咨询与建议

限定检索结果

文献类型

  • 3,214 篇 会议
  • 19 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 3,243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,942 篇 工学
    • 1,740 篇 计算机科学与技术...
    • 1,594 篇 软件工程
    • 423 篇 信息与通信工程
    • 329 篇 控制科学与工程
    • 318 篇 生物工程
    • 185 篇 生物医学工程(可授...
    • 176 篇 电气工程
    • 145 篇 机械工程
    • 116 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 99 篇 安全科学与工程
    • 93 篇 化学工程与技术
    • 92 篇 动力工程及工程热...
    • 79 篇 网络空间安全
  • 893 篇 理学
    • 499 篇 数学
    • 336 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 158 篇 物理学
    • 154 篇 系统科学
    • 84 篇 化学
  • 505 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 185 篇 医学
    • 158 篇 临床医学
    • 156 篇 基础医学(可授医学...
    • 110 篇 药学(可授医学、理...
    • 83 篇 公共卫生与预防医...
  • 134 篇 法学
    • 91 篇 社会学
  • 82 篇 经济学
    • 82 篇 应用经济学
  • 78 篇 农学
    • 75 篇 作物学
  • 66 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学

主题

  • 499 篇 machine learning
  • 104 篇 deep learning
  • 86 篇 software
  • 62 篇 machine learning...
  • 59 篇 support vector m...
  • 52 篇 internet of thin...
  • 52 篇 artificial intel...
  • 49 篇 decision trees
  • 47 篇 forecasting
  • 44 篇 software enginee...
  • 40 篇 training
  • 39 篇 predictive model...
  • 36 篇 feature extracti...
  • 35 篇 neural networks
  • 33 篇 software testing
  • 31 篇 software algorit...
  • 26 篇 reinforcement le...
  • 26 篇 adversarial mach...
  • 25 篇 covid-19
  • 25 篇 object detection

机构

  • 31 篇 college of compu...
  • 31 篇 chitkara univers...
  • 12 篇 karnataka bangal...
  • 12 篇 school of inform...
  • 11 篇 software enginee...
  • 11 篇 department of so...
  • 10 篇 department of so...
  • 10 篇 school of comput...
  • 9 篇 maharishi school...
  • 8 篇 maharishi school...
  • 7 篇 maharishi school...
  • 7 篇 school of comput...
  • 7 篇 daffodil interna...
  • 7 篇 department of co...
  • 7 篇 school of inform...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 software enginee...
  • 6 篇 department of co...
  • 6 篇 department of so...

作者

  • 8 篇 patidar sanjay
  • 7 篇 liu han
  • 7 篇 han liu
  • 6 篇 alfurhood badria...
  • 6 篇 ishu sharma
  • 6 篇 sharma ishu
  • 6 篇 badria sulaiman ...
  • 5 篇 bitto abu kowshi...
  • 5 篇 dharshana kasthu...
  • 5 篇 ali raja hashim
  • 5 篇 yibeltal assefa
  • 5 篇 assefa yibeltal
  • 5 篇 ajmeera kiran
  • 5 篇 raja hashim ali
  • 5 篇 sethia divyashik...
  • 4 篇 heyn hans-martin
  • 4 篇 krishna aneesh
  • 4 篇 william p.
  • 4 篇 iqbal muhammad w...
  • 4 篇 liu xin

