咨询与建议

限定检索结果

文献类型

  • 2,961 篇 会议
  • 1,620 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 4,629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,867 篇 工学
    • 1,990 篇 计算机科学与技术...
    • 1,664 篇 软件工程
    • 466 篇 信息与通信工程
    • 439 篇 控制科学与工程
    • 282 篇 电气工程
    • 281 篇 生物工程
    • 214 篇 机械工程
    • 214 篇 电子科学与技术(可...
    • 189 篇 生物医学工程(可授...
    • 188 篇 化学工程与技术
    • 153 篇 光学工程
    • 119 篇 动力工程及工程热...
    • 118 篇 材料科学与工程(可...
    • 115 篇 安全科学与工程
    • 99 篇 仪器科学与技术
    • 98 篇 土木工程
    • 95 篇 交通运输工程
    • 86 篇 网络空间安全
  • 1,332 篇 理学
    • 629 篇 数学
    • 374 篇 物理学
    • 311 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 148 篇 化学
  • 843 篇 管理学
    • 593 篇 管理科学与工程(可...
    • 297 篇 图书情报与档案管...
    • 293 篇 工商管理
  • 171 篇 医学
    • 158 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 107 篇 经济学
    • 106 篇 应用经济学
  • 97 篇 法学
  • 75 篇 教育学
  • 46 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 162 篇 software enginee...
  • 101 篇 software
  • 97 篇 deep learning
  • 89 篇 computational mo...
  • 88 篇 feature extracti...
  • 84 篇 accuracy
  • 81 篇 machine learning
  • 73 篇 computer science
  • 70 篇 training
  • 69 篇 computer archite...
  • 68 篇 software systems
  • 68 篇 data mining
  • 66 篇 semantics
  • 65 篇 data models
  • 61 篇 cloud computing
  • 57 篇 systems engineer...
  • 55 篇 predictive model...
  • 55 篇 artificial intel...
  • 52 篇 optimization
  • 51 篇 security

机构

  • 77 篇 beijing engineer...
  • 56 篇 state key labora...
  • 54 篇 school of softwa...
  • 44 篇 college of compu...
  • 44 篇 shenzhen institu...
  • 31 篇 beijing key labo...
  • 31 篇 university of ch...
  • 30 篇 school of softwa...
  • 28 篇 school of inform...
  • 26 篇 suzhou institute...
  • 26 篇 college of compu...
  • 23 篇 school of softwa...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 state key labora...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 18 篇 college of compu...

作者

  • 35 篇 biffl stefan
  • 33 篇 junping du
  • 29 篇 zhangqin huang
  • 26 篇 stefan biffl
  • 26 篇 rausch andreas
  • 20 篇 john grundy
  • 20 篇 ismail leila
  • 19 篇 baojian hua
  • 18 篇 moser thomas
  • 18 篇 yingmin jia
  • 17 篇 huang zhangqin
  • 16 篇 andreas rausch
  • 16 篇 grundy john
  • 15 篇 wang wei
  • 14 篇 hua baojian
  • 14 篇 veera boonjing
  • 14 篇 fashan yu
  • 13 篇 zheng yushan
  • 13 篇 liu jie
  • 13 篇 thomas moser

