咨询与建议

限定检索结果

文献类型

  • 88,698 篇 会议
  • 234 篇 期刊文献
  • 119 册 图书

馆藏范围

  • 89,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,556 篇 工学
    • 38,421 篇 计算机科学与技术...
    • 31,321 篇 软件工程
    • 13,050 篇 信息与通信工程
    • 10,747 篇 控制科学与工程
    • 8,463 篇 电气工程
    • 5,600 篇 电子科学与技术(可...
    • 5,037 篇 生物工程
    • 4,273 篇 机械工程
    • 4,063 篇 生物医学工程(可授...
    • 3,094 篇 动力工程及工程热...
    • 3,059 篇 仪器科学与技术
    • 2,784 篇 光学工程
    • 2,665 篇 安全科学与工程
    • 2,480 篇 交通运输工程
    • 1,679 篇 化学工程与技术
    • 1,628 篇 网络空间安全
  • 21,721 篇 理学
    • 11,656 篇 数学
    • 5,335 篇 生物学
    • 5,010 篇 物理学
    • 3,655 篇 统计学(可授理学、...
    • 3,646 篇 系统科学
    • 1,882 篇 化学
  • 13,910 篇 管理学
    • 9,386 篇 管理科学与工程(可...
    • 5,791 篇 图书情报与档案管...
    • 4,610 篇 工商管理
  • 3,451 篇 医学
    • 2,782 篇 临床医学
    • 2,655 篇 基础医学(可授医学...
    • 1,566 篇 药学(可授医学、理...
  • 2,119 篇 法学
    • 1,686 篇 社会学
  • 1,692 篇 经济学
    • 1,684 篇 应用经济学
  • 1,088 篇 农学
  • 1,069 篇 教育学
  • 338 篇 文学
  • 207 篇 军事学
  • 132 篇 艺术学
  • 1 篇 哲学

主题

  • 3,165 篇 computer archite...
  • 2,771 篇 computer science
  • 2,493 篇 computational mo...
  • 2,299 篇 feature extracti...
  • 2,252 篇 control systems
  • 1,969 篇 real-time system...
  • 1,663 篇 training
  • 1,618 篇 application soft...
  • 1,604 篇 accuracy
  • 1,537 篇 conferences
  • 1,491 篇 hardware
  • 1,250 篇 neural networks
  • 1,227 篇 data mining
  • 1,186 篇 costs
  • 1,158 篇 robot sensing sy...
  • 1,135 篇 monitoring
  • 1,129 篇 testing
  • 1,101 篇 protocols
  • 1,099 篇 computer vision
  • 1,099 篇 robustness

机构

  • 148 篇 school of comput...
  • 140 篇 school of comput...
  • 120 篇 department of el...
  • 118 篇 school of comput...
  • 82 篇 school of comput...
  • 67 篇 institute of inf...
  • 64 篇 college of compu...
  • 61 篇 school of automa...
  • 60 篇 chitkara univers...
  • 55 篇 department of sy...
  • 54 篇 department of co...
  • 52 篇 department of el...
  • 52 篇 school of electr...
  • 49 篇 ieee
  • 48 篇 department of el...
  • 46 篇 college of compu...
  • 46 篇 department of el...
  • 46 篇 department of el...
  • 45 篇 department of el...
  • 44 篇 school of comput...

作者

  • 35 篇 lei wang
  • 34 篇 zhang tao
  • 34 篇 wang jing
  • 33 篇 zhang lei
  • 31 篇 li yang
  • 28 篇 jun wang
  • 26 篇 wang lei
  • 25 篇 yu wang
  • 24 篇 li xin
  • 24 篇 ning xi
  • 23 篇 rui wang
  • 22 篇 sudeep tanwar
  • 21 篇 weiming shen
  • 21 篇 li peng
  • 20 篇 dhabaleswar k. p...
  • 20 篇 chengkuo lee
  • 19 篇 hisao ishibuchi
  • 19 篇 xiao liu
  • 19 篇 hui wang
  • 19 篇 yang bo

