咨询与建议

限定检索结果

文献类型

  • 2,978 篇 会议
  • 1,650 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 4,676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,896 篇 工学
    • 2,008 篇 计算机科学与技术...
    • 1,675 篇 软件工程
    • 485 篇 信息与通信工程
    • 465 篇 控制科学与工程
    • 302 篇 电气工程
    • 282 篇 生物工程
    • 223 篇 电子科学与技术(可...
    • 221 篇 机械工程
    • 192 篇 化学工程与技术
    • 190 篇 生物医学工程(可授...
    • 155 篇 光学工程
    • 125 篇 动力工程及工程热...
    • 123 篇 材料科学与工程(可...
    • 122 篇 安全科学与工程
    • 103 篇 仪器科学与技术
    • 102 篇 交通运输工程
    • 100 篇 土木工程
    • 93 篇 网络空间安全
  • 1,343 篇 理学
    • 637 篇 数学
    • 379 篇 物理学
    • 312 篇 生物学
    • 196 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 152 篇 化学
  • 856 篇 管理学
    • 606 篇 管理科学与工程(可...
    • 303 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 180 篇 医学
    • 163 篇 临床医学
    • 129 篇 基础医学(可授医学...
  • 108 篇 经济学
    • 107 篇 应用经济学
  • 100 篇 法学
  • 76 篇 教育学
  • 46 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 10 篇 文学

主题

  • 163 篇 software enginee...
  • 101 篇 software
  • 98 篇 deep learning
  • 92 篇 computational mo...
  • 87 篇 feature extracti...
  • 86 篇 machine learning
  • 83 篇 accuracy
  • 72 篇 computer science
  • 71 篇 computer archite...
  • 71 篇 training
  • 69 篇 data mining
  • 68 篇 software systems
  • 65 篇 semantics
  • 65 篇 data models
  • 61 篇 cloud computing
  • 60 篇 artificial intel...
  • 57 篇 systems engineer...
  • 55 篇 optimization
  • 55 篇 predictive model...
  • 52 篇 security

机构

  • 77 篇 beijing engineer...
  • 58 篇 state key labora...
  • 55 篇 school of softwa...
  • 46 篇 college of compu...
  • 45 篇 shenzhen institu...
  • 33 篇 university of ch...
  • 31 篇 school of softwa...
  • 31 篇 beijing key labo...
  • 29 篇 suzhou institute...
  • 29 篇 school of inform...
  • 26 篇 college of compu...
  • 23 篇 school of softwa...
  • 22 篇 school of comput...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 state key labora...
  • 21 篇 state key labora...
  • 19 篇 college of compu...

作者

  • 35 篇 biffl stefan
  • 33 篇 junping du
  • 29 篇 zhangqin huang
  • 26 篇 stefan biffl
  • 26 篇 rausch andreas
  • 20 篇 john grundy
  • 20 篇 ismail leila
  • 19 篇 baojian hua
  • 18 篇 moser thomas
  • 17 篇 andreas rausch
  • 17 篇 yingmin jia
  • 16 篇 wang wei
  • 16 篇 grundy john
  • 15 篇 hua baojian
  • 15 篇 huang zhangqin
  • 14 篇 veera boonjing
  • 13 篇 zhang qiang
  • 13 篇 thomas moser
  • 13 篇 xinjun mao
  • 13 篇 lin lin

