咨询与建议

限定检索结果

文献类型

  • 156 篇 会议
  • 73 篇 期刊文献

馆藏范围

  • 229 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 144 篇 工学
    • 122 篇 计算机科学与技术...
    • 89 篇 软件工程
    • 26 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 11 篇 生物工程
    • 8 篇 机械工程
    • 8 篇 动力工程及工程热...
    • 7 篇 电子科学与技术(可...
    • 6 篇 建筑学
    • 6 篇 航空宇航科学与技...
    • 5 篇 电气工程
    • 4 篇 网络空间安全
    • 3 篇 力学(可授工学、理...
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 71 篇 理学
    • 48 篇 数学
    • 14 篇 系统科学
    • 14 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 11 篇 物理学
    • 3 篇 化学
  • 43 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 6 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 2 篇 法学

主题

  • 10 篇 software enginee...
  • 9 篇 web services
  • 7 篇 laboratories
  • 7 篇 authentication
  • 7 篇 computational mo...
  • 7 篇 semantics
  • 6 篇 xml
  • 6 篇 educational inst...
  • 6 篇 algorithm design...
  • 6 篇 analytical model...
  • 5 篇 protocols
  • 4 篇 reinforcement le...
  • 4 篇 public key crypt...
  • 4 篇 network topology
  • 4 篇 wireless sensor ...
  • 4 篇 calculus
  • 3 篇 helium
  • 3 篇 surveys
  • 3 篇 service oriented...
  • 3 篇 application soft...

机构

  • 67 篇 shanghai key lab...
  • 36 篇 software enginee...
  • 18 篇 shanghai key lab...
  • 15 篇 shanghai key lab...
  • 15 篇 shanghai key lab...
  • 8 篇 shanghai key lab...
  • 6 篇 school of inform...
  • 6 篇 school of comput...
  • 5 篇 university of ch...
  • 4 篇 shanghai key lab...
  • 4 篇 shanghai key lab...
  • 4 篇 state key labora...
  • 3 篇 institute of com...
  • 3 篇 microsoft
  • 3 篇 college of infor...
  • 3 篇 east china norma...
  • 3 篇 science and tech...
  • 3 篇 state key lab of...
  • 3 篇 shanghai key lab...
  • 3 篇 shanghai key lab...

作者

  • 16 篇 huibiao zhu
  • 13 篇 wang ting
  • 12 篇 zhu huibiao
  • 11 篇 zhao hui
  • 10 篇 qin li
  • 10 篇 zhou aoying
  • 9 篇 zhang lei
  • 9 篇 shi yuanming
  • 8 篇 wang xiaoling
  • 7 篇 peng chao
  • 7 篇 hui zhao
  • 6 篇 yongxin zhao
  • 6 篇 zhao yongxin
  • 6 篇 jifeng he
  • 6 篇 jing liu
  • 6 篇 du yugen
  • 5 篇 cai haibin
  • 5 篇 geguang pu
  • 5 篇 shi jianqi
  • 5 篇 li qin

