咨询与建议

限定检索结果

文献类型

  • 2,962 篇 会议
  • 1,613 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 4,623 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,856 篇 工学
    • 1,974 篇 计算机科学与技术...
    • 1,654 篇 软件工程
    • 467 篇 信息与通信工程
    • 439 篇 控制科学与工程
    • 284 篇 电气工程
    • 281 篇 生物工程
    • 216 篇 电子科学与技术(可...
    • 215 篇 机械工程
    • 189 篇 化学工程与技术
    • 189 篇 生物医学工程(可授...
    • 153 篇 光学工程
    • 121 篇 材料科学与工程(可...
    • 118 篇 动力工程及工程热...
    • 114 篇 安全科学与工程
    • 100 篇 仪器科学与技术
    • 95 篇 土木工程
    • 94 篇 交通运输工程
    • 85 篇 网络空间安全
  • 1,323 篇 理学
    • 629 篇 数学
    • 371 篇 物理学
    • 310 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 149 篇 化学
  • 837 篇 管理学
    • 588 篇 管理科学与工程(可...
    • 296 篇 图书情报与档案管...
    • 292 篇 工商管理
  • 172 篇 医学
    • 159 篇 临床医学
    • 129 篇 基础医学(可授医学...
  • 105 篇 经济学
    • 104 篇 应用经济学
  • 97 篇 法学
  • 75 篇 教育学
  • 46 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 163 篇 software enginee...
  • 101 篇 software
  • 97 篇 deep learning
  • 89 篇 computational mo...
  • 88 篇 feature extracti...
  • 84 篇 accuracy
  • 83 篇 machine learning
  • 72 篇 computer science
  • 71 篇 training
  • 70 篇 computer archite...
  • 69 篇 data mining
  • 68 篇 software systems
  • 66 篇 semantics
  • 65 篇 data models
  • 61 篇 cloud computing
  • 58 篇 artificial intel...
  • 57 篇 systems engineer...
  • 55 篇 predictive model...
  • 53 篇 optimization
  • 51 篇 security

机构

  • 77 篇 beijing engineer...
  • 58 篇 state key labora...
  • 56 篇 school of softwa...
  • 45 篇 college of compu...
  • 45 篇 shenzhen institu...
  • 31 篇 school of softwa...
  • 31 篇 beijing key labo...
  • 31 篇 university of ch...
  • 28 篇 suzhou institute...
  • 28 篇 school of inform...
  • 26 篇 college of compu...
  • 23 篇 school of softwa...
  • 22 篇 school of comput...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 state key labora...
  • 20 篇 state key labora...
  • 18 篇 college of compu...

作者

  • 35 篇 biffl stefan
  • 34 篇 junping du
  • 29 篇 zhangqin huang
  • 26 篇 stefan biffl
  • 26 篇 rausch andreas
  • 21 篇 yingmin jia
  • 20 篇 john grundy
  • 20 篇 ismail leila
  • 19 篇 baojian hua
  • 18 篇 moser thomas
  • 17 篇 andreas rausch
  • 15 篇 grundy john
  • 15 篇 huang zhangqin
  • 14 篇 hua baojian
  • 14 篇 thomas moser
  • 14 篇 veera boonjing
  • 14 篇 lin lin
  • 14 篇 fashan yu
  • 13 篇 wang wei
  • 13 篇 xinjun mao

