咨询与建议

限定检索结果

文献类型

  • 11,708 篇 会议
  • 771 篇 期刊文献

馆藏范围

  • 12,479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,072 篇 计算机科学与技术...
    • 1,032 篇 电气工程
    • 455 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 29 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 185 篇 理学
    • 63 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,479 篇 software algorit...
  • 3,731 篇 software
  • 1,965 篇 algorithm design...
  • 1,777 篇 hardware
  • 826 篇 computer archite...
  • 805 篇 heuristic algori...
  • 761 篇 application soft...
  • 706 篇 software enginee...
  • 645 篇 computer science
  • 598 篇 software systems
  • 571 篇 computational mo...
  • 559 篇 prediction algor...
  • 545 篇 optimization
  • 521 篇 clustering algor...
  • 473 篇 testing
  • 428 篇 accuracy
  • 412 篇 signal processin...
  • 371 篇 costs
  • 348 篇 machine learning...
  • 320 篇 software testing

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...
  • 8 篇 college of compu...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,401 篇 英文
  • 49 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12479 条 记 录,以下是241-250 订阅
排序:
A multi-objective particle swarm optimization algorithm for dual elite selection
A multi-objective particle swarm optimization algorithm for ...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Jianjie Chen Yanmin Liu Yi Luo Jing Zhang Yuci Li Siwan Chen Jiangyan Xu School of Data Science and Information Engineering Guizhou Minzu University Guiyang China School of Mathematics Zunyi Normal College Zunyi China School of Mathematics and Statistics Guizhou University Guiyang China
In this paper, a multi-objective particle swarm optimization algorithm (DEMOPSO) is proposed, which introduces a double elite selection mechanism to select high-quality elite particles in the archive and enhances the ... 详细信息
来源: 评论
Improving Robustness and Natural Accuracy in Adversarial Distillation with Important Sample Features
Improving Robustness and Natural Accuracy in Adversarial Dis...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Peichao Qiu Lifeng Huang Ning Liu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China College of Mathematics and Informatics South China Agricultural University Guangzhou China
Although adversarial training proves to be an effective method for training robust neural networks, its application is constrained by model capacity, making it challenging to implement in scenarios with limited comput... 详细信息
来源: 评论
Data Frequency Coverage Impact on AI Performance
Data Frequency Coverage Impact on AI Performance
收藏 引用
IEEE International Conference on software Testing Verification and Validation Workshop, ICSTW
作者: Erin Lanus Brian Lee Jaganmohan Chandrasekaran Laura J. Freeman M S Raunak Raghu N. Kacker D. Richard Kuhn National Security Institute Virginia Tech Arlington VA USA Sanghani Center for Artificial Intelligence & Data Analytics Virginia Tech Arlington VA USA Information Technology Lab National Institute of Standards and Technology MD USA
Artificial Intelligence (AI) models use statistical learning over data to solve complex problems for which straightforward rules or algorithms may be difficult or impossible to design; however, a side effect is that m... 详细信息
来源: 评论
Development of LoRa Communication System Generator Simulation Model
Development of LoRa Communication System Generator Simulatio...
收藏 引用
Systems of Signals Generating and Processing in the Field of on Board Communications
作者: Konstantin Yu. Ryumshin Angela I. Sattarova Alexey P. Zhuravlev Vladimir E. Rusanov Lev M. Kazadaev Moscow Technical University of Communications and Informatics Moscow Russia
Today LoRa data transmission technology is gaining more and more popularity among Internet devices for collecting information and communication. The main purpose of LoRa technology is to collect simple information in ... 详细信息
来源: 评论
Smart Resume Analyzer: An Automated Approach for Recruitment Process
Smart Resume Analyzer: An Automated Approach for Recruitment...
收藏 引用
Pervasive Computational Technologies (ICPCT), International Conference on
作者: Kajal Rai Pawan Kumar Dept. of MCA GL Bajaj Institute of Technology and Management Greater Noida Uttar Pradesh India School of Computer Applications Lovely Professional University Phagwara Punjab India
This work presents an automated Resume Analyzer system to streamline the initial resume screening process. Designed to alleviate recruiters’ workloads, the system extracts key resume details—such as name, contact in... 详细信息
来源: 评论
Securing IoT-enabled Metaverse with Authentication and Threat Classification Framework Using DL
Securing IoT-enabled Metaverse with Authentication and Threa...
收藏 引用
International Symposium on Advanced Computing and Communication (ISACC)
作者: Krisha Darji Chinmay Trivedi Rajesh Gupta Fenil Ramoliya Sudeep Tanwar Smita Agrawal Dept. of Comp. Science & Engg. Institute of Tech. Nirma University Ahmedabad India
In the current technological landscape, the rise of Web 3.0 is notable. Alongside this, immersive technologies like Virtual Reality (VR) and Augmented Reality (AR) are gaining increased popularity. This is due to idea... 详细信息
来源: 评论
Enhancing Fraud Detection via On-Chain Ethereum and Off-Chain X Data Fusion
Enhancing Fraud Detection via On-Chain Ethereum and Off-Chai...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Yunpeng Niu Guang Li Yangtian Mi Jieying Zhou Weigang Wu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
Although Ethereum stands as the dominant blockchain for smart contracts and decentralized applications, faces persistent security challenges from fraudulent activities. Such activities often correlate with off-chain p... 详细信息
来源: 评论
Development of an Algorithm for Intelligent Analysis of Data From a Microprocessor-Based Portable Spectrophotometer
Development of an Algorithm for Intelligent Analysis of Data...
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Bekruz Z. Parmanov Fayzullo M. Nazarov Maruf R. Tojiyev Department of Management Theory and Information Security Samarkand state university named fater Sharof Rashidov Samarkand Uzbekistan Department of Artificial intelligence and Information systems Samarkand state university named fater Sharof Rashidov Samarkand Uzbekistan
This article is devoted to the development of a microprocessor-based portable spectrophotometer for the analysis of substances in water, the development of an algorithm for analyzing data from the device, and the writ... 详细信息
来源: 评论
Privacy-Preserving Large Language Model in Terms of Secure Computing: A Survey
Privacy-Preserving Large Language Model in Terms of Secure C...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Peiming Xu Huan Xu Maoqiang Chen Zhihong Liang Wenqian Xu Guangdong Provincial Key Laboratory of Power System Network Security China Southern Power Grid Electric Power Research Institute Guangzhou China China Southern Power Grid Company Limited Guangzhou China
As large language models (LLMs) become increasingly embedded in diverse applications, from natural language processing to cybersecurity, the demand for robust privacy-preserving solutions has surged. This paper discus... 详细信息
来源: 评论
Evaluating ReLink for Traceability Link Recovery in Practice
Evaluating ReLink for Traceability Link Recovery in Practice
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Ayberk Yaşa Cemhan Kaan Özaltan Görkem Ayten Fatih Kaplama Ömercan Devran Baykal Mehmet Uçar Eray Tüzün Stash Ankara Turkey RWTH Aachen University Aachen Germany Bilkent University Ankara Turkey Beko İstanbul Turkey
Traceability is important in the software development life cycle for managing the connections among various software artifacts, particularly pull requests (PRs) and issues. Developers often neglect to link these manua... 详细信息
来源: 评论