咨询与建议

限定检索结果

文献类型

  • 1,526 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,137 篇 工学
    • 965 篇 计算机科学与技术...
    • 824 篇 软件工程
    • 269 篇 信息与通信工程
    • 207 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 317 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 1,513 篇 英文
  • 16 篇 中文
  • 14 篇 其他
  • 3 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1532 条 记 录,以下是201-210 订阅
排序:
Maintaining consistency in distributed software engineering environments.
Maintaining consistency in distributed software engineering ...
收藏 引用
Proceedings - 8th international conference on Distributed Computing systems.
作者: Walpole, J. Blair, G.S. Malik, J. Nicol, J.R. Univ of Lancaster Engl
the authors argue that immutability is a suitable base on which to build distributed software engineering environments. they discuss the various approaches to maintaining consistency in immutable object systems and co... 详细信息
来源: 评论
Analysis of Traffic Sign Recognition for Automated Transportation systems Using Neural Networks  8
Analysis of Traffic Sign Recognition for Automated Transport...
收藏 引用
8th ieee international conference for Convergence in Technology, I2CT 2023
作者: Baruah, Arindam Kumar, Rakesh Gupta, Meenu Chandigarh University Computer Science Engineering Punjab India
Recently, numerous applications of Intelligent Transportation systems (ITS) have gained increasingly more focus. One of the most crucial functions of ITS is Traffic Signs Detection and Recognition (TSDR) by notifying ... 详细信息
来源: 评论
Exploring Cryptographic Techniques for Data security in Resource-Constrained Wireless Sensor Networks:Performance Evaluation and Considerations
Exploring Cryptographic Techniques for Data security in Reso...
收藏 引用
international conference on software engineering and computer systems (icsecs)
作者: Dharshika Singarathnam Swathi Ganesan Sangita Pokhrel Nalinda Somasiri Department of Computer Science York St John University London England
Wireless sensor networks (WSNs) play a crucial role in environmental monitoring and data collection. However, ensuring data security in WSNs poses challenges due to the vulnerabilities of wireless communication channe...
来源: 评论
Enhancing the Detection of DDoS Attacks in Cloud using Linear Discriminant Algorithm  8
Enhancing the Detection of DDoS Attacks in Cloud using Linea...
收藏 引用
8th international conference on Communication and Electronics systems, ICCES 2023
作者: Mahesh Muthulakshmi, R. Anithaashri, T.P. Saveetha Institute of Médical and Technical Sciences Institute of Computer Science and Engineering Saveetha School of Engineering Chennai Tamilnadu Thandalam India
the environment of Cloud Computing (CC) offer, its users a platform to exchange resources, services, and information. With an increased demand for data, the cloud faces security threats and vulnerabilities. Organizati... 详细信息
来源: 评论
ANALYST - A WORKSTATION FOR ANALYSIS AND DESIGN.
ANALYST - A WORKSTATION FOR ANALYSIS AND DESIGN.
收藏 引用
Proceedings - 8th international conference on software engineering.
作者: Stephens, Mark Whitehead, Ken Systems Designers Int plc Camberley Engl Systems Designers Int plc Camberley Engl
A description is given of the Analyst system currently being developed to support software analysis and design methods. the method support facilities are being implemented using expert-system or knowledge-based techni... 详细信息
来源: 评论
Using Project-Based Learning and Collaborative Learning in software engineering Talent Cultivation
Using Project-Based Learning and Collaborative Learning in S...
收藏 引用
Int Joint conference of 10th ieee Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th ieee Int Conf on Embedded software and systems (ICESS) / 6th Int Conf on Frontier of computer Science and Technology (FCST)
作者: Song, Hongzhi Si, Guodong Yang, Lei Liang, Huakun Zhang, Lixia South China Agr Univ Coll Informat Res Ctr Human Comp Interact Guangzhou 510642 Guangdong Peoples R China
Higher education is the most important way to cultivating software engineering talents in China, but there is an education gap between the industry and the universities. the current curriculum in university lacked in ... 详细信息
来源: 评论
Twenty years of safe train control in Sweden
Twenty years of safe train control in Sweden
收藏 引用
8th Annual ieee international conference and Workshop on the engineering of computer Based systems (ECBS)
作者: Lawson, HW Wallin, S Bryntse, B Friman, B Lawson Konsult AB Stockholm Sweden
the properties of the Automatic Train Control System that has provided a reliable and safe function in Sweden since 1980 are described. Via an engineering view of the problem domain, an architecture evolved in the mid... 详细信息
来源: 评论
Model Checking of Adaptive Programs with Mode-extended Linear Temporal Logic
Model Checking of Adaptive Programs with Mode-extended Linea...
收藏 引用
ieee Int Conf/Workshops on engineering of Autonomic and Autonomous systems/Int Conf on the engineering of computer-Based systems/Int Conf on the engineering of Complex computer systems
作者: Zhao, Yongwang Ma, Dianfu Li, Jing Li, Zhuqing Beihang Univ Sch Comp Sci & Engn State Key Lab Software Dev Environm Beijing Peoples R China Beihang Univ Sch Engn & Comp Sci Inst Adv Comp Technol Beijing 100191 Peoples R China
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environme... 详细信息
来源: 评论
An Automated Strabismus Classification Using Machine Learning Algorithm for Binocular Vision Management System
An Automated Strabismus Classification Using Machine Learnin...
收藏 引用
international conference on software engineering and computer systems (icsecs)
作者: Muhammad Amirul Isyraf Rohismadi Anis Farihan Mat Raffei Nor Saradatul Akmar Zulkifli Mohd. Hafidz Ithnin Shah Farez Othman Faculty of Computing Universiti Malaysia Pahang Al-Sultan Abdullah Pekan Pahang Malaysia Kulliyah of Medicine International Islamic University Malaysia Kuantan Pahang Malaysia
Binocular vision is a type of vision that allows an individual to perceive depth and distance using both eyes to create a single image of their environment. However, there is an illness called strabismus, where it is ...
来源: 评论
Fraud Detection using Recurrent Neural Networks for Digital Wallet Security  8
Fraud Detection using Recurrent Neural Networks for Digital ...
收藏 引用
8th international conference on computer Science and engineering, UBMK 2023
作者: Iscan, Can Akbulut, Fatma Patlar R&d Center of Formica Ai Istanbul Turkey Istanbul Kültür University Department of Software Engineering Istanbul Turkey
E-wallet use has exploded, bringing in a new era of convenient and secure digital transactions;nevertheless, it has also led to a surge in fraudulent transactions. Using Recurrent Neural Networks (RNNs), this research... 详细信息
来源: 评论