咨询与建议

限定检索结果

文献类型

  • 5,067 篇 期刊文献
  • 301 篇 会议

馆藏范围

  • 5,368 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,582 篇 工学
    • 3,309 篇 计算机科学与技术...
    • 1,597 篇 软件工程
    • 1,565 篇 电气工程
    • 1,254 篇 信息与通信工程
    • 1,224 篇 控制科学与工程
    • 942 篇 电子科学与技术(可...
    • 928 篇 机械工程
    • 887 篇 材料科学与工程(可...
    • 512 篇 网络空间安全
    • 376 篇 仪器科学与技术
    • 343 篇 力学(可授工学、理...
    • 247 篇 生物医学工程(可授...
    • 144 篇 动力工程及工程热...
    • 123 篇 化学工程与技术
    • 108 篇 交通运输工程
    • 91 篇 航空宇航科学与技...
  • 2,416 篇 理学
    • 1,610 篇 数学
    • 424 篇 物理学
    • 252 篇 生物学
    • 210 篇 天文学
    • 153 篇 系统科学
    • 149 篇 化学
    • 112 篇 统计学(可授理学、...
  • 976 篇 管理学
    • 785 篇 管理科学与工程(可...
    • 174 篇 图书情报与档案管...
  • 261 篇 医学
    • 218 篇 临床医学
  • 168 篇 教育学
    • 153 篇 教育学
  • 161 篇 经济学
    • 155 篇 应用经济学
  • 102 篇 法学
    • 87 篇 社会学
  • 101 篇 艺术学
    • 83 篇 设计学(可授艺术学...
  • 80 篇 文学
  • 78 篇 农学
  • 78 篇 军事学
  • 15 篇 哲学
  • 3 篇 历史学

主题

  • 176 篇 deep learning
  • 82 篇 machine learning
  • 52 篇 model
  • 49 篇 blockchain
  • 43 篇 network
  • 42 篇 artificial intel...
  • 40 篇 convolutional ne...
  • 39 篇 internet of thin...
  • 38 篇 software enginee...
  • 34 篇 analysis
  • 34 篇 optimization
  • 31 篇 simulation
  • 30 篇 system
  • 29 篇 genetic algorith...
  • 27 篇 clustering
  • 27 篇 and
  • 26 篇 cnn
  • 26 篇 privacy
  • 25 篇 detection
  • 25 篇 software

机构

  • 70 篇 state key labora...
  • 67 篇 school of comput...
  • 46 篇 state key labora...
  • 45 篇 state key labora...
  • 44 篇 school of softwa...
  • 38 篇 state key labora...
  • 37 篇 school of inform...
  • 37 篇 school of softwa...
  • 37 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 siemens plm soft...
  • 34 篇 state key labora...
  • 33 篇 college of mathe...
  • 32 篇 jiangsu collabor...
  • 31 篇 university of ch...
  • 31 篇 state key labora...
  • 28 篇 guangxi key labo...
  • 28 篇 national key lab...
  • 28 篇 institute of sof...
  • 27 篇 institute of sof...

作者

  • 25 篇 muhammad adnan k...
  • 22 篇 yongjun ren
  • 20 篇 wei li
  • 19 篇 muhammad waseem ...
  • 18 篇 wei sun
  • 18 篇 xiaorui zhang
  • 17 篇 xingming sun
  • 17 篇 zhi-hua zhou
  • 16 篇 seokhoon kim
  • 15 篇 sagheer abbas
  • 15 篇 张健
  • 15 篇 xiaolong xu
  • 15 篇 yazeed yasin gha...
  • 15 篇 yu xue
  • 14 篇 ahmad jalal
  • 14 篇 xiaoyu li
  • 14 篇 junping du
  • 14 篇 wei wang
  • 13 篇 dongming chen
  • 13 篇 li zhang