语言

  • 4,144 篇 英文
  • 440 篇 其他
  • 44 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Systems Engineering Advanced Software and Technology"
4623 条 记 录,以下是571-580 订阅
排序:
Sleep Monitoring with Wearable Sensor Data in an eCoach Recommendation System: A Conceptual Study with Machine Learning Approach  7th
Sleep Monitoring with Wearable Sensor Data in an eCoach Reco...
收藏 引用
7th International Conference on Emerging Applications of Information technology, EAIT 2022
作者: Chatterjee, Ayan Prinz, Andreas Pahari, Nibedita Das, Jishnu Riegler, Michael Alexander Department of Information Technology Center for eHealth University of Agder Kristiansand Norway Department of Software Engineering Knowit AS Oslo Norway Department of Library and Information Science University of Calcutta Calcutta India Department of Holistic Systems Simula Research Laboratory Oslo Norway
The collective effects of sleep loss and sleep disorders are correlated with many adverse health consequences, including increased risk of high blood pressure, obesity, diabetes, depressive state, and cardiovascular s... 详细信息
来源: 评论
An Intelligent and Interpretable Intrusion Detection System for Unmanned Aerial Vehicles
An Intelligent and Interpretable Intrusion Detection System ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Danish Javeed Tianhan Gao Prabhat Kumar Shifa Shoukat Ijaz Ahmad Randhir Kumar Software College Northeastern University Shenyang China Department of Software Engineering School of Engineering Science LUT University Lappeenranta Finland Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen Guangdong China Department of Computer Science and Engineering SRM University AP AP India
The increasing adoption of Unmanned Aerial Ve-hicles (UAV s) in various critical applications necessitates robust security measures to protect these systems from cyber threats. In response, this research introduces an... 详细信息
来源: 评论
Predicting software Functional Size Using Natural Language Processing: An Exploratory Case Study
Predicting Software Functional Size Using Natural Language P...
收藏 引用
Euromicro Conference on software engineering and advanced Applications (SEAA)
作者: Hüseyin Ünlü Samet Tenekeci Can Çiftçi İbrahim Baran Oral Tunahan Atalay Tuna Hacaloğlu Burcu Musaoğlu Onur DemirǶrs Department of Computer Engineering Izmir Institute of Technology Izmir Turkiye Bilgi Grubu Izmir Turkiye Department of Information Systems Engineering Atilim University Ankara Turkiye Department of Software and IT Engineering Ecole de Technologie Superieure Montreal Canada Siskon Software & Automation Izmir Turkiye
software Size Measurement (SSM) plays an essential role in software project management as it enables the acquisition of software size, which is the primary input for development effort and schedule estimation. However... 详细信息
来源: 评论
Predictive Hiring System: Information technology Consultants Soft Skills
Predictive Hiring System: Information Technology Consultants...
收藏 引用
International Conference on advanced Intelligent systems for Sustainable Development, AI2SD 2022
作者: Lamjid, Asmaa El Bouchti, Karim Ziti, Soumia Mohamed, Reda Oussama Labrim, Hicham Riadsolh, Anouar Belkacemi, Mourad Intelligence Processing System and Security Mohammed V University in Rabat Rabat Morocco Algorithms Networks Intelligent Systems and Software Engineering Research Faculty of Sciences Mohammed V University in Rabat Rabat Morocco Advanced Systems Engineering Laboratory National School of Applied Sciences Ibn Tofail University Kenitra Morocco Faculty of Sciences Mohammed V University in Rabat Rabat Morocco
Recruiting candidates who will perform well within any organization has become a challenge in the Human Resources sector. Generally, poor recruitment can negatively reflect the progression and evolution of the organis... 详细信息
来源: 评论
INNSE: Invertible neural network-based DNA image storage with self-correction encoding
收藏 引用
Computational and Structural Biotechnology Journal 2025年 27卷 2492-2502页
作者: Zheng, Yanfen Zhang, Xiaokang Sun, Lijun Cao, Ben Wang, Bin Zhang, Qiang Zheng, Pan School of Computer Science and Technology Dalian University of Technology Liaoning Dalian116024 China The Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Liaoning Dalian116622 China Department of Accounting and Information Systems University of Canterbury Upper Riccarton Christchurch8140 New Zealand
DNA storage has become an alternative to silicon-based storage of media. However, when used to store multimodal data such as images, it fails to take full advantage of the characteristics of high correlation and varia... 详细信息
来源: 评论
Automatic Deployment to Kubernetes Cluster by Applying a New Learning Tool and Learning Processes  10
Automatic Deployment to Kubernetes Cluster by Applying a New...
收藏 引用
10th Workshop on software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2023
作者: Golis, Tomáš Dakić, Pavle Vranić, Valentino Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava Ilkovičova 2 Bratislava842 16 4 Slovakia Faculty of Informatics and Computing Singidunum University Danijelova 32 Belgrade Serbia
The rapid growth and widespread adoption of containerization technologies, such as Docker, and the increasing popularity of Kubernetes as a container orchestration platform have significantly shaped the landscape of m... 详细信息
来源: 评论
Exploiting Inter-sample and Inter-feature Relations in Dataset Distillation
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Wenxiao Li, Wenbin Ding, Tianyu Wang, Lei Zhang, Hongguang Huang, Kuihua Huo, Jing Gao, Yang State Key Laboratory for Novel Software Technology Nanjing University China Microsoft Corporation United States University of Wollongong Australia Systems Engineering Institute AMS China School of Systems Engineering University of Defense Technology China
Dataset distillation has emerged as a promising approach in deep learning, enabling efficient training with small synthetic datasets derived from larger real ones. Particularly, distribution matching-based distillatio... 详细信息
来源: 评论
A Hybrid Particle Swarm Optimization based on Q-Learning for Multiobjective Distributed Flow-Shop Scheduling Problem
A Hybrid Particle Swarm Optimization based on Q-Learning for...
收藏 引用
2023 International Conference on Sensing, Measurement and Data Analytics in the Era of Artificial Intelligence, ICSMD 2023
作者: Li, Chen Zhang, Wenqiang Lin, Lin School of Software Dalian University of Technology Dalian116620 China College of Info. Sci. and Eng. Henan University of Technology Zhengzhou450001 China International School of Info. Sci. and Eng. Dalian University of Technology Dalian China Dalian University of Technology DUT-RU International School of Information Science and Engineering Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116620 China Fuzzy Logic Systems Institute lizuka8200067 Japan
This study addresses the distributed flow-shop scheduling problem (DFSP) and aims to minimize the makespan and the total processing time. Although many intelligent algorithms have been proposed to solve DFSP, the effi... 详细信息
来源: 评论
Enhancing Multiscale Simulations with Constitutive Relations-Aware Deep Operator Networks
arXiv
收藏 引用
arXiv 2024年
作者: Eivazi, Hamidreza Alikhani, Mahyar Tröger, Jendrik-Alexander Wittek, Stefan Hartmann, Stefan Rausch, Andreas Institute for Software and Systems Engineering Clausthal University of Technology Clausthal-Zellerfeld38678 Germany Institute of Applied Mechanics Clausthal University of Technology Clausthal-Zellerfeld38678 Germany
Multiscale problems are widely observed across diverse domains in physics and engineering. Translating these problems into numerical simulations and solving them using numerical schemes, e.g. the finite element method... 详细信息
来源: 评论
Forensic Investigation of Malicious Activities in Digital Environments  4
Forensic Investigation of Malicious Activities in Digital En...
收藏 引用
4th IEEE International Conference on Data engineering and Communication systems, ICDECS 2024
作者: Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. Ravikumar, K. Abdul Kareem, D. Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India Rrase College of Engineering Padappai Department of Computer Science & Engineering Chennai India Grt Institute of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Tiruttani India
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha... 详细信息
来源: 评论