咨询与建议

限定检索结果

文献类型

  • 3,206 篇 会议
  • 56 册 图书
  • 26 篇 期刊文献

馆藏范围

  • 3,288 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,719 篇 工学
    • 1,325 篇 计算机科学与技术...
    • 1,216 篇 软件工程
    • 213 篇 控制科学与工程
    • 204 篇 信息与通信工程
    • 195 篇 电气工程
    • 151 篇 机械工程
    • 136 篇 材料科学与工程(可...
    • 131 篇 安全科学与工程
    • 128 篇 生物工程
    • 125 篇 生物医学工程(可授...
    • 94 篇 土木工程
    • 93 篇 交通运输工程
    • 85 篇 建筑学
    • 79 篇 动力工程及工程热...
    • 75 篇 电子科学与技术(可...
    • 70 篇 化学工程与技术
    • 62 篇 力学(可授工学、理...
  • 703 篇 理学
    • 491 篇 数学
    • 167 篇 统计学(可授理学、...
    • 132 篇 生物学
    • 115 篇 物理学
    • 113 篇 系统科学
    • 60 篇 化学
  • 391 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 172 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 93 篇 医学
    • 85 篇 基础医学(可授医学...
    • 80 篇 临床医学
  • 56 篇 经济学
    • 56 篇 应用经济学
  • 50 篇 教育学
    • 49 篇 教育学
  • 43 篇 法学
  • 32 篇 农学
  • 6 篇 文学
  • 5 篇 军事学
  • 1 篇 艺术学

主题

  • 943 篇 predictive model...
  • 265 篇 accuracy
  • 257 篇 data models
  • 235 篇 computational mo...
  • 203 篇 analytical model...
  • 180 篇 prediction algor...
  • 148 篇 training
  • 135 篇 software enginee...
  • 129 篇 feature extracti...
  • 119 篇 software
  • 117 篇 machine learning
  • 116 篇 deep learning
  • 104 篇 neural networks
  • 103 篇 forecasting
  • 97 篇 adaptation model...
  • 83 篇 mathematical mod...
  • 82 篇 machine learning...
  • 76 篇 optimization
  • 70 篇 real-time system...
  • 62 篇 support vector m...

机构

  • 10 篇 school of inform...
  • 7 篇 national enginee...
  • 7 篇 hubei key labora...
  • 7 篇 school of electr...
  • 7 篇 school of automa...
  • 6 篇 school of comput...
  • 6 篇 school of softwa...
  • 6 篇 school of electr...
  • 6 篇 engineering rese...
  • 5 篇 school of comput...
  • 5 篇 school of transp...
  • 5 篇 nanjing univ sta...
  • 5 篇 chitkara univers...
  • 5 篇 school of softwa...
  • 4 篇 school of inform...
  • 4 篇 naval university...
  • 4 篇 school of manage...
  • 4 篇 school of softwa...
  • 4 篇 software enginee...
  • 4 篇 school of electr...

作者

  • 8 篇 labiche yvan
  • 7 篇 menzies tim
  • 6 篇 hassan ahmed e.
  • 5 篇 yang yang
  • 5 篇 mcintosh shane
  • 5 篇 chen li
  • 5 篇 ziadi tewfik
  • 5 篇 yan wang
  • 4 篇 yu wang
  • 4 篇 ming li
  • 4 篇 liu yang
  • 4 篇 hall tracy
  • 4 篇 xintian liu
  • 4 篇 bowes david
  • 4 篇 monden akito
  • 4 篇 min wu
  • 4 篇 matsumoto ken-ic...
  • 4 篇 yu zhang
  • 4 篇 lei zhang
  • 4 篇 briand lionel c.