语言

  • 4,051 篇 英文
  • 586 篇 其他
  • 47 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Systems Engineering Advanced Software and Technology"
4676 条 记 录,以下是371-380 订阅
Building Custom Spreadsheet Functions with Python: End-User software engineering Approach
收藏 引用
Journal of software engineering and Applications 2024年 第5期17卷 246-258页
作者: Tamer Bahgat Elserwy Atef Tayh Nour El-Din Raslan Tarek Ali Mervat H. Gheith Department of Software Engineering Faculty of Graduate Studies for Statistical Research (FGSSR) Cairo University Giza Egypt Department of Information Systems Higher Institute of Advanced Studies Giza Egypt
End-user computing empowers non-developers to manage data and applications, enhancing collaboration and efficiency. Spreadsheets, a prime example of end-user programming environments widely used in business for data a... 详细信息
来源: 评论
Improved Traffic Filtering for IoT Security  5
Improved Traffic Filtering for IoT Security
收藏 引用
5th IEEE International Conference on Electro-Computing Technologies for Humanity, NIGERCON 2024
作者: Ovili, Henry Peter Okpor, Margaret Nwanze, N.E. Olayinka, Tosin Ojei, Emmanuel Nwankwo, Wilson Delta State University of Science and Technology Department of Information Systems & Technology Ozoro Nigeria Delta State University of Science and Technology Department of Cyber Security Ozoro Nigeria Delta State University of Science and Technology Faculty of Engineering Marine Engineering Department Ozoro Nigeria Wellspring University Department of Computing Benin City Nigeria Delta State University of Science and Technology Department of Software Engineering Ozoro Nigeria
This research presents an advanced traffic filtering technique using a Support Vector Machine (SVM) model to enhance IoT network security, achieving 85% accuracy, with high precision (87%) and recall (96%) in identify... 详细信息
来源: 评论
MSTF: enhancing long-term forecasting with multi-scale temporal fusion in time series forecasting
收藏 引用
The Journal of Supercomputing 2025年 第9期81卷 1-21页
作者: Zhou, Chengjie Jiang, Ke Liu, Yunjiong Che, Chao Zhang, Qiang School of Computer Science and Technology Dalian University of Technology Dalian China Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China
Long-term time series forecasting plays a vital role in applications like financial market prediction, energy usage forecasting, and traffic flow analysis. Deep learning models, though widely used in this task, often ...
来源: 评论
Specification Completion for Sustainable software Development via Sustainability-Driven Mining
Specification Completion for Sustainable Software Developmen...
收藏 引用
International Workshop on Green and Sustainable software (GREENS)
作者: Mohamed Toufik Ailane Carolin Rubner Andreas Rausch Siemens Foundational Technologies Siemens AG Erlangen Germany Institute for Software and Systems Engineering Clausthal University of Technology Germany
In an era where digital transformation intersects with environmental sustainability, the software development industry must integrate practices that minimize ecological impacts. This paper proposes a comprehensive fra... 详细信息
来源: 评论
LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection  25
LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Qi, Jiaxing Huang, Shaohan Luan, Zhongzhi Yang, Shu Fung, Carol Yang, Hailong Qian, Depei Shang, Jing Xiao, Zhiwen Wu, Zhihui Sino-German Joint Software Institute Beihang University Beijing100191 China The Concordia Institute for Information Systems Engineering Concordia University Quebec Canada The China Mobile Information Technology Center China
The increasing volume of log data produced by software-intensive systems makes it impractical to analyze them manually. Many deep learning-based methods have been proposed for log-based anomaly detection. These method... 详细信息
来源: 评论
Success Factors of Requirement Elicitation in the Field of software engineering  4
Success Factors of Requirement Elicitation in the Field of S...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Attanayaka, Buddhima Nawinna, Dasuni Manathunga, Kalpani Abeygunawardhana, Pradeep K.W. Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka Department of Computer Systems & Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ... 详细信息
来源: 评论
Exploring Problems and Solutions About Launch Files in ROS from Q&A Community  3
Exploring Problems and Solutions About Launch Files in ROS f...
收藏 引用
3rd International Conference on Big Data and Artificial Intelligence and software engineering, ICBASE 2022
作者: Jiang, Guangjun Mao, Xinjun College of Computer National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China
Robot Operating System (ROS) is a widely used software architecture for robotic systems, which provides hardware abstractions and common functions in robotics. Launch files, as one of the configuration files in the ac... 详细信息
来源: 评论
Fingerprint matching,spoof and liveness detection:classification and literature review
收藏 引用
Frontiers of Computer Science 2021年 第1期15卷 179-196页
作者: Syed Farooq ALI Muhammad Aamir KHAN Ahmed Sohail ASLAM Department of Software Engineering University of Management and TechnologyLahore 54770Pakistan Department of Informatics and Systems University of Management and TechnologyLahore 54770Pakistan Department of Computer Science University of Management and TechnologyLahore 54770Pakistan
Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of *** recent decade,several technique... 详细信息
来源: 评论
Quality Obstacles of Distance Learning: Experiences from Students of the University of Benghazi  3
Quality Obstacles of Distance Learning: Experiences from Stu...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer engineering, MI-STA 2023
作者: Suweel, Osamah Sulayman Yahya Maatuk, Abdelsalam M. Abdalla, Mohamed A E Benghazi University Faculty of Information Technology Dept. of Information Systems Benghazi Libya Libyan International Medical University Faculty of Information Technology Benghazi Libya Benghazi University Faculty of Information Technology Dept. of Software Engineering Benghazi Libya
Adopting distance learning with a high level of quality in universities and educational institutions is a real challenge. Therefore, several studies and organizations have provided different standards to evaluate the ... 详细信息
来源: 评论
Enhancing MBSE Education with Version Control and Automated Feedback
arXiv
收藏 引用
arXiv 2024年
作者: Bajczi, Levente Szekeres, Dániel Siegl, Daniel Molnár, Vince Budapest University of Technology and Economics Department of Artificial Intelligence and Systems Engineering Hungary LieberLieber Software GmbH Austria
This paper presents an innovative approach to conducting a Model-Based systems engineering (MBSE) course, engaging over 80 participants annually. The course is structured around collaborative group assignments, where ... 详细信息
来源: 评论