咨询与建议

限定检索结果

文献类型

  • 121 篇 期刊文献
  • 111 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 134 篇 计算机科学与技术...
    • 113 篇 软件工程
    • 43 篇 信息与通信工程
    • 23 篇 生物工程
    • 21 篇 电气工程
    • 16 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 6 篇 光学工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
    • 5 篇 交通运输工程
  • 77 篇 理学
    • 33 篇 数学
    • 26 篇 生物学
    • 22 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 9 篇 化学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 10 篇 法学
    • 9 篇 社会学
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 12 篇 semantics
  • 9 篇 federated learni...
  • 7 篇 computational mo...
  • 6 篇 deep learning
  • 6 篇 feature extracti...
  • 5 篇 data mining
  • 5 篇 software
  • 5 篇 blockchains
  • 5 篇 training
  • 4 篇 reinforcement le...
  • 4 篇 raman spectrosco...
  • 4 篇 convolution
  • 4 篇 optimization
  • 4 篇 image denoising
  • 4 篇 costs
  • 4 篇 blockchain
  • 4 篇 probabilistic lo...
  • 4 篇 testing
  • 3 篇 conferences
  • 3 篇 semantic segment...

机构

  • 9 篇 software enginee...
  • 9 篇 huawei software ...
  • 9 篇 shanghai key lab...
  • 8 篇 school of softwa...
  • 7 篇 yunnan key labor...
  • 7 篇 nanyang technolo...
  • 7 篇 peng cheng labor...
  • 6 篇 college of data ...
  • 6 篇 national key lab...
  • 5 篇 software enginee...
  • 5 篇 singapore manage...
  • 5 篇 the state key la...
  • 5 篇 shenzhen institu...
  • 5 篇 school of softwa...
  • 5 篇 moe engineering ...
  • 5 篇 engineering rese...
  • 5 篇 national enginee...
  • 5 篇 engineering rese...
  • 4 篇 national trusted...
  • 4 篇 science and tech...

作者

  • 11 篇 tian chunwei
  • 9 篇 zhang yanning
  • 9 篇 wang ting
  • 8 篇 liu kui
  • 7 篇 xia xin
  • 7 篇 lin chia-wen
  • 6 篇 zhang lei
  • 6 篇 zheng menghua
  • 6 篇 yin kai
  • 6 篇 zuo wangmeng
  • 5 篇 junhong liu
  • 5 篇 fake fang
  • 5 篇 jiale xie
  • 5 篇 zehui yuan
  • 5 篇 xian deng
  • 5 篇 libo feng
  • 5 篇 chen cheng
  • 5 篇 shi yuanming
  • 5 篇 zhang david
  • 5 篇 li bohan

语言

  • 218 篇 英文
  • 12 篇 其他
  • 2 篇 中文
检索条件"机构=Software Engineering Application Technology Laboratory"
232 条 记 录,以下是11-20 订阅
排序:
Archer: Adaptive Memory Compression with Page-Association-Rule Awareness for High-Speed Response of Mobile Devices  23
Archer: Adaptive Memory Compression with Page-Association-Ru...
收藏 引用
23rd USENIX Conference on File and Storage Technologies, FAST 2025
作者: Li, Changlong Zhu, Zongwei Wang, Chao Liu, Fangming Xu, Fei Sha, Edwin H.-M. Zhou, Xuehai School of Computer Science and Technology East China Normal University China Jianghuai Advance Technology Center Hefei230026 China MoE Engineering Research Center of Hardware/Software Co-Design Technology and Application China School of Software Engineering University of Science and Technology of China Hefei230026 China Suzhou Institute for Advanced Research University of Science and Technology of China Suzhou215123 China Huazhong University of Science and Technology China Peng Cheng Laboratory China
In mobile systems, memory can be compressed page-by-page to save space. This approach is widely adopted because memory data is accessed by page. However, this paper shows that the system response speed is significantl... 详细信息
来源: 评论
Temporal-Aware Multi-behavior Contrastive Recommendation  28th
Temporal-Aware Multi-behavior Contrastive Recommendation
收藏 引用
28th International Conference on Database Systems for Advanced applications, DASFAA 2023
作者: Xuan, Hongrui Li, Bohan College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Nanjing China National Engineering Laboratory for Integrated Aero-Space-GroundOcean Big Data Application Technology Nanjing China
Modeling various types of users’ interactions and jointly considering individual preferences from multiple perspectives, multi-behavior recommendation has attracted increasing attention recently. However, most existi... 详细信息
来源: 评论
Refined multi-channel inception network for automobile insurance fraud identification based on attention mechanism and dense connection structure
Refined multi-channel inception network for automobile insur...
收藏 引用
2023 International Conference on Computer application and Information Security, ICCAIS 2023
作者: Wang, Deguang Zhang, Ting Li, Fengqi Tong, Ning Xu, Fengqiang School of Software Dalian Jiaotong University Liaoning Dalian116028 China School of Computer Communication and Engineering Dalian Jiaotong University Liaoning Dalian116028 China The Dalian Key Laboratory of Blockchain Technology and Application Liaoning Dalian116028 China
Automobile insurance fraud causes huge economic losses to insurance companies, detection technology has become an urgent research topic. However, feature selection manually is prone to subjective judgment, which resul... 详细信息
来源: 评论
Leveraging Interactive Paths for Sequential Recommendation  28th
Leveraging Interactive Paths for Sequential Recommendation
收藏 引用
28th International Conference on Database Systems for Advanced applications, DASFAA 2023
作者: Li, Aoran Zang, Yalei Wang, Yani Li, Bohan College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Beijing China National Engineering Laboratory for Integrated Aero-Space-Ground Ocean Big Data Application Technology Xi’an China
Sequential recommendation systems dynamically predict the users’ next behaviors from chronological historical records to provide more accurate recommendations. However, in many real-world scenarios, recommenders find... 详细信息
来源: 评论
An efficient group key agreement protocol with administrator  3
An efficient group key agreement protocol with administrator
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Fang, Qihao Zhang, Lei Zhang, Mingrui Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Chengdu610041 China Engineering Research Center of Software/Hardware Co-design Technology and Application Ministry of Education Shanghai200062 China
Group key agreement technology is one of the most popular solution to establish a reliable secure channel between communicating entities of a group. Group key agreement protocol with administrator (GKAA) can handle a ... 详细信息
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin  26
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chang, Qianqian Xu, Lin Zhang, Lei Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Chengdu610041 China Engineering Research Center of Software/Hardware Co-design Technology and Application Ministry of Education Shanghai200062 China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony... 详细信息
来源: 评论
Attribute Enhanced Graph Attention Networks for Session-based Recommendation  11
Attribute Enhanced Graph Attention Networks for Session-base...
收藏 引用
11th International Conference on Advanced Cloud and Big Data, CBD 2023
作者: Xu, Yidan Wang, Ning Wu, Jiaqi Xu, Shuai Li, Bohan Nanjing University of Aeronautics and Astronautics Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Natl. Engineering Laboratory for Integrated Aero-Space-Ground Ocean Big Data Application Technology Xi'an China
Session-based recommendation (SBR) aims to predict the next item that the anonymous users will interact with based on their short behavior sequence. However, most of the current approaches towards SBR only focus on mo... 详细信息
来源: 评论
Ratchet: Retrieval Augmented Transformer for Program Repair
Ratchet: Retrieval Augmented Transformer for Program Repair
收藏 引用
International Symposium on software Reliability engineering (ISSRE)
作者: Jian Wang Shangqing Liu Xiaofei Xie Jingkai Siow Kui Liu Yi Li Singapore Management University Singapore Nanyang Technological University Singapore Software Engineering Application Technology Laboratory Huawei China
Automated Program Repair (APR) presents the promising momentum of releasing developers from the burden of manual debugging tasks by automatically fixing bugs in various ways. Recent advances in deep learning inspire m...
来源: 评论
A Survey on Modern Code Review: Progresses, Challenges and Opportunities
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zezhou Gao, Cuiyun Guo, Zhaoqiang Li, Zhenhao Liu, Kui Xia, Xin Zhou, Yuming Harbin Institute of Technology Shenzhen China Software Engineering Application Technology Lab Huawei Hangzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Over the past decade, modern code review (MCR) has been deemed as a crucial practice of software quality assurance, which is applied to improve software quality and transfer development knowledge within a software tea... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. Security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论