咨询与建议

限定检索结果

文献类型

  • 3,214 篇 会议
  • 19 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 3,243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,942 篇 工学
    • 1,740 篇 计算机科学与技术...
    • 1,594 篇 软件工程
    • 423 篇 信息与通信工程
    • 329 篇 控制科学与工程
    • 318 篇 生物工程
    • 185 篇 生物医学工程(可授...
    • 176 篇 电气工程
    • 145 篇 机械工程
    • 116 篇 电子科学与技术(可...
    • 101 篇 光学工程
    • 99 篇 安全科学与工程
    • 93 篇 化学工程与技术
    • 92 篇 动力工程及工程热...
    • 79 篇 网络空间安全
  • 893 篇 理学
    • 499 篇 数学
    • 336 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 158 篇 物理学
    • 154 篇 系统科学
    • 84 篇 化学
  • 505 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 160 篇 工商管理
  • 185 篇 医学
    • 158 篇 临床医学
    • 156 篇 基础医学(可授医学...
    • 110 篇 药学(可授医学、理...
    • 83 篇 公共卫生与预防医...
  • 134 篇 法学
    • 91 篇 社会学
  • 82 篇 经济学
    • 82 篇 应用经济学
  • 78 篇 农学
    • 75 篇 作物学
  • 66 篇 教育学
  • 4 篇 文学
  • 1 篇 军事学

主题

  • 499 篇 machine learning
  • 104 篇 deep learning
  • 86 篇 software
  • 62 篇 machine learning...
  • 59 篇 support vector m...
  • 52 篇 internet of thin...
  • 52 篇 artificial intel...
  • 49 篇 decision trees
  • 47 篇 forecasting
  • 44 篇 software enginee...
  • 40 篇 training
  • 39 篇 predictive model...
  • 36 篇 feature extracti...
  • 35 篇 neural networks
  • 33 篇 software testing
  • 31 篇 software algorit...
  • 26 篇 reinforcement le...
  • 26 篇 adversarial mach...
  • 25 篇 covid-19
  • 25 篇 object detection

机构

  • 31 篇 college of compu...
  • 31 篇 chitkara univers...
  • 12 篇 karnataka bangal...
  • 12 篇 school of inform...
  • 11 篇 software enginee...
  • 11 篇 department of so...
  • 10 篇 department of so...
  • 10 篇 school of comput...
  • 9 篇 maharishi school...
  • 8 篇 maharishi school...
  • 7 篇 maharishi school...
  • 7 篇 school of comput...
  • 7 篇 daffodil interna...
  • 7 篇 department of co...
  • 7 篇 school of inform...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 software enginee...
  • 6 篇 department of co...
  • 6 篇 department of so...

作者

  • 8 篇 patidar sanjay
  • 7 篇 liu han
  • 7 篇 han liu
  • 6 篇 alfurhood badria...
  • 6 篇 ishu sharma
  • 6 篇 sharma ishu
  • 6 篇 badria sulaiman ...
  • 5 篇 bitto abu kowshi...
  • 5 篇 dharshana kasthu...
  • 5 篇 ali raja hashim
  • 5 篇 yibeltal assefa
  • 5 篇 assefa yibeltal
  • 5 篇 ajmeera kiran
  • 5 篇 raja hashim ali
  • 5 篇 sethia divyashik...
  • 4 篇 heyn hans-martin
  • 4 篇 krishna aneesh
  • 4 篇 william p.
  • 4 篇 iqbal muhammad w...
  • 4 篇 liu xin

