咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 32 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 14 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 2 篇 土木工程
    • 2 篇 船舶与海洋工程
    • 2 篇 网络空间安全
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
  • 5 篇 理学
    • 2 篇 海洋科学
    • 1 篇 数学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 security
  • 3 篇 technological in...
  • 2 篇 internet of thin...
  • 2 篇 deep learning
  • 2 篇 throughput
  • 2 篇 software enginee...
  • 2 篇 data mining
  • 2 篇 semantics
  • 2 篇 decision making
  • 2 篇 software design
  • 2 篇 open source soft...
  • 1 篇 phenology
  • 1 篇 software systems
  • 1 篇 conservation bio...
  • 1 篇 parallel process...
  • 1 篇 scalability
  • 1 篇 productivity
  • 1 篇 passive acoustic...
  • 1 篇 libraries
  • 1 篇 roads

机构

  • 6 篇 the state key la...
  • 5 篇 zhejiang univers...
  • 5 篇 singapore manage...
  • 4 篇 jiangxi provinci...
  • 4 篇 school of comput...
  • 4 篇 software enginee...
  • 4 篇 school of softwa...
  • 3 篇 zhejiang univers...
  • 3 篇 the hong kong po...
  • 2 篇 management scien...
  • 2 篇 research centre ...
  • 2 篇 school of softwa...
  • 2 篇 school of comput...
  • 2 篇 guangdong provin...
  • 2 篇 harbin institute...
  • 2 篇 huanggang polyte...
  • 2 篇 guangzhou instit...
  • 2 篇 concordia univer...
  • 2 篇 guizhou provinci...
  • 2 篇 china mobile inf...

作者

  • 6 篇 lo david
  • 5 篇 xia xin
  • 5 篇 hu xing
  • 3 篇 xing hu
  • 3 篇 david lo
  • 3 篇 yang xiaohu
  • 3 篇 xin xia
  • 2 篇 xiong hu
  • 2 篇 lu yong
  • 2 篇 yuehua fan
  • 2 篇 li shanping
  • 2 篇 li zhiyang
  • 2 篇 yang biao
  • 2 篇 li bing
  • 2 篇 hou yuqi
  • 2 篇 jinquan nie
  • 2 篇 zhan qi
  • 2 篇 zhan xian
  • 2 篇 yeh kuo-hui
  • 2 篇 pan zhiyuan

