咨询与建议

限定检索结果

文献类型

  • 9,953 篇 会议
  • 82 册 图书
  • 54 篇 期刊文献

馆藏范围

  • 10,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,159 篇 工学
    • 4,542 篇 计算机科学与技术...
    • 3,493 篇 软件工程
    • 1,524 篇 信息与通信工程
    • 1,014 篇 电气工程
    • 896 篇 控制科学与工程
    • 663 篇 电子科学与技术(可...
    • 563 篇 机械工程
    • 519 篇 生物工程
    • 485 篇 生物医学工程(可授...
    • 369 篇 动力工程及工程热...
    • 300 篇 安全科学与工程
    • 289 篇 仪器科学与技术
    • 286 篇 光学工程
    • 277 篇 交通运输工程
    • 222 篇 化学工程与技术
    • 184 篇 环境科学与工程(可...
    • 179 篇 网络空间安全
    • 167 篇 建筑学
  • 2,284 篇 理学
    • 1,230 篇 数学
    • 571 篇 生物学
    • 541 篇 物理学
    • 388 篇 统计学(可授理学、...
    • 359 篇 系统科学
    • 216 篇 化学
  • 1,507 篇 管理学
    • 980 篇 管理科学与工程(可...
    • 637 篇 图书情报与档案管...
    • 470 篇 工商管理
  • 365 篇 医学
    • 305 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 170 篇 药学(可授医学、理...
  • 201 篇 法学
  • 158 篇 经济学
  • 152 篇 教育学
  • 107 篇 艺术学
  • 93 篇 农学
  • 15 篇 文学
  • 14 篇 军事学
  • 2 篇 历史学

主题

  • 416 篇 computer archite...
  • 280 篇 computer science
  • 237 篇 computational mo...
  • 218 篇 software enginee...
  • 197 篇 application soft...
  • 187 篇 conferences
  • 185 篇 feature extracti...
  • 179 篇 software systems
  • 172 篇 real-time system...
  • 128 篇 hardware
  • 126 篇 monitoring
  • 118 篇 deep learning
  • 115 篇 support vector m...
  • 114 篇 programming
  • 114 篇 data mining
  • 112 篇 costs
  • 109 篇 control systems
  • 109 篇 protocols
  • 106 篇 quality of servi...
  • 106 篇 wireless sensor ...

机构

  • 30 篇 lovely professio...
  • 27 篇 department of el...
  • 23 篇 school of comput...
  • 22 篇 school of inform...
  • 20 篇 chitkara univers...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 school of comput...
  • 17 篇 hunan university...
  • 16 篇 lloyd institute ...
  • 16 篇 school of comput...
  • 14 篇 institute of aer...
  • 14 篇 school of inform...
  • 13 篇 department of el...
  • 13 篇 institute of aer...
  • 12 篇 school of electr...
  • 12 篇 department of co...
  • 12 篇 school of electr...
  • 12 篇 lloyd law colleg...
  • 11 篇 institute for in...

作者

  • 13 篇 china
  • 11 篇 leonard barolli
  • 10 篇 li yang
  • 10 篇 yang yang
  • 10 篇 jerzy w. rozenbl...
  • 9 篇 wei li
  • 8 篇 liu bo
  • 8 篇 j. leaney
  • 8 篇 jianfeng peng
  • 8 篇 wang wei
  • 8 篇 attila kovari
  • 7 篇 himadri nath sah...
  • 7 篇 febus reidj g. c...
  • 7 篇 liu xin
  • 7 篇 matthias riebisc...
  • 7 篇 chen yu
  • 7 篇 robert demeter
  • 7 篇 wang houjun
  • 7 篇 leaney j
  • 7 篇 zhang jie

