咨询与建议

限定检索结果

文献类型

  • 2,961 篇 会议
  • 1,620 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 4,629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,867 篇 工学
    • 1,990 篇 计算机科学与技术...
    • 1,664 篇 软件工程
    • 466 篇 信息与通信工程
    • 439 篇 控制科学与工程
    • 282 篇 电气工程
    • 281 篇 生物工程
    • 214 篇 机械工程
    • 214 篇 电子科学与技术(可...
    • 189 篇 生物医学工程(可授...
    • 188 篇 化学工程与技术
    • 153 篇 光学工程
    • 119 篇 动力工程及工程热...
    • 118 篇 材料科学与工程(可...
    • 115 篇 安全科学与工程
    • 99 篇 仪器科学与技术
    • 98 篇 土木工程
    • 95 篇 交通运输工程
    • 86 篇 网络空间安全
  • 1,332 篇 理学
    • 629 篇 数学
    • 374 篇 物理学
    • 311 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 148 篇 化学
  • 843 篇 管理学
    • 593 篇 管理科学与工程(可...
    • 297 篇 图书情报与档案管...
    • 293 篇 工商管理
  • 171 篇 医学
    • 158 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 107 篇 经济学
    • 106 篇 应用经济学
  • 97 篇 法学
  • 75 篇 教育学
  • 46 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 162 篇 software enginee...
  • 101 篇 software
  • 97 篇 deep learning
  • 89 篇 computational mo...
  • 88 篇 feature extracti...
  • 84 篇 accuracy
  • 81 篇 machine learning
  • 73 篇 computer science
  • 70 篇 training
  • 69 篇 computer archite...
  • 68 篇 software systems
  • 68 篇 data mining
  • 66 篇 semantics
  • 65 篇 data models
  • 61 篇 cloud computing
  • 57 篇 systems engineer...
  • 55 篇 predictive model...
  • 55 篇 artificial intel...
  • 52 篇 optimization
  • 51 篇 security

机构

  • 77 篇 beijing engineer...
  • 56 篇 state key labora...
  • 54 篇 school of softwa...
  • 44 篇 college of compu...
  • 44 篇 shenzhen institu...
  • 31 篇 beijing key labo...
  • 31 篇 university of ch...
  • 30 篇 school of softwa...
  • 28 篇 school of inform...
  • 26 篇 suzhou institute...
  • 26 篇 college of compu...
  • 23 篇 school of softwa...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 state key labora...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 18 篇 college of compu...

作者

  • 35 篇 biffl stefan
  • 33 篇 junping du
  • 29 篇 zhangqin huang
  • 26 篇 stefan biffl
  • 26 篇 rausch andreas
  • 20 篇 john grundy
  • 20 篇 ismail leila
  • 19 篇 baojian hua
  • 18 篇 moser thomas
  • 18 篇 yingmin jia
  • 17 篇 huang zhangqin
  • 16 篇 andreas rausch
  • 16 篇 grundy john
  • 15 篇 wang wei
  • 14 篇 hua baojian
  • 14 篇 veera boonjing
  • 14 篇 fashan yu
  • 13 篇 zheng yushan
  • 13 篇 liu jie
  • 13 篇 thomas moser

