咨询与建议

限定检索结果

文献类型

  • 361 篇 会议
  • 169 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 282 篇 计算机科学与技术...
    • 243 篇 软件工程
    • 61 篇 信息与通信工程
    • 39 篇 生物工程
    • 33 篇 电气工程
    • 27 篇 控制科学与工程
    • 27 篇 生物医学工程(可授...
    • 19 篇 电子科学与技术(可...
    • 19 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 18 篇 机械工程
    • 17 篇 化学工程与技术
    • 16 篇 光学工程
    • 11 篇 仪器科学与技术
    • 10 篇 环境科学与工程(可...
  • 137 篇 理学
    • 68 篇 数学
    • 43 篇 生物学
    • 36 篇 物理学
    • 19 篇 统计学(可授理学、...
    • 15 篇 化学
    • 13 篇 系统科学
  • 120 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 31 篇 医学
    • 26 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
    • 11 篇 药学(可授医学、理...
  • 23 篇 法学
    • 19 篇 社会学
  • 17 篇 教育学
    • 16 篇 教育学
  • 8 篇 经济学
  • 4 篇 农学
  • 1 篇 艺术学

主题

  • 34 篇 software enginee...
  • 25 篇 informatics
  • 16 篇 artificial intel...
  • 14 篇 information tech...
  • 14 篇 software
  • 13 篇 information syst...
  • 12 篇 semantics
  • 12 篇 software design
  • 10 篇 database managem...
  • 10 篇 semantic web
  • 9 篇 conferences
  • 9 篇 organizational p...
  • 9 篇 information stor...
  • 8 篇 programming
  • 8 篇 data mining
  • 7 篇 software systems
  • 7 篇 prototypes
  • 7 篇 software measure...
  • 7 篇 machine learning
  • 7 篇 complexity theor...

机构

  • 22 篇 institute of inf...
  • 11 篇 national institu...
  • 10 篇 institute of inf...
  • 10 篇 institute of inf...
  • 8 篇 institute of inf...
  • 7 篇 institute of inf...
  • 6 篇 institute of inf...
  • 6 篇 institute of inf...
  • 5 篇 college of mathe...
  • 5 篇 institute of inf...
  • 5 篇 corporate techno...
  • 5 篇 department of so...
  • 5 篇 department of so...
  • 5 篇 institute of sof...
  • 5 篇 institute of inf...
  • 5 篇 institute of com...
  • 4 篇 institute of inf...
  • 4 篇 max planck insti...
  • 4 篇 faculty of civil...
  • 4 篇 institute of com...

作者

  • 42 篇 bieliková mária
  • 14 篇 valentino vranić
  • 14 篇 vranic valentino
  • 13 篇 vranić valentino
  • 11 篇 šimko marián
  • 11 篇 chudá daniela
  • 10 篇 barla michal
  • 7 篇 mária bieliková
  • 7 篇 wang zheng
  • 6 篇 maria bielikova
  • 6 篇 dakić pavle
  • 6 篇 lukáš kohútka
  • 6 篇 li chen
  • 6 篇 ján mach
  • 5 篇 pavel čičák
  • 5 篇 rashid tarik a.
  • 5 篇 reinhold plösch
  • 5 篇 ngoc thanh nguye...
  • 5 篇 bartalos peter
  • 5 篇 valentino vranic