语言

  • 214 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"机构=Shanghai Key Lab of Trustworthy Computing Software Engineering Institute"
229 条 记 录,以下是91-100 订阅
排序:
Test scenario generation using model checking
收藏 引用
International Journal of Performability engineering 2018年 第6期14卷 1241-1250页
作者: Yin, Zhixiong Zhang, Min Li, Guoqiang Fang, Ling School of Engineering Sciences University of Chinese Academy of Sciences Beijing100049 China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China School of Software Shanghai Jiao Tong University Shanghai200240 China Institute of Technology Innovation Hefei Institutes of Physical Science Chinese Academy of Sciences Hefei230031 China
Testing, including designation, execution and bug analysis has been broadly adopted in various industries. Test cases must be designed to confirm the entire behavior of the object system. In practice, a test case norm... 详细信息
来源: 评论
The medical segmentation decathlon
arXiv
收藏 引用
arXiv 2021年
作者: Antonelli, Michela Reinke, Annika Bakas, Spyridon Farahani, keyvan Kopp-Schneider, Annette Landman, Bennett A. Litjens, Geert Menze, Bjoern Ronneberger, Olaf Summers, Ronald M. van Ginneken, Bram Bilello, Michel Bilic, Patrick Christ, Patrick F. Do, Richard K.G. Gollub, Marc J. Heckers, Stephan H. Huisman, Henkjan Jarnagin, William R. McHugo, Maureen K. Napel, Sandy Golia Pernicka, Jennifer S. Rhode, Kawal Tobon-Gomez, Catalina Vorontsov, Eugene Hulsmon, Hankan Meakin, James A. Ourselin, Sebastien Wiesenfarth, Manuel Arbeláez, Pablo Bae, Byeonguk Chen, Sihong Daza, Laura Feng, Jianjiang He, Baochun Isensee, Fabian Ji, Yuanfeng Jia, Fucang Kim, Namkug Kim, Ildoo Merhof, Dorit Pai, Akshay Park, Beomhee Perslev, Mathias Rezaiifar, Ramin Rippel, Oliver Sarasua, Ignacio Shen, Wei Son, Jaemin Wachinger, Christian Wang, Liansheng Wang, Yan Xia, Yingda Xu, Daguang Xu, Zhanwei Zheng, Yefeng Simpson, Amber L. Maier-Hein, Lena Cardoso, M. Jorge School of Biomedical Engineering & Imaging Sciences King’s College London London United Kingdom Heidelberg Germany Heidelberg Germany Faculty of Mathematics and Computer Science University of Heidelberg Heidelberg Germany University of Pennsylvania PhiladelphiaPA United States BethesdaMD United States Heidelberg Germany Electrical Engineering and Computer Science Vanderbilt University NashvilleTN United States Radboud University Medical Center Radboud Institute for Health Sciences Nijmegen Netherlands Quantitative Biomedicine University of Zurich Zurich Switzerland DeepMind London United Kingdom School of Computing Department of Biomedical and Molecular Sciences Queen’s University KingstonON Canada Department of Surgery Memorial Sloan Kettering Cancer Center New YorkNY United States BethesdaMD United States Department of Informatics Technische Universität München Germany Department of Radiology Memorial Sloan Kettering Cancer Center New YorkNY United States Department of Psychiatry & Behavioral Sciences Vanderbilt University Medical Center NashvilleTN United States Department of Radiology Stanford University StanfordCA United States Department of Computer Science and Software Engineering École Polytechnique de Montréal Department of Radiology Perelman School of Medicine University of Pennsylvania PhiladelphiaPA United States Department of Pathology and Laboratory Medicine Perelman School of Medicine University of Pennsylvania PhiladelphiaPA United States Medical Faculty University of Heidelberg Heidelberg Germany VUNO Inc. Seoul Korea Republic of Universidad de los Andes Colombia Department of Automation Tsinghua University Beijing China Heidelberg Germany Department of Computer Science Xiamen University Xiamen361005 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Kakao Brain Korea Republic of Institute of Imaging & Computer Vision RWTH Aachen University Aachen Germany Cere
International challenges have become the de facto standard for comparative assessment of image analysis algorithms given a specific task. Segmentation is so far the most widely investigated medical image processing ta... 详细信息
来源: 评论
Accountable multi-authority ciphertext-policy attribute-based encryption without key escrow and key abuse  9th
Accountable multi-authority ciphertext-policy attribute-base...
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Yu, Gang Ma, Xiaoxiao Cao, Zhenfu Zhu, Weihua Zeng, Junjie State Key Laboratory of Mathematical Engineering and Advanced Computing Information Science and Technology Institute Zhengzhou450001 China Shanghai Key Lab for Trustworthy Computing East China Normal University Shanghai200062 China Zheng Zhou Vocational University of Information and Technology Zhengzhou450046 China
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising public key encryption primitive enabling fine-grained access control on shared data in public cloud. However, two quite challenging issues, the prev... 详细信息
来源: 评论
Large-scale analysis of framework-specific exceptions in android apps
