咨询与建议

限定检索结果

文献类型

  • 118 篇 期刊文献
  • 113 篇 会议

馆藏范围

  • 231 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 171 篇 工学
    • 136 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 生物工程
    • 21 篇 电气工程
    • 16 篇 控制科学与工程
    • 13 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 10 篇 材料科学与工程(可...
    • 7 篇 光学工程
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 建筑学
    • 5 篇 交通运输工程
    • 5 篇 安全科学与工程
  • 79 篇 理学
    • 33 篇 数学
    • 27 篇 生物学
    • 24 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 9 篇 化学
    • 4 篇 系统科学
  • 49 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 19 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 9 篇 社会学
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 12 篇 semantics
  • 9 篇 federated learni...
  • 7 篇 computational mo...
  • 6 篇 deep learning
  • 6 篇 feature extracti...
  • 5 篇 data mining
  • 5 篇 software
  • 5 篇 blockchains
  • 5 篇 training
  • 4 篇 reinforcement le...
  • 4 篇 raman spectrosco...
  • 4 篇 convolution
  • 4 篇 optimization
  • 4 篇 image denoising
  • 4 篇 costs
  • 4 篇 probabilistic lo...
  • 4 篇 testing
  • 3 篇 conferences
  • 3 篇 semantic segment...
  • 3 篇 computer archite...

机构

  • 10 篇 software enginee...
  • 9 篇 huawei software ...
  • 9 篇 shanghai key lab...
  • 8 篇 school of softwa...
  • 7 篇 yunnan key labor...
  • 7 篇 nanyang technolo...
  • 7 篇 peng cheng labor...
  • 6 篇 college of data ...
  • 6 篇 national key lab...
  • 6 篇 moe engineering ...
  • 5 篇 software enginee...
  • 5 篇 singapore manage...
  • 5 篇 the state key la...
  • 5 篇 shenzhen institu...
  • 5 篇 school of softwa...
  • 5 篇 engineering rese...
  • 5 篇 national enginee...
  • 5 篇 engineering rese...
  • 4 篇 school of comput...
  • 4 篇 national trusted...

作者

  • 11 篇 tian chunwei
  • 9 篇 liu kui
  • 9 篇 zhang yanning
  • 9 篇 wang ting
  • 8 篇 xia xin
  • 7 篇 lin chia-wen
  • 6 篇 zheng menghua
  • 6 篇 yin kai
  • 6 篇 zuo wangmeng
  • 5 篇 junhong liu
  • 5 篇 zhang lei
  • 5 篇 fake fang
  • 5 篇 jiale xie
  • 5 篇 zehui yuan
  • 5 篇 xian deng
  • 5 篇 libo feng
  • 5 篇 chen cheng
  • 5 篇 lo david
  • 5 篇 shi yuanming
  • 5 篇 zhang david

