咨询与建议

限定检索结果

文献类型

  • 276 篇 会议
  • 60 篇 期刊文献

馆藏范围

  • 336 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 209 篇 工学
    • 185 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 30 篇 控制科学与工程
    • 21 篇 信息与通信工程
    • 16 篇 交通运输工程
    • 15 篇 机械工程
    • 14 篇 生物工程
    • 11 篇 建筑学
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 网络空间安全
    • 7 篇 电气工程
    • 6 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 石油与天然气工程
    • 4 篇 安全科学与工程
  • 97 篇 理学
    • 73 篇 数学
    • 16 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 9 篇 系统科学
    • 8 篇 物理学
  • 73 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 14 篇 工商管理
    • 5 篇 公共管理
  • 9 篇 医学
    • 8 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
    • 6 篇 社会学
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 29 篇 software testing
  • 23 篇 testing
  • 21 篇 petri nets
  • 20 篇 software
  • 20 篇 web services
  • 15 篇 model checking
  • 13 篇 software quality
  • 10 篇 analytical model...
  • 10 篇 cloud computing
  • 9 篇 laboratories
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 semantics
  • 8 篇 algorithm design...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 7 篇 software reliabi...
  • 7 篇 costs
  • 7 篇 business
  • 7 篇 training

机构

  • 165 篇 shanghai key lab...
  • 73 篇 school of comput...
  • 55 篇 department of co...
  • 40 篇 shanghai key lab...
  • 24 篇 department of co...
  • 19 篇 shanghai key lab...
  • 19 篇 school of comput...
  • 16 篇 school of inform...
  • 16 篇 shanghai key lab...
  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 9 篇 shanghai key lab...
  • 8 篇 east china unive...
  • 7 篇 shanghai jiao to...
  • 7 篇 school of inform...
  • 7 篇 guangxi collabor...
  • 7 篇 computing center...
  • 6 篇 shanghai enginee...
  • 6 篇 shanghai key lab...
  • 6 篇 faculty of engin...

作者

  • 37 篇 lizhi cai
  • 32 篇 yu huiqun
  • 31 篇 miao huaikou
  • 30 篇 cai lizhi
  • 29 篇 fan guisheng
  • 24 篇 zhenyu liu
  • 21 篇 chen liqiong
  • 19 篇 liu zhenyu
  • 16 篇 huaikou miao
  • 14 篇 chen mingang
  • 13 篇 chen shengbo
  • 11 篇 gao honghao
  • 10 篇 mingang chen
  • 10 篇 liu pan
  • 10 篇 zhang juan
  • 9 篇 genxing yang
  • 9 篇 hongwei zeng
  • 9 篇 yun hu
  • 9 篇 chunhe xia
  • 9 篇 tianbo wang

语言

  • 331 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Shanghai Key Laboratory of Computer Software Testing and Evaluation"
336 条 记 录,以下是101-110 订阅
排序:
CRCS: Learning Synergistic Cascade Correlation for Microscopic Cascade Prediction
CRCS: Learning Synergistic Cascade Correlation for Microscop...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Huacheng Li Chunhe Xia Tianbo Wang Haopeng Zhao Key Laboratory of Beijing Network Technology Beihang University Beijing China Key Laboratory of Beijing Network Technology Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Information diffusion prediction is the basis of many fundamental tasks, such as social recommendation and community detection. Currently, most researchers infer user correlation based on cascade records to predict fu...
来源: 评论
CHESS: Learning User Correlation from Semantic-related Cascades for Diffusion Prediction
CHESS: Learning User Correlation from Semantic-related Casca...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Huacheng Li Chunhe Xia Tianbo Wang Haopeng Zhao Key Laboratory of Beijing Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Understanding the information diffusion trajectory in online social networks has become an ever-growing prominent research direction in the information era. Users interact with social information they are interested i...
来源: 评论
Load Balancing Optimization for Transformer in Distributed Environment
Load Balancing Optimization for Transformer in Distributed E...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Delu Ma Zhou Lei Shengbo Chen Peng Wang School of Computer Engineering and Science Shanghai University Shanghai China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai China
In recent years, the demand for artificial intelligence applications has increased dramatically. Complex models can promote machine learning to achieve excellent results, but computing efficiency has gradually reached... 详细信息
来源: 评论
CFC: a Cascade Forest approach to discover Cancer driver genes using multi-omics data
CFC: a Cascade Forest approach to discover Cancer driver gen...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Lei Zhang Yijing Yang Zhe Wang Dongdong Li Jingping Liu Hai Yang Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Department of Computer Science University of Illinois Urbana-Champaign Champaign Illinois United States of America
With the development of next-generation sequencing technology, massive genomic data has been generated, primarily encouraging research on cancer driver genes. Many bioinformatics methods were proposed to identify driv... 详细信息
来源: 评论
Test Sequence Generation Based on Chain Unique Input-Output Sequence in FSM Conformance testing
Test Sequence Generation Based on Chain Unique Input-Output ...
收藏 引用
作者: Weiwei Lin Hongwei Zeng School of Computer Engineering and Science Shanghai UniversityShanghai Key Laboratory of Computer Software Evaluating &Testing School of Computer Engineering and Science Shanghai University
This paper introduces a test method based on chain unique input/output(CUIO) sequence in finite state machine(FSM) conformance testing. For FSMs with UIO for each state, the test sequence based on CUIO can identify al... 详细信息
来源: 评论
computer-Aided Formalization of Product Family Models
SSRN
收藏 引用
SSRN 2022年
作者: Liu, Hongbo Wang, Xi Wang, Weiwei School of Computer Engineering and Scinece Shanghai University No.333 Nan Chen Road Baoshan District Shanghai Shanghai200444 China Shanghai Key Laboratory of Computer Software Testing and Evaluating No.333 Nan Chen Road Baoshan District Shanghai200444 China
The software product line enables the rapid construction of software products by reusing core assets. Product family modeling is one of the important activities in software product line engineering, which is a model f... 详细信息
来源: 评论
Message from the InSTA 2022 chairs
Proceedings - 2022 IEEE 14th International Conference on Sof...
收藏 引用
Proceedings - 2022 IEEE 14th International Conference on software testing, Verification and Validation Workshops, ICSTW 2022 2022年 xvii页
作者: Masuda, Satoshi Nishi, Yasuharu Hagar, Jon Katayama, Tetsuro Liu, Qin Liu, Zhenyu Tsuda, Kazuhiko Yumoto, Tsuyoshi Takeda, T. Zhang, W. Hiruta, Y. Suhara, H. Masuda, S. Suzuki, K. Hagar, J. Tokyo City University Japan The University of Electro-Communications Japan Grand Software Testing United States University of Miyazaki Japan Tongji University China Shanghai Key Laboratory of Computer Software Testing and Evaluation China China University of Tsukuba Japan Japan Npo ASTER Japan Japan Software Bug Prediction Model Based on Mathematical Graph Features Metrics Japan Obtaining Fuzzing Results with Different Timeouts
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based Network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论