咨询与建议

限定检索结果

文献类型

  • 1,526 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,137 篇 工学
    • 965 篇 计算机科学与技术...
    • 824 篇 软件工程
    • 269 篇 信息与通信工程
    • 207 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 317 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 1,513 篇 英文
  • 16 篇 中文
  • 14 篇 其他
  • 3 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1532 条 记 录,以下是311-320 订阅
排序:
Facial Expression Classification using Convolutional Neural Network  8
Facial Expression Classification using Convolutional Neural ...
收藏 引用
8th international conference on Communication and Electronics systems, ICCES 2023
作者: Shourie, Poonam Anand, Vatsala Gupta, Sheifali Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Classifying facial expressions is a crucial computer vision task having applications in security systems, emotion identification, and human-computer interaction. Convolutional Neural Networks (CNNs) have displayed out... 详细信息
来源: 评论
Defining a basic framework for the deployment/adaptation of pervasive applications
Defining a basic framework for the deployment/adaptation of ...
收藏 引用
2011 8th ieee international conference on e-Business engineering, ICEBE 2011
作者: Belkhatir, Nureddine Benamar, Abdelkrim Adele S/W Engineering Team LIG Laboratory University of Grenoble France Department of Computer Sciences University of Abou Bekr Belkaid Tlemcen Algeria
the paper presents the result of several work which we completed previously [8] [9] [10] [11]. It is a framework dedicated to emerging pervasive environments whose one of the objectives among others is to deal with th... 详细信息
来源: 评论
A Low-Power RF Programmable Frequency Divider  8
A Low-Power RF Programmable Frequency Divider
收藏 引用
8th international conference on computer and Communication systems, ICCCS 2023
作者: Zheng, Yu Chen, Xiangning School of Electronic Science and Engineering Nanjing University Nanjing China
Since the popularization of 5G communications in 2019, the requirements of wireless communication related to data transmission have become higher and higher. As a universal module in the chip circuit, the phase-locked... 详细信息
来源: 评论
Explainability and Interpretability in Decision Trees and Agent Based Modelling When Approximating Financial Time Series. A Matter of Balance with Performance  8
Explainability and Interpretability in Decision Trees and Ag...
收藏 引用
8th international conference on Computational Intelligence and Applications, ICCIA 2023
作者: Layfield, Colin Neri, Filippo University of Malta Department of Computer Information Systems Msida Malta University of Naples Department of Electrical and Computer Engineering Naples Italy
the paper discusses the notions of explainability and interpretability when using decision tree learning and agent based modeling to approximate financial time series. And how they related to the selected learning alg... 详细信息
来源: 评论
Network Intrusion Detection Using CNN-based Classification Method  8
Network Intrusion Detection Using CNN-based Classification M...
收藏 引用
8th ieee/ACIS international conference on Big Data, Cloud Computing, and Data Science, BCD 2023
作者: Peng, Tzu-En Liu, I-Hsien Li, Jung-Shian Liu, Chuan-Kang National Cheng Kung University Institute of Computer and Communication Engineering Department of Electrical Engineering Tainan Taiwan National Chin-Yi University of Technology Department of Artificial Intelligence and Computer Engineering Taichung Taiwan
With the rapid advancement of Artificial Intelligence (AI) in recent years, there has been a growing body of AI-related research in the field of Network Intrusion Detection systems (NIDSs). In this paper, a network in... 详细信息
来源: 评论
Implementation of Computationally Efficient And Accurate Music Auto Tagging  8
Implementation of Computationally Efficient And Accurate Mus...
收藏 引用
8th international conference on Advanced Computing and Communication systems, ICACCS 2022
作者: Rajendran, Sindu Anandaraj, S.P. Presidency University Department of Computer Science & Engineering Karnataka Bengaluru India
In recent past, Convolutional Neural Network becomes a prominent methodology used in Music Information Retrieval (MIR) projects, such as audio classification, mood recognition, auto tagging of music then on. Music aut... 详细信息
来源: 评论
Improvements on Teaching Methods and Contents for the "computer Organization and Architecture" Curriculum
Improvements on Teaching Methods and Contents for the "Compu...
收藏 引用
international conference on Scalable Computing and Communications/8th international conference on Embedded Computing
作者: Yuan, Chunfeng Huang, Yihua Zhang, Zhesheng Chen, Guihai Dou, Wanchun Nanjing Univ Dept Comp Sci & Technol State Key Lab Novel Software Technol Nanjing 210093 Jiangsu Peoples R China
"computer Organization and Architecture" is one of the most important fundamental courses for those majoring in computer science and engineering. the contents of the curriculum are crucial for entire compute... 详细信息
来源: 评论
A Universal Concurrent Framework for Fault Diagnosis in Processor Based systems  8
A Universal Concurrent Framework for Fault Diagnosis in Proc...
收藏 引用
8th international conference on Control and Automation, CA 2015
作者: Kodavade, D.V. Computer Sc. and Engineering Department D.K.T.E.Society's Textile and Engineering Institute Ichalkaranji416 115 India
After acceptance of artificial intelligence paradigm, a number of successful artificial intelligence systems werecreated. the most successful area of artificial intelligence is knowledge based systems (KBS). In indust... 详细信息
来源: 评论
Segment Routing Traffic engineering by Pruned Landmark Labeling  8
Segment Routing Traffic Engineering by Pruned Landmark Label...
收藏 引用
8th ieee/ACIS international conference on Big Data, Cloud Computing, and Data Science, BCD 2023
作者: Jiang, Shan Sakamoto, Naoshi Graduate School of Engineering Tokyo Denki University Master of Information and Communication Engineering Tokyo Japan School of Engineering Tokyo Denki University Department of Information and Communication Engineering Tokyo Japan
As network usage is increasing recently, providers are faced with the dual challenge of enhancing network performance while also optimizing link utilization. In a provider's network with a redundant structure, the... 详细信息
来源: 评论
Security system construction of land and resources network based on intrusion detection  8
Security system construction of land and resources network b...
收藏 引用
8th international conference on BioMedical engineering and Informatics, BMEI 2015
作者: Shen, Chao Chen, Zhongyang Xue, Yu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology NUIST Nanjing China School of Computer and Software Nanjing University of Information Science and Technology NUIST Nanjing China
Intrusion detection can decide whether there are dangerous user behaviors. It can also timely detect network security vulnerabilities of inner attacks, and it can make quick response and improve network security. ther... 详细信息
来源: 评论