咨询与建议

限定检索结果

文献类型

  • 2,961 篇 会议
  • 1,620 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 4,629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,867 篇 工学
    • 1,990 篇 计算机科学与技术...
    • 1,664 篇 软件工程
    • 466 篇 信息与通信工程
    • 439 篇 控制科学与工程
    • 282 篇 电气工程
    • 281 篇 生物工程
    • 214 篇 机械工程
    • 214 篇 电子科学与技术(可...
    • 189 篇 生物医学工程(可授...
    • 188 篇 化学工程与技术
    • 153 篇 光学工程
    • 119 篇 动力工程及工程热...
    • 118 篇 材料科学与工程(可...
    • 115 篇 安全科学与工程
    • 99 篇 仪器科学与技术
    • 98 篇 土木工程
    • 95 篇 交通运输工程
    • 86 篇 网络空间安全
  • 1,332 篇 理学
    • 629 篇 数学
    • 374 篇 物理学
    • 311 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 148 篇 化学
  • 843 篇 管理学
    • 593 篇 管理科学与工程(可...
    • 297 篇 图书情报与档案管...
    • 293 篇 工商管理
  • 171 篇 医学
    • 158 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 107 篇 经济学
    • 106 篇 应用经济学
  • 97 篇 法学
  • 75 篇 教育学
  • 46 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 162 篇 software enginee...
  • 101 篇 software
  • 97 篇 deep learning
  • 89 篇 computational mo...
  • 88 篇 feature extracti...
  • 84 篇 accuracy
  • 81 篇 machine learning
  • 73 篇 computer science
  • 70 篇 training
  • 69 篇 computer archite...
  • 68 篇 software systems
  • 68 篇 data mining
  • 66 篇 semantics
  • 65 篇 data models
  • 61 篇 cloud computing
  • 57 篇 systems engineer...
  • 55 篇 predictive model...
  • 55 篇 artificial intel...
  • 52 篇 optimization
  • 51 篇 security

机构

  • 77 篇 beijing engineer...
  • 56 篇 state key labora...
  • 54 篇 school of softwa...
  • 44 篇 college of compu...
  • 44 篇 shenzhen institu...
  • 31 篇 beijing key labo...
  • 31 篇 university of ch...
  • 30 篇 school of softwa...
  • 28 篇 school of inform...
  • 26 篇 suzhou institute...
  • 26 篇 college of compu...
  • 23 篇 school of softwa...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 state key labora...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 18 篇 college of compu...

作者

  • 35 篇 biffl stefan
  • 33 篇 junping du
  • 29 篇 zhangqin huang
  • 26 篇 stefan biffl
  • 26 篇 rausch andreas
  • 20 篇 john grundy
  • 20 篇 ismail leila
  • 19 篇 baojian hua
  • 18 篇 moser thomas
  • 18 篇 yingmin jia
  • 17 篇 huang zhangqin
  • 16 篇 andreas rausch
  • 16 篇 grundy john
  • 15 篇 wang wei
  • 14 篇 hua baojian
  • 14 篇 veera boonjing
  • 14 篇 fashan yu
  • 13 篇 zheng yushan
  • 13 篇 liu jie
  • 13 篇 thomas moser