语言

  • 208 篇 英文
  • 20 篇 其他
  • 2 篇 中文
检索条件"机构=Software Engineering Application Technology Laboratory"
231 条 记 录,以下是1-10 订阅
E-PRedictor: an approach for early prediction of pull request acceptance
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 380-395页
作者: Kexing CHEN Lingfeng BAO Xing HU Xin XIA Xiaohu YANG State Key Laboratory of Blockchain and Data Security Zhejiang University Software Engineering Application Technology Lab
A pull request(PR) is an event in Git where a contributor asks project maintainers to review code he/she wants to merge into a project. The PR mechanism greatly improves the efficiency of distributed software developm... 详细信息
来源: 评论
Ratchet: Retrieval Augmented Transformer for Program Repair  35
Ratchet: Retrieval Augmented Transformer for Program Repair
收藏 引用
35th IEEE International Symposium on software Reliability engineering, ISSRE 2024
作者: Wang, Jian Liu, Shangqing Xie, Xiaofei Siow, Jingkai Liu, Kui Li, Yi Singapore Management University Singapore Nanyang Technological University Singapore Software Engineering Application Technology Laboratory Huawei China
Automated Program Repair (APR) presents the promising momentum of releasing developers from the burden of manual debugging tasks by automatically fixing bugs in various ways. Recent advances in deep learning inspire m... 详细信息
来源: 评论
Dual Prompt-Based Few-Shot Learning for Automated Vulnerability Patch Localization  31
Dual Prompt-Based Few-Shot Learning for Automated Vulnerabil...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Zhang, Junwei Hu, Xing Bao, Lingfeng Xia, Xin Li, Shanping Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Software Engineering Application Technology Lab Huawei China
Vulnerabilities are disclosed with corresponding patches so that users can remediate them in time. However, there are instances where patches are not released with the disclosed vulnerabilities, causing hidden dangers... 详细信息
来源: 评论
Investigating White-Box Attacks for On-Device Models  24
Investigating White-Box Attacks for On-Device Models
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Zhou, Mingyi Gao, Xiang Wu, Jing Liu, Kui Sun, Hailong Li, Li Monash University MelbourneVIC Australia Beihang University Beijing China Huawei Software Engineering Application Technology Lab China Beihang University Beijing China Yunnan Key Laboratory of Software Engineering China
Numerous mobile apps have leveraged deep learning capabilities. However, on-device models are vulnerable to attacks as they can be easily extracted from their corresponding mobile apps. Although the structure and para... 详细信息
来源: 评论
GIRP: Energy-Efficient QoS-Oriented Microservice Resource Provisioning via Multi-Objective Multi-Task Reinforcement Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5793-5807页
作者: Yuan, Honggang Wang, Ting Fu, Min Shi, Yuanming East China Normal University MoE Engineering Research Center of Software/Hardware Co-design Technology and Application Shanghai Key Laboratory of Trustworthy Computing Shanghai200062 China National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore ShanghaiTech University School of Information Science and Technology Shanghai201210 China
Microservice architecture has revolutionized web service development by facilitating loosely coupled and independently developable components distributed as containers or virtual machines. While existing studies empha... 详细信息
来源: 评论
An Efficient and Privacy-Preserving Spatial Crowdsourcing Protocol from Hash Functions for IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19231-19243页
作者: Abla, Parhat Fang, Wan Li, Taotao Deng, Zhihong Xie, Anke South China Normal University School of Software Foshan528225 China Sun Yat-Sen University School of Software Engineering Zhuhai528478 China Guangzhou University School of Mathematics and Information Science Guangzhou510006 China Yunnan Innovation Institute of Beihang University Yunnan Key Laboratory of Blockchain Application Technology Kunming650233 China
The proliferation of smart devices has propelled the advancement of IoT-based spatial crowdsourcing. The issue of location privacy in task allocation for IoT-based spatial crowdsourcing has attracted significant atten... 详细信息
来源: 评论
Practical Program Repair via Preference-based Ensemble Strategy  24
Practical Program Repair via Preference-based Ensemble Strat...
收藏 引用
46th IEEE/ACM International Conference on software engineering, ICSE 2024
作者: Zhong, Wenkang Xu, Tongtong Li, Chuanyi Ge, Jidong Liu, Kui Bissyandé, Tegawendé F. Luo, Bin Ng, Vincent National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Huawei Software Engineering Application Technology Lab Hangzhou China University of Luxembourg Luxembourg Human Language Technology Research Institute University of Texas at Dallas RichardsonTX United States
To date, over 40 Automated Program Repair (APR) tools have been designed with varying bug-fixing strategies, which have been demonstrated to have complementary performance in terms of being effective for different bug... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
PS3: Precise Patch Presence Test Based on Semantic Symbolic Signature  24
PS3: Precise Patch Presence Test Based on Semantic Symbolic ...
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Zhan, Qi Hu, Xing Li, Zhiyang Xia, Xin Lo, David Li, Shanping Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei China Singapore Management University Singapore
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论
NL2CTL: Automatic Generation of Formal Requirements Specifications via Large Language Models  1
收藏 引用
25th International Conference on Formal engineering Methods, ICFEM 2024
作者: Zhao, Mengyan Tao, Ran Huang, Yanhong Shi, Jianqi Qin, Shengchao Yang, Yang National Trusted Embedded Software Engineering Technology Research Center East China Normal University Shanghai China Hardware/Software Co-Design Technology and Application Engineering Research Center East China Normal University Shanghai China Guangzhou Institute of Technology Xidian University Xi’an China ICTT and ISN Laboratory Xidian University Xi’an China Software Engineering Institute East China Normal University Shanghai China
Reducing the gap between natural language requirements and precise formal specifications is a critical task in requirements engineering. In recent years, requirement engineering is becoming increasingly complex alongs... 详细信息
来源: 评论