语言

  • 3,195 篇 英文
  • 82 篇 其他
  • 21 篇 中文
  • 1 篇 俄文
检索条件"任意字段=Proceedings of the 6th International Conference on Predictive Models in Software Engineering"
3288 条 记 录,以下是181-190 订阅
排序:
Large Scale Study of Orphan Vulnerabilities in the software Supply Chain  19
Large Scale Study of Orphan Vulnerabilities in the Software ...
收藏 引用
19th international conference on predictive models and Data Analytics in software engineering (PROMISE)
作者: Reid, David Rahkema, Kristiina Walden, James Univ Tennessee Knoxville TN 37996 USA Univ Tartu Tartu Estonia Northern Kentucky Univ Highland Hts KY USA
the security of the software supply chain has become a critical issue in an era where the majority of software projects use open source software dependencies, exposing them to vulnerabilities in those dependencies. Aw... 详细信息
来源: 评论
GM-YOLO: A Lightweight Small Target Detection Model  24
GM-YOLO: A Lightweight Small Target Detection Model
收藏 引用
6th international conference on Telecommunications and Communication engineering
作者: Xiao, Linsong Li, Wenzao Zhang, Xiaoqiang Jiang, Hong Wan, Bing Ren, Dehao Chengdu Univ Informat Technol Sch Commun Engn Chengdu Sichuan Peoples R China Sichuan GFS Informat Technol Co Ltd Chengdu Sichuan Peoples R China Chengdu Polytech Sch Software Chengdu Sichuan Peoples R China
Traditional target detection models struggle to maintain accuracy and improve inference speed for small target detection on computationally limited embedded devices. To solve this problem, this paper proposes an Unpro... 详细信息
来源: 评论
Enhancing Exercise Efficacy: A predictive EMG Analysis for Dumbbell Press Workouts  6
Enhancing Exercise Efficacy: A Predictive EMG Analysis for D...
收藏 引用
6th IEEE international conference on Artificial Intelligence in engineering and Technology, IICAIET 2024
作者: Pattanashetty, Pranav T. Chaurasia, Shreya Upadhyaya, Sujatha R. Visweswara, Ramesh Debur Pes University Dept. of Computer Science and Engineering Bengaluru India Ramaiah Memorial Hospital Dept. of Physiotherapy Bengaluru India
the current paper describes a preliminary model that would help improve the dumbbell press exercise through the use of electromyography (EMG). the model recognizes the optimal and marginal repetitions in sets based on... 详细信息
来源: 评论
Elastic-plastic modeling method based on temporal convolutional network  6
Elastic-plastic modeling method based on temporal convolutio...
收藏 引用
6th international conference on Advanced Electronic Materials, Computers, and software engineering, AEMCSE 2023
作者: Wang, Haibo Niu, Qiang School of Mechanical and Material Engineering North China University of Technology Beijing100144 China
Because the deformation of the material under load is strongly correlated with the loading path, the Temporal Convolutional Network (TCN), which can satisfy the time-series learning, is chosen to model the elastic-pla... 详细信息
来源: 评论
CSECU-DSG @ Causal News Corpus 2023: Leveraging RoBERTa and DeBERTa Transformer Model with Contrastive Learning for Causal Event Classification  6
CSECU-DSG @ Causal News Corpus 2023: Leveraging RoBERTa and ...
收藏 引用
6th Workshop on Challenges and Applications of Automated Extraction of Socio-Political Events from Text, CASE 2023
作者: Hossain, Md. Akram Aziz, Abdul Chy, Abu Nowshed Department of Computer Science and Engineering University of Chittagong Chattogram4331 Bangladesh
Cause-effect relationships play a crucial role in human cognition, and distilling cause-effect relations from text helps in ameliorating causal networks for predictive tasks including natural language-based financial ... 详细信息
来源: 评论
software Attribute Comprehensive Trust Measurement Model  24
Software Attribute Comprehensive Trust Measurement Model
收藏 引用
6th international conference on software engineering and Development, ICSED 2024
作者: Luo, Yihang Sun, Pengxuan Faculty Of Information Technology Beijing University Of Technology China
With the rapid development of the information age, software security has become a crucial component. In the realm of security, quantifying the trustworthiness of software has become a focal point, yielding a series of... 详细信息
来源: 评论
Detecting Bitcoin CoinJoin Transactions Using Machine Learning  6
Detecting Bitcoin CoinJoin Transactions Using Machine Learni...
收藏 引用
6th international conference on Blockchain Computing and Applications, BCCA 2024
作者: Dekhil, Oumayma Tonga-Naha, Rodrigue Mayeli-Feridani, Mikaeil Najjar, Fatma Zhang, Kaiwen Department of Software and IT Engineering ÉTS Montréal QC Canada
Anonymity is one of the characteristics that makes Bitcoin mainstream. However, various approaches have been proposed to deanonymize Bitcoin to reveal the identities of the people behind the addresses. In order to enh... 详细信息
来源: 评论
CAVDL:A Comparative Analysis Of Diverse DL models For Enhancing COVID-19 Images  6
CAVDL:A Comparative Analysis Of Diverse DL Models For Enhanc...
收藏 引用
6th Parul international conference on engineering and Technology, PICET 2024
作者: Jain, Arti Kaliyar, Rohit Kumar Sharma, Shallu School of Computer Science Engineering and Technology Bennett University Uttar Pradesh India
the global health crisis has brought to light the critical role that medical imaging, particularly X-rays, play in the diagnosis and surveillance of COVID-19 infections. the capacity to increase X-ray picture quality ... 详细信息
来源: 评论
Research on AUV Navigation State Prediction Method Using MultiHead Attention Mechanism in a CNN-BiLSTM Model  7
Research on AUV Navigation State Prediction Method Using Mul...
收藏 引用
7th international conference on Advanced Electronic Materials, Computers, and software engineering, AEMCSE 2024
作者: Pan, Wei Lv, Bangjun Peng, Likun School of Power Engineering Naval University of Engineering Wuhan430030 China
In response to the issue of low accuracy in predicting the navigation state of existing AUV motion models, a predictive model for AUV navigation state based on a combination of a time-domain convolutional neural netwo... 详细信息
来源: 评论
Improving Cybersecurity Named Entity Recognition with Large Language models  6
Improving Cybersecurity Named Entity Recognition with Large ...
收藏 引用
6th international conference on software engineering and Computer Science, CSECS 2023
作者: Qiao, Zhe Zhang, Chen Du, Gang Information Security Management and Operation Center China Mobile Ltd Beijing10053 China China Mobile Group Design Institute Co. Ltd Beijing100080 China
A lot of attention has been paid to cybersecurity threat intelligence analysis based on security knowledge graphs because they can evaluate multi-source threat intelligence data at a fine-grained level. the primary ef... 详细信息
来源: 评论