语言

  • 479 篇 英文
  • 72 篇 其他
  • 4 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Software Engineering Informatics Institute of Technology"
553 条 记 录,以下是121-130 订阅
排序:
UAVs Meet LLMs: Overviews and Perspectives Toward Agentic Low-Altitude Mobility
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Yonglin Lin, Fei Li, Yiduo Zhang, Tengchao Zhang, Qiyao Fu, Xuan Huang, Jun Dai, Xingyuan Wang, Yutong Tian, Chunwei Li, Bai Lv, Yisheng Kovács, Levente Wang, Fei-Yue The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing100190 China Department of Engineering Science Faculty of Innovation Engineering Macau University of Science and Technology 999078 China School of Automation Beijing Institute of Technology Beijing100081 China School of Software Northwestern Polytechnical University Xi’an710129 China College of Mechanical and Vehicle Engineering Hunan University Changsha410082 China John von Neumann Faculty of Informatics Obuda University BudapestH-1034 Hungary
Low-altitude mobility, exemplified by unmanned aerial vehicles (UAVs), has introduced transformative advancements across various domains, like transportation, logistics, and agriculture. Leveraging flexible perspectiv... 详细信息
来源: 评论
A Lightweight and Robust Access Control Protocol for IoT-based e-Healthcare Network
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Ghaffar, Zahid Kuo, Wen-Chung Mahmood, Khalid Tariq, Tayyaba Shamshad, Salman Das, Ashok Kumar Alenazi, Mohammed J.F. National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University Department of Computer Science and Engineering College of Informatics 145 Anam-ro Seongbuk-gu Seoul02841 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh Saudi Arabia
Internet of Things (IoT) devices are crucial components in e-healthcare networks. It enables remote patient health monitoring and facilitates seamless communication among medical sensors, wearable devices, and healthc... 详细信息
来源: 评论
The 4D Nucleome Data Portal as a resource for searching and visualizing curated nucleomics data (vol 13, 2365, 2022)
收藏 引用
NATURE COMMUNICATIONS 2022年 第1期13卷 1-11页
作者: Reiff, Sarah B. Schroeder, Andrew J. Kirli, Koray Cosolo, Andrea Bakker, Clara Mercado, Luisa Lee, Soohyun Veit, Alexander D. Balashov, Alexander K. Vitzthum, Carl Ronchetti, William Pitman, Kent M. Johnson, Jeremy Ehmsen, Shannon R. Kerpedjiev, Peter Abdennur, Nezar Imakaev, Maxim Ozturk, Serkan Utku Camoglu, Ugur Mirny, Leonid A. Gehlenborg, Nils Alver, Burak H. Park, Peter J. Department of Biomedical Informatics Harvard Medical School Boston MA 02115 USA Institute for Medical Engineering and Science Massachusetts Institute of Technology Cambridge MA 02139 USA Karya SMD Software Solutions İzmir 35040 Turkey Department of Physics Massachusetts Institute of Technology Cambridge MA 02139 USA
The 4D Nucleome (4DN) Network aims to elucidate the complex structure and organization of chromosomes in the nucleus and the impact of their disruption in disease biology. We present the 4DN Data Portal (https://***/)... 详细信息
来源: 评论
An Optimized Approach to Hourly Temperature and Humidity Setpoint Generation for Reducing Tomato Disease and Saving Power Cost in Greenhouses
SSRN
收藏 引用
SSRN 2024年
作者: Sánchez-Molina, Jorge Antonio Wang, Hui Laktionov, Ivan Díaz, Francisco Rodríguez Li, Ming BIPP Institute of Plant Protection Beijing Academy of Agriculture and Forestry Sciences Beijing100097 China Department of Computer Systems Software Dnipro University of Technology DniproUA49005 Ukraine Department of Informatics University of Almería ceiA3 CIESOL Almería04120 Spain Beijing Research Center for Information Technology in Agriculture National Engineering Research Centre for Information Technology in Agriculture National Engineering Laboratory for Agri-product Quality Traceability Key Laboratory of Agri-informatics Ministry of Agriculture Beijing100097 China
Grey leaf spot is a main leaf disease of tomato in Mediterranean greenhouses, characterized by warm temperatures and high humidity during the spring and winter seasons, hence suitable for pathogen infection and spore ... 详细信息
来源: 评论
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack Tree and Fuzzy Logic  3
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack T...
收藏 引用
3rd IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Naik, Nitin Jenkins, Paul Grace, Paul Naik, Dishita Song, Jingping Prajapat, Shaligram Mishra, Durgesh Yang, Longzhi Boongoen, Tossapon Iam-On, Natthakan School of Informatics and Digital Engineering Aston University United Kingdom Cardiff School of Technologies Cardiff Metropolitan University United Kingdom Birmingham City University United Kingdom Software College Northeastern University China International Institute of Professional Studies Devi Ahilya University India School of Computer Science & Information Technology Symbiosis University of Applied Sciences India Northumbria University Department of Computer and Information Sciences United Kingdom Aberystwyth University Department of Computer Science United Kingdom