语言

  • 4,363 篇 英文
  • 226 篇 其他
  • 43 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Systems Engineering Advanced Software and Technology"
4629 条 记 录,以下是241-250 订阅
排序:
Autonomous Environmental Exploration and Target Tracking Control for Unmanned Surface Vehicles in Uncertain Environment
Autonomous Environmental Exploration and Target Tracking Con...
收藏 引用
2024 IEEE International Conference on Real-Time Computing and Robotics, RCAR 2024
作者: Zhu, Kaiwei Kong, Shihan Wu, Fang Sun, Jinan Yu, Junzhi College of Engineering Peking University State Key Laboratory for Turbulence and Complex Systems Department of Advanced Manufacturing and Robotics Beijing100871 China SPIC Nuclear Energy Co. Ltd. China Peking University National Engineering Research Center for Software Engineering Beijing100871 China
In this paper, a set of methods of autonomous obstacle exploration, avoiding, and target-tracking control in the uncertain environment is proposed. First, a secure and reliable obstacle exploration framework via multi... 详细信息
来源: 评论
Neural-Network-Based Control for Discrete-Time Nonlinear systems with Input Saturation Under Stochastic Communication Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第4期8卷 766-778页
作者: Xueli Wang Derui Ding Hongli Dong Xian-Ming Zhang Department of Control Science and Engineering University of Shanghai for Science and TechnologyShanghai 200093China School of Software and Electrical Engineering Swinburne University of TechnologyMelbourne 3122VictoriaAustralia Institute of Complex Systems and Advanced Control Northeast Petroleum UniversityDaqing 163318China
In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input *** save the communication resources between the controll... 详细信息
来源: 评论
Improving Fake News Detection with a Mixture of Experts: Leveraging Sentiment Analysis and Sarcasm Detection as Core Expert Models  6
Improving Fake News Detection with a Mixture of Experts: Lev...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Gunasekara, Tharindu Thihan, Disira Kodithuwakku, Sansika Dissanayake, Dinuka Fernando, Harinda Vidhanaarachchi, Samitha Sindhujan, Archchana Sri Lanka Institute of Information Technology Malabe Dept. of Software Engineering Sri Lanka Sri Lanka Institute of Information Technology Malabe Dept. of Computer Computer Systems Engineering Sri Lanka University of Surrey Dept. of Computer Science and Electronic Engineering United Kingdom
Fake news continues to proliferate, posing an increasing threat to public discourse. The paper proposes a framework of a Mixture of Experts, Sentiment Analysis, and Sarcasm Detection experts for improved fake news det... 详细信息
来源: 评论
Global Stock Market Prediction Using Transformer-Based Deep Learning Techniques  15
Global Stock Market Prediction Using Transformer-Based Deep ...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Gothai, E. Thamilselvan, R. Natesan, P. Vignesh, K. Kongu Engineering College Department of Computer Technology Tamilnadu Perundurai India Kongu Engineering College Department of Cse Tamilnadu Perundurai India Kongu Engineering College Department of It Tamilnadu Perundurai India Kongu Engineering College Software Systems Department of Ct Tamilnadu Perundurai India
Deep learning approaches' use in financial market forecasting has recently drawn a lot of attention from both investors and scholars. The Transformer framework, initially created for natural language processing, i... 详细信息
来源: 评论
Quantum Computing's Impact on Data Encryption:Methodologies, Implementation, and Future Directions: Exploring the BB84 Protocol and Comparative Analysis with Classical Cryptographic Techniques  2
Quantum Computing's Impact on Data Encryption:Methodologies,...
收藏 引用
2nd International Conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Kamel, Omar H.Ali El-Din Raslan, Atef Tayh Nour Aly, Tarek Gheith, Mervat Cairo University Faculty of Graduate Studies For Statistical Research Cairo Egypt Higher Institute of Advanced Studies Department of Information Systems Cairo Egypt Cairo University Faculty of Graduate Studies for Statistical Research Software Engineering Department Cairo Egypt
This paper delves into the realm of quantum computing and its potential to revolutionize data encryption methodologies. Leveraging IBM's Qiskit tool, we investigate encryption approaches aimed at bolstering data s... 详细信息
来源: 评论
Evaluating the usage of fault localization in automated program repair:an empirical study
收藏 引用
Frontiers of Computer Science 2021年 第1期15卷 53-67页
作者: Deheng YANG Yuhua QI Xiaoguang MAO Yan LEI College of Computer National University of Defense TechnologyChangsha 410073China Laboratory of Software Engineering for Complex Systems Changsha 410073China Beijing Institute of Tracking and Communication Technology Beijing 100094China School of Big Data&Software Engineering Chongqing UniversityChongqing 400044China
Fault localization techniques are originally proposed to assist in manual debugging by generally producing a rank list of suspicious *** the increasing popularity of automated program repair,the fault localization tec... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
Designing Uncorrelated Address Constrain for DNA Storage by DMVO Algorithm
收藏 引用
IEEE/ACM Transactions on Computational Biology and Bioinformatics 2022年 第2期19卷 866-877页
作者: Cao, Ben Ii, Xue Zhang, Xiaokang Wang, Bin Zhang, Qiang Wei, Xiaopeng Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Ministry of Education School of Software Engineering Dalian University Dalian116622 China School of Computer Science and Technology Dalian University of Technology Dalian116024 China
At present, huge amounts of data are being produced every second, a situation that will gradually overwhelm current storage technology. DNA is a storage medium that features high storage density and long-term stabilit... 详细信息
来源: 评论
Sentiment Analysis of Covid-19 Twitter Data using Deep Learning Algorithm  2
Sentiment Analysis of Covid-19 Twitter Data using Deep Learn...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Valarmathi, B. Gupta, N. Srinivasa Karthick, V. Chellatamilan, T. Santhi, K. Chalicheemala, Dhanush Department of Software and Systems Engineering School of Information Technology and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Manufacturing School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Assistant Systems Engineer Tata Consultancy Services Chennai India Department of Analytics School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Information Technology School of Information Technology and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
A key method used in the study of Natural Language Processing (NLP) is sentiment analysis, or emotion analysis, plays a pivotal role in text analysis. Its primary function is to discern and categorize the underlying e... 详细信息
来源: 评论
A Transparent Polymer-Composite Film for Window Energy Conservation
收藏 引用
Nano-Micro Letters 2025年 第7期 9-19页
作者: Xianhu Liu Haoyu Zhang Yamin Pan Jun Ma Chuntai Liu Changyu Shen College of Materials Science and Engineering State Key Laboratory of Structural AnalysisOptimization and CAE Software for Industrial EquipmentNational Engineering Research Center for Advanced Polymer Processing TechnologyZhengzhou University Uni SA STEM and Future Industries Institute University of South Australia
As living standards improve, the energy consumption for regulating indoor temperature keeps increasing. Windows, in particular, enhance indoor brightness but also lead to increased energy loss, especially in sunny wea...
来源: 评论