咨询与建议

限定检索结果

文献类型

  • 682,416 篇 会议
  • 11,817 篇 期刊文献
  • 6,244 册 图书
  • 30 篇 学位论文
  • 4 篇 科技报告

馆藏范围

  • 700,482 篇 电子文献
  • 49 种 纸本馆藏

日期分布

学科分类号

  • 413,512 篇 工学
    • 304,595 篇 计算机科学与技术...
    • 244,026 篇 软件工程
    • 84,209 篇 信息与通信工程
    • 56,729 篇 控制科学与工程
    • 46,535 篇 电气工程
    • 36,399 篇 机械工程
    • 35,387 篇 电子科学与技术(可...
    • 35,234 篇 生物工程
    • 29,473 篇 生物医学工程(可授...
    • 21,614 篇 光学工程
    • 21,253 篇 仪器科学与技术
    • 19,341 篇 动力工程及工程热...
    • 18,252 篇 化学工程与技术
    • 15,345 篇 安全科学与工程
    • 14,427 篇 材料科学与工程(可...
    • 13,540 篇 交通运输工程
    • 12,981 篇 土木工程
  • 167,884 篇 理学
    • 93,824 篇 数学
    • 41,269 篇 物理学
    • 37,978 篇 生物学
    • 26,763 篇 统计学(可授理学、...
    • 19,393 篇 系统科学
    • 17,337 篇 化学
  • 102,851 篇 管理学
    • 66,250 篇 管理科学与工程(可...
    • 41,707 篇 图书情报与档案管...
    • 31,353 篇 工商管理
  • 24,799 篇 医学
    • 20,871 篇 临床医学
    • 19,468 篇 基础医学(可授医学...
  • 16,060 篇 法学
    • 13,040 篇 社会学
  • 14,922 篇 教育学
    • 14,297 篇 教育学
  • 12,416 篇 经济学
  • 8,627 篇 农学
  • 4,548 篇 文学
  • 1,783 篇 军事学
  • 1,542 篇 艺术学
  • 71 篇 哲学
  • 44 篇 历史学

主题

  • 34,348 篇 computer science
  • 20,255 篇 application soft...
  • 19,016 篇 computational mo...
  • 17,975 篇 software
  • 16,205 篇 feature extracti...
  • 16,158 篇 accuracy
  • 16,124 篇 computer archite...
  • 15,858 篇 software enginee...
  • 13,754 篇 training
  • 11,275 篇 deep learning
  • 11,140 篇 data mining
  • 10,394 篇 hardware
  • 10,161 篇 machine learning
  • 9,779 篇 predictive model...
  • 9,554 篇 educational inst...
  • 9,467 篇 testing
  • 8,909 篇 costs
  • 8,841 篇 data models
  • 8,670 篇 support vector m...
  • 8,413 篇 artificial intel...

机构

  • 1,906 篇 chitkara univers...
  • 1,370 篇 school of comput...
  • 1,148 篇 school of comput...
  • 1,090 篇 school of comput...
  • 874 篇 school of comput...
  • 811 篇 department of co...
  • 720 篇 college of compu...
  • 687 篇 school of comput...
  • 664 篇 school of comput...
  • 644 篇 department of co...
  • 627 篇 university of ch...
  • 587 篇 state key labora...
  • 582 篇 lovely professio...
  • 545 篇 college of compu...
  • 541 篇 school of comput...
  • 516 篇 maharishi school...
  • 499 篇 department of co...
  • 432 篇 school of comput...
  • 426 篇 nanjing univ sta...
  • 422 篇 school of comput...

