咨询与建议

限定检索结果

文献类型

  • 1,548 篇 会议
  • 51 篇 期刊文献
  • 35 册 图书

馆藏范围

  • 1,632 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 1,173 篇 工学
    • 869 篇 计算机科学与技术...
    • 556 篇 软件工程
    • 135 篇 电气工程
    • 122 篇 控制科学与工程
    • 92 篇 信息与通信工程
    • 91 篇 土木工程
    • 88 篇 机械工程
    • 76 篇 建筑学
    • 60 篇 安全科学与工程
    • 58 篇 材料科学与工程(可...
    • 40 篇 交通运输工程
    • 37 篇 动力工程及工程热...
    • 33 篇 化学工程与技术
    • 28 篇 生物工程
    • 27 篇 仪器科学与技术
    • 25 篇 力学(可授工学、理...
    • 22 篇 环境科学与工程(可...
  • 329 篇 理学
    • 226 篇 数学
    • 75 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 43 篇 物理学
    • 42 篇 生物学
    • 27 篇 化学
  • 216 篇 管理学
    • 154 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 31 篇 医学
    • 24 篇 基础医学(可授医学...
    • 23 篇 临床医学
  • 30 篇 法学
    • 27 篇 社会学
  • 24 篇 经济学
    • 23 篇 应用经济学
  • 17 篇 教育学
  • 15 篇 文学
  • 10 篇 农学
  • 6 篇 艺术学
  • 5 篇 军事学

主题

  • 68 篇 model checking
  • 43 篇 tools
  • 35 篇 algorithm design...
  • 28 篇 software enginee...
  • 28 篇 static analysis
  • 26 篇 data mining
  • 23 篇 stochastic syste...
  • 20 篇 real time system...
  • 20 篇 computational mo...
  • 20 篇 analytical model...
  • 17 篇 hybrid systems
  • 17 篇 real-time system...
  • 17 篇 machine learning
  • 17 篇 testing
  • 16 篇 software tools
  • 16 篇 optimization
  • 16 篇 computers
  • 16 篇 sentiment analys...
  • 16 篇 software
  • 16 篇 data models

机构

  • 26 篇 rhein westfal th...
  • 13 篇 ludwig maximilia...
  • 8 篇 univ penn philad...
  • 7 篇 univ twente ensc...
  • 7 篇 univ twente form...
  • 7 篇 tech univ munich...
  • 6 篇 univ illinois ur...
  • 5 篇 saarland univ sa...
  • 5 篇 rhein westfal th...
  • 5 篇 chinese acad sci...
  • 5 篇 suny stony brook...
  • 5 篇 univ calif berke...
  • 5 篇 univ texas austi...
  • 4 篇 radboud univ nij...
  • 4 篇 verimag ctr equa...
  • 3 篇 university of wa...
  • 3 篇 vienna universit...
  • 3 篇 univ colorado bo...
  • 3 篇 tu wien austria
  • 3 篇 carnegie mellon ...

作者

  • 22 篇 katoen joost-pie...
  • 14 篇 beyer dirk
  • 10 篇 junges sebastian
  • 9 篇 parker david
  • 9 篇 hermanns holger
  • 8 篇 quatmann tim
  • 7 篇 kwiatkowska mart...
  • 6 篇 van de pol jaco
  • 6 篇 yi w
  • 6 篇 hartmanns arnd
  • 5 篇 majumdar rupak
  • 5 篇 podelski andreas
  • 5 篇 bozga marius
  • 5 篇 alur rajeev
  • 5 篇 pettersson p
  • 5 篇 cimatti alessand...
  • 5 篇 norman gethin
  • 4 篇 behrmann gerd
  • 4 篇 latella diego
  • 4 篇 ruys theo c.

语言

  • 1,573 篇 英文
  • 30 篇 其他
  • 15 篇 德文
  • 9 篇 中文
  • 4 篇 葡萄牙文
  • 3 篇 俄文
  • 1 篇 捷克文
检索条件"任意字段=11th International Conference on Tools and Algorithms for the Construction and Analysis of Systems"
1634 条 记 录,以下是321-330 订阅
排序:
ICAI 2020 - Proceedings of the 11th international conference on Applied Informatics
ICAI 2020 - Proceedings of the 11th International Conference...
收藏 引用
11th international conference on Applied Informatics, ICAI 2020
the proceedings contain 44 papers. the topics discussed include: automatic tag recommendation for news articles;are computational thinking skills measurable? an analysis;implementing a new interface for directed graph...
来源: 评论
Automated Verification of Parallel Nested DFS  26th
Automated Verification of Parallel Nested DFS
收藏 引用
26th international conference on tools and algorithms for construction and analysis of systems (TACAS)
作者: Oortwijn, Wytse Huisman, Marieke Joosten, Sebastiaan J. C. van de Pol, Jaco Swiss Fed Inst Technol Dept Comp Sci Zurich Switzerland Univ Twente Formal Methods & Tools Enschede Netherlands Dartmouth Coll Hanover NH 03755 USA Aarhus Univ Dept Comp Sci Aarhus Denmark
Model checking algorithms are typically complex graph algorithms, whose correctness is crucial for the usability of a model checker. However, establishing the correctness of such algorithms can be challenging and is o... 详细信息
来源: 评论
Interpretation-Based Violation Witness Validation for C: NITWIT  26th
Interpretation-Based Violation Witness Validation for C: NIT...
收藏 引用
26th international conference on tools and algorithms for construction and analysis of systems (TACAS)
作者: Svejda, Jan Berger, Philipp Katoen, Joost-Pieter Rhein Westfal TH Aachen Aachen Germany
As software verification is gaining traction in academia and industry the number and complexity of verification tools is growing constantly. this initiated research and interest into exchangeable verification witnesse... 详细信息
来源: 评论
analysis and processing of environmental monitoring system  11
Analysis and processing of environmental monitoring system
收藏 引用
11th international conference on Ambient systems, Networks and Technologies (ANT) / 3rd international conference on Emerging Data and Industry 4.0 (EDI)
作者: Pyagay, Viktor T. Sarsenova, Zhibek N. Duisebekova, Kulyanda S. Duzbayev, Nurzhan T. Albanbai, Nurtai Int Informat Technol Univ 34-1 Manas Str Alma Ata 050040 Kazakhstan Kazakh Natl Univ 71 Al Farabi Ave Alma Ata 050040 Kazakhstan
In this article, the problem of monitoring of climatic and ecological condition of the region is considered. the authors propose an approach to the construction of such systems using the LoRaWAN (Long Range Wide Area ... 详细信息
来源: 评论
MUST: Minimal Unsatisfiable Subsets Enumeration Tool  26th
MUST: Minimal Unsatisfiable Subsets Enumeration Tool
收藏 引用
26th international conference on tools and algorithms for construction and analysis of systems (TACAS)
作者: Bendik, Jaroslav Cerna, Ivana Masaryk Univ Fac Informat Brno Czech Republic
In many areas of computer science, we are given an unsatisfiable set of constraints with the goal to provide an insight into the unsatisfiability. One of common approaches is to identify minimal unsatisfiable subsets ... 详细信息
来源: 评论
Development of Recommendation System in e-Commerce using Emotional analysis and Machine Learning Methods
Development of Recommendation System in e-Commerce using Emo...
收藏 引用
IEEE international Workshop on Intelligent Data Acquisition and Advanced Computing systems: Technology and Applications
作者: Taras Mykhalchuk Tetiana Zatonatska Oleksandr Dluhopolskyi Alina Zhukovska Tetiana Dluhopolska Larysa Liakhovych Taras Shevchenko National University of Kyiv Kyiv West Ukrainian National University Ternopil
the article identifies the theoretical aspects of e-commerce as an economic category, the problems of the current state of the e-commerce market related to the COVID-19 pandemic, consumer distrust and less functionali... 详细信息
来源: 评论
analysis of External Power Source in Agricultural Fields Energy Management System
Analysis of External Power Source in Agricultural Fields Ene...
收藏 引用
international conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: thiagarajan Kittappa Bhukya Shankar Vikas Bhimrao Pawar T. Sheela R. Sasikala B V.Febiyola Justin PM Murali Department of Mathematics Rajalakshmi Institute of Technology Poonamalle Chennai Department of Electronics and Communication Engineering CVR College of Engineering Ibrahimpatnam Hyderabad Department of Applied Science Bharati Vidyapeeth College of Engineering Navi Mumbai ECE Vinayaka Mission's Kirupananda Variyar Engineering College (Vinayaka Mission's Research Foundation (Deemed to be University) Salem Department of MBA S.A.Engineering College (Autonomous) Chennai Department of Biochemistry St. Peter's institute of Higher education and Research Avadi Chennai Department of Management Studies and ECE Vinayaka Mission's Kirupananda Variyar Engineering College Vinayaka Mission's Research Foundation Deemed to be University Salem India
Renewable energy plants integrated are obtained locally, including hydro, biogas, as well as solar. the construction of hydropower and biogas with while solar power plants were constructed. the primary issue is that a... 详细信息
来源: 评论
Multi-Agent Safety Verification using Symmetry Transformations  26th
Multi-Agent Safety Verification using Symmetry Transformatio...
收藏 引用
26th international conference on tools and algorithms for construction and analysis of systems (TACAS)
作者: Sibai, Hussein Mokhlesi, Navid Fan, Chuchu Mitra, Sayan Univ Illinois Urbana IL 61801 USA
We show that symmetry transformations and caching can enable scalable, and possibly unbounded, verification of multi-agent systems. Symmetry transformations map any solution of the system to another solution. We show ... 详细信息
来源: 评论
Cybersecurity Methodology for Specialized Behavior analysis  1
收藏 引用
11th international conference on Digital Forensics and Cyber Crime
作者: Padilla, Edgar Acosta, Jaime C. Kiekintveld, Christopher D. Univ Texas El Paso El Paso TX 79968 USA CCDC Army Res Lab Adelphi MD 20783 USA
Analyzing attacker behavior and generating realistic models to accurately capture the realities of cybersecurity threats is a very challenging task for researchers. Psychological personality and profiling studies prov... 详细信息
来源: 评论
tools and algorithms for the construction and analysis of systems : 5th international conference, Tacas '99, Held as Part of the Joint European conferences on theory and Practice of Software, Etaps '99, Amsterdam, the Netherlands, March 22-28, 1999 : Proceedings
收藏 引用
2016年
作者: w. r. cleaveland
tools and algorithms for the construction and analysis of systems : 5th international conference, Tacas '99, Held as Part of the Joint European conferences on theory and Practice of Software, Etaps '99, Amster... 详细信息
来源: 评论