语言

  • 4,363 篇 英文
  • 226 篇 其他
  • 43 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Systems Engineering Advanced Software and Technology"
4629 条 记 录,以下是551-560 订阅
排序:
GUIDE: LLM-Driven GUI Generation Decomposition for Automated Prototyping
arXiv
收藏 引用
arXiv 2025年
作者: Kolthoff, Kristian Kretzer, Felix Bartelt, Christian Maedche, Alexander Ponzetto, Simone Paolo Institute for Software and Systems Engineering Clausthal University of Technology Clausthal Germany Human-Centered Systems Lab Karlsruhe Institute of Technology Karlsruhe Germany Data and Web Science Group University of Mannheim Mannheim Germany
Graphical user interface (GUI) prototyping serves as one of the most valuable techniques for enhancing the elicitation of requirements, facilitating the visualization and refinement of customer needs and closely integ... 详细信息
来源: 评论
WASMDYPA: Effectively Detecting WebAssembly Bugs via Dynamic Program Analysis
WASMDYPA: Effectively Detecting WebAssembly Bugs via Dynamic...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Wenlong Zheng Baojian Hua Zhuochen Jiang School of Software Engineering University of Science and Technology of China China Suzhou Institute for Advanced Research University of Science and Technology of China China
Safe binary execution is a crucial requirement in to- day's security-critical computing infrastructures. WebAssem- bly is an emerging language designed for safe binary execution that has been deployed in many secu...
来源: 评论
Patterns of Recreating Reality in Games  22
Patterns of Recreating Reality in Games
收藏 引用
Proceedings of the 29th Conference on Pattern Languages of Programs
作者: Branislava Vranić Valentino Vranić Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava
There are various ways of how reality is recreated in games. These patterns recur in within a single game and throughout many games. There are contradictory forces that lead to a solution that can be reused. Clearly, ... 详细信息
来源: 评论
Progressive Diversifying Policy for Multi-Agent Reinforcement Learning
Progressive Diversifying Policy for Multi-Agent Reinforcemen...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Shaoqi Sun Yuanzhao Zhai Kele Xu Dawei Feng Bo Ding National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems Changsha China
Multi-Agent Reinforcement Learning (MARL) has recently achieved promising performance in many collaborative decision making tasks. However, one of the main bottleneck challenges for MARL is the sparsity of the team re... 详细信息
来源: 评论
Optimizing Existing SHM systems: Retasking as a Self-Healing Solution for Improved Fault Tolerance
Optimizing Existing SHM Systems: Retasking as a Self-Healing...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Aaron Mano Cherian D. Ajitha Avanish Gouraha Dipanshu Mandal School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology Vellore Tamilnadu India Department of Software Systems School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology Vellore Tamilnadu India
This paper focuses on self-healing algorithms in structural health monitoring (SHM) systems centered around the enhancement of resilience and adaptability of the systems. In this study, imports from existing methods (... 详细信息
来源: 评论
Self-supervised Scene Text Segmentation with Object-centric Layered Representations Augmented by Text Regions
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yibo Ye, Yunhu Mao, Yuanpeng Yu, Yanwei Song, Yuanping School of Software Engineering University of Science and Technology of China China Suzhou Institute for Advanced Research University of Science and Technology of China China
Text segmentation tasks have a very wide range of application values, such as image editing, style transfer, watermark removal, etc. However, existing public datasets are of poor quality of pixel-level labels that hav... 详细信息
来源: 评论
Task-Specific Alignment and Multiple-level Transformer for Few-Shot Action Recognition
arXiv
收藏 引用
arXiv 2023年
作者: Guo, Fei Zhu, Li Wang, YiKang Sun, Jing School of Software Engineering Xi'an Jiaotong University China Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China
In the research field of few-shot learning, the main difference between image-based and video-based is the additional temporal dimension. In recent years, some works have used the Transformer to deal with frames, then... 详细信息
来源: 评论
Dynamic Topology Management In Ad-Hoc Networks For Improved Performance  2
Dynamic Topology Management In Ad-Hoc Networks For Improved ...
收藏 引用
2nd IEEE International Conference on Advances in Information technology, ICAIT 2024
作者: Anakath, A.S. Kannadasan, R. Margarat, G. Simi Pandian, A. Pasumpon Antony Sibiya Varghese, V. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology VIT University Tamil Nadu Vellore India Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering CARE College of Engineering Trichy India Department of Artificial Intelligence and Data Science GRT Institute of Engineering and Technology Tamil Nadu Tiruttani India
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result fro... 详细信息
来源: 评论
VMCanary: Effective Memory Protection for WebAssembly via Virtual Machine-assisted Approach
VMCanary: Effective Memory Protection for WebAssembly via Vi...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security (QRS)
作者: Ziyao Zhang Wenlong Zheng Baojian Hua Qiliang Fan Zhizhong Pan School of Software Engineering University of Science and Technology of China China Suzhou Institute for Advanced Research University of Science and Technology of China China
WebAssembly is an emerging secure programming language and portable instruction set architecture, and has been deployed in diverse security-critical scenarios due to its safety advantages. However, WebAssembly’s line...
来源: 评论
Accelerating ab initio melting property calculations with machine learning:application to the high entropy alloy TaVCrW
收藏 引用
npj Computational Materials 2024年 第1期10卷 328-338页
作者: Li-Fang Zhu Fritz Körmann Qing Chen Malin Selleby Jörg Neugebauer Blazej Grabowski Department for Computational Materials Design Max Planck Institute for Sustainable MaterialsMax-Planck-str.140237 DüsseldorfGermany Institute for Materials Science University of StuttgartPfaffenwaldring 5570569 StuttgartGermany Interdisciplinary Centre for Advanced Materials Simulation(ICAMS) Ruhr-Universität Bochum44801 BochumGermany Thermo-Calc Software AB Råsundavägen 18SE-16967 SolnaSweden Department of Materials Science and Engineering KTH Royal Institute of TechnologySE-10044StockholmSweden
Melting properties are critical for designing novel materials,especially for discovering highperformance,high-melting refractory *** measurements of these properties are extremely challenging due to their high melting... 详细信息
来源: 评论