咨询与建议

限定检索结果

文献类型

  • 1,526 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,137 篇 工学
    • 964 篇 计算机科学与技术...
    • 824 篇 软件工程
    • 268 篇 信息与通信工程
    • 206 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 316 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 137 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 1,513 篇 英文
  • 16 篇 中文
  • 14 篇 其他
  • 3 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1532 条 记 录,以下是241-250 订阅
排序:
Model Checking of Adaptive Programs with Mode-extended Linear Temporal Logic
Model Checking of Adaptive Programs with Mode-extended Linea...
收藏 引用
ieee Int Conf/Workshops on engineering of Autonomic and Autonomous systems/Int Conf on the engineering of computer-Based systems/Int Conf on the engineering of Complex computer systems
作者: Zhao, Yongwang Ma, Dianfu Li, Jing Li, Zhuqing Beihang Univ Sch Comp Sci & Engn State Key Lab Software Dev Environm Beijing Peoples R China Beihang Univ Sch Engn & Comp Sci Inst Adv Comp Technol Beijing 100191 Peoples R China
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environme... 详细信息
来源: 评论
A Comparative Analysis on three Duplication Elements in Copy-Move Forgery using PatchMatch-Based Detection Method
A Comparative Analysis on Three Duplication Elements in Copy...
收藏 引用
international conference on software engineering and computer systems (icsecs)
作者: Nur Izzati Nor Azaimi Nor Bakiah Abd Warif Nor-Syahidatul N Ismail Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Johor Malaysia Faculty of Computer Science and Information Technology Centre for Information Security Research Universiti Tun Hussein Onn Malaysia Johor Malaysia Department of Computer System and Networking Faculty of Computing Universiti Malaysia Pahang Al-Sultan Abdullah Pekan Pahang Malaysia
Image forgery is the alteration of a digital image to hide some of the important and useful information. Copy-move forgery (CMF) is one of the most difficult to detect because the copied part of the image has the same...
来源: 评论
the research on the construction method of evaluation indicator system based on software product line
The research on the construction method of evaluation indica...
收藏 引用
2011 8th international conference on Fuzzy systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th international conference on Natural Computation, ICNC'11
作者: Liu, Yu-Yan Zhao, Qing Liu, Yu-Lin Department of Computer Science Technology of Kunming University Yunnan China Trade and Administration College Chongqing University Chongqing China
the software product line development goal is whole domain rather than a single software system, with the results that effectively improved the software system development productivity and quality, shortened developme... 详细信息
来源: 评论
Fraud Detection using Recurrent Neural Networks for Digital Wallet Security  8
Fraud Detection using Recurrent Neural Networks for Digital ...
收藏 引用
8th international conference on computer Science and engineering, UBMK 2023
作者: Iscan, Can Akbulut, Fatma Patlar R&d Center of Formica Ai Istanbul Turkey Istanbul Kültür University Department of Software Engineering Istanbul Turkey
E-wallet use has exploded, bringing in a new era of convenient and secure digital transactions;nevertheless, it has also led to a surge in fraudulent transactions. Using Recurrent Neural Networks (RNNs), this research... 详细信息
来源: 评论
Universal methodology for embedded system testing
Universal methodology for embedded system testing
收藏 引用
8th international conference on computer Science and Education, ICCSE 2013
作者: Karmore, Swapnili P. Mahajan, Anjali R. Department of Computer Science and Engineering G. H. Raisoni College of Engineering Nagpur Maharashtra India Department of Computer Science and Engineering P.I.ET. Nagpur Maharashtra India
this paper describes testing framework that is capable of testing heterogeneous embedded systems. there are three key contributions. the first is the introduction of a new approach of embedded system testing. the seco... 详细信息
来源: 评论
An evaluation of software requirements tools  8
An evaluation of software requirements tools
收藏 引用
8th international conference on Intelligent Computing and Information systems, ICICIS 2017
作者: Shah, Atif Alasow, Mohamed Ali Sajjad, Faisal Baig, Jawad Javed Akbar Information and Computer Science Department King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia
software requirements gathering from users, customers, and stakeholders is the very first and critical step in software development. Requirements are volatile due to change in needs, processes and technology. this mak... 详细信息
来源: 评论
Feature Based Comparative Analysis of Traditional Intrusion Detection System and software-Defined Networking Based Intrusion Detection System  8
Feature Based Comparative Analysis of Traditional Intrusion ...
收藏 引用
8th ieee international conference on engineering Technologies and Applied Sciences, ICETAS 2023
作者: Mahar, Iftekhar Ahmed Libing, Wu Rahu, Ghulam Ali Maher, Zulfikar Ahmed Koondhar, Muhammad Yaqoob School of Computer Science Wuhan University China Wuhan China Information Technology Centre Sindh Agriculture University Tandojam Tandojam Pakistan
Intrusion Detection systems (IDS) play a crucial role in a comprehensive security framework for an organization by detection and response to security incidents, encompassing both network-based and host-based threats. ... 详细信息
来源: 评论
Product Recommendation using Deep Learning in computer Vision
Product Recommendation using Deep Learning in Computer Visio...
收藏 引用
international conference on software engineering and computer systems (icsecs)
作者: Sharvinteraan C. Mogan Zuriani Mustaffa Mohd Herwan Sulaiman Ferda Ernawan Faculty of Computing Universiti Malaysia Pahang Al-Sultan Abdullah Pekan Pahang Malaysia Faculty of Electrical and Electronics Engineering technology Universiti Malaysia Pahang Al-Sultan Abdullah Pekan Pahang Malaysia
Recently, recommendation models have gained popularity due to their effectiveness in improving customer satisfaction and deriving sales. However, current product recommendation models have a drawback: they lack person...
来源: 评论
PMSM Sliding Mode Control Based on a New Approach Law  8
PMSM Sliding Mode Control Based on a New Approach Law
收藏 引用
8th international conference on Intelligent Informatics and Biomedical Sciences, ICIIBMS 2023
作者: Wang, Bulai Li, Zixin Shanghai Institute of Technology School of Electrical and Electronic Engineering Shanghai China
A new type of exponential reaching law is proposed to address the problems of large overshoot and weak anti-interference ability of traditional exponential reaching law sliding mode control in permanent magnet synchro... 详细信息
来源: 评论
Sentirec - A Sentiment Analysis with Recommendation System  8
Sentirec - A Sentiment Analysis with Recommendation System
收藏 引用
8th international conference on Communication and Electronics systems, ICCES 2023
作者: Oswalt Manoj, S. Catherine Chandralekha, T. Dharshini, R.M. Hemadharsini, P. Sri Krishna College of Engineering and Technology Department of Computer Science and Business System Coimbatore India Sri Krishna College of Engineering and Technology Department of Computer Science and Engineering Coimbatore India
the standard language is assessed, and the feelings transmitted by the individual are brought up. the purpose of sentiment analysis is to determine the polarity of a person's textual opinion. Most of the people us... 详细信息
来源: 评论