咨询与建议

限定检索结果

文献类型

  • 361 篇 会议
  • 169 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 282 篇 计算机科学与技术...
    • 243 篇 软件工程
    • 61 篇 信息与通信工程
    • 39 篇 生物工程
    • 33 篇 电气工程
    • 27 篇 控制科学与工程
    • 27 篇 生物医学工程(可授...
    • 19 篇 电子科学与技术(可...
    • 19 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 18 篇 机械工程
    • 17 篇 化学工程与技术
    • 16 篇 光学工程
    • 11 篇 仪器科学与技术
    • 10 篇 环境科学与工程(可...
  • 137 篇 理学
    • 68 篇 数学
    • 43 篇 生物学
    • 36 篇 物理学
    • 19 篇 统计学(可授理学、...
    • 15 篇 化学
    • 13 篇 系统科学
  • 120 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 31 篇 医学
    • 26 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
    • 11 篇 药学(可授医学、理...
  • 23 篇 法学
    • 19 篇 社会学
  • 17 篇 教育学
    • 16 篇 教育学
  • 8 篇 经济学
  • 4 篇 农学
  • 1 篇 艺术学

主题

  • 34 篇 software enginee...
  • 25 篇 informatics
  • 16 篇 artificial intel...
  • 14 篇 information tech...
  • 14 篇 software
  • 13 篇 information syst...
  • 12 篇 semantics
  • 12 篇 software design
  • 10 篇 database managem...
  • 10 篇 semantic web
  • 9 篇 conferences
  • 9 篇 organizational p...
  • 9 篇 information stor...
  • 8 篇 programming
  • 8 篇 data mining
  • 7 篇 software systems
  • 7 篇 prototypes
  • 7 篇 software measure...
  • 7 篇 machine learning
  • 7 篇 complexity theor...

机构

  • 22 篇 institute of inf...
  • 11 篇 national institu...
  • 10 篇 institute of inf...
  • 10 篇 institute of inf...
  • 8 篇 institute of inf...
  • 7 篇 institute of inf...
  • 6 篇 institute of inf...
  • 6 篇 institute of inf...
  • 5 篇 college of mathe...
  • 5 篇 institute of inf...
  • 5 篇 corporate techno...
  • 5 篇 department of so...
  • 5 篇 department of so...
  • 5 篇 institute of sof...
  • 5 篇 institute of inf...
  • 5 篇 institute of com...
  • 4 篇 institute of inf...
  • 4 篇 max planck insti...
  • 4 篇 faculty of civil...
  • 4 篇 institute of com...

作者

  • 42 篇 bieliková mária
  • 14 篇 valentino vranić
  • 14 篇 vranic valentino
  • 13 篇 vranić valentino
  • 11 篇 šimko marián
  • 11 篇 chudá daniela
  • 10 篇 barla michal
  • 7 篇 mária bieliková
  • 7 篇 wang zheng
  • 6 篇 maria bielikova
  • 6 篇 dakić pavle
  • 6 篇 lukáš kohútka
  • 6 篇 li chen
  • 6 篇 ján mach
  • 5 篇 pavel čičák
  • 5 篇 rashid tarik a.
  • 5 篇 reinhold plösch
  • 5 篇 ngoc thanh nguye...
  • 5 篇 bartalos peter
  • 5 篇 valentino vranic

