咨询与建议

限定检索结果

文献类型

  • 2,940 篇 会议
  • 1,599 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 4,586 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,837 篇 工学
    • 1,975 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 461 篇 信息与通信工程
    • 432 篇 控制科学与工程
    • 280 篇 电气工程
    • 277 篇 生物工程
    • 213 篇 机械工程
    • 210 篇 电子科学与技术(可...
    • 186 篇 化学工程与技术
    • 186 篇 生物医学工程(可授...
    • 150 篇 光学工程
    • 114 篇 材料科学与工程(可...
    • 114 篇 动力工程及工程热...
    • 114 篇 安全科学与工程
    • 99 篇 仪器科学与技术
    • 97 篇 土木工程
    • 96 篇 交通运输工程
    • 85 篇 网络空间安全
  • 1,318 篇 理学
    • 628 篇 数学
    • 367 篇 物理学
    • 307 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 147 篇 化学
  • 837 篇 管理学
    • 589 篇 管理科学与工程(可...
    • 294 篇 图书情报与档案管...
    • 292 篇 工商管理
  • 169 篇 医学
    • 156 篇 临床医学
    • 126 篇 基础医学(可授医学...
  • 106 篇 经济学
    • 105 篇 应用经济学
  • 97 篇 法学
  • 74 篇 教育学
  • 45 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 161 篇 software enginee...
  • 101 篇 software
  • 94 篇 deep learning
  • 87 篇 computational mo...
  • 86 篇 feature extracti...
  • 81 篇 machine learning
  • 81 篇 accuracy
  • 73 篇 computer science
  • 69 篇 training
  • 68 篇 computer archite...
  • 67 篇 software systems
  • 67 篇 data mining
  • 65 篇 semantics
  • 64 篇 data models
  • 62 篇 cloud computing
  • 58 篇 artificial intel...
  • 57 篇 systems engineer...
  • 52 篇 optimization
  • 52 篇 predictive model...
  • 49 篇 educational inst...

机构

  • 77 篇 beijing engineer...
  • 55 篇 state key labora...
  • 55 篇 school of softwa...
  • 44 篇 college of compu...
  • 44 篇 shenzhen institu...
  • 31 篇 beijing key labo...
  • 31 篇 university of ch...
  • 30 篇 school of softwa...
  • 27 篇 school of inform...
  • 26 篇 suzhou institute...
  • 26 篇 college of compu...
  • 23 篇 school of softwa...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 state key labora...
  • 19 篇 school of comput...
  • 19 篇 state key labora...
  • 18 篇 school of softwa...

作者

  • 35 篇 biffl stefan
  • 33 篇 junping du
  • 29 篇 zhangqin huang
  • 26 篇 stefan biffl
  • 26 篇 rausch andreas
  • 20 篇 john grundy
  • 20 篇 ismail leila
  • 18 篇 baojian hua
  • 18 篇 moser thomas
  • 18 篇 yingmin jia
  • 16 篇 andreas rausch
  • 16 篇 grundy john
  • 16 篇 huang zhangqin
  • 15 篇 wang wei
  • 14 篇 veera boonjing
  • 14 篇 fashan yu
  • 13 篇 hua baojian
  • 13 篇 liu jie
  • 13 篇 thomas moser
  • 13 篇 xinjun mao