语言

  • 1,802 篇 英文
  • 1,440 篇 其他
  • 69 篇 中文
  • 1 篇 德文
检索条件"任意字段=2023 International Conference on Software Engineering and Machine Learning, CONF-SEML 2023"
3243 条 记 录,以下是3131-3140 订阅
排序:
machine learning Detects Anomalies in OPS-SAT Telemetry  23rd
Machine Learning Detects Anomalies in OPS-SAT Telemetry
收藏 引用
23rd international conference on Computational Science, ICCS 2023
作者: Ruszczak, Bogdan Kotowski, Krzysztof Andrzejewski, Jacek Musial, Alicja Evans, David Zelenevskiy, Vladimir Bammens, Sam Laurinovics, Rodrigo Nalepa, Jakub Faculty of Electrical Engineering Automatic Control and Informatics Department of Informatics Opole University of Technology Prószkowska 76 Opole45-758 Poland Faculty of Automatic Control Electronics and Computer Science Department of Algorithmics and Software Silesian University of Technology Akademicka 16 Gliwice44-100 Poland KP Labs Konarskiego 18C Gliwice44-100 Poland European Space Agency/ESOC Robert-Bosch-Str. 5 Darmstadt64293 Germany Telespazio Germany GmbH Europaplatz 5 Darmstadt64293 Germany IrbGS ltd "Viraki" Ance Parish IrbeneLV-3601 Latvia
Detecting anomalies in satellite telemetry data is pivotal in ensuring its safe operations. Although there exist various data-driven techniques for the task of determining abnormal parts of the signal, they are virtua... 详细信息
来源: 评论
GIM: Versatile GNN Acceleration with Reconfigurable Processing-in-Memory
GIM: Versatile GNN Acceleration with Reconfigurable Processi...
收藏 引用
IEEE international conference on Computer Design: VLSI in Computers and Processors, (ICCD)
作者: Chen Nie Guoyang Chen Weifeng Zhang Zhezhi He School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Alibaba Cloud Infrastructure Sunnyvale USA
Recent boost of deep learning has revolutionized many machine learning tasks, including the graph neural networks (GNNs) that are specifically designed for non-Euclidean graph data. GNNs have been widely adopted in nu...
来源: 评论
Strategies for Network Traffic Optimization: An In-Depth Analysis of Multipath Routing Algorithms in SDN
Strategies for Network Traffic Optimization: An In-Depth Ana...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE international conference on
作者: Venkata Sai. R Prabu. U Satwik. Ch Sanjaya Kumar Panda V. Geetha Department of CSE Velagapudi Ramakrishna Siddhartha Engineering College Vijayawada India Department of CSE National Institute of Technology Warangal India Department of Information Technology Puducherry Technological University Puducherry India
Demand for online services and cloud services has been increasing day to day. The usage of these services increases network traffic, which is difficult to handle by traditional networks. In the traditional networking ...
来源: 评论
Research on the application of artificial intelligence algorithms in drought prediction  22
Research on the application of artificial intelligence algor...
收藏 引用
Proceedings of the 2022 6th international conference on Electronic Information Technology and Computer engineering
作者: Mengxi Liu Guangjun Zai Guofu Wang Weiwei Shi Guanqun Zhang School of Cyber Science and Engineering ZhengZhou University China National Climate Center China Beijing SuperMap Software Co. Ltd China
With the aggravation of global warming, drought has caused more and more serious impact on society and national economy, so the accurate prediction of drought is also the most important thing to deal with the frequent... 详细信息
来源: 评论
DTC: Addressing the long-tailed problem in intrusion detection through the divide-then-conquer paradigm
DTC: Addressing the long-tailed problem in intrusion detecti...
收藏 引用
international conference on Parallel and Distributed Systems (ICPADS)
作者: Chaoqun Guo Nan Wang Yuanlin Sun Dalin Zhang Dept. School of Software Engineering Beijing Jiaotong University Beijing China
Intrusion detection systems (IDS) analyze the monitored data to detect patterns or signatures that correspond to known cyberattack techniques, vulnerabilities, or deviations from established baselines. They employ dif...
来源: 评论
A Research Survey on Traffic Management, Accident Detection and Emergency Notification Systems to Improve Society Health
A Research Survey on Traffic Management, Accident Detection ...
收藏 引用
international conference on Computing Communication Control and Automation (ICCUBEA)
作者: Maya P. Shelke Nihar M. Ranjan Prathamesh Ukirde Shruti Pagade Shantanu Hanchate Nikhil Mehtre Department of Information Technology JSPM's Rajarshi Shahu College of Engineering Pune India
The rapid growth of urbanization coupled with the rise in number of vehicles on roads have resulted in various issues, including traffic congestion, emergency vehicle delays, and delayed medical assistance to accident...
来源: 评论
4th international conference on Soft Computing and its engineering Applications, icSoftComp 2022
4th International Conference on Soft Computing and its Engin...
收藏 引用
4th international conference on Soft Computing and its engineering Applications, icSoftComp 2022
The proceedings contain 36 papers. The special focus in this conference is on Soft Computing and its engineering Applications. The topics include: Explainable AI for Predictive Analytics on Employee Attrition;graph Co...
来源: 评论
machine learning-based study of eye features under the emotion of anger  22
Machine learning-based study of eye features under the emoti...
收藏 引用
Proceedings of the 2022 6th international conference on Electronic Information Technology and Computer engineering
作者: Zhuoluo Huang Yafang Li Key Laboratory of Traditional Chinese Medicine Psychology and Brain Science Jiangxi Provincial Administration of Traditional Chinese Medicine China
Based on the theory of "the liver is open to the eyes", this study uses a machine learning approach to explore methods and models that can be applied to the identification of eye features for angry emotions,... 详细信息
来源: 评论
AD-PU: A Novel Approach for Automated Identification of the Outliers in User Interface Testing (UAT)
AD-PU: A Novel Approach for Automated Identification of the ...
收藏 引用
international Automatic Testing conference, AUTOTESTCON
作者: S.M.N.S.K Seneviratne Victoria Penenco Dharshana Kasthurirathna Faculty of Graduate Studies and Research Sri Lanka Institute of Information Technology Sri Lanka UAT London Stock Exchange Group London Dept. of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
User acceptance testing (UAT) is the process that validates the system under test (SUT) behaves according to the business requirements. A User would use the graphical user interface to interact with the underlying cod...
来源: 评论
dToF LIDAR System Using Addressable Multi-Channel VCSEL Transmitter, 128x80 SPAD Sensor, and ML-Based Object Detection for Adaptive Beam-Steering  44
dToF LIDAR System Using Addressable Multi-Channel VCSEL Tran...
收藏 引用
44th Annual IEEE Custom Integrated Circuits conference, CICC 2023
作者: Wu, Yifan Zhou, Sifan Sun, Miao Xia, Tao Qian, Jian Wang, Lei Shi, Shi Cui, Lebei Wang, Chill Li, Yuan Yu, Hengwei Lin, Zhihong Qiu, Lei Qin, Yajie Sun, Min Bai, Rui Chen, Xuefeng Chiang, Patrick Yin Zhuo, Shenglong Tongji University The College of Electronics and Information Engineering Shanghai China Fudan University Shanghai China Southeast University Shanghai China Tencent Research China PhotonIC Technologies Shanghai China
Light detection and ranging (LiDAR) technology is increasingly being deployed in vehicles for advanced driving assistance system (ADAS) and is a potential critical technology for autonomous driving in the future. Curr... 详细信息
来源: 评论