语言

  • 86,502 篇 英文
  • 2,111 篇 其他
  • 461 篇 中文
  • 14 篇 土耳其文
  • 6 篇 西班牙文
  • 5 篇 俄文
  • 2 篇 法文
  • 1 篇 葡萄牙文
检索条件"任意字段=IEEE International Conference and Workshops on Engineering of Computer Based Systems"
89051 条 记 录,以下是141-150 订阅
排序:
Automatic Defect Detection in Wind Turbine Blade Images: Model Benchmarks and Re-Annotations
Automatic Defect Detection in Wind Turbine Blade Images: Mod...
收藏 引用
2023 ieee international conference on Multimedia and Expo workshops, ICMEW 2023
作者: Gohar, Imad See, John Halimi, Abderrahim Yew, Weng Kean School of Engineering and Physical Sciences Heriot-Watt University Putrajaya Malaysia School of Mathematical and Computer Sciences Heriot-Watt University Putrajaya Malaysia School of Engineering and Physical Sciences Heriot-Watt University Edinburgh United Kingdom
Automatic detection of defects from wind turbine blade images has shown tremendous progress in recent years. However, there are not many annotated datasets feasible for benchmarking purposes, and a lack of consistency... 详细信息
来源: 评论
On the Modeling of Tendon-Driven systems: a Literature Review  20
On the Modeling of Tendon-Driven Systems: a Literature Revie...
收藏 引用
20th ieee/ASME international conference on Mechatronic and Embedded systems and Applications (MESA)
作者: Baggetta, Mario Rittore, Alberto Berselli, Giovanni Univ Genoa DIME Genoa Italy Phase Mot Control Genoa Italy
Tendon-driven systems have become popular and efficient solutions for remotely positioning motors and actuation systems in various mechanisms. They address specific needs such as reducing the weight and inertia of mov... 详细信息
来源: 评论
Structural Backdoor Attack on IoT Malware Detectors via Graph Explainability  18
Structural Backdoor Attack on IoT Malware Detectors via Grap...
收藏 引用
18th ieee international conference on Software Testing, Verification and Validation workshops, ICSTW 2025
作者: Chiu, Yu-Cheng Mwangi, Maina Bernard Cheng, Shin-Ming Lee, Hahn-Ming National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei Taiwan
In AI-based malware detection, structural features such as function call graphs (FCGs) and control flow graphs (CFGs) are widely used for their ability to encapsulate program execution flow and facilitate cross-archit... 详细信息
来源: 评论
2024 ieee 2nd international conference on Sensors, Electronics and computer engineering, ICSECE 2024
2024 IEEE 2nd International Conference on Sensors, Electroni...
收藏 引用
2nd ieee international conference on Sensors, Electronics and computer engineering, ICSECE 2024
The proceedings contain 331 papers. The topics discussed include: research on computer aided French audiovisual intelligence system;feature extraction and intelligent generation of spatial environment design combined ...
来源: 评论
Architecture-based Cross-Component Issue Management and Propagation Analysis  24
Architecture-Based Cross-Component Issue Management and Prop...
收藏 引用
46th international conference on Software engineering: Companion, ICSE-Companion 2024
作者: Speth, Sandro Institute of Software Engineering Baden-Württemberg Stuttgart Germany
This paper addresses the challenge of issue management in complex, component-based software architectures. In these systems, issues in one component often propagate across the architecture along the call chains. Yet, ... 详细信息
来源: 评论
Fairness Testing of Machine Learning Models using Combinatorial Testing in Latent Space  18
Fairness Testing of Machine Learning Models using Combinator...
收藏 引用
18th ieee international conference on Software Testing, Verification and Validation workshops, ICSTW 2025
作者: Dahal, Arjun Shree, Sunny Lei, Yu Kacker, Raghu N. Richard Kuhn, D. The University of Texas at Arlington Department of Computer Science and Engineering Arlington United States National Institute of Standards and Technology Information Technology Laboratory Gaithersburg United States
Decision-making by Machine Learning (ML) models can exhibit biased behavior, resulting in unfair outcomes. Testing ML models for such biases is essential to ensure unbiased decision-making. In this paper, we propose a... 详细信息
来源: 评论
Intent and URL based ML Classification for Phishing Detection
Intent and URL based ML Classification for Phishing Detectio...
收藏 引用
2024 international conference on Smart systems for Electrical, Electronics, Communication and computer engineering, ICSSEEC 2024
作者: Uloli, Thiruvaazhi Sadasivam, Sudha Kumaraguru College of Technology Department of Computer Science & Engineering Coimbatore India PSG College of Technology Department of Computer Science & Engineering Coimbatore India
Reports show that the number of phishing web sites is exponentially increasing and it is estimated that between 80% to 93 % of the data breaches are involving phishing attacks. With both probability of occurrence as w... 详细信息
来源: 评论
Graph Representation Learning for Recommender systems
Graph Representation Learning for Recommender Systems
收藏 引用
2025 ieee international Students' conference on Electrical, Electronics and computer Science, SCEECS 2025
作者: Manikrao, Kulkarni Manjusha Hiremath, Savitha Manjula, S.H. Dayananda Sagar University School of Engineering Department of Computer Science and Engineering Karnataka Bengaluru India University of Visvesvaraya College of Engineering Department of Computer Science and Engineering Karnataka Bengaluru India
Graph data represents information efficiently and can be used to learn subsequent tasks easily. In the domain of biological science, recommender systems, social network analysis graph representation learning has becom... 详细信息
来源: 评论
An Optimization Method of Federated Database Join Query based on Computational Push-Down  2
An Optimization Method of Federated Database Join Query Base...
收藏 引用
2nd ieee international conference on Control, Electronics and computer Technology, ICCECT 2024
作者: Gao, Wenjie Wen, Yong Zhang, Hao Institute of Computer Application Chinese Academy of Engineering Physics Mianyang China
Nowadays, in order to solve the problem of information sharing in heterogeneous systems, federated database is a mature solution. However, the distributed database system also faces many performance bottlenecks. For e... 详细信息
来源: 评论
Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS  48
Practical Performance of a Distributed Processing Framework ...
收藏 引用
48th Annual ieee international computers, Software, and Applications conference (COMPSAC) - Digital Development for a Better Future
作者: Kajiura, Maho Nakamura, Junya Toyohashi Univ Technol Dept Comp Sci & Engn Toyohashi Aichi Japan Toyohashi Univ Technol Informat & Media Ctr Toyohashi Aichi Japan
Network Intrusion Detection systems (NIDSs) detect intrusion attacks in network traffic. In particular, machinelearning-based NIDSs have attracted attention because of their high detection rates of unknown attacks. A ... 详细信息
来源: 评论