咨询与建议

限定检索结果

文献类型

  • 2,978 篇 会议
  • 1,650 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 4,676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,896 篇 工学
    • 2,008 篇 计算机科学与技术...
    • 1,675 篇 软件工程
    • 485 篇 信息与通信工程
    • 465 篇 控制科学与工程
    • 302 篇 电气工程
    • 282 篇 生物工程
    • 223 篇 电子科学与技术(可...
    • 221 篇 机械工程
    • 192 篇 化学工程与技术
    • 190 篇 生物医学工程(可授...
    • 155 篇 光学工程
    • 125 篇 动力工程及工程热...
    • 123 篇 材料科学与工程(可...
    • 122 篇 安全科学与工程
    • 103 篇 仪器科学与技术
    • 102 篇 交通运输工程
    • 100 篇 土木工程
    • 93 篇 网络空间安全
  • 1,343 篇 理学
    • 637 篇 数学
    • 379 篇 物理学
    • 312 篇 生物学
    • 196 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 152 篇 化学
  • 856 篇 管理学
    • 606 篇 管理科学与工程(可...
    • 303 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 180 篇 医学
    • 163 篇 临床医学
    • 129 篇 基础医学(可授医学...
  • 108 篇 经济学
    • 107 篇 应用经济学
  • 100 篇 法学
  • 76 篇 教育学
  • 46 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 10 篇 文学

主题

  • 163 篇 software enginee...
  • 101 篇 software
  • 98 篇 deep learning
  • 92 篇 computational mo...
  • 87 篇 feature extracti...
  • 86 篇 machine learning
  • 83 篇 accuracy
  • 72 篇 computer science
  • 71 篇 computer archite...
  • 71 篇 training
  • 69 篇 data mining
  • 68 篇 software systems
  • 65 篇 semantics
  • 65 篇 data models
  • 61 篇 cloud computing
  • 60 篇 artificial intel...
  • 57 篇 systems engineer...
  • 55 篇 optimization
  • 55 篇 predictive model...
  • 52 篇 security

机构

  • 77 篇 beijing engineer...
  • 58 篇 state key labora...
  • 55 篇 school of softwa...
  • 46 篇 college of compu...
  • 45 篇 shenzhen institu...
  • 33 篇 university of ch...
  • 31 篇 school of softwa...
  • 31 篇 beijing key labo...
  • 29 篇 suzhou institute...
  • 29 篇 school of inform...
  • 26 篇 college of compu...
  • 23 篇 school of softwa...
  • 22 篇 school of comput...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 state key labora...
  • 21 篇 state key labora...
  • 19 篇 college of compu...

作者

  • 35 篇 biffl stefan
  • 33 篇 junping du
  • 29 篇 zhangqin huang
  • 26 篇 stefan biffl
  • 26 篇 rausch andreas
  • 20 篇 john grundy
  • 20 篇 ismail leila
  • 19 篇 baojian hua
  • 18 篇 moser thomas
  • 17 篇 andreas rausch
  • 17 篇 yingmin jia
  • 16 篇 wang wei
  • 16 篇 grundy john
  • 15 篇 hua baojian
  • 15 篇 huang zhangqin
  • 14 篇 veera boonjing
  • 13 篇 zhang qiang
  • 13 篇 thomas moser
  • 13 篇 xinjun mao
  • 13 篇 lin lin