语言

  • 4,363 篇 英文
  • 226 篇 其他
  • 43 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Systems Engineering Advanced Software and Technology"
4629 条 记 录,以下是351-360 订阅
排序:
Fingerprint matching,spoof and liveness detection:classification and literature review
收藏 引用
Frontiers of Computer Science 2021年 第1期15卷 179-196页
作者: Syed Farooq ALI Muhammad Aamir KHAN Ahmed Sohail ASLAM Department of Software Engineering University of Management and TechnologyLahore 54770Pakistan Department of Informatics and Systems University of Management and TechnologyLahore 54770Pakistan Department of Computer Science University of Management and TechnologyLahore 54770Pakistan
Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of *** recent decade,several technique... 详细信息
来源: 评论
Quality Obstacles of Distance Learning: Experiences from Students of the University of Benghazi  3
Quality Obstacles of Distance Learning: Experiences from Stu...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer engineering, MI-STA 2023
作者: Suweel, Osamah Sulayman Yahya Maatuk, Abdelsalam M. Abdalla, Mohamed A E Benghazi University Faculty of Information Technology Dept. of Information Systems Benghazi Libya Libyan International Medical University Faculty of Information Technology Benghazi Libya Benghazi University Faculty of Information Technology Dept. of Software Engineering Benghazi Libya
Adopting distance learning with a high level of quality in universities and educational institutions is a real challenge. Therefore, several studies and organizations have provided different standards to evaluate the ... 详细信息
来源: 评论
KiteRunner: Language-Driven Cooperative Local-Global Navigation Policy with UAV Mapping in Outdoor Environments
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Shibo Shi, Chenfan Yang, Jian Dong, Hanlin Mi, Jinpeng Li, Ke Zhang, Jianfeng Ding, Miao Liang, Peidong You, Xiong Wei, Xian Software Engineering Institute East China Normal University China School of Geospatial Information Information Engineering University China University of Shanghai for Science and Technology China School of Software Liaoning Technical University China Institute of Advanced Manufacturing Technology China
Autonomous navigation in open-world outdoor environments faces challenges in integrating dynamic conditions, long-distance spatial reasoning, and semantic understanding. Traditional methods struggle to balance local p... 详细信息
来源: 评论
Enhancing MBSE Education with Version Control and Automated Feedback
arXiv
收藏 引用
arXiv 2024年
作者: Bajczi, Levente Szekeres, Dániel Siegl, Daniel Molnár, Vince Budapest University of Technology and Economics Department of Artificial Intelligence and Systems Engineering Hungary LieberLieber Software GmbH Austria
This paper presents an innovative approach to conducting a Model-Based systems engineering (MBSE) course, engaging over 80 participants annually. The course is structured around collaborative group assignments, where ... 详细信息
来源: 评论
Towards an Automated System for Reverse Geocoding of Aerial Photographs  30
Towards an Automated System for Reverse Geocoding of Aerial ...
收藏 引用
30th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, WSCG 2022
作者: Praschl, Christoph Stradner, Michael Ono, Yuta Zwettler, Gerald Research Group Advanced Information Systems and Technology Research and Development Department University of Applied Sciences Upper Austria Austria Graduate School of Software and Information Science Iwate Prefectural University Japan Department of Software Engineering School of Informatics Communications and Media University of Applied Sciences Upper Austria Austria
Aerial photographs of buildings are often used as memorabilia sold by trading companies. Such photographs come with an issue regarding the address of the shown buildings, since the recording location of the camera may... 详细信息
来源: 评论
Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context Learning
Large Language Models are Few-Shot Summarizers: Multi-Intent...
收藏 引用
International Conference on software engineering (ICSE)
作者: Mingyang Geng Shangwen Wang Dezun Dong Haotian Wang Ge Li Zhi Jin Xiaoguang Mao Xiangke Liao College of Computer Science National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems Key Lab of High Confidence Software Technology Peking University Beijing China
Code comment generation aims at generating natural language descriptions for a code snippet to facilitate developers' program comprehension activities. Despite being studied for a long time, a bottleneck for exist... 详细信息
来源: 评论
Proposed intelligence systems based on digital Forensics: Review paper
收藏 引用
Materials Today: Proceedings 2023年 80卷 2647-2651页
作者: Ismael Sahib, Hussein Qahatan AlSudani, Mustafa Hasan Ali, Mohammed Qassim Abbas, Haydar Moorthy, Kohbalan Mundher Adnan, Myasar Faculty of Computer Science and Information Technology UniversitiTun Hussein Onn Malaysia Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia 81310 Johor Bahru Malaysia
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on t... 详细信息
来源: 评论
There are More Fish in the Sea: Automated Vulnerability Repair via Binary Templates
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Bo Wang, Shangwen Chen, Liqian Mao, Xiaoguang Key Laboratory of Software Engineering for Complex Systems College of Computer Science and Technology National University of Defense Technology Changsha China
As software vulnerabilities increase in both volume and complexity, vendors often struggle to repair them promptly. Automated vulnerability repair has emerged as a promising solution to reduce the burden of manual deb... 详细信息
来源: 评论
A Survey on Modern Deep Neural Network for Traffic Prediction: Trends, Methods and Challenges (Extended Abstract)  39
A Survey on Modern Deep Neural Network for Traffic Predictio...
收藏 引用
39th IEEE International Conference on Data engineering, ICDE 2023
作者: Tedjopurnomo, David Alexander Bao, Zhifeng Zheng, Baihua Choudhury, Farhana Murtaza Qin, A.K. Rmit University School of Computing Technologies Australia Singapore Management University School of Computing and Information Systems Singapore The University of Melbourne School of Computing and Information Systems Australia Swinburne University of Technology Department of Computer Science and Software Engineering Australia
In this modern era, traffic congestion has become a major source of negative economic and environmental impact for urban areas worldwide. One of the most efficient ways to mitigate this issue is through traffic predic... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论