作者

  • 459 篇 wang wei
  • 339 篇 liu yang
  • 336 篇 yang yang
  • 265 篇 li li
  • 265 篇 china
  • 261 篇 yang liu
  • 244 篇 li wei
  • 242 篇 zhang lei
  • 238 篇 wang lei
  • 231 篇 wei li
  • 226 篇 vinay kukreja
  • 218 篇 kukreja vinay
  • 210 篇 li yang
  • 195 篇 liu wei
  • 183 篇 wei wang
  • 180 篇 zhang wei
  • 173 篇 wang jian
  • 170 篇 li bo
  • 169 篇 zhang yan
  • 167 篇 lei wang

语言

  • 672,696 篇 英文
  • 22,613 篇 其他
  • 6,518 篇 中文
  • 83 篇 德文
  • 75 篇 西班牙文
  • 48 篇 俄文
  • 48 篇 土耳其文
  • 44 篇 法文
  • 38 篇 葡萄牙文
  • 7 篇 乌克兰文
  • 5 篇 捷克文
  • 3 篇 日文
  • 2 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛伐克文
检索条件"任意字段=International Conference on Computer Science and Software Engineering"
700513 条 记 录,以下是4641-4650 订阅
排序:
Costs and Benefits of Machine Learning software Defect Prediction: Industrial Case Study  32
Costs and Benefits of Machine Learning Software Defect Predi...
收藏 引用
32nd ACM international conference on the Foundations of software engineering (FSE)
作者: Stradowski, Szymon Madeyski, Lech Wroclaw Univ Sci & Technol Wroclaw Poland NOKIA Wroclaw Poland
Our research is set in the industrial context of Nokia 5G and the introduction of Machine Learning software Defect Prediction (ML SDP) to the existing quality assurance process within the company. We aim to support or... 详细信息
来源: 评论
Message from the President of computer science Cooperative Research Network (CSCRN)
Message from the President of Computer Science Cooperative R...
收藏 引用
international Joint conference on computer science and software engineering (JCSSE)
来源: 评论
An Investigation of Challenges Encountered When Specifying Training Data and Runtime Monitors for Safety Critical ML Applications  1
收藏 引用
29th international Working conference on Requirements engineering - Foundation for software Quality (REFSQ)
作者: Heyn, Hans-Martin Knauss, Eric Malleswaran, Iswarya Dinakaran, Shruthi Chalmers Univ Technol SE-41296 Gothenburg Sweden Univ Gothenburg SE-40530 Gothenburg Sweden
[Context and motivation] The development and operation of critical software that contains machine learning (ML) models requires diligence and established processes. Especially the training data used during the develop... 详细信息
来源: 评论
Evolving Safety Protocols: Deep Learning-Enabled Detection of Personal Protective Equipment  1
收藏 引用
4th international conference on computer Vision, High-Performance Computing, Smart Devices, and Networks, CHSN 2023
作者: Alahmid, Mustafa Bhimani, Kishankumar Saradva, Khushbu Ghildiyal, Sushil Saeedi, Sayed Aryan Ali, Saraa Yan, Han Filippov, Evgeny Faculty of Computer Science and Technology Saint Petersburg Electrotechnical University "LETI" Saint Petersburg Russia Laboratory on AI for Computational Biology Faculty of Computer Science HSE University Moscow Russia Department of Computer Science and Engineering Indian Institute of Technology Ropar Punjab India Laboratory of Methods for Big Data Analysis Faculty of Computer Science HSE University Moscow Russia Deggendorf Institute of Technology Bavaria Germany
To give shift in safety protocols, we have employed advanced deep learning algorithms and frameworks (Shrestha and Mahmood in IEEE Access 7:53,040–53,065, 2019 [25]) to construct an innovative AI model. The designed ... 详细信息
来源: 评论
Documenting Regulatory Requirements Decision-Making as a Compliance Concern  30
Documenting Regulatory Requirements Decision-Making as a Com...
收藏 引用
30th IEEE international Requirements engineering conference (RE)
作者: Kempe, Evelyn Univ Maryland Baltimore Cty Dept Informat Syst Baltimore MD 21228 USA
software practitioners must implement a growing list of regulatory and security mandates, but have no established tool or mechanism for demonstrating their due diligence or compliance efforts exists. Providing an appr... 详细信息
来源: 评论
Fast Second-order Method for Neural Networks under Small Treewidth Setting
Fast Second-order Method for Neural Networks under Small Tre...
收藏 引用
2024 IEEE international conference on Big Data, BigData 2024