语言

  • 4,051 篇 英文
  • 586 篇 其他
  • 47 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Systems Engineering Advanced Software and Technology"
4676 条 记 录,以下是331-340 订阅
Aspect-Based Sentiment Analysis on Amharic Text for Evaluating Ethio-Telecom Services  2
Aspect-Based Sentiment Analysis on Amharic Text for Evaluati...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Tesfa, Tarikwa Belete, Befikadu Abera, Samuel Mohapatra, Sudhir Kumar Das, Tapan Kumar Addis Ababa Science and Technology University Department of Software Engineering Addis Ababa Ethiopia Ethio Telecom Services Addis Ababa Ethiopia Sri Sri University Faculty of Emerging Technologies Cuttack India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
People are increasingly expressing their views and opinions about a company's goods or service on social media these days. For all types of businesses and organizations, sentiment analysis in text can be used to f... 详细信息
来源: 评论
Evolution of Web API Cooperation Network via Exploring Community Structure and Popularity
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6659-6671页
作者: Kang, Guosheng Wang, Yang Liu, Jianxun Cao, Buqing Xiao, Yong Xu, Yu Hunan University of Science and Technology Hunan Provincial Key Laboratory for Services Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China University of Cambridge Cambridge Baker Systems Genomics Initiative British Heart Foundation Cardiovascular Epidemiology Unit Department of Public Health and Primary Care CambridgeCB1 8RN United Kingdom
With the growing popularity of the Internet, Web applications have become increasingly essential in our daily lives. Web application programming interfaces (Web APIs) play a crucial role in facilitating interaction be... 详细信息
来源: 评论
Wheelchair Wheel Design with Transformable 'Wheel-Leg' Configuration for Climbing Stairs and Various Surfaces
Wheelchair Wheel Design with Transformable 'Wheel-Leg' Confi...
收藏 引用
2025 International Russian Smart Industry Conference, SmartIndustryCon 2025
作者: Magomedov, Islam Aygumov, Timur Kanametov, Anzor A. Kadyrov Chechen State University Grozny Russia Dagestan State Technical University Department of Software Engineering Computer Technology and Automated Systems Dagestan Russia Kabardino-Balkarian State University Department of Electronics and Digital Information Technologies Nalchik Russia
The dynamic and uneven terrain of our environment introduces complexity for locomotion vehicles to navigate easily across different settings. Wheelchairs belong to the category of vehicles that require locomotion acro... 详细信息
来源: 评论
Blockchain-Based Decentralized Breast Cancer Patient Monitoring System for Remote Healthcare Security  5
Blockchain-Based Decentralized Breast Cancer Patient Monitor...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Dilshan, K.N. Rathnayake, H.A.C.K. Pathirana, L.P.T.L. Dhanapala, D.H.S.V. Fernando, Harinda Abeygunawardhana, Pradeep K.W Sri Lanka Institute of Information Technology Faculty of Computer Systems Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Information Technology Malabe Sri Lanka
Breast cancer is a disease that is prevalent all over the world, and that is essential for the efficient treatment and care of breast cancer patients who are monitored remotely. However, traditional conventional centr... 详细信息
来源: 评论
Interpersonal Synchrony Over a Distance - the Effect of Network Noise on Synchronization and its Prosocial Consequences  25
Interpersonal Synchrony Over a Distance - the Effect of Netw...
收藏 引用
2025 CHI Conference on Human Factors in Computing systems, CHI 2025
作者: Rinott, Michal Rafaeli, Sheizaf Tractinsky, Noam Software and Information Systems Engineering Ben Gurion University of the Negev Be'er Sheva Israel Kadar Design and Technology Center Shenkar - Engineering. Design. Art Ramat Gan Israel University of Haifa Haifa Israel Shenkar - Engineering. Design. Art Ramat Gan Israel
Interpersonal motor synchronization (IMS) occurs when people move together, in temporal alignment. Being in IMS can result in prosocial effects: increased liking, similarity and trust. We address the possibility of re... 详细信息
来源: 评论
IPL Data Analysis by Web Scraping and Using PowerBI
IPL Data Analysis by Web Scraping and Using PowerBI
收藏 引用
IT Innovation and Knowledge Discovery (ITIKD), International Conference on
作者: Mogith P Mothiswar T B G Mohammad Abubak J. Jagannathan N. Balaganesh Software Engineering Vellore Institute of Technology Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Cricket fans throughout the world avidly follow the Indian Premier League (IPL), a competition of great fame. The IPL data is examined in this using Exploratory Data Analysis (EDA) approaches to find hidden trends, pa... 详细信息
来源: 评论
A new hybrid teaching learning based Optimization -Extreme learning Machine model based Intrusion-Detection system
收藏 引用
Materials Today: Proceedings 2023年 80卷 2701-2705页
作者: Qahatan Alsudani, Mustafa Abbdal Reflish, Salah H. Moorthy, Kohbalan Mundher Adnan, Myasar Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia Johor Bahru81310 Malaysia
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s... 详细信息
来源: 评论
IoT Based Drip Infusion Monitoring System
IoT Based Drip Infusion Monitoring System
收藏 引用
2022 IEEE Delhi Section Conference, DELCON 2022
作者: Maniktalia, Riddhi Tanwar, Satwik Billa, Ritvik Deepa, K. School of Computer Science and Engineering Vellore Institute of Technology Vellore India School of Computer Science and Engineering Vellore Institute of Technology Department of Software Systems Vellore India
During recent years, we have seen many technological advancements which help to take better care of patient's health and assure them fast and safe recovery. The most basic item necessary is competent patient care ... 详细信息
来源: 评论
NLGT: Neighborhood-based and Label-enhanced Graph Transformer Framework for Node Classification  39
NLGT: Neighborhood-based and Label-enhanced Graph Transforme...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xu, Xiaolong Zhou, Yibo Xiang, Haolong Li, Xiaoyong Zhang, Xuyun Qi, Lianyong Dou, Wanchun School of Software Nanjing University of Information Science and Technology China Yunnan Key Laboratory of Service Computing Yunan University of Finance and Economics China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology China College of Meteorology and Oceanography National University of Defense Technology China School of Computing Macquarie University Australia China State Key Laboratory for Novel Software Technology Nanjing University China
Graph Neural Networks (GNNs) are widely applied on graph-level tasks, such as node classification, link prediction and graph generation. Existing GNNs mostly adopt a message-passing mechanism to aggregate node informa... 详细信息
来源: 评论
Formal Verification Based Synthesis for Behavior Trees  9th
Formal Verification Based Synthesis for Behavior Trees
收藏 引用
9th International Symposium on Dependable software engineering: Theories, Tools and Applications, SETTA 2023
作者: Hong, Weijiang Chen, Zhenbang Li, Minglong Li, Yuhan Huang, Peishan Wang, Ji College of Computer National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China Institute for Quantum Information & State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China
Behavior trees (BTs) have been extensively applied in the area of both computer games and robotics, as the control architectures. However, the construction of BTs is labor-expensive, time-consuming, and even impossibl... 详细信息
来源: 评论