咨询与建议

限定检索结果

文献类型

  • 3,106 篇 会议
  • 46 篇 期刊文献
  • 11 册 图书

馆藏范围

  • 3,163 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,948 篇 工学
    • 1,690 篇 计算机科学与技术...
    • 855 篇 软件工程
    • 552 篇 电气工程
    • 276 篇 控制科学与工程
    • 273 篇 信息与通信工程
    • 93 篇 电子科学与技术(可...
    • 80 篇 机械工程
    • 75 篇 动力工程及工程热...
    • 60 篇 生物工程
    • 50 篇 仪器科学与技术
    • 49 篇 安全科学与工程
    • 34 篇 生物医学工程(可授...
    • 33 篇 交通运输工程
    • 29 篇 土木工程
    • 28 篇 建筑学
    • 23 篇 航空宇航科学与技...
    • 22 篇 光学工程
    • 21 篇 石油与天然气工程
  • 333 篇 理学
    • 181 篇 数学
    • 67 篇 生物学
    • 65 篇 系统科学
    • 55 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 28 篇 化学
  • 247 篇 管理学
    • 193 篇 管理科学与工程(可...
    • 118 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 32 篇 医学
    • 26 篇 临床医学
    • 23 篇 基础医学(可授医学...
  • 25 篇 法学
    • 25 篇 社会学
  • 19 篇 经济学
  • 12 篇 农学
  • 8 篇 军事学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 501 篇 real time system...
  • 477 篇 real-time system...
  • 275 篇 embedded systems
  • 162 篇 processor schedu...
  • 157 篇 hardware
  • 132 篇 computational mo...
  • 131 篇 computer archite...
  • 125 篇 embedded system
  • 119 篇 timing
  • 92 篇 embedded computi...
  • 88 篇 energy consumpti...
  • 85 篇 application soft...
  • 85 篇 monitoring
  • 84 篇 protocols
  • 82 篇 scheduling
  • 80 篇 resource managem...
  • 75 篇 control systems
  • 75 篇 delay
  • 70 篇 computer science
  • 70 篇 program processo...

机构

  • 10 篇 college of compu...
  • 10 篇 department of co...
  • 8 篇 chongqing univ c...
  • 8 篇 city university ...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 malardalen univ ...
  • 6 篇 scuola super san...
  • 6 篇 uppsala universi...
  • 6 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 univ texas san a...
  • 5 篇 waseda univ dept...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 univ politecn va...
  • 5 篇 univ houston dep...
  • 5 篇 department of co...
  • 5 篇 malardalen univ ...

作者

  • 14 篇 thomas nolte
  • 13 篇 nolte thomas
  • 12 篇 jian-jia chen
  • 12 篇 tei-wei kuo
  • 12 篇 anderson james h...
  • 12 篇 nakajima tatsuo
  • 11 篇 meikang qiu
  • 11 篇 james h. anderso...
  • 10 篇 shao zili
  • 10 篇 chen jian-jia
  • 9 篇 nobuyuki yamasak...
  • 8 篇 dakai zhu
  • 8 篇 kuo tei-wei
  • 8 篇 tovar eduardo
  • 8 篇 chun jason xue
  • 8 篇 wang yi
  • 8 篇 cheng albert m. ...
  • 8 篇 nan guan
  • 7 篇 shinpei kato
  • 7 篇 kato shinpei

