咨询与建议

限定检索结果

文献类型

  • 3,145 篇 会议
  • 43 篇 期刊文献
  • 21 册 图书
  • 1 篇 学位论文

馆藏范围

  • 3,210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,901 篇 工学
    • 1,681 篇 计算机科学与技术...
    • 890 篇 软件工程
    • 544 篇 电气工程
    • 292 篇 信息与通信工程
    • 251 篇 控制科学与工程
    • 93 篇 电子科学与技术(可...
    • 71 篇 动力工程及工程热...
    • 66 篇 机械工程
    • 60 篇 生物工程
    • 53 篇 安全科学与工程
    • 49 篇 网络空间安全
    • 46 篇 交通运输工程
    • 43 篇 仪器科学与技术
    • 36 篇 建筑学
    • 30 篇 生物医学工程(可授...
    • 27 篇 土木工程
    • 25 篇 光学工程
    • 20 篇 环境科学与工程(可...
  • 324 篇 理学
    • 171 篇 数学
    • 65 篇 生物学
    • 61 篇 物理学
    • 54 篇 系统科学
    • 32 篇 统计学(可授理学、...
    • 20 篇 化学
  • 263 篇 管理学
    • 210 篇 管理科学与工程(可...
    • 134 篇 工商管理
    • 68 篇 图书情报与档案管...
  • 40 篇 法学
    • 36 篇 社会学
  • 26 篇 医学
    • 23 篇 临床医学
  • 21 篇 经济学
    • 21 篇 应用经济学
  • 11 篇 农学
  • 9 篇 教育学
  • 9 篇 军事学
  • 8 篇 文学
  • 1 篇 艺术学

主题

  • 521 篇 real-time system...
  • 514 篇 real time system...
  • 254 篇 embedded systems
  • 150 篇 processor schedu...
  • 137 篇 hardware
  • 132 篇 embedded system
  • 129 篇 computational mo...
  • 118 篇 computer archite...
  • 111 篇 timing
  • 88 篇 energy consumpti...
  • 88 篇 embedded computi...
  • 85 篇 resource managem...
  • 83 篇 control systems
  • 83 篇 protocols
  • 77 篇 application soft...
  • 73 篇 monitoring
  • 70 篇 delay
  • 69 篇 computer science
  • 69 篇 scheduling
  • 68 篇 scheduling algor...

机构

  • 11 篇 department of co...
  • 8 篇 malardalen univ ...
  • 8 篇 city university ...
  • 7 篇 college of compu...
  • 7 篇 eindhoven univer...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 scuola super san...
  • 6 篇 uppsala universi...
  • 6 篇 malardalen univ ...
  • 6 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 evidence srl pis...
  • 5 篇 chongqing univ c...
  • 5 篇 department of co...
  • 5 篇 george mason uni...
  • 5 篇 univ politecn va...
  • 5 篇 department of co...

作者

  • 15 篇 nolte thomas
  • 14 篇 thomas nolte
  • 12 篇 jian-jia chen
  • 12 篇 tei-wei kuo
  • 12 篇 anderson james h...
  • 11 篇 james h. anderso...
  • 11 篇 chen jian-jia
  • 10 篇 nobuyuki yamasak...
  • 10 篇 nakajima tatsuo
  • 9 篇 shao zili
  • 8 篇 khalgui mohamed
  • 8 篇 dakai zhu
  • 8 篇 kuo tei-wei
  • 8 篇 xue chun jason
  • 8 篇 tovar eduardo
  • 8 篇 chun jason xue
  • 8 篇 chakraborty sama...
  • 8 篇 cheng albert m. ...
  • 8 篇 nan guan
  • 8 篇 wei zhang

语言

  • 3,171 篇 英文
  • 34 篇 其他
  • 5 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"任意字段=11th International Conference on Embedded and Real-Time Computing Systems and Applications"
3210 条 记 录,以下是991-1000 订阅
排序:
Test-driven modeling and development of cloud-enabled cyber-physical smart systems  11
Test-driven modeling and development of cloud-enabled cyber-...
收藏 引用
11th Annual IEEE international systems conference (SysCon)
作者: Munck, Allan Madsen, Jan Tech Univ Denmark Dept Appl Math & Comp Sci Sect Embedded Syst Engn Lyngby Denmark
embedded products currently tend to evolve into large and complex smart systems where products are enriched with services through clouds and other web technologies. the complex characteristics of smart systems make it... 详细信息
来源: 评论
Detecting Permission Over-claim of Android applications with Static and Semantic Analysis Approach  16
Detecting Permission Over-claim of Android Applications with...
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications / the 11th IEEE international conference on Big Data Science and Engineering / the 14th IEEE international conference on embedded Software and systems
作者: Tang, Junwei Li, Ruixuan Han, Hongmu Zhang, Heng Gu, Xiwu Huazhong Univ Sci & Technol Sch Comp Sci & Technol Wuhan 430074 Peoples R China
Android access control granularity based on its permission mechanism is relatively coarse, which cannot effectively protect the user privacy. Many Android applications do not strictly abide by the principle of least p... 详细信息
来源: 评论
One-Round Provably Secure Yoking-Proof for RFID applications  16
One-Round Provably Secure Yoking-Proof for RFID Applications
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications / the 11th IEEE international conference on Big Data Science and Engineering / the 14th IEEE international conference on embedded Software and systems
作者: Sun, Da-Zhi Xu, Guang-Quan Tianjin Univ Sch Comp Sci & Technol Tianjin Key Lab Adv Networking TANK Tianjin Peoples R China Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Univ Wollongong Sch Comp & Informat Technol Wollongong NSW Australia
Under the Internet of things (IoT), the coexistence proof of multiple RFID tagged objects becomes a very useful mechanism in many application areas such as health care, evidences in court, and stores. the yoking-proof... 详细信息
来源: 评论
Edge Detection in Static and Dynamic Environments using Robot Swarms  11
Edge Detection in Static and Dynamic Environments using Robo...
收藏 引用
11th IEEE international conference on Self-Adaptive and Self-Organizing systems (SASO)
作者: Khaluf, Yara Univ Ghent Dept Informat Technol IMEC IDLab Ghent Belgium
Robotic systems offer an attractive solution for a large spectrum of real-world applications that are hosted in dangerous or inaccessible areas for humans. In such applications, one of the fundamental tasks is to dete... 详细信息
来源: 评论
Software Technologies  1st ed. 2017
收藏 引用
丛书名: Communications in Computer and Information Science
2017年
作者: Enrique Cabello Jorge Cardoso André Ludwig Leszek A. Maciaszek Marten van Sinderen
this book constitutes the thoroughly refereed proceedings of the 11th international Joint conference on Software Technologies, ICSOFT 2016, held in Lisbon, Portugal, in July 2016. the 13 revised full papers together w...
来源: 评论
Design and Implementation of WebRTC-Based Video conference System in Odroid Board
Design and Implementation of WebRTC-Based Video Conference S...
收藏 引用
international conference on Telecommunication systems, Services, and applications (TSSA)
作者: Bryan Christy Purba Muhammad Diva Pasha Yoanes Bandung School of Electrical Engineering and Informatics Institut Teknologi Bandung Bandung Indonesia
this paper presents design of a real-time WebRTC-based video conference system implemented in Odroid embedded board. this research aims to design a low-cost video conference system but with sufficient quality for supp... 详细信息
来源: 评论
A Reconfigurable Wideband Streaming Channeliser for RF Sensing applications: A Multiple GPU-Based Implementation  11
A Reconfigurable Wideband Streaming Channeliser for RF Sensi...
收藏 引用
11th international conference on Signal Processing and Communication systems (ICSPCS)
作者: Faulkner, Simon Elton, Stephen D. Lamahewa, tharaka A. Roberts, David Def Sci & Technol Grp Cyber & Elect Warfare Div Edinburgh SA 5111 Australia
this paper describes the design and implementation of a reconfigurable, software-defined spectral channeliser for radio frequency (RF) spectrum sensing applications. the software-based design targets a parallel, multi... 详细信息
来源: 评论
Estimation filtering for Deep Water Navigation
Estimation filtering for Deep Water Navigation
收藏 引用
11th IFAC conference on Control applications in Marine systems, Robotics, and Vehicles (CAMS)
作者: Costanzi, Riccardo Fenucci, Davide Caiti, Andrea Micheli, Michele Vermeij, Arjan Tesei, Alessandra Munafo, Andrea Univ Pisa Dipartimento Ingn Informaz Pisa Italy Univ Pisa Ctr Ric E Piaggio Pisa Italy ISME Interuniv Ctr Integrated Syst Marine Environm Genoa Italy NATO STO Ctr Maritime Res & Expt La Spezia Italy Natl Oceanog Ctr Marine Autonomous & Robot Syst Southampton Hants England
the navigation task for Unmanned Underwater Vehicles is made difficult in a deep water scenario because of the lack of bottom lock for Doppler Velocity Log (DVL). this is due to the operating altitude that, for this k... 详细信息
来源: 评论
11th international Joint conference on Software Technologies, ICSOFT 2016
11th International Joint Conference on Software Technologies...
收藏 引用
11th international Joint conference on Software Technologies, ICSOFT 2016
the proceedings contain 16 papers. the special focus in this conference is on Software Technologies. the topics include: Collaboration viewpoint for modeling cross organizational business concerns;a new approach for a...
来源: 评论
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics  16
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare N...
收藏 引用
16th IEEE international conference on Trust, Security and Privacy in computing and Communications / the 11th IEEE international conference on Big Data Science and Engineering / the 14th IEEE international conference on embedded Software and systems
作者: Zhang, Peng Zhang, Xiafei Sun, Xiaoqiang Liu, Joseph K. Yu, Jianping Jiang, Zoe L. Shenzhen Univ Coll Informat Engn ATR Key Lab Natl Def Technol Shenzhen Peoples R China Shenzhen Univ Coll Informat Engn Shenzhen Peoples R China Monash Univ Fac Informat Technol Melbourne Vic Australia Harbin Inst Technol Shenzhen Grad Sch Shenzhen Peoples R China
Mobile Healthcare Networks (MHN) continuously collect the patients' health data sensed by wearable devices, and analyze the collected data pre-processed by servers combined with medical histories, such that diseas... 详细信息
来源: 评论