语言

  • 9,934 篇 英文
  • 119 篇 其他
  • 51 篇 中文
  • 7 篇 俄文
  • 1 篇 德文
检索条件"任意字段=10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems"
10089 条 记 录,以下是11-20 订阅
排序:
10th international workshop on Big Data Management and Service, BDMS 2024, 9th international workshop on Big Data Quality Management, BDQM 2024, DASFAA 2024 workshop on Emerging Results in Data Science and engineering, ERDSE 2024 and 8th international workshop on Graph Data Management and Analysis, GDMA 2024 held in conjunction with 29th international conference on Database systems for Advanced Applications, DASFAA 2024
10th International Workshop on Big Data Management and Servi...
收藏 引用
10th international workshop on Big Data Management and Service, BDMS 2024, 9th international workshop on Big Data Quality Management, BDQM 2024, DASFAA 2024 workshop on Emerging Results in Data Science and engineering, ERDSE 2024 and 8th international workshop on Graph Data Management and Analysis, GDMA 2024 held in conjunction with 29th international conference on Database systems for Advanced Applications, DASFAA 2024
the proceedings contain 26 papers. the special focus in this conference is on Big Data Management and Service. the topics include: FAIth: A Fast, Accurate, and Lightweight Database-Agnostic Learned Cost Model;fas...
来源: 评论
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
19th International Workshop on Data Privacy Management, DPM ...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
来源: 评论
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
19th International Workshop on Data Privacy Management, DPM ...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
来源: 评论
Homomorphic Encryption based ECDSA Generation Over Five Party Protocol  19th
Homomorphic Encryption Based ECDSA Generation Over Five Part...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Aggarwal, Akshit Swain, Srinibas Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India School of Computer and Mathematical Sciences University of Adelaide Adelaide Australia
Secure computation of multiparty protocol (MPP) is being widely used to address privacy issues in various technologies, such as cryptocurrencies, blockchain, and many more. the security of MPP is computed in various s... 详细信息
来源: 评论
Grid-based Decompositions for Spatial Data Under Local Differential Privacy  19th
Grid-Based Decompositions for Spatial Data Under Local Diff...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Balioglu, Berkay Kemal Khodaie, Alireza Taweel, Ameer Gursoy, M.Emre Department of Computer Engineering Koç University Istanbul Turkey
Local differential privacy (LDP) has recently emerged as a popular privacy standard. With the growing popularity of LDP, recent works have applied LDP to spatial data, and grid-based decompositions have been a common ... 详细信息
来源: 评论
On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural Networks  19th
On Intrinsic Cause and Defense of Adversarial Examples in...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Tasaki, Hajime Chao, Jinhui Department of Information and System Engineering Chuo University Bunkyo Tokyo1-13-27 Kasuga Japan
the existence of so-called adversarial examples has become a serious threat to Deep Neural Networks (DNN) and their applications, especially security-sensitive ones. Explanations and defenses mainly focused on inside ... 详细信息
来源: 评论
5th ieee/ACIS international conference on computer and Information Science and 1st ieee/ACIS international workshop on Component-based Software engineering,Software Architecture and Reuse - Title
5th IEEE/ACIS International Conference on Computer and Infor...
收藏 引用
international conference on computer and Information Science (ACIS)
the following topics are dealt with: parallel and distributed computing; software metrics and project management; communication systems and networks; data mining; data warehousing; information management systems; Inte...
来源: 评论
Hydrostatic Strength and Resonant Frequency of Large and thin LPCVD SiN Diaphragm with Added Parylene  38
Hydrostatic Strength and Resonant Frequency of Large and thi...
收藏 引用
38th ieee international conference on Micro Electro Mechanical systems, MEMS 2025
作者: Gao, Hongxiang Wang, Junyi Wang, Kunfeng Sengupta, Anik Kim, Eun Sok University of Southern California Department of Electrical and Computer Engineering United States
this paper describes the impact of Parylene layer on the hydrostatic strength and resonant frequency of large and thin bulk-micromachined diaphragm of 500 nm thick Low Pressure Chemical Vapor Deposition (LPCVD) low-st... 详细信息
来源: 评论
the Concept of Genetic Reverse-engineering to Restore the Program's Source Code from a Binary Code: theory and Applying Practice  17
The Concept of Genetic Reverse-Engineering to Restore the Pr...
收藏 引用
17th international conference on COMmunication systems and NETworkS, COMSNETS 2025
作者: Izrailov, Konstantin Kotenko, Igor St. Petersburg Federal Research Center The Russian Academy of Sciences Computer Security Problems Laboratory Saint-Petersburg Russia
the work is devoted to solving the problem of restoring the representation of the source code of a program (and in the future, algorithms, architecture, etc.) in the form of a binary code, which will allow searching f... 详细信息
来源: 评论
Proceedings - 12th ieee international conference and workshop on the engineering of computer-based System, ECS: Foreword
Proceedings - 12th IEEE International Conference and Worksho...
收藏 引用
Proceedings - 12th ieee international conference and workshops on the engineering of computer-based systems, ECS 2005 2005年 x页
作者: Hinchey, Michael Rozenblit, Jerzy Leaney, John O'Neill, Tim
No abstract available
来源: 评论