语言

  • 3,130 篇 英文
  • 26 篇 其他
  • 10 篇 中文
  • 1 篇 俄文
检索条件"任意字段=12th International Conference on Embedded and Real-Time Computing Systems and Applications"
3163 条 记 录,以下是41-50 订阅
排序:
Classifiers for Human Pose Recognition: Analysis for real-time applications  12th
Classifiers for Human Pose Recognition: Analysis for Real-Ti...
收藏 引用
12th international conference on Recent Trends in computing, ICRTC 2024
作者: Panchal, Piyush Tirkey, Nikhil Singh, Kaustubh Ranjan Bawana Road Delhi110042 India
Action detection is a rapidly growing field that involves identifying and tracking particular body key points in photos/videos to ascertain an individual’s action. Its difficulties arise from the natural fluctuations... 详细信息
来源: 评论
2018 14th IEEE/ASME international conference on Mechatronic and embedded systems and applications, MESA 2018
2018 14th IEEE/ASME International Conference on Mechatronic ...
收藏 引用
14th IEEE/ASME international conference on Mechatronic and embedded systems and applications, MESA 2018
the proceedings contain 60 papers. the topics discussed include: sensor-embedded linear ball bearing for linear guide way pre-load and straightness monitoring;multi-robot coordination through mobile agent;research of ...
来源: 评论
Reliability of IoT systems for Fire Detection  16
Reliability of IoT Systems for Fire Detection
收藏 引用
16th international conference on ENTERprise Information systems, CENTERIS 2024 - 12th international conference on Project MANagement, ProjMAN 2024 - 14th international conference on Health and Social Care Information systems and Technologies, HCist 2024
作者: Singh, Khushwant Yadav, Mohit Barak, Dheerdhwaj Moreira, Fernando Department of Computer Science & Engineering U.I.E.T Maharshi Dayanand University Rohtak124001 India Department of Mathematics University Institute of Sciences Chandigarh University Punjab Mohali140413 India Department of Computer Science & Engineering Vaish College of Engineering Rohtak124001 India REMIT IJP Universidade Portucalense Porto & IEETA Universidade de Aveiro Aveiro Portugal
In this paper, a smart IoT system including the software and hardware aspects of its design, as well as its operation in the context of a city or a building, along with its advantages, disadvantages, and potential app... 详细信息
来源: 评论
FDA-TO-FCA: Flow Direction Algorithm-Based Task Offloading in Fog-Cloud Architecture  4th
FDA-TO-FCA: Flow Direction Algorithm-Based Task Offloading i...
收藏 引用
4th international conference on Smart IoT systems: Innovations and computing, SSIC 2023
作者: Shukla, Prashant Pandey, Sudhakar Gupta, Shivani Agrawal, Deepika Department of IT NIT Chhattisgarh Raipur492010 India Department of CSE IIT Bihar Patna801106 India
With the development of a lot of delay-sensitive applications, it is very difficult to perform all the tasks locally because our devices have less computation power. Traditional Cloud Server (CS) has large computing p... 详细信息
来源: 评论
Sentimental Insights: A Study of Margaret Atwood’s Oryx and Crake Using Natural Language Processing (NLP) Tool NVivo12  12th
Sentimental Insights: A Study of Margaret Atwood’s Oryx and...
收藏 引用
12th international conference on Frontiers of Intelligent computing: theory and applications, FICTA 2024
作者: Sharma, Mohit Balhara, Nikita Chandigarh University Mohali India
the present study is an attempt to develop a working segregation of words used in Margaret Atwood’s Oryx and Crake. It functions around the exploration of the sentiments prevailing in the text. the narration is origi... 详细信息
来源: 评论
Unlocking potential: Critical success factors for AI integration in remote patient monitoring systems for post-cardiac surgery care  16
Unlocking potential: Critical success factors for AI integra...
收藏 引用
16th international conference on ENTERprise Information systems, CENTERIS 2024 - 12th international conference on Project MANagement, ProjMAN 2024 - 14th international conference on Health and Social Care Information systems and Technologies, HCist 2024
作者: Schmocker, Roberto Sampaio, Suzana Cormican, Kathryn Enterprise Research Centre and LERO The Irish Software Research Centre School of Engineering University of Galway H91 TK33 Ireland Federal Rural University of Pernambuco PE Recife Brazil
Rising healthcare costs have led to a shift towards cost-effective medical technologies that enhance clinical outcomes. Remote Patient Monitoring (RPM) systems enable real-time data collection, reducing hospital stays... 详细信息
来源: 评论
Decision systems Optimization for Cybersecurity Resilience  12th
Decision Systems Optimization for Cybersecurity Resilience
收藏 引用
12th international conference on Frontiers of Intelligent computing: theory and applications, FICTA 2024
作者: Ikhar, Sharayu Mondal, Dipannita Khubalkar, Deepti Yadav, Ranjeev Deshpande, Pallavi Patil, Sonali Vrushabhasagar Yashika Journal Publications Pvt. Ltd Maharashtra Wardha India Artificial Intelligence and Data Science Department Dr. Y. Patil College of Engineering and Innovation Telegaon410507 India Nagpur Campus Pune India Computer Science and Engineering Arya College of Engineering Jaipur India EnTC VIIT Pune India Nutan Maharashtra Institute of Engineering and Technology Maharashtra Pune India
the increasing danger in the online environment highlights the necessity for strong and durable cybersecurity solutions. this study aims to improve Intrusion Detection systems (IDS) by introducing a new hybrid method ... 详细信息
来源: 评论
AI-Driven Incident Response systems for Cybersecurity: A Hybrid Approach  12th
AI-Driven Incident Response Systems for Cybersecurity: A Hyb...
收藏 引用
12th international conference on Frontiers of Intelligent computing: theory and applications, FICTA 2