咨询与建议

限定检索结果

文献类型

  • 276 篇 会议
  • 60 篇 期刊文献

馆藏范围

  • 336 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 209 篇 工学
    • 185 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 30 篇 控制科学与工程
    • 21 篇 信息与通信工程
    • 16 篇 交通运输工程
    • 15 篇 机械工程
    • 14 篇 生物工程
    • 11 篇 建筑学
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 网络空间安全
    • 7 篇 电气工程
    • 6 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 4 篇 石油与天然气工程
    • 4 篇 安全科学与工程
  • 97 篇 理学
    • 73 篇 数学
    • 16 篇 生物学
    • 13 篇 统计学(可授理学、...
    • 9 篇 系统科学
    • 8 篇 物理学
  • 73 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 14 篇 工商管理
    • 5 篇 公共管理
  • 9 篇 医学
    • 8 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
    • 6 篇 社会学
  • 5 篇 艺术学
    • 5 篇 设计学(可授艺术学...
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 29 篇 software testing
  • 23 篇 testing
  • 21 篇 petri nets
  • 20 篇 software
  • 20 篇 web services
  • 15 篇 model checking
  • 13 篇 software quality
  • 10 篇 analytical model...
  • 10 篇 cloud computing
  • 9 篇 laboratories
  • 9 篇 quality of servi...
  • 9 篇 computational mo...
  • 9 篇 semantics
  • 8 篇 algorithm design...
  • 8 篇 feature extracti...
  • 8 篇 security
  • 7 篇 software reliabi...
  • 7 篇 costs
  • 7 篇 business
  • 7 篇 training

机构

  • 165 篇 shanghai key lab...
  • 73 篇 school of comput...
  • 55 篇 department of co...
  • 40 篇 shanghai key lab...
  • 24 篇 department of co...
  • 19 篇 shanghai key lab...
  • 19 篇 school of comput...
  • 16 篇 school of inform...
  • 16 篇 shanghai key lab...
  • 10 篇 school of comput...
  • 10 篇 school of cyber ...
  • 9 篇 shanghai key lab...
  • 8 篇 east china unive...
  • 7 篇 shanghai jiao to...
  • 7 篇 school of inform...
  • 7 篇 guangxi collabor...
  • 7 篇 computing center...
  • 6 篇 shanghai enginee...
  • 6 篇 shanghai key lab...
  • 6 篇 faculty of engin...

作者

  • 37 篇 lizhi cai
  • 33 篇 yu huiqun
  • 31 篇 miao huaikou
  • 30 篇 cai lizhi
  • 29 篇 fan guisheng
  • 24 篇 zhenyu liu
  • 21 篇 chen liqiong
  • 19 篇 liu zhenyu
  • 16 篇 huaikou miao
  • 14 篇 chen mingang
  • 13 篇 chen shengbo
  • 11 篇 gao honghao
  • 10 篇 mingang chen
  • 10 篇 liu pan
  • 10 篇 zhang juan
  • 9 篇 genxing yang
  • 9 篇 hongwei zeng
  • 9 篇 yun hu
  • 9 篇 chunhe xia
  • 9 篇 tianbo wang

