咨询与建议

限定检索结果

文献类型

  • 19,890 篇 会议
  • 247 册 图书
  • 142 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 20,278 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 15,203 篇 工学
    • 10,525 篇 计算机科学与技术...
    • 8,770 篇 软件工程
    • 2,166 篇 电气工程
    • 2,066 篇 信息与通信工程
    • 1,920 篇 控制科学与工程
    • 1,363 篇 电子科学与技术(可...
    • 1,322 篇 机械工程
    • 1,193 篇 土木工程
    • 923 篇 材料科学与工程(可...
    • 876 篇 建筑学
    • 871 篇 动力工程及工程热...
    • 859 篇 仪器科学与技术
    • 848 篇 生物工程
    • 841 篇 化学工程与技术
    • 749 篇 生物医学工程(可授...
    • 728 篇 安全科学与工程
    • 689 篇 力学(可授工学、理...
    • 551 篇 光学工程
    • 531 篇 交通运输工程
  • 6,216 篇 理学
    • 3,556 篇 数学
    • 1,824 篇 物理学
    • 971 篇 生物学
    • 943 篇 统计学(可授理学、...
    • 765 篇 系统科学
    • 741 篇 化学
  • 3,601 篇 管理学
    • 2,412 篇 管理科学与工程(可...
    • 1,500 篇 图书情报与档案管...
    • 1,341 篇 工商管理
  • 688 篇 教育学
    • 684 篇 教育学
  • 590 篇 医学
    • 525 篇 临床医学
  • 466 篇 经济学
  • 425 篇 法学
  • 159 篇 农学
  • 103 篇 文学
  • 54 篇 艺术学
  • 52 篇 军事学

主题

  • 779 篇 software enginee...
  • 326 篇 application soft...
  • 303 篇 software
  • 262 篇 computer science
  • 222 篇 data mining
  • 221 篇 neural networks
  • 217 篇 knowledge engine...
  • 177 篇 knowledge based ...
  • 177 篇 educational inst...
  • 170 篇 computer archite...
  • 160 篇 software systems
  • 153 篇 knowledge manage...
  • 145 篇 software testing
  • 136 篇 programming
  • 128 篇 software archite...
  • 127 篇 software design
  • 115 篇 semantics
  • 110 篇 computational mo...
  • 110 篇 artificial intel...
  • 109 篇 fuzzy logic

机构

  • 39 篇 school of comput...
  • 33 篇 dmms core lab fl...
  • 32 篇 state key labora...
  • 30 篇 school of electr...
  • 29 篇 school of automa...
  • 26 篇 nanjing univ sta...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 college of compu...
  • 21 篇 school of reliab...
  • 21 篇 national univers...
  • 21 篇 school of reliab...
  • 20 篇 ieee
  • 18 篇 hunan university...
  • 17 篇 university of ch...
  • 15 篇 shenyang normal ...
  • 15 篇 school of softwa...
  • 15 篇 institute of inf...
  • 15 篇 chinese acad sci...
  • 14 篇 school of comput...

作者

  • 21 篇 biffl stefan
  • 17 篇 liu yan
  • 15 篇 wang tao
  • 15 篇 wang wei
  • 14 篇 desmet w.
  • 14 篇 liu yang
  • 13 篇 liu jie
  • 11 篇 huang tao
  • 11 篇 wang lei
  • 11 篇 jin zhi
  • 11 篇 wang jian
  • 11 篇 li yong
  • 10 篇 zhang lin
  • 10 篇 li yang
  • 10 篇 li li
  • 10 篇 wei jun
  • 10 篇 wang qing
  • 10 篇 li juan
  • 10 篇 yang yang
  • 10 篇 zhang j.

