咨询与建议

限定检索结果

文献类型

  • 159 篇 会议
  • 94 篇 期刊文献

馆藏范围

  • 253 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 241 篇 工学
    • 208 篇 计算机科学与技术...
    • 86 篇 软件工程
    • 76 篇 电气工程
    • 37 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 交通运输工程
    • 1 篇 化学工程与技术
    • 1 篇 网络空间安全
  • 15 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
  • 9 篇 理学
    • 4 篇 数学
    • 3 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
  • 5 篇 医学
    • 4 篇 临床医学
    • 1 篇 基础医学(可授医学...
  • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
    • 1 篇 教育学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 16 篇 cloud computing
  • 12 篇 deep learning
  • 7 篇 petri nets
  • 7 篇 test case priori...
  • 7 篇 federated learni...
  • 6 篇 task analysis
  • 6 篇 service composit...
  • 6 篇 semantics
  • 6 篇 security
  • 6 篇 qos
  • 5 篇 energy consumpti...
  • 5 篇 regression testi...
  • 5 篇 software test
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 attention mechan...
  • 5 篇 privacy
  • 4 篇 petri net
  • 4 篇 reliability
  • 4 篇 collaborative fi...

机构

  • 105 篇 shanghai key lab...
  • 49 篇 shanghai univ sc...
  • 43 篇 east china univ ...
  • 40 篇 shanghai key lab...
  • 19 篇 shanghai key lab...
  • 17 篇 shanghai inst te...
  • 14 篇 east china univ ...
  • 14 篇 shanghai dev ctr...
  • 12 篇 donghua univ sch...
  • 10 篇 shanghai key lab...
  • 10 篇 shanghai univ ct...
  • 9 篇 beihang univ sch...
  • 9 篇 shanghai key lab...
  • 8 篇 shanghai engn re...
  • 8 篇 e china univ sci...
  • 7 篇 beihang univ bei...
  • 6 篇 shanghai jiao to...
  • 6 篇 nanjing univ sta...
  • 6 篇 school of cyber ...
  • 6 篇 chongqing univ p...

作者

  • 53 篇 yu huiqun
  • 43 篇 fan guisheng
  • 34 篇 miao huaikou
  • 32 篇 cai lizhi
  • 22 篇 liu zhenyu
  • 20 篇 chen liqiong
  • 15 篇 ma lizhuang
  • 14 篇 chen mingang
  • 14 篇 gao honghao
  • 10 篇 wang hongya
  • 10 篇 sun huaiying
  • 9 篇 zeng hongwei
  • 9 篇 wang tianbo
  • 9 篇 chen chen
  • 9 篇 liu pan
  • 9 篇 chen shengbo
  • 9 篇 hu yun
  • 9 篇 xia chunhe
  • 8 篇 yi ran
  • 8 篇 xiao yingyuan

