咨询与建议

限定检索结果

文献类型

  • 604 篇 会议
  • 114 册 图书

馆藏范围

  • 707 篇 电子文献
  • 12 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 9 篇 计算机科学与技术...
    • 8 篇 电子科学与技术(可...
    • 6 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 风景园林学(可授工...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 1 篇 农林经济管理
    • 1 篇 公共管理
  • 6 篇 经济学
    • 4 篇 应用经济学
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 政治学
    • 2 篇 公安学
    • 1 篇 社会学
    • 1 篇 马克思主义理论
  • 3 篇 农学
    • 2 篇 畜牧学
    • 1 篇 林学
  • 1 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
  • 1 篇 理学
    • 1 篇 生态学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 军事学

主题

  • 95 篇 mobile robots
  • 84 篇 robot sensing sy...
  • 75 篇 humans
  • 61 篇 control systems
  • 60 篇 hardware
  • 56 篇 orbital robotics
  • 51 篇 computer science
  • 45 篇 cameras
  • 44 篇 robot vision sys...
  • 44 篇 robot kinematics
  • 43 篇 robot control
  • 42 篇 robots
  • 42 篇 navigation
  • 42 篇 costs
  • 40 篇 manipulators
  • 39 篇 application soft...
  • 36 篇 motion control
  • 35 篇 intelligent robo...
  • 35 篇 robotics and aut...
  • 34 篇 kinematics

机构

  • 6 篇 the robotics ins...
  • 5 篇 department of me...
  • 4 篇 university colle...
  • 4 篇 robotics institu...
  • 3 篇 manchester visua...
  • 3 篇 institute of ind...
  • 3 篇 department of me...
  • 3 篇 school of engine...
  • 3 篇 department of co...
  • 3 篇 mechanical engin...
  • 3 篇 department of ae...
  • 3 篇 department of co...
  • 3 篇 intelligent auto...
  • 3 篇 jet propulsion l...
  • 3 篇 department of el...
  • 3 篇 department of sy...
  • 3 篇 institute of tel...
  • 3 篇 department of el...
  • 2 篇 department of co...
  • 2 篇 department of el...

作者

  • 6 篇 l. jozwiak
  • 5 篇 m. asada
  • 5 篇 yangsheng xu
  • 4 篇 y. shirai
  • 4 篇 d.m. howard
  • 3 篇 c. laugier
  • 3 篇 m. hebert
  • 3 篇 t. shibata
  • 3 篇 s. payandeh
  • 3 篇 t. fukuda
  • 3 篇 hyung suck cho
  • 3 篇 m. kaneko
  • 3 篇 b. hannaford
  • 3 篇 p.d. lawrence
  • 3 篇 s.k. tso
  • 3 篇 k. kuchcinski
  • 3 篇 andy oram
  • 3 篇 y. kuno
  • 3 篇 d.n. nenchev
  • 3 篇 y. nakamura

语言

  • 683 篇 英文
  • 34 篇 中文
  • 1 篇 其他
检索条件"丛书名=Theory in Practice"
718 条 记 录,以下是91-100 订阅
排序:
The Art of Project Management  1
收藏 引用
丛书名: theory in practice O'Reilly
2005年
作者: [美] Scott Berkun
The Art of Project Management covers it all--from practical methods for making sure work gets done right and on time, to the mindset that can make you a great leader motivating your team to do their best. Reading this... 详细信息
来源: 评论
生殖生物学理论与实践  1
收藏 引用
丛书名: = Reproductive biology theory and practice eng
2005年
作者: 徐晨 周作民
本书系统介绍了生殖生物学的基础知识、基本理论和主要的实验研究方法及相关临床技术,反映了生殖生物学在科学研究中的最新进展。全书包括生殖系统的发生、生殖系统的结构与功能、性功能障碍、辅助生殖技术等内容。
来源: 评论
Some topics related to resilient functions
Some topics related to resilient functions
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: K. Kurosawa Department of Computer and Information Sciences Ibaraki University Hitachi Ibaraki Japan
A resilient function is a randomness extractor which outputs truly random bits from bit fixing sources. In this paper, we discuss on some topics related to resilient functions: almost resilient functions, covering rad... 详细信息
来源: 评论
Bit commitment from weak non-locality
Bit commitment from weak non-locality
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: S. Wolf J. Wullschleger Département d'Informatique et R.O Université de Montréal Canada
So-called non-local boxes, which have been introduced as an idealization n different respects - of the behavior of entangled quantum states, have been known to allow for unconditional bit commitment between the two ... 详细信息
来源: 评论
Copyright page
Copyright page
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carr...
来源: 评论
Bounds on authentication systems in query model
Bounds on authentication systems in query model
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: R. Safavi-Naini P. Wild School of Information Technology and Computer Science University of Wollongong Wollongong Australia Department of Mathematics Royal Holloway University of London Surrey UK
Unconditionally secure authentication codes provide information theoretic security against an adversary who observes authenticated messages and then wants to construct a fraudulent message that is acceptable by the re... 详细信息
来源: 评论
Broadcast and secure computation under reduced setup assumptions
Broadcast and secure computation under reduced setup assumpt...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: M. Fitzi Aarhus University Denmark
The problems of broadcast and multi-party computation are usually treated with respect to a small number of standard models. In this overview, with respect to two important such standard models, we address the followi... 详细信息
来源: 评论
Unconditionally secure signatures and its related schemes
Unconditionally secure signatures and its related schemes
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: G. Hanaoka National Institute for Advanced Industrial Science and Technology Japan
The present paper has two aims. One is on a practical aspect to survey briefly about an unconditionally secure signature which is known to be a useful cryptographic tool for application that requires long-term integri... 详细信息
来源: 评论
Author index
Author index
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
The author index contains an entry for each author and coauthor included in the proceedings record.
来源: 评论
Acknowledgements
Acknowledgements
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
The conference organizers greatly appreciate the support of the various corporate sponsors listed.
来源: 评论