语言

  • 19,823 篇 英文
  • 314 篇 其他
  • 106 篇 中文
  • 21 篇 西班牙文
  • 10 篇 葡萄牙文
  • 7 篇 土耳其文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 俄文
  • 2 篇 乌克兰文
  • 1 篇 捷克文
检索条件"任意字段=Proceedings of the 9th Knowledge-Based Software Engineering Conference"
20280 条 记 录,以下是281-290 订阅
排序:
the Gamification Advantage: Innovating Education through Engagement  9
The Gamification Advantage: Innovating Education through Eng...
收藏 引用
9th South-East Europe Design Automation, Computer engineering, Computer Networks and Social Media conference, SEEDA-CECNSM 2024
作者: Strousopoulos, Panagiotis Troussas, Christos Krouska, Akrivi Sgouropoulou, Cleo University of West Attica Department of Informatics and Computer Engineering Egaleo Greece
the study identifies how the game elements of points, badges, and leaderboards could be used to engage students to enhance learning outcomes in educational settings. As the innovative teaching paradigm is gaining impo... 详细信息
来源: 评论
A Model-based Approach for Remote Development of Embedded software for Object Avoidance Applications  9
A Model-Based Approach for Remote Development of Embedded So...
收藏 引用
9th International conference on Automation, Robotics and Applications (ICARA)
作者: Beneder, Roman Schmitt, Patrick Oernyefalvy, Clemens K. UAS Technikum Wien Dept Elect Engn Vienna Austria
the research and development of digital control systems, embedded software and precise sensor measurement within the field of automated and autonomous robotics applications has increased significantly within the last ... 详细信息
来源: 评论
Trustworthy AI in practice: an analysis of practitioners' needs and challenges  24
Trustworthy AI in practice: an analysis of practitioners' ne...
收藏 引用
28th International conference on Evaluation and Assessment in software engineering (EASE)
作者: Baldassarre, Maria Teresa Gigante, Domenico Kalinowski, Marcos Ragone, Azzurra Tibido, Sara Univ Bari A Moro Bari Italy Ser&Practices Srl Bari Italy Pontifical Catholic Univ Rio de Janeiro PUC Rio Rio De Janeiro Brazil Scuola IMT Alti Studi Lucca Bari Italy
Recently, there has been growing attention on behalf of both academic and practice communities towards the ability of Artificial Intelligence (AI) systems to operate responsibly and ethically. As a result, a plethora ... 详细信息
来源: 评论
LLM & Bagging for 1-shot Joint IE  9
LLM & Bagging for 1-shot Joint IE
收藏 引用
9th IEEE International conference on Data Science in Cyberspace, DSC 2024
作者: Fu, Yibin Ding, Zhaoyun Xu, Xiaojie National University of Defense Technology National Key Laboratory of Information Systems Engineering Changsha China Qingdao China
Domain-specific few-shot information extraction (IE) has always been the difficulty of domain knowledge graph construction, and there is a new solution in this direction after the emergence of large language models (L... 详细信息
来源: 评论
Integrating Stacking Ensembles with SVM Kernels for High-Fidelity Malware Classification  9
Integrating Stacking Ensembles with SVM Kernels for High-Fid...
收藏 引用
9th International conference on Communication and Electronics Systems, ICCES 2024
作者: Singh, Preet Hasija, Taniya Ramkumar, K.R. Chitkara University Chitkara University Institute of Engineering and Technology Punjab India
Malicious software, or malware, is programming code that infiltrates computer systems through security holes. this research paper presents an all-inclusive study on improving the malware detection process using ensemb... 详细信息
来源: 评论
A Cost Effective IoT based Firefighting Rover  9
A Cost Effective IoT Based Firefighting Rover
收藏 引用
9th International conference on Communication and Electronics Systems, ICCES 2024
作者: Dhanasekar, S. Niranchanaa, V. Nivethitha, D. Medha, K.V. Kumar, M. Praveen Saravanan, M. Sri Eshwar College of Engineering Department of Electronics and Communication Engineering Tamil Nadu Coimbatore India
In this research study, an IoT-enabled firefighting rover has been fabricated to cater to the growing demand for safe and efficient firefighting operations in hazardous areas. It is fitted with cameras, heat sensors, ... 详细信息
来源: 评论
Refining Guideline knowledge for Agent Planning Using Textgrad  15
Refining Guideline Knowledge for Agent Planning Using Textgr...
收藏 引用
15th IEEE International conference on knowledge Graph, ICKG 2024
作者: Fang, Runnan Qiao, Shuofei Xi, Zekun Zhejiang University Department of Software Technology Hangzhou China Zhejiang University Department of Computer Science Hangzhou China
Guideline knowledge is helpful for LLM (Large Language Model) based Agent in embody task planning. In this work, we introduce Textgrad to optimize the Guideline knowledge for the agent9;s embodied tasks. this allow... 详细信息
来源: 评论
Implementation of 8-bit Dadda Multiplier by Using 4:2 Compressors and Brentkung Adder for Reducing Propagation Delay in Comparison with Kogge Stone Adder  9
Implementation of 8-bit Dadda Multiplier by Using 4:2 Compre...
收藏 引用
9th International conference on Science, Technology, engineering and Mathematics, ICONSTEM 2024
作者: Rohith, G. Jagadeesh, P. Meenakshisundaram, N. Saveetha School of Engineering Simats Dept of Ece Chennai India
A Novel Dadda multiplier called a Kogge Stone Adder is the object of this study9;s comparison of power consumption and delay. that employs 4:2 compressors, and a suggested Brent Kung adder in order to determine the... 详细信息
来源: 评论
Wall thickness Estimation based on LSTM for through-Wall Radar Imaging  9
Wall Thickness Estimation Based on LSTM for Through-Wall Rad...
收藏 引用
9th International conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Ma, Tianfang Wang, Zhaodong Qi, Qingjie School of Emergency Management and Safety Engineering China University of Mining and Technology Beijing China Emergency Science Research Institute Chinese Institute of Coal Science Beijing China
Prior knowledge of the wall9;s thickness is crucial for precisely pinpointing the location of the target in through-wall radar imaging. We suggest a method to estimate wall thickness using Long Short-Term Memory (L... 详细信息
来源: 评论
Enhancing Factory Automation through Facial Recognition Using Phoenix PLC and Factory I/O  9
Enhancing Factory Automation Through Facial Recognition Usin...
收藏 引用
9th International conference on Communication and Electronics Systems, ICCES 2024
作者: Janarthanan, S. thangatamilan, M. Akash Kumar, A. Bovas Kirubakaran, D. Deepak, P. Kongu Engineering College Department of Eie Tamil Nadu Erode India
this research study explores the integration of facial recognition technology to enhance factory automation, utilizing Phoenix PLC and Factory I/O in a secure and efficient manner. the system employs a face terminal t... 详细信息
来源: 评论