咨询与建议

限定检索结果

文献类型

  • 3,107 篇 会议
  • 46 篇 期刊文献
  • 11 册 图书

馆藏范围

  • 3,164 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,948 篇 工学
    • 1,690 篇 计算机科学与技术...
    • 854 篇 软件工程
    • 551 篇 电气工程
    • 275 篇 控制科学与工程
    • 273 篇 信息与通信工程
    • 92 篇 电子科学与技术(可...
    • 80 篇 机械工程
    • 75 篇 动力工程及工程热...
    • 60 篇 生物工程
    • 50 篇 仪器科学与技术
    • 49 篇 安全科学与工程
    • 34 篇 生物医学工程(可授...
    • 33 篇 交通运输工程
    • 29 篇 土木工程
    • 28 篇 建筑学
    • 23 篇 航空宇航科学与技...
    • 22 篇 光学工程
    • 21 篇 石油与天然气工程
  • 333 篇 理学
    • 181 篇 数学
    • 67 篇 生物学
    • 65 篇 系统科学
    • 55 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 28 篇 化学
  • 247 篇 管理学
    • 193 篇 管理科学与工程(可...
    • 118 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 32 篇 医学
    • 26 篇 临床医学
    • 23 篇 基础医学(可授医学...
  • 25 篇 法学
    • 25 篇 社会学
  • 19 篇 经济学
  • 12 篇 农学
  • 8 篇 军事学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 501 篇 real time system...
  • 477 篇 real-time system...
  • 276 篇 embedded systems
  • 162 篇 processor schedu...
  • 157 篇 hardware
  • 132 篇 computational mo...
  • 131 篇 computer archite...
  • 125 篇 embedded system
  • 119 篇 timing
  • 92 篇 embedded computi...
  • 88 篇 energy consumpti...
  • 85 篇 application soft...
  • 85 篇 monitoring
  • 84 篇 protocols
  • 82 篇 scheduling
  • 80 篇 resource managem...
  • 75 篇 control systems
  • 75 篇 delay
  • 70 篇 computer science
  • 70 篇 program processo...

机构

  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 8 篇 chongqing univ c...
  • 8 篇 city university ...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 malardalen univ ...
  • 6 篇 scuola super san...
  • 6 篇 uppsala universi...
  • 6 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 univ texas san a...
  • 5 篇 waseda univ dept...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 univ politecn va...
  • 5 篇 univ houston dep...
  • 5 篇 department of co...
  • 5 篇 malardalen univ ...

作者

  • 14 篇 thomas nolte
  • 13 篇 nolte thomas
  • 12 篇 jian-jia chen
  • 12 篇 tei-wei kuo
  • 12 篇 anderson james h...
  • 12 篇 nakajima tatsuo
  • 11 篇 meikang qiu
  • 11 篇 james h. anderso...
  • 10 篇 shao zili
  • 10 篇 chen jian-jia
  • 9 篇 nobuyuki yamasak...
  • 8 篇 dakai zhu
  • 8 篇 kuo tei-wei
  • 8 篇 tovar eduardo
  • 8 篇 chun jason xue
  • 8 篇 wang yi
  • 8 篇 cheng albert m. ...
  • 8 篇 nan guan
  • 7 篇 shinpei kato
  • 7 篇 kato shinpei