语言

  • 251 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Shanghai Key Lab Comp Software Evaluating Testing"
253 条 记 录,以下是21-30 订阅
排序:
TGAS-ReID: Efficient architecture search for person re-identification via greedy decisions with topological order
收藏 引用
APPLIED INTELLIGENCE 2023年 第7期53卷 7343-7354页
作者: Chen, Shengbo Jiang, Kai Liu, Xianrui Yang, Kangkang Lei, Zhou Shanghai Univ Sch Comp Engn & Sci Shanghai 200444 Peoples R China Shanghai Key Lab Comp Software Testing & Evaluati Shanghai 201112 Peoples R China
Person Re-Identification (Re-ID) technology is being developed rapidly due to the successful application of deep convolutional neural networks. However, the prevailing Re-ID models are usually built upon manually desi... 详细信息
来源: 评论
Multi-domain mixup for scenario-universal face anti-spoofing
收藏 引用
compUTERS & GRAPHICS-UK 2023年 116卷 327-335页
作者: Lu, Shitao Liu, Shice Zhang, keyue Chen, Mingang Tan, Xin Ma, Lizhuang East China Normal Univ Shanghai Peoples R China Shanghai Key Lab Comp Software Evaluating & Testin Shanghai Peoples R China Tencent Youtu Lab Shenzhen Peoples R China
Recently, disentangled representation learning has been commonly used in face anti-spoofing (FAS). However, such method has limited generalization ability due to the lack of data domains in the training phase. To over... 详细信息
来源: 评论
Time-cost efficient memory configuration for serverless workflow applications
收藏 引用
CONCURRENCY AND compUTATION-PRACTICE & EXPERIENCE 2022年 第27期34卷
作者: Li, Zengpeng Yu, Huiqun Fan, Guisheng East China Univ Sci & Technol Sch Informat Sci & Engn Shanghai 200237 Peoples R China Shanghai Key Lab Comp Software Evaluating & Testi Shanghai Peoples R China
Recently, workflow applications are increasingly migrated to Function-as-a-Service platforms which are easy to manage, highly-scalable, and pay-as-you-go. Meanwhile, users face challenges in migration of serverless ap... 详细信息
来源: 评论
A Combining Method for Wireless Protocol Conformance testing: A Empirical Case
收藏 引用
WIRELESS COMMUNICATIONS & MOBILE compUTING 2021年 第1期2021卷 p1-14页
作者: Wei-Wei, Lin Hong-Wei, Zeng Kim, Jung Yoon Shanghai Univ Sch Comp Engn & Sci Shanghai Peoples R China Shanghai Key Lab Comp Software Evaluating & Testi Shanghai Peoples R China Gachon Univ Grad Sch Game Seongnam South Korea
Ensuring the consistency of protocol implementation and protocol specification is the basic premise of wireless communication. With the application of wireless communication in more and more fields, the wireless commu... 详细信息
来源: 评论
A graph algorithm for the time constrained shortest path
收藏 引用
CONNECTION SCIENCE 2022年 第1期34卷 1500-1518页
作者: Liu, Pan Huang, Wulan Shanghai Business Sch Fac Business Informat Shanghai Peoples R China Shanghai Key Lab Comp Software Testing & Evaluat Shanghai Peoples R China
Highly efficient algorithms for solving the time constrained shortest path problem have been highlighted over the past decades to reduce the cost of vehicle travel in the road network. The paper presents a novel graph... 详细信息
来源: 评论
Security-based code smell definition, detection, and impact quantification in Android
收藏 引用
software-PRACTICE & EXPERIENCE 2023年 第11期53卷 2296-2321页
作者: Zhong, Yi Shi, Mengyu He, Jiawei Fang, Chunrong Chen, Zhenyu Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China Shanghai Key Lab Comp Software Evaluating & Testin Shanghai Peoples R China Nanjing Univ Shenzhen Res Inst Shenzhen Peoples R China
Android's high market share and extensive functionality make its security a significant concern. Research reveals that many security issues are caused by insecure coding practices. As a poor design indicator, code... 详细信息
来源: 评论
Pattern Mining-Based Warning Prioritization by Refining Abstract Syntax Tree
收藏 引用
INTERNATIONAL JOURNAL OF software ENGINEERING AND KNOWLEDGE ENGINEERING 2024年 第10期34卷 1593-1619页
作者: Ge, Xiuting Li, Xuanye Sun, Yuanyuan Qing, Mingshuang Zheng, Haitao Zhang, Huibin Wu, Xianyu GuangDong Tops Soft Pk co LTD Guangzhou Peoples R China Shanghai Key Lab Comp Software Evaluating & Testin Shanghai Peoples R China Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China
Static code analysis tools (SATs) are widely used to detect potential defects in software projects. However, the usability of SATs is seriously hindered by a large number of unactionable warnings. Currently, many warn... 详细信息
来源: 评论
Enhancing code summarization with action word prediction
收藏 引用
NEUROcompUTING 2024年 563卷
作者: Li, Mingchen Yu, Huiqun Fan, Guisheng Zhou, Ziyi Huang, Zijie East China Univ Sci & Technol Dept Comp Sci & Engn Shanghai Peoples R China Shanghai Engn Res Ctr Smart Energy Shanghai Peoples R China Shanghai Comp Software Tech Dev Ctr Shanghai Key Lab Comp Software Evaluating & Testin Shanghai Peoples R China
Code summarization refers to automatically generating concise description in natural language from a code snippet. Good code summaries could effectively facilitate program comprehension and software maintenance. In re... 详细信息
来源: 评论
ClassSum: a deep learning model for class-level code summarization
收藏 引用
NEURAL compUTING & APPLICATIONS 2023年 第4期35卷 3373-3393页
作者: Li, Mingchen Yu, Huiqun Fan, Guisheng Zhou, Ziyi Huang, Jiawen East China Univ Sci & Technol Dept Comp Sci & Engn Shanghai Peoples R China Shanghai Engn Res Ctr Smart Energy Shanghai Peoples R China Shanghai Comp Software Tech Dev Ctr Shanghai Key Lab Comp Software Evaluating & Testi Shanghai Peoples R China
Code summaries are clear and concise natural language descriptions of program entities. Meaningful code summaries assist developers in better understanding. Code summarization refers to the task of generating a natura... 详细信息
来源: 评论
Neural 3D face rendering conditioned on 2D appearance via GAN disentanglement method
收藏 引用
compUTERS & GRAPHICS-UK 2023年 116卷 336-344页
作者: Chen, Ruizhao Yi, Ran Wang, Tuanfeng Yang Ma, Lizhuang Shanghai Jiao Tong Univ Shanghai 200240 Peoples R China Shanghai Key Lab Comp Software Evaluating & Testin Shanghai 201112 Peoples R China Adobe Res San Jose CA USA
Previewing the shaded output of 3D models has been a long-standing requirement in the field. Typically, this is achieved by applying common materials;however, this approach is often laborintensive and can yield only r... 详细信息
来源: 评论