语言

  • 479 篇 英文
  • 72 篇 其他
  • 4 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Software Engineering Informatics Institute of Technology"
553 条 记 录,以下是131-140 订阅
排序:
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Vulnerability Detection with Graph Simplification and Enhanc...
收藏 引用
International Conference on software engineering (ICSE)
作者: Xin-Cheng Wen Yupan Chen Cuiyun Gao Hongyu Zhang Jie M. Zhang Qing Liao School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory and Guangdong Provincial Key Laboratory Novel Security Intelligence Technologies School of Big Data and Software Engineering Chongqing University China Department of Informatics King's College London UK Peng Cheng Laboratory
Prior studies have demonstrated the effectiveness of Deep Learning (DL) in automated software vulnerability detection. Graph Neural Networks (GNNs) have proven effective in learning the graph representations of source...
来源: 评论
ECPC-IDS: A benchmark endometrial cancer PET/CT image dataset for evaluation of semantic segmentation and detection of hypermetabolic regions
收藏 引用
Computers in Biology and Medicine 2024年 171卷 108217-108217页
作者: Tang, Dechao Li, Chen Du, Tianmin Jiang, Huiyan Ma, Deguo Ma, Zhiyu Grzegorzek, Marcin Jiang, Tao Sun, Hongzan Microscopic Image and Medical Image Analysis Group College of Medicine and Biological Information Engineering Northeastern University China Software College Northeastern University Shenyang China Institute of Medical Informatics University of Luebeck Luebeck Germany Department of Knowledge Engineering University of Economics in Katowice Poland Chengdu University of Traditional Chinese Medicine Chengdu China International Joint Institute of Robotics and Intelligent Systems Chengdu University of Information Technology China Department of Radiology Shengjing Hospital China Medical University Shenyang China
Background: Endometrial cancer is one of the most common tumors in the female reproductive system and is the third most common gynecological malignancy that causes death after ovarian and cervical cancer. Early diagno... 详细信息
来源: 评论
Architecture of Automated User Interface based Tests with Protocol-Oriented Programming paradigm
Architecture of Automated User Interface based Tests with Pr...
收藏 引用
International IEEE Conference and Workshop: Óbuda on Electrical and Power engineering (CANDO-EPE)
作者: Jozsef Laszlo Basiszta Attila Kovari Jozsef Katona Department of Software Development and Application University of Dunaujvaros Dunaujvaros Hungary Institute of Engineering Alba Regia Technical Faculty Óbuda University Székesfehérvár Hungary Institute of Digital Technology Faculty of Informatics Eszterházy Károly Catholic University Eger Hungary Ágoston Trefort Engineering Education Center Institute of Electrophysics Kandó Kálmán Faculty of Electrical Engineering Óbuda University Budapest Hungary Department of Software Development and Application Informatics Institute University of Dunaujvaros Dunaujvaros Hungary
Nowadays, manual and automated tests, among other things, are used to achieve the best quality of a software product. There are several types of automated tests that try to meet the needs of today’s technology, but i... 详细信息
来源: 评论
State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques
State-based Sandbox Tool for Distributed Malware Detection w...
收藏 引用
IEEE International Conference on Dependable Systems, Services and Technologies (DESSERT)
作者: Pavlo Rehida George Markowsky Anatoliy Sachenko Oleg Savenko Department of Computer Engineering and Information Systems Khmelnytskyi National University Khmelnytskyi Ukraine Department of Software Engineering and Game Development Kennesaw State University Marietta USA Department of Informatics Kazimierz Pulaski University of Technology and Humanities Radom Poland Research Institute for Intelligent Computer Systems West Ukrainian National Unversity Ternopil Ukraine
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technolog...
来源: 评论
Multi-Scale Terahertz Image Reconstruction ⋆,⋆⋆
SSRN
收藏 引用
SSRN 2024年
作者: Su, Zhipeng Zhang, Yixiong Zhou, Jianyang Shi, Jianghong Qi, Feng Zhang, Xiao-Ping Ji, Chunlin School of Informatics Xiamen University National Demonstrative Software School Xiamen University China School of Electronic Science and Engineering National Model Microelectronics College Xiamen University China Shenyang Institute of Automation Chinese Academy of Sciences China Department of Electrical Computer & Biomedical Engineering Finance Department The Ted Rogers School of Management Toronto Metropolitan University Canada Kuang-Chi Institute of Advanced Technology State Key Laboratory of Meta-RF Electromagnetic Modulation Technology Shen Zhen China
This paper proposes a novel terahertz (THz) image recovery algorithm and a new THz image dataset is publicly available. Because of transmission noise, artificial errors and problems with diffraction phenomena are amon... 详细信息
