咨询与建议

限定检索结果

文献类型

  • 3,204 篇 会议
  • 19 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 3,233 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,933 篇 工学
    • 1,731 篇 计算机科学与技术...
    • 1,587 篇 软件工程
    • 421 篇 信息与通信工程
    • 321 篇 控制科学与工程
    • 318 篇 生物工程
    • 185 篇 生物医学工程(可授...
    • 172 篇 电气工程
    • 144 篇 机械工程
    • 115 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 94 篇 安全科学与工程
    • 92 篇 化学工程与技术
    • 91 篇 动力工程及工程热...
    • 79 篇 网络空间安全
  • 891 篇 理学
    • 497 篇 数学
    • 336 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 158 篇 物理学
    • 154 篇 系统科学
    • 84 篇 化学
  • 500 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 185 篇 医学
    • 158 篇 临床医学
    • 156 篇 基础医学(可授医学...
    • 110 篇 药学(可授医学、理...
    • 83 篇 公共卫生与预防医...
  • 133 篇 法学
    • 90 篇 社会学
  • 82 篇 经济学
    • 82 篇 应用经济学
  • 78 篇 农学
    • 75 篇 作物学
  • 66 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学

主题

  • 493 篇 machine learning
  • 103 篇 deep learning
  • 86 篇 software
  • 62 篇 machine learning...
  • 59 篇 support vector m...
  • 52 篇 internet of thin...
  • 49 篇 decision trees
  • 48 篇 artificial intel...
  • 47 篇 forecasting
  • 44 篇 software enginee...
  • 40 篇 training
  • 39 篇 predictive model...
  • 36 篇 feature extracti...
  • 35 篇 neural networks
  • 33 篇 software testing
  • 31 篇 software algorit...
  • 26 篇 reinforcement le...
  • 26 篇 adversarial mach...
  • 25 篇 covid-19
  • 25 篇 object detection

机构

  • 31 篇 college of compu...
  • 31 篇 chitkara univers...
  • 12 篇 karnataka bangal...
  • 12 篇 school of inform...
  • 11 篇 software enginee...
  • 11 篇 department of so...
  • 10 篇 department of so...
  • 10 篇 school of comput...
  • 9 篇 maharishi school...
  • 8 篇 maharishi school...
  • 7 篇 maharishi school...
  • 7 篇 school of comput...
  • 7 篇 daffodil interna...
  • 7 篇 department of co...
  • 7 篇 school of inform...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 software enginee...
  • 6 篇 department of co...
  • 6 篇 department of so...

作者

  • 8 篇 patidar sanjay
  • 7 篇 liu han
  • 7 篇 han liu
  • 6 篇 alfurhood badria...
  • 6 篇 ishu sharma
  • 6 篇 sharma ishu
  • 6 篇 badria sulaiman ...
  • 5 篇 bitto abu kowshi...
  • 5 篇 dharshana kasthu...
  • 5 篇 ali raja hashim
  • 5 篇 yibeltal assefa
  • 5 篇 assefa yibeltal
  • 5 篇 ajmeera kiran
  • 5 篇 raja hashim ali
  • 5 篇 sethia divyashik...
  • 4 篇 heyn hans-martin
  • 4 篇 krishna aneesh
  • 4 篇 william p.
  • 4 篇 iqbal muhammad w...
  • 4 篇 zain ul abideen