语言

  • 331 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Shanghai Key Laboratory of Computer Software Testing and Evaluation"
336 条 记 录,以下是291-300 订阅
排序:
Multi-MedVit: a deep learning approach for the diagnosis of COVID-19 with the CT images
Multi-MedVit: a deep learning approach for the diagnosis of ...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yunjie Cai Zeqi Zheng Shanling Nie Yue Guo Ruijie Zhang Hai Yang Department of Computer Science and Engineering East China University of Science and Technology Shanghai PR China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China School of Electronics and Computer Science University of Southampton UK
The grim situation of novel coronavirus pneumonia 2019 (COVID-19) and its terrible spreading speed have already constituted a severe risk to human life, so it is ultimately essential to rapidly and accurately diagnose... 详细信息
来源: 评论
Modif-SegUnet: Innovatively Advancing Liver Cancer Diagnosis and Treatment through Efficient and Meaningful Segmentation of 3D Medical Images
Modif-SegUnet: Innovatively Advancing Liver Cancer Diagnosis...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Chenhang Wang Yujian Jin Jiayi Liang YuHan Yang Shanling Nie Yang Hai Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Faculty of Engineering The University of Sydney Sydney Australia
Hepatocellular Carcinoma (HCC) holds a record of high incidence and severe global harm. In tasks of liver cancer segmentation based on 3D medical images, the majority of methods have endeavored to enhance the 3D U-net...
来源: 评论
An empirical study on clustering approach combining fault prediction for test case prioritization
An empirical study on clustering approach combining fault pr...
收藏 引用
International Conference on computer and Information Science (ACIS)
作者: Lei Xiao Huaikou Miao Weiwei Zhuang Shaojun Chen School of Computer Engineering and Science Shanghai University Shanghai China School of Computer and Information Engineering Xiamen University of Technology Xiamen China Shanghai Key Laboratory of Computer Software Testing & Evaluating Shanghai China Meitu corporation Xiamen China
Using Clustering algorithm to improve the effectiveness of test case prioritization has been well recognized by many researchers. software fault prediction has been one of the active parts of software engineering, but... 详细信息
来源: 评论
A practical test method for scalability of the cluster
A practical test method for scalability of the cluster
收藏 引用
International Conference on New Trends in Information and Service Science, NISS
作者: Shiyan Wei Lizhi Cai Donglin Liu Zhenyu Liu Leilei Chen Pan Liu School of Information Science & Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Evaluating & Testing Shanghai China College of Computer Engineering and Science Shanghai Business School Shanghai China
Scalability is an important metric which is used to evaluate the scalability of the cluster system. Although, there have been a lot of scalability metrics, the research of scalability of the cluster system is very few... 详细信息
来源: 评论
An optimized method for generating cases of metamorphic testing
An optimized method for generating cases of metamorphic test...
收藏 引用
International Conference on New Trends in Information and Service Science, NISS
作者: Leilei Chen Lizhi Cai Jiang Liu Zhenyu Liu Shiyan Wei Pan Liu School of Information Science & Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory Computer Software Evaluating & Testing Shanghai China Shanghai Business School College of Computer Engineering and Science Shanghai China
The information contained in the successful test case has been fully tapped by metamorphic testing which can effectively solve the oracle problem of software testing. One of the key factors affecting the results of th... 详细信息
来源: 评论
Verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks
收藏 引用
Journal of Computational Information Systems 2011年 第8期7卷 2770-2778页
作者: Sun, Hua Yu, Huiqun Yang, Nianhua Li, Li Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China School of Information Science and Engineering Xinjiang University Urumqi 830046 Xinjiang China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China
In this paper we propose an innovative verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks. This scheme employs RSA threshold secret sharing theory to realize management of th... 详细信息
来源: 评论
A Novel Personalized Recommendation Algorithm Based on Trust Relevancy Degree
A Novel Personalized Recommendation Algorithm Based on Trust...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Weimin Li Heng Zhu Xiaokang Zhou Shohei Shimizu Mingjun Xin Qun Jin School of Computer Engineering and Technology Shanghai University Shanghai China Faculty of Data Science Shiga University Hikone Japan Software Evaluating and Testing Shanghai Key Laboratory of Computer Shanghai China Faculty of Human Sciences Waseda University Japan
The rapid development of the Internet and ecommerce has brought a lot of convenience to people's life. Personalized recommendation technology provides users with services that they may be interested according to u... 详细信息
来源: 评论
Accountable authority identity-based encryption with public traceability
Accountable authority identity-based encryption with public ...
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Lai, Junzuo Deng, Robert H. Zhao, Yunlei Weng, Jian School of Information Systems Singapore Management University Singapore Singapore Software School Fudan University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con... 详细信息
来源: 评论
Research on Quality Model for Quantum Simulator software
Research on Quality Model for Quantum Simulator Software
收藏 引用
software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter), ACIS International Winter Conference on
作者: Chao Wang Jingwei Chen JianXin Ge XueZhong Wu QianQian Qu Le Luo Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer Software Technology Shanghai China QUDOOR Technologies Inc. Hefei China Software Engineering of Computer and Information Engineering College Shanghai Polytechnic University Shanghai China QUDOOR Technologies Inc. School of Physics and Astronomy Sun Yat-Sen University Zhuhai China
In recent years, the demand for arithmetic power from all walks of life is growing, especially the increasing popularity of AIGC, which makes people realize that huge technological progress cannot be made without the ...
来源: 评论
CRCS: Learning Synergistic Cascade Correlation for Microscopic Cascade Prediction
CRCS: Learning Synergistic Cascade Correlation for Microscop...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Huacheng Li Chunhe Xia Tianbo Wang Haopeng Zhao Key Laboratory of Beijing Network Technology Beihang University Beijing China Key Laboratory of Beijing Network Technology Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Information diffusion prediction is the basis of many fundamental tasks, such as social recommendation and community detection. Currently, most researchers infer user correlation based on cascade records to predict fu...
来源: 评论