语言

  • 4,394 篇 英文
  • 155 篇 其他
  • 42 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Systems Engineering Advanced Software and Technology"
4586 条 记 录,以下是101-110 订阅
排序:
Patterns for Improving User Contribution  28
Patterns for Improving User Contribution
收藏 引用
28th European Conference on Pattern Languages of Programs, EuroPLoP 2023
作者: Haiderzai, Mohammad Daud Vranic, Valentino Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava Slovakia
User contributions is an important part in software development, the pursuit of identifying effective means of user contributions in software development is a crucial area of interest for software companies and their ... 详细信息
来源: 评论
Challenge-Response Emotion Authentication Algorithm Using Modified Horizontal Deep Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3659-3675页
作者: Mohamed Ezz Ayman Mohamed Mostafa Ayman Elshenawy College of Computer and Information Sciences Jouf UniversitySakaka72314Saudi Arabia Systems and Computers Engineering DEPT Faculty of EngineeringAl-Azhar UniversityCairo11651Egypt Software Engineering&Information Technology Faculty of Engineering&TechnologyEgyptian Chinese UniversityEgypt
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me... 详细信息
来源: 评论
Lockstep Vs Microarchitecture: A Comparison  37
Lockstep Vs Microarchitecture: A Comparison
收藏 引用
37th IEEE International System-on-Chip Conference, SOCC 2024
作者: Mach, Jan Kohutka, Lukas Cicak, Pavel Slovak University of Technology Institute of Computer Engineering and Applied Informatics Bratislava842 16 Slovakia Slovak University of Technology Institute of Informatics Information Systems and Software Engineering Bratislava842 16 Slovakia
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks... 详细信息
来源: 评论
Supporting Changes in Digital Ownership and Data Sovereignty Across the Automotive Value Chain with Catena-X  6
Supporting Changes in Digital Ownership and Data Sovereignty...
收藏 引用
6th International Conference on Industry 4.0 and Smart Manufacturing, ISM 2024
作者: Manoury, Marvin Riedelsheimer, Theresa Hellmeier, Malte Meyer, Tom Fraunhofer Institute for Production Systems and Design Technology IPK Pascalstrasse 8-9 Berlin10587 Germany Fraunhofer Institute for Software and Systems Engineering ISST Speicherstraße 6 Dortmund44147 Germany
Considering the concept of a Circular Economy, which entails several life cycles of, e.g., vehicles, their components, and materials, it is important to investigate how the respective Digital Twins are managed over th... 详细信息
来源: 评论
Reliable Task Offloading for 6G-Based IoT Applications
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 2255-2274页
作者: Usman Mahmood Malik Muhammad Awais Javed Ahmad Naseem Alvi Mohammed Alkhathami Department of Computer Software Engineering National University of Science and Technology(NUST)Islamabad44000Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadIslamabad45550Pakistan Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ... 详细信息
来源: 评论
Enhancing multiscale simulations with constitutive relations-aware deep operator networks
Enhancing multiscale simulations with constitutive relations...
收藏 引用
94th Annual Meeting of the International Association of Applied Mathematics and Mechanics, GAMM 2024
作者: Eivazi, Hamidreza Alikhani, Mahyar Tröger, Jendrik-Alexander Wittek, Stefan Hartmann, Stefan Rausch, Andreas Institute for Software and Systems Engineering Clausthal University of Technology Clausthal-Zellerfeld Germany Institute of Applied Mechanics Clausthal University of Technology Clausthal-Zellerfeld Germany
Multiscale problems are widely observed across diverse domains in physics and engineering. Translating these problems into numerical simulations and solving them using numerical schemes, for example, the finite elemen... 详细信息
来源: 评论
BEHAVIOR PROXIMAL POLICY OPTIMIZATION  11
BEHAVIOR PROXIMAL POLICY OPTIMIZATION
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Zhuang, Zifeng Lei, Kun Liu, Jinxin Wang, Donglin Guo, Yilang Zhejiang University China School of Engineering Westlake University China Institute of Advanced Technology Westlake Institute for Advanced Study China School of Software Engineering Beijing Jiaotong University China
Offline reinforcement learning (RL) is a challenging setting where existing off-policy actor-critic methods perform poorly due to overestimating of out-of-distribution state-action ***, various additional augmentation...
来源: 评论
Color Image Steganalysis Algorithm Based on Quaternion Convolutional Neural Network  30th
Color Image Steganalysis Algorithm Based on Quaternion Convo...
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Xu, Meng Wang, Jinwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Department of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
Most of the images on the Internet are color images, and steganalysis of color images is a very critical issue in the field of steganalysis. The current proposed color image steganalysis features mainly rely on manual... 详细信息
来源: 评论
Distinguishing Sensitive and Insensitive Options for the Winograd Schema Challenge  28th
Distinguishing Sensitive and Insensitive Options for the ...
收藏 引用
28th International Conference on Database systems for advanced Applications, DASFAA 2023
作者: Li, Dong Wang, Pancheng He, Liangliang Pang, Kunyuan Li, Shasha Tang, Jintao Wang, Ting College of Computer Science and Technology National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems Changsha China
The Winograd Schema Challenge (WSC) is a popular benchmark for commonsense reasoning. Each WSC instance has a component that corresponds to the mention of the correct answer option of the two options in the context. W... 详细信息
来源: 评论
Analysis of Patterns in Recorded Signals of software systems With a Variance Based Segmentation Algorithm
arXiv
收藏 引用
arXiv 2025年
作者: Lukić, Bojan Knust, Thorben Rausch, Andreas Clausthal University of Technology Institute for Software and Systems Engineering Germany
Due to the increasing complexity and interconnectedness of different components in modern automotive software systems there is a great number of interactions between these system components and their environment. Thes...
来源: 评论