语言

  • 4,972 篇 英文
  • 396 篇 中文
检索条件"机构=FPT Software"
5368 条 记 录,以下是1-10 订阅
排序:
Cross-Project software Defect Prediction Based on SMOTE and Deep Canonical Correlation Analysis
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1687-1711页
作者: Xin Fan Shuqing Zhang Kaisheng Wu Wei Zheng Yu Ge School of software Nanchang Hangkong UniversityNanchang330063China software Testing and Evaluation Center Nanchang Hangkong UniversityNanchang330063China
Cross-Project Defect Prediction(CPDP)is a method that utilizes historical data from other source projects to train predictive models for defect prediction in the target ***,existing CPDP methods only consider linear c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
software Defect Prediction Method Based on Stable Learning
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 65-84页
作者: Xin Fan Jingen Mao Liangjue Lian Li Yu Wei Zheng Yun Ge College of Aerospace Engineering Nanjing University of Aeronautics and AstronauticsNanjing210012China School of software Nanchang Hangkong UniversityNanchang330029China software Testing and Evaluation Center Nanchang Hangkong UniversityNanchang330029China
The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and *** previous software defect prediction st... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
IoV environment exploring coordination:A federated learning approach
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 135-141页
作者: Tong Ding Lei Liu Yi Zhu Lizhen Cui Zhongmin Yan School of software Shandong UniversityJinan250101China
Exploring open fields with coordinated unmanned vehicles is popular in academia and *** of the most impressive applicable approaches is the Internet of Vehicles(lov).The IoV connects vehicles,road infrastructures and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Online Algorithm Based on Replication for Using Spot Instances in IaaS Clouds
收藏 引用
Journal of Computer Science & Technology 2024年 第1期39卷 103-115页
作者: 许志伟 潘丽 刘士军 School of software Shandong UniversityJinan 250101China
Infrastructure-as-a-Service(IaaS)cloud platforms offer resources with diverse buying *** can run an instance on the on-demand market which is stable but expensive or on the spot market with a significant ***,users hav... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Learnware:small models do big
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 39-50页
作者: Zhi-Hua ZHOU Zhi-Hao TAN National Key Laboratory for Novel software Technology Nanjing University
There are complaints about current machine learning techniques such as the requirement of a huge amount of training data and proficient training skills,the difficulty of continual learning,the risk of catastrophic for... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
NeurstrucEnergy:A bi-directional GNN model for energy prediction of neural networks in IoT
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 439-449页
作者: Chaopeng Guo Zhaojin Zhong Zexin Zhang Jie Song software Campus Northeastern UniversityShenyang110000LiaoningChina
A significant demand rises for energy-efficient deep neural networks to support power-limited embedding devices with successful deep learning applications in IoT and edge computing *** accurate energy prediction appro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A buffer overflow detection and defense method based on RiSC-V instruction set extension
收藏 引用
Cybersecurity 2024年 第2期7卷 28-43页
作者: Chang Liu Yan-Jun Wu Jing-Zheng Wu Chen Zhao Intelligent software Research Center Institute of SoftwareChinese Academy of SciencesBejingChina University of Chinese Academy of Sciences BeijingChina State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijingChina
Buffer overflow poses a serious threat to the memory security of modern operating *** overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution environ-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3535-3563页
作者: Younghoon Ban Myeonghyun Kim Haehyun Cho School of software Soongsil UniversitySeoul06978Korea
Antivirus vendors and the research community employ Machine Learning(ML)or Deep Learning(DL)-based static analysis techniques for efficient identification of new threats,given the continual emergence of novel malware ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
IoTDQ: An Industrial IoT Data Analysis Library for Apache IoTDB
收藏 引用
Big Data Mining and Analytics 2024年 第1期7卷 29-41页
作者: Pengyu Chen Wendi He Wenxuan Ma Xiangdong Huang Chen Wang School of software Tsinghua UniversityBeijing 100084China National Engineering Research Center for Big Data software(NERCBDS) Tsinghua UniversityBeijing 100084China
There is a growing demand for time series data analysis in industry *** loTDB is a time series database designed for the Internet of Things(loT)with enhanced storage and I/O *** User-Defined Functions(UDF)provided,com... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Key points and visible part fusion attention network for occluded pedestrian detection in traffic environments
收藏 引用
Optoelectronics Letters 2024年 第7期20卷 430-436页
作者: LIU Peiyu MA Yixuan School of software Engineering Beijing Jiaotong University
Aiming at the problem of low detection accuracy of occluded pedestrian in traffic environments,this paper proposes a key points and visible part fusion network for occluded pedestrian *** proposed algorithm constructs... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论