来源: 评论
Towards Lightweight Super-Resolution with Dual Regression Learning
arXiv
收藏 引用
arXiv 2022年
作者: Guo, Yong Tan, Mingkui Deng, Zeshuai Wang, Jingdong Chen, Qi Cao, Jiezhang Xu, Yanwu Chen, Jian The School of Software Engineering South China University of Technology China The Max Planck Institute for Informatics Germany The Pazhou Laboratory Guangzhou China The Baidu Inc China The Faculty of Engineering The University of Adelaide Australia ETH Zürich Switzerland The School of Future Technology South China University of Technology China
Deep neural networks have exhibited remarkable performance in image super-resolution (SR) tasks by learning a mapping from low-resolution (LR) images to high-resolution (HR) images. However, the SR problem is typicall... 详细信息
来源: 评论
Leveraging Big Data for Effective Healthcare Management with Artificial Intelligence
Leveraging Big Data for Effective Healthcare Management with...
收藏 引用
Artificial Intelligence for Innovations in Healthcare Industries (ICAIIHI), International Conference on
作者: Krati Dubey Chaitali B. Kasar Guravaiah Thulluri Anuradha Yesugad Mehaboob Karishma Dipanjali Padhi Department of Information technology Manipal University Jaipur Jaipur India Department of Electronics and Telecommunication Engineering Dr. D. Y. Patil Institute of Technology Pune Embedded Senior Software Developer SAK informatics Hyderabad Institute of Management & Entrepreneurship Development Bharati Vidyapeeth (Deemed to be University) Pune Department of Computer Application Sir C R R College Eluru Department of Electronics & Telecommunication Engineering Dhole Patil college of Engineering Pune
To improve clinical judgment, resource allocation, and patient outcomes, this study investigates the integration of big data with artificial intelligence (AI) for medical management. Utilizing a descriptive design wit...
来源: 评论
TAD-Bench: A Comprehensive Benchmark for Embedding-Based Text Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Cao, Yang Yang, Sikun Li, Chen Xiang, Haolong Qi, Lianyong Liu, Bo Li, Rongsheng Liu, Ming School of Computing and Information Technology Great Bay University China Great Bay Institute for Advanced Study Great Bay University China Graduate School of Informatics Nagoya University Japan School of Software Nanjing University of Information Science and Technology China College of Computer Science and Technology China University of Petroleum [East China China College of Cyberspace Security Zhengzhou University China School of Computer Harbin Engineering University China School of IT Deakin University Australia
Text anomaly detection is crucial for identifying spam, misinformation, and offensive language in natural language processing tasks. Despite the growing adoption of embedding-based methods, their effectiveness and gen... 详细信息
来源: 评论
WcDT: World-centric Diffusion Transformer for Traffic Scene Generation
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Chen He, Yangfan Tian, Aaron Xuxiang Chen, Dong Wang, Jianhui Shi, Tianyu Heydarian, Arsalan Liu, Pei Department of Computer Science and Informatics Cardiff University United Kingdom College of Libera Arts University of Minnesota - Twin Cities United States United States Agricultural & Biological Engineering Mississippi State University United States Information and Software Engineering University of Electronic Science and Technology of China China Transportation Research Institute University of Toronto Canada Link Lab & Civil and Environmental Engineering University of Virginia United States Intelligent Transportation Thrust The Hong Kong University of Science and Technology Guangzhou China
In this paper, we introduce a novel approach for autonomous driving trajectory generation by harnessing the complementary strengths of diffusion probabilistic models (a.k.a., diffusion models) and transformers. Our pr... 详细信息
来源: 评论
Multi-sector Risk Management Framework for Analysis Cybersecurity Challenges and Opportunities  1
收藏 引用
11th International Conference on Multimedia Communications, Services and Security, MCSS 2022
作者: Niemiec, Marcin Pappalardo, Salvatore Marco Bozhilova, Maya Stoianov, Nikolai Dziech, Andrzej Stiller, Burkhard AGH University of Science and Technology Mickiewicza 30 Krakow30-059 Poland CIRM Viale Ortles 22 Milan Italy Software Engineering Italia S.r.l. Piazza Abramo Lincoln 7 Catania Italy Bulgarian Defence Institute Sofia Bulgaria Communication Systems Group CSG Department of Informatics IfI University of Zurich UZH Binzmühlestrasse 14 Zürich8050 Switzerland
This paper describes an approach to analyse transversal and inter-sectoral cybersecurity challenges and opportunities: dedicated risk assessment and management framework, which can be used to develop cybersecurity tec... 详细信息
来源: 评论