语言

  • 27 篇 英文
  • 5 篇 其他
检索条件"机构=Software Solutions-Data Security and Data Management"
32 条 记 录,以下是11-20 订阅
排序:
PS3: Precise Patch Presence Test based on Semantic Symbolic Signature
arXiv
收藏 引用
arXiv 2023年
作者: Zhan, Qi Xia, Xin Hu, Xing Lo, David Li, Zhiyang Li, Shanping The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab China Singapore Management University Singapore Zhejiang University Hangzhou China
During software development, vulnerabilities have posed a significant threat to users. Patches are the most effective way to combat vulnerabilities. In a large-scale software system, testing the presence of a security... 详细信息
来源: 评论
A Cross-Chain Protocol Based on Main-SubChain Architecture
A Cross-Chain Protocol Based on Main-SubChain Architecture
收藏 引用
Computer Science and Blockchain (CCSB), International Conference on
作者: Feng Zhang Yu Le Rong Wang Minfu Yuan Wei-Tek Tsai Yuansheng Dong China Mobile Information Security Management and Operation Center Beijing China Guangzhou Institute of Software Guangzhou China College of Computer and Data Science Fuzhou University Arizona State University Tempe AZ USA Huanggang Polytechnic College Huanggang China
Addressing the current surge in blockchain applications and the increasingly significant throughput and scalability challenges of single-chain systems, we propose a cross-chain protocol based on a main-subchain archit... 详细信息
来源: 评论
QUIC Performance Evaluation: From the Prespective of Internet Competing Traffic
QUIC Performance Evaluation: From the Prespective of Interne...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Yuehua Fan Jinquan Nie Zhiming Zhang Liang Shan Junyi Wu School of Software Jiangxi Normal University Nanchang China Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance Nanchang China Management Science and Engineering Center Jiangxi Normal University Nanchang China
With the rise of the Industrial Internet and Industry 4.0, the Internet of Things (IoT) has been widely applied in various fields. Within IoT applications, HTTP 3.0 plays a crucial role and brings new innovations to m... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
International Conference on software Engineering (ICSE)
作者: Zhiyuan Pan Xing Hu Xin Xia Xian Zhan David Lo Xiaohu Yang The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei Hangzhou China The Hong Kong Polytechnic University Hong Kong China School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
Research on Personalized Course Recommendation for Online MOOC Platforms Based on Emotion Recognition
Frontiers in Artificial Intelligence and Applications
收藏 引用
Frontiers in Artificial Intelligence and Applications 2025年 404卷 31-41页
作者: Li, Bing Hou, Yuqi Yang, Biao School of software Jiangxi Normal University Jiangxi Nanchang330022 China Research Centre for Management Science and Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance Jiangxi Nanchang330022 China School of digital Industries Jiangxi Normal University Jiangxi Nanchang330022 China
In the era of smart education, online courses as the avant-garde force in the educational field are leading the way in innovating teaching methods. Although online learning platforms provide students with convenient c... 详细信息
来源: 评论
Multi-perspective temporal information fusion perception for next basket recommendation
收藏 引用
The Journal of Supercomputing 2025年 第9期81卷 1-23页
作者: Li, Bing Yang, Biao Hou, Yuqi Wang, Xile Dong, Jiangtao Yang, Zhijian Research Centre for Management Science and Engineering Jiangxi Normal University Nanchang China Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance Nanchang China School of Software Jiangxi Normal University Nanchang China School of Digital Industry Jiangxi Normal University Shangrao China School of Computer and Information Engineering Jiangxi Normal University Nanchang China
Next Basket Recommendation System aims to predict the series of items a user is likely to purchase next based on their historical interaction data. While existing next basket recommendation models focus on user-item r... 详细信息
来源: 评论
Code Search Is All You Need? Improving Code Suggestions with Code Search
Code Search Is All You Need? Improving Code Suggestions with...
收藏 引用
International Conference on software Engineering (ICSE)
作者: Junkai Chen Xing Hu Zhenhao Li Cuiyun Gao Xin Xia David Lo School of Software Technology Zhejiang University Ningbo China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Concordia University Montreal Canada Harbin Institute of Technology Shenzhen China Zhejiang University Hangzhou China Singapore Management University Singapore
Modern integrated development environments (IDEs) provide various automated code suggestion techniques (e.g., code completion and code generation) to help developers improve their efficiency. Such techniques may retri... 详细信息
来源: 评论
DRLFcc: Deep Reinforcement Learning-empowered Congestion Control Mechanism for TCP Fast Recovery in High Loss Wireless Networks
DRLFcc: Deep Reinforcement Learning-empowered Congestion Con...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yuanlong Cao Jinquan Nie Yuehua Fan Xun Shao Gang Lei School of Software Jiangxi Normal University Nanchang China Jiangxi Provincial Engineering Research Center of Blockchain Data Security and Governance Nanchang China Management Science and Engineering Center Jiangxi Normal University Nanchang China Toyohashi University of Technology Toyohashi Japan
TCP is currently the most widely used Internet transmission protocol, which is extensively applied to applications on the Internet to enable reliable data transmission. The TCP congestion control algorithm has a signi...
来源: 评论
Ppt4J: Patch Presence Test for Java Binaries
arXiv
收藏 引用
arXiv 2023年
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Software Engineering Application Technology Lab Huawei Hangzhou China The Hong Kong Polytechnic University Hong Kong Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
Modelling V&V Workflows to Improve Development Processes of software-intensive Systems
Modelling V&V Workflows to Improve Development Processes of ...
收藏 引用
International Conference on Dependable Systems and Networks Workshops (DSN-W)
作者: Thomas Bauer Wolfgang Herzner Bob Hruska Katia Di Blasio Zain Shahwar Virtual Engineering Department Fraunhofer IESE Kaiserslautern Germany Center for Digital Safety & Security (DSS) Austrian Institute of Technology (AIT) Vienna Austria Consultant Department LieberLieber Software GmbH Vienna Austria Automotive and Smart System Division Intecs Solutions S.p.A. Pisa Italy Data Analytics and AI Solutions PUMACY TECHNOLOGIES AG Berlin Germany
The rapid increase in the complexity of systems, especially due to the integration of subsystems from different domains into cyber-physical systems, presents unique challenges for efficient verification and validation...
来源: 评论