语言

  • 1,802 篇 英文
  • 1,440 篇 其他
  • 69 篇 中文
  • 1 篇 德文
检索条件"任意字段=2023 International Conference on Software Engineering and Machine Learning, CONF-SEML 2023"
3243 条 记 录,以下是701-710 订阅
排序:
MLOps: Automatic, Zero-Touch and Reusable machine learning Training and Serving Pipelines
MLOps: Automatic, Zero-Touch and Reusable Machine Learning T...
收藏 引用
2023 IEEE international conference on Internet of Things and Intelligence Systems, IoTaIS 2023
作者: Panchal, Deven Baran, Isilay Musgrove, Dan Lu, David AT&T Middletown NJ United States AT&T Dallas TX United States
Due to increased interest in machine learning, Deep learning and AI and easy availability of ML toolk-its/libraries/ frameworks as well as talent that has ML skillsets and know-how to use these ML tools, machine learn... 详细信息
来源: 评论
Design and Implementation of Real Time Object Detection using CNN
Design and Implementation of Real Time Object Detection usin...
收藏 引用
2023 international conference on System, Computation, Automation and Networking, ICSCAN 2023
作者: Palanivel, N. Madhan, K. Venkatvamsi, A. Madhavan, G. Sindhuja, B. Priya G, Lakshmi Manakula Vinayagar Institute of Technology Department of CSE Puducherry India Mailam Engineering College Mailam Department of CSE Tamil Nadu India Manakula Vinayagar Institute of Technology Department of CSE Puducherry India
The study of computer systems and software that can recognize and understand scenes and images is known as computer vision. Image recognition, object detection, image synthesis, image super resolution and many other c... 详细信息
来源: 评论
Using machine learning Techniques for Assessing Media Text Readability  24
Using Machine Learning Techniques for Assessing Media Text R...
收藏 引用
24th IEEE international conference of Young Professionals in Electron Devices and Materials, EDM 2023
作者: Laputenko, Andrey Evtushenko, Tatiana Klochkova, Elena Yevtushenko, Nina National Research Tomsk State University Department of Information Technologies Tomsk Russia Graduate School of Applied Linguistics and Translation Studies Peter the Great St. Petersburg Polytechnic University Saint Petersburg Russia Ivannikov Institute for System Programming of the Russian Academy of Sciences Department of Software Engineering Moscow Russia
The paper addresses the problem of assessing media text readability depending on the correlation of objective and subjective text complexity. Objective text complexity refers to a set of measurable characteristics suc... 详细信息
来源: 评论
Vulnerability Name Prediction Based on Enhanced Multi-Source Domain Adaptation  22
Vulnerability Name Prediction Based on Enhanced Multi-Source...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in Computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Xing, Ying Zhao, Mengci Yang, Bin Zhang, Yuwei Li, Wenjin Gu, Jiawei Yuan, Jun Xu, Lexi Beijing Univ Posts & Telecommun Sch Artificial Intelligence Beijing 100876 Peoples R China Nanjing Univ Aeronaut & Astronaut Minist Ind & Informat Technol Key Lab Safety Crit Software Dev & Verificat Nanjing 211106 Peoples R China Yunnan Key Lab Software Engn Kunming 650091 Yunnan Peoples R China China Unicom Res Inst Beijing 100048 Peoples R China Peking Univ Sch Comp Sci Beijing 100871 Peoples R China NSFOCUS Technol Grp Co Ltd Beijing 100089 Peoples R China
software products have brought convenience to modern society but also pose significant security risks due to various types of vulnerabilities. Identifying vulnerability names is vital for program repair and software m... 详细信息
来源: 评论
A review: Wireless sensor network location  3
A review: Wireless sensor network location
收藏 引用
3rd international conference on Signal Processing and machine learning, conf-SPML 2023
作者: Xiao, Qing School of Materials Science and Engineering Northeastern University Liaoning province Shenyang110819 China
Node localisation is one of the important technologies in wireless sensor networks, and localisation algorithms are the core elements of localisation technology. This paper first lists the evaluation criteria of local... 详细信息
来源: 评论
Performance Improvement in Time Series Prediction through PECNET Framework  22
Performance Improvement in Time Series Prediction through PE...
收藏 引用
22nd IEEE international conference on machine learning and Applications, ICMLA 2023
作者: MacIt, Serkan Ustundag, Burak Berk İstanbul Technical University Department of Computer Engineering İstanbul Turkey
machine learning algorithms have garnered con-siderable attention and recognition in the context of addressing time series prediction challenges. However, constructing a ma-chine learning model with optimal architectu... 详细信息
来源: 评论
Exploring machine learning Models to Predict the Diamond Price: A Data Mining Utility Using Weka  9
Exploring Machine Learning Models to Predict the Diamond Pri...
收藏 引用
9th international conference on Advanced Computing and Communication Systems, ICACCS 2023
作者: Amzad Basha, Md Shaik Martha Sucharitha, M. Devi, A. Uma Ashok, M. Oveis, Peerzadah Mohammad GITAM School of Business Bengaluru India Deemed to be University Department of Professional Studies Christ Bengaluru India SRM Valliammai Engineering College Department of Management Studies Chengalpattu India Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai India
In contrast to gold and platinum, whose values may be fairly determined, determining a diamond's worth involves a far more complex set of considerations. The appropriate rate is based on many factors, not just one... 详细信息
来源: 评论
Requirements Elicitation in the Age of AI: A Tool's Multi-system Journey  1
收藏 引用
18th international conference on Evaluation of Novel Approaches to software engineering (ENASE)
作者: Ahmad, Khlood Arora, Chetan Abdelrazek, Mohamed Grundy, John Vasa, Rajesh Deakin Univ Geelong Vic Australia Monash Univ Clayton Vic Australia
Traditional Requirements engineering (RE) practices have introduced new tools to elicit and model requirements. Applying these tools to building AI software solutions has raised new issues and challenges. Also, most A... 详细信息
来源: 评论
An Assessment of machine learning Algorithms and Models for Prediction of Change-Prone Java Methods  23
An Assessment of Machine Learning Algorithms and Models for ...
收藏 引用
37th Brazilian Symposium on software engineering, SBES 2023, held in conjunction with the Brazilian conference on software: Theory and Practice, CBSoft 2023
作者: Farah, Paulo Roberto Silva, Rogério Vergilio, Silvia Santa Catarina State University SC Ibirama Brazil PR Curitiba Brazil
Identifying which parts of code are prone to change during software evolution allows developers to prioritize and allocate resources efficiently. Having as focus a smaller scope makes easier change management and allo... 详细信息
来源: 评论
The GitHub Recent Bugs Dataset for Evaluating LLM-based Debugging Applications  17
The GitHub Recent Bugs Dataset for Evaluating LLM-based Debu...
收藏 引用
17th IEEE international conference on software Testing, Verification, and Validation (ICST)
作者: Lee, Jae Yong Kang, Sungmin Yoon, Juyeon Yoo, Shin Korea Adv Inst Sci & Technol Daejeon South Korea
While Large Language Models (LLMs) have demonstrated strong natural language and code processing capabilities, concern has been raised as to whether existing bug benchmarks are included in their training data. We exam... 详细信息
来源: 评论