作者: Li, Xiaoyu Long, Jiangxuan Song, Zhao Zhou, Tianyi Stevens Institute of Technology Department of Computer Science HobokenNJ United States South China University of Technology School of Software Engineering Guangzhou China University of California Berkeley The Simons Institute for the Theory of Computing BerkeleyCA United States University of Southern California Department of Computer Science Los AngelesCA United States
Training neural networks is a fundamental problem in theoretical machine learning. Second-order methods are rarely used in practice due to their high computational cost, even they converge much faster than first-order... 详细信息
来源: 评论
Smart Flood Detection and Communication in Hazardous Zones via MANET-Based IoT and Parallely Distributed Slimmable Neural Networks  4
Smart Flood Detection and Communication in Hazardous Zones v...
收藏 引用
4th international conference on Sustainable Expert Systems, ICSES 2024
作者: Sathya, V. Bhadula, Shuchi Srinivasan, R. Bhargav, H.K. Panda, Bhavani Sankar Barve, Amit Department of Computer Science Vallam Tamil Nadu Thanjavur613403 India Graphic Era Deemed to be University Department of Computer Science & Engineering Uttarakhand Dehradun248 002 India Veltech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Department of Computer Science and Engineering Avadi Tiruvallur Tamil Nadu Chennai600054 India Shridevi Institute of Engineering and Technology Department of Computer Science and Engineering Karnataka Tumakuru572106 India Raghu Engineering College Department of Computer Science and Engineering Andhra Pradesh Visakhapatnam531162 India Parul Institute of Technology Parul University Faculty of Engineering and Technology Department of Computer Science and Engineering P.O.Limda Gujarat 391760 India
Disasters can be mitigated by an early warning signal and proper communication within the hazardous environment using the MANET technology. However, the exact prediction of disaster situation is needed for the timely ... 详细信息
来源: 评论
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries  24
LibvDiff: Library Version Difference Guided OSS Version Iden...
收藏 引用
46th IEEE/ACM international conference on software engineering, ICSE 2024
作者: Dong, Chaopeng Li, Siyuan Yang, Shouguo Xiao, Yang Wang, Yongpan Li, Hong Li, Zhi Sun, Limin Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China
Open-source software (OSS) has been extensively employed to expedite software development, inevitably exposing downstream software to the peril of potential vulnerabilities. Precisely identifying the version of OSS no... 详细信息
来源: 评论
Refined multi-channel inception network for automobile insurance fraud identification based on attention mechanism and dense connection structure
Refined multi-channel inception network for automobile insur...
收藏 引用
2023 international conference on computer Application and Information Security, ICCAIS 2023
作者: Wang, Deguang Zhang, Ting Li, Fengqi Tong, Ning Xu, Fengqiang School of Software Dalian Jiaotong University Liaoning Dalian116028 China School of Computer Communication and Engineering Dalian Jiaotong University Liaoning Dalian116028 China The Dalian Key Laboratory of Blockchain Technology and Application Liaoning Dalian116028 China
Automobile insurance fraud causes huge economic losses to insurance companies, detection technology has become an urgent research topic. However, feature selection manually is prone to subjective judgment, which resul... 详细信息
来源: 评论
An attention-based channel estimation network with residual mechanism for 5G OFDM systems  4
An attention-based channel estimation network with residual ...
收藏 引用
4th international conference on Electronic Communication, computer science and Technology, ECCST 2024
作者: Jiang, Jinjing Huang, Weipeng Zhang, Xiao Yang, Kun Peng, Tong School of Information Engineering Zhejiang Ocean University China School of Computer Science and Software Engineering Shenzhen Institute of Information Technology China
Due to the significant increase in data transmission speed and gradual increase in Doppler frequency shift, channel estimation accuracy has become one of the most prioritized considerations in many cases. Specifically... 详细信息
来源: 评论