Organisations and users have been experiencing significant rises in cyberattacks and their severity, which means that they require a greater awareness and understanding of the anatomy of cyberattacks, to prevent and m... 详细信息
来源: 评论
HumanNeRF-SE: A Simple yet Effective Approach to Animate HumanNeRF with Diverse Poses
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Caoyuan Liu, Yu-Lun Wang, Zhixiang Liu, Wu Liu, Xinchen Wang, Zheng National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Wuhan University China National Yang Ming Chiao Tung University Taiwan The University of Tokyo Japan National Institute of Informatics Japan School of Information Science and Technology University of Science and Technology of China China JD Explore Academy
We present HumanNeRF-SE, a simple yet effective method that synthesizes diverse novel pose images with simple input. Previous HumanNeRF works require a large number of optimizable parameters to fit the human images. I... 详细信息
来源: 评论
Through the Sci-Fi Lens: Exploring Social Media’s Influence on Body Image and Bullying Among Adolescents in Boarding Schools
Through the Sci-Fi Lens: Exploring Social Media’s Influence...
收藏 引用
Learning and technology Conference (L&T)
作者: Jawahir Che Mustapha Muhammad Azmin Mohamed Ghazali Munaisyah Abdullah Nor Intan Saniah Sulaiman Hezlin Aryani Abd Rahman Informatics & Analytics Section Universiti Kuala Lumpur Malaysian Institute of Information Technology Kuala Lumpur Malaysia Computer Engineering Tech. Section Universiti Kuala Lumpur Malaysian Institute of Information Technology Kuala Lumpur Malaysia Software Engineering Section Universiti Kuala Lumpur Malaysian Institute of Information Technology Kuala Lumpur Malaysia College of Arts and Science School of Quantitative Sciences Universiti Utara Malaysia Kedah Malaysia Centre of Statistical and Decision Science Studies Faculty of Computer and Mathematical Sciences Universiti Teknologi MARA Selangor Malaysia
This research investigates the complex relationships between social media, body image, and bullying among adolescent boarding school students, with an emphasis on the Malaysian context. Utilizing science fiction as a ...
来源: 评论
Extracting Relations between Organizational Patterns Using Association Mining  20
Extracting Relations between Organizational Patterns Using A...
收藏 引用
2020 European Conference on Pattern Languages of Programs, EuroPLoP 2020
作者: Waseeb, Shakirullah Khail, Waheedullah Sulaiman Wahaj, Haji Gul Vranić, Valentino Software Engineering Department Nangarhar University Afghanistan Institute of Informatics Information Systems and Software Engineering Slovak University of Technology in Bratislava Slovakia Database and Information System Department Nangarhar University Afghanistan
Patterns are powerful when used in combinations. Identifying relationships between patterns is challenging. The existing approaches and pattern formats reflect the relationships with other patterns in a very informal ... 详细信息
来源: 评论
Modeling and Analysis of the Kinetics of the Pyrolysis Process of Biomass with Influence Raw Material Composition on Comsol Multiphysics
Modeling and Analysis of the Kinetics of the Pyrolysis Proce...
收藏 引用
Technological Advancements in Computational Sciences (ICTACS), International Conference on
作者: Mamatkulova Sayyora Gulyamovna Uzakov Gulom Norboyevich Qodirov Farrux Ergash Ug'Ii Ulasheva Shaxlo Tagayevna PhD Student of the Department Alternative Energy Sources Karshi Engineering Economic Institute Karshi City Uzbekistan Professor of the Department Alternative Energy Sources Karshi Engineering Economic Institute Karshi City Uzbekistan Head of the Department of Informatics and its Teaching Methodology Shakhrisabz State Pedagogical Institute Kashkadarya Uzbekistan Senior Lecturer of the Department of Information Technology Software Karshi Branch of the Tashkent University of Information Technologies named after Muhammad Al-Khwarizmi
In this article, the modeling and analysis of the kinetics of the pyrolysis process is carried out, which allows us to determine the rate of chemical reactions occurring during the decomposition of the material, as we... 详细信息
来源: 评论
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wen, Xin-Cheng Chen, Yupan Gao, Cuiyun Zhang, Hongyu Zhang, Jie M. Liao, Qing School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Big Data and Software Engineering Chongqing University China Department of Informatics King’s College London United Kingdom Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies China Peng Cheng Laboratory China
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source... 详细信息
来源: 评论