语言

  • 1,910 篇 英文
  • 1,322 篇 其他
  • 53 篇 中文
  • 1 篇 德文
检索条件"任意字段=2023 International Conference on Software Engineering and Machine Learning, CONF-SEML 2023"
3233 条 记 录,以下是341-350 订阅
排序:
Proceedings - 2023 international conference on Power, Electrical engineering, Electronics and Control, PEEEC 2023
Proceedings - 2023 International Conference on Power, Electr...
收藏 引用
2023 international conference on Power, Electrical engineering, Electronics and Control, PEEEC 2023
The proceedings contain 190 papers. The topics discussed include: construction of network security situation assessment model based on improved ant colony algorithm;optimization of software engineering supervision bas...
来源: 评论
An analysis on Keylogger Attack and Detection based on machine learning
An analysis on Keylogger Attack and Detection based on Machi...
收藏 引用
2023 international conference on Artificial Intelligence and Knowledge Discovery in Concurrent engineering, ICEconf 2023
作者: Balakrishnan, Yeshaswini Renjith, P.N. School of Computer Science and Engineering Vellore Institute of Technology Chennai India
A keylogger attack is a type of cyberattack that involves the use of a software program to record keystrokes on a target device. Attacks of this kind can be used to steal sensitive data, including credit card numbers ... 详细信息
来源: 评论
machine learning Techniques for Water Quality Classification of Thailand's Rivers  20
Machine Learning Techniques for Water Quality Classification...
收藏 引用
20th international Joint conference on Computer Science and software engineering, JCSSE 2023
作者: Sirikarin, Keereeluk Khonthapagdee, Subhorn Srinakharinwirot University Faculty of Science Department of Computer Science Bangkok Thailand
Water is necessary for human consumption. To ensure that water is safe, a monitoring system for water quality is required. One part of the system is to be able to predict the water quality class. Using data collected ... 详细信息
来源: 评论
GPTCloneBench: A comprehensive benchmark of semantic clones and cross-language clones using GPT-3 model and SemanticCloneBench  39
GPTCloneBench: A comprehensive benchmark of semantic clones ...
收藏 引用
39th IEEE international conference on software Maintenance and Evolution (ICSME)
作者: Alam, Ajmain I. Roy, Palash R. Al-Omari, Farouq Roy, Chanchal K. Roy, Banani Schneider, Kevin A. Univ Saskatchewan Dept Comp Sci Saskatoon SK Canada
With the emergence of machine learning, there has been a surge in leveraging its capabilities for problem-solving across various domains. In the code clone realm, the identification of type-4 or semantic clones has em... 详细信息
来源: 评论
3rd international conference on Electrical, Computer and Communication engineering, ECCE 2023
3rd International Conference on Electrical, Computer and Com...
收藏 引用
3rd international conference on Electrical, Computer and Communication engineering, ECCE 2023
The proceedings contain 137 papers. The topics discussed include: sexual harassment detection using machine learning and deep learning techniques for Bangla text;optimization strategies for micro-grid energy managemen...
来源: 评论
PURLTL: Mining LTL Specification from Imperfect Traces in Testing  38
PURLTL: Mining LTL Specification from Imperfect Traces in Te...
收藏 引用
38th IEEE/ACM international conference on Automated software engineering (ASE)
作者: Peng, Bo Liang, Pingjia Han, Tingchen Luo, Weilin Du, Jianfeng Wan, Hai Ye, Rongzhen Zheng, Yuhang Sun Yat Sen Univ Guangzhou Peoples R China Guangdong Univ Foreign Studies Pazhou Lab Guangzhou Peoples R China
Formal specifications are widely used in software testing approaches, while writing such specifications is a time-consuming job. Recently, a number of methods have been proposed to mine specifications from execution t... 详细信息
来源: 评论
A Systematic Mapping Study of machine learning Techniques Applied to software Traceability
A Systematic Mapping Study of Machine Learning Techniques Ap...
收藏 引用
2023 IEEE international conference on Systems, Man, and Cybernetics, SMC 2023
作者: Wang, Bangchao Li, Xingfu Wan, Hongyan Deng, Yang School of Computer Science and Artificial Intelligence Engineering Research Center of Hubei Province for Clothing Information Wuhan Textile University Wuhan China
Context: software traceability (ST) refers to capturing associations in various artifacts. A growing interest has been in applying machine learning (ML) techniques to ST. Objective: The purpose of this work is to pres... 详细信息
来源: 评论
learning-Based Traffic Classification for software-Defined Networks  8th
Learning-Based Traffic Classification for Software-Defined N...
收藏 引用
8th international conference on Microelectronics Electromagnetics and Telecommunications, ICMEET 2023
作者: Panni, Priyanka Budihal, Suneeta V. KLE Technological University Hubli India
Recent advancements in linked devices and industrial automation have created a large demand for network resources. The amount of traffic created by these technologies is so great that traditional networks are becoming... 详细信息
来源: 评论
Predicting the Risks of Brain Stroke Using machine learning Models and Artificial Neural Network
Predicting the Risks of Brain Stroke Using Machine Learning ...
收藏 引用
2023 Annual international conference on Emerging Research Areas: international conference on Intelligent Systems, AICERA/ICIS 2023
作者: Nahid, Nafiz Hossain, Mehrab Rifat, Ariful Islam Khan Raisa, Meher Durdana Islam, Ashraful Sylhet Engineering College Department of Computer Science and Engineering Sylhet Bangladesh American International University Department of Computer Science and Engineering Dhaka Bangladesh Daffodil International University Department of Software Engineering Dhaka Bangladesh University of Regina Department of Computer Science Regina Canada
The primary cause of death and disability worldwide is stroke. Accurate prediction models and identification of stroke risk factors can aid in early intervention and preventive measures. In this study, an approach bas... 详细信息
来源: 评论
Cross comparison of COVID-19 fake news detection machine learning models  17
Cross comparison of COVID-19 fake news detection machine lea...
收藏 引用
17th international conference on Open Source Systems and Technologies, ICOSST 2023
作者: Qadees, Muhammad Hannan, Abdul Islamabad Department of Computer & Software Engineering Pakistan
The quick advancement of technology in internet communication and social media platforms eased several problems during the COVID-19 outbreak. It was, however, used to spread untruths and misinformation regarding the i... 详细信息
来源: 评论