arXiv
收藏 引用
arXiv 2018年
作者: Fan, Lingling Su, Ting Chen, Sen Meng, Guozhu Liu, Yang Xu, Lihua Pu, Geguang Su, Zhendong School of Computer Science and Software Engineering East China Normal University China School of Computer Science and Engineering Nanyang Technological University Singapore SKLOIS Institute of Information Engineering Chinese Academy of Sciences China Shanghai Key Laboratory of Trustworthy Computing East China Normal University China Department of Computer Science University of California Davis United States
Mobile apps have become ubiquitous. For app developers, it is a key priority to ensure their apps' correctness and reliability. However, many apps still suffer from occasional to frequent crashes, weakening their ... 详细信息
来源: 评论
Perturbation techniques for convergence analysis of proximal gradient method and other first-order algorithms via variational analysis
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Xiangfeng Ye, Jane J. Yuan, Xiaoming Zeng, Shangzhi Zhang, Jin Shanghai Key Lab for Trustworthy Computing School of Computer Science and Software Engineering East China Normal University China Department of Mathematics and Statistics University of Victoria Canada Department of Mathematics University of Hong Kong Hong Kong Hong Kong Department of Mathematics University of Hong Kong Hong Kong Hong Kong Department of Mathematics Hong Kong Baptist University Hong Kong HKBU Institute of Research and Continuing Education Shenzhen China
We develop new perturbation techniques for conducting convergence analysis of various first-order algorithms for a class of nonsmooth optimization problems. We consider the iteration scheme of an algorithm to construc... 详细信息
来源: 评论
AdaRate: A rate-adaptive traffic measurement method in software defined networks
收藏 引用
International Journal of Performability engineering 2017年 第6期13卷 937-944页
作者: Tang, Jixing Zhang, Yue Li, Yan MoE Engineering Research Center for Software/Hardware Co-Design Technology and Application East China Normal University Shanghai200062 China Shanghai Key Lab for Trustworthy Computing East China Normal University Shanghai200062 China
Traffic measurement is the basis of analysis and prediction of network traffic. Its accuracy directly affects the reliability of upper applications. This paper proposes a rate-adaptive traffic measurement method calle... 详细信息
来源: 评论
Comparison and evaluation of routing protocols based on a collaborative simulation using SUMO and NS3 with TraCI
Comparison and evaluation of routing protocols based on a co...
收藏 引用
2016 International Conference on Information System and Artificial Intelligence, ISAI 2016
作者: Yang, Yue Hao, Si-Yuan Cai, Ha-Bin Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Software Engineering Institute East China Normal University Shanghai China
Vehicle Ad hoc Network (VANET) is an emerging technology and a new application of mobile Ad Hoc technology in the field of traffic. As the simulation experiments cost less manpower and material resources and they are ... 详细信息
来源: 评论
On the Convergence Rate of a Class of Proximal-Based Decomposition Methods for Monotone Variational Inequalities
收藏 引用
Journal of the Operations Research Society of China 2015年 第3期3卷 347-362页
作者: Xiang-Feng Wang Shanghai Key Lab for Trustworthy Computing Software Engineering InstituteEast China Normal UniversityShanghai 200062China
A unified efficient algorithm framework of proximal-based decomposition methods has been proposed for monotone variational inequalities in 2012,while only global convergence is proved at the same *** this paper,we giv... 详细信息
来源: 评论
Improving Defect Detection Ability of Derived Test Cases Based on Mutated UML Activity Diagrams
Improving Defect Detection Ability of Derived Test Cases Bas...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Haiying Sun Mingsong Chen Min Zhang Jing Liu Ying Zhang Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Software Engineering Institute East China Normal University Shanghai China
Structure coverage driven test generation is the key approach for automatic testing at source code level. However, the defect detection ability of the generated test cases should be carefully evaluated since the corre... 详细信息
来源: 评论
Comparison and Evaluation of Routing Protocols Based on a Collaborative Simulation Using SUMO and NS3 with TraCI
Comparison and Evaluation of Routing Protocols Based on a Co...
收藏 引用
International Conference on Information System and Artificial Intelligence (ISAI)
作者: Yue Yang Si-Yuan Hao Ha-Bin Cai Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Software Engineering Institute East China Normal University Shanghai China
Vehicle Ad hoc Network (VANET) is an emerging technology and a new application of mobile Ad Hoc technology in the field of traffic. As the simulation experiments cost less manpower and material resources and they are ... 详细信息
来源: 评论