咨询与建议

限定检索结果

文献类型

  • 1,527 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,533 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,138 篇 工学
    • 966 篇 计算机科学与技术...
    • 825 篇 软件工程
    • 268 篇 信息与通信工程
    • 206 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 317 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 875 篇 英文
  • 656 篇 其他
  • 24 篇 中文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1533 条 记 录,以下是991-1000 订阅
排序:
In-Field Fault Detection Framework for Edge Accelerator Using Autoencoder
In-Field Fault Detection Framework for Edge Accelerator Usin...
收藏 引用
ieee international Test conference on India (ITC India)
作者: R S Haripriya Jaynarayan T Tudu Dept. of Electrical Engineering Indian Institute of Technology Tirupati India Dept. of Computer Science & Engineering Indian Institute of Technology Tirupati India
AI accelerators are ubiquitous across all computational domains, including safety-critical systems such as autonomous driving. However, they are also susceptible to dynamic faults due to aging-related and missed perma... 详细信息
来源: 评论
An Architecture for Microprocessor-Executable Skin Cancer Classification
An Architecture for Microprocessor-Executable Skin Cancer Cl...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Carlos Vicente Niño Rondón Diego Andrés Castellano Carvajal Byron Medina Delgado Sergio Alexander Castro Casadiego Dinael Guevara Ibarra Electricidad & Electrónica Universidad Francisco de Paula Santander Cúcuta Colombia
Skin cancer ranks as the most common malignant tumor among all types of cancer. Melanoma accounts for 1% of all cancer cases. However, it is responsible for the majority of deaths from this type of cancer. According t... 详细信息
来源: 评论
software Vulnerability Detection with GPT and In-Context Learning
Software Vulnerability Detection with GPT and In-Context Lea...
收藏 引用
ieee international conference on Data Science in Cyberspace (DSC)
作者: Zhihong Liu Qing Liao Wenchao Gu Cuiyun Gao School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory Shenzhen China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China
Code vulnerability detection is a software security analysis technique that focuses on recognizing and resolving possible code vulnerabilities and weaknesses. Its primary objective is to mitigate the chances of malici...
来源: 评论
Sustainable Intelligent Information System for Tourism Industry
Sustainable Intelligent Information System for Tourism Indus...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Anurag Kumar Himanshu Rai Goyal Sachin Sharma Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India
the technological advancements of the modern period have made the tourist sector one of the most significant and influential on a global scale. Artificial intelligence, one of the most cutting-edge technologies, is pr... 详细信息
来源: 评论
Comparative Analysis of the Performance Metrics in IMT-E Band using YAGI-UDA Antenna and Helical Antenna at Center Frequency 2.6 GHz
Comparative Analysis of the Performance Metrics in IMT-E Ban...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: G. Revanth T.J. Nagalakshmi Department of Electronics and Communication Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamilnadu India
the aim of this proposed work is the comparative analysis of the innovative antenna designed with Yagi-uda antenna and helical antenna in IMT-E band with center frequency 2.6 GHz. A total number of 28 samples are coll... 详细信息
来源: 评论
ERAS-NETS: An Efficient Resource Allocation Scheme-based Nonlinear Energy Harvesting Timeslot Switching
ERAS-NETS: An Efficient Resource Allocation Scheme-based Non...
收藏 引用
ieee international conference on engineering Technologies and Applied Sciences (ICETAS)
作者: Nivine Guler Ali Gunes Department of Informatics Engineering University of Technology Bahrain Kingdom of Bahrain Department of Computer Engineering Istanbul Aydin University Turkey
In this paper, an efficient resource allocation scheme-based nonlinear energy harvesting (EH) Timeslot switching (TS) for single-input-single-output (SISO) SWIPT systems-(ERAS-NETS) is presented. the energy saturation...
来源: 评论
Analyzing the Growth Patterns of Github Projects to Construct Best Practices for Project Managements
Analyzing the Growth Patterns of GitHub Projects to Construc...
收藏 引用
Big Data, Cloud Computing, Data Science & engineering (BCD)
作者: Kaito Kaide Haruaki Tamada Division of Frontier Informatics Graduate School of Kyoto Sangyo University Kyoto Japan Faculty of Information Science and Engineering Kyoto Sangyo University Kyoto Japan
the Git platforms, such as Github, are big data providers that store various development histories. then, many researchers analyze data from such platforms from various aspects. Recently, AI-based systems have been us...
来源: 评论
A Two-Sided Stable Matching Method in Ridesharing
A Two-Sided Stable Matching Method in Ridesharing
收藏 引用
ieee international conference on Cloud Computing and Intelligence systems (CCIS)
作者: Jingwei Lv Jiannan Hao Shuzhen Yao Huobin Tan School of Computer Science and Engineering Beihang University Beijing China School of Physics Beihang University Beijing China School of Software Beihang University Beijing China
Many researchers have studied optimization methods for ridesharing. However, the individual interests of passengers and drivers are not considered enough. So we propose a two-sided stable matching method according to ... 详细信息
来源: 评论
Severity Detection of Problematic Smartphone Usage (PSU) and its Effect on Human Lifestyle using Machine Learning
Severity Detection of Problematic Smartphone Usage (PSU) and...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Fairuz Tanzim Achal Mosammat Suraiya Ahmmed Tanjim Taharat Aurpa Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh
Although smartphone addiction has recently become a concern about that based on the usage habits of individual smartphone users, it can be challenging to anticipate the number of problem smartphone users. Smartphones ... 详细信息
来源: 评论
Application of Two Forms of the Erlang Distribution Law in Queueing theory  8
Application of Two Forms of the Erlang Distribution Law in Q...
收藏 引用
8th ieee international conference on Problems of Infocommunications, Science and Technology, PIC S and T 2021
作者: Bakhareva, Nadezhda Tarasov, Veniamin Povolzhskiy State University of Telecommunications And Informatics Department of Informatics And Computer Engineering Software And Management In Technical Systems Department Samara Russia
the purpose of this work is to compare two forms of the Erlang distribution law: ordinary and normalized. the ordinary Erlang distribution is a special case of a more general gamma distribution and its mathematical ex... 详细信息
来源: 评论