, the susceptibility of WANETs to security threats, particularly Black hole attacks, has bec... 详细信息
来源: 评论