语言

  • 3,131 篇 英文
  • 26 篇 其他
  • 8 篇 中文
  • 1 篇 俄文
检索条件"任意字段=12th International Conference on Embedded and Real-Time Computing Systems and Applications"
3164 条 记 录,以下是3001-3010 订阅
排序:
An embedded real-time vision system for 24-hour indoor/outdoor car-counting applications
An embedded real-time vision system for 24-hour indoor/outdo...
收藏 引用
international conference on Pattern Recognition
作者: Ming-Yee Chiu R. Depommier T. Spindler Setrix Inc. Princeton NJ USA Setrix AG Munich Germany
We describe an embedded vision system, which integrates a Web-cam quality CMOS imaging chip with a RISC processor, to perform real-time car-counting functions in the indoor and outdoor environment. the challenge of th... 详细信息
来源: 评论
Automatic SQNR determination in non-linear and non-recursive fixed-point systems
Automatic SQNR determination in non-linear and non-recursive...
收藏 引用
European Signal Processing conference (EUSIPCO)
作者: D. Menard R. Rocher P. Scalart O. Sentieys IRISA/ENSSAT University of Rennes I Lannion FRANCE
Most of the digital signal processing applications are implemented in embedded systems which are based on fixed-point arithmetic. the reduction of the time-to-market requires the automation of the fixed-point specific... 详细信息
来源: 评论
An energy-efficient route maintenance scheme for ad hoc networking systems
An energy-efficient route maintenance scheme for ad hoc netw...
收藏 引用
9th international conference on real-time and embedded computing systems and applications, RTCSA 2003
作者: Ou, DongXiu Lam, Kam-Yiu Dong, DeCun Department of Computer Science City University of Hong Kong 83 Tat Chee Avenue Kowloon Hong Kong Institute of Traffic Information Engineering Tong Ji University Shanghai China
Although in recent years many excellent works have been done on resolving the routing problem in ad hoc networking systems, the energy issue in route maintenance has been greatly ignored. Due to movement of mobile hos... 详细信息
来源: 评论
Secure multicast model for ad-hoc military networks
Secure multicast model for ad-hoc military networks
收藏 引用
IEEE international conference on Networks
作者: M. Choudhary P. Sharma D. Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur India
Multicasting is an efficient way to deliver real time data to a large group of users in the battle field military applications. the very nature of military applications necessitates the use of security features such a... 详细信息
来源: 评论
Motion capture from inertial sensing for untethered humanoid teleoperation
Motion capture from inertial sensing for untethered humanoid...
收藏 引用
IEEE-RAS international conference on Humanoid Robots
作者: N. Miller O.C. Jenkins M. Kallmann M.J. Mataric Department of Computer Science California State University Bakersfield CA USA Center of Robotics Embedded Systems Interaction Laboratory Los Angeles CA USA
We describe the design of a modular system for untethered real-time kinematic motion capture using sensors with inertial measuring units (IMU). Our system is comprised of a set of small and lightweight sensors. Each s... 详细信息
来源: 评论
Design and implementation of a dynamic protocol framework
Design and implementation of a dynamic protocol framework
收藏 引用
IEEE international conference on Networks
作者: LiMing An Hung-ICeng Pung LiFeng Zhou Network Systems and Services Lab School of Computing National University of Singapore Singapore
Future distributed applications are expected to be deployed in an environment that is more dynamic and heterogeneous than ever before. the environment features are difficult to predict beforehand due to their variatio... 详细信息
来源: 评论
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
An efficient hidden Markov model training scheme for anomaly...
收藏 引用
IEEE international conference on Networks
作者: X.A. Hoang J. Hu School of Computer Science and Information Technology RMIT University Melbourne VIC Australia
Recently hidden Markov model (HMM) has been proved to be a good tool to model normal behaviours of privileged processes for anomaly intrusion detection based on system calls. However, one major problem with this appro... 详细信息
来源: 评论
On computing maximum likelihood phylogeny using FPGA  14th
On computing maximum likelihood phylogeny using FPGA
收藏 引用
14th international conference on Field Programmable Logic and applications, FPL 2004
作者: Mak, Terrence S. T. Lam, K.P. Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong
Phylogenetic tree (or phylogeny) is a meaningful tree representation for the evolutionary history of different organisms that it has been shown useful in drug discovery, virus identification and functional genomic stu... 详细信息
来源: 评论
Reliability of MEMS-based storage enclosures
Reliability of MEMS-based storage enclosures
收藏 引用
international Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication systems (MASCOTS)
作者: Bo Hong T.J.E. Schwarz S.A. Brandtt D.D.E. Long Storage Systems Research Center University of California Santa Cruz CA USA Computer Engineering Department Santa Clara University Santa Clara CA
MEMS-based storage is a new, non-volatile storage technology currently under development. It promises fast data access, high throughput, high storage density, small physical size, low power consumption, and low entry ... 详细信息
来源: 评论
Improving real-time system configuration via a QoS-aware CORBA component model
Improving real-time system configuration via a QoS-aware COR...
收藏 引用
Annual Hawaii international conference on System Sciences (HICSS)
作者: Nanbor Wang C. Gill Department of Computer Science and Engineering Washington University Saint Louis MO USA
A fundamental tension exists in systems research and practice between (1) hiding extraneous details to simplify the system programming model, and (2) revealing crucial details to allow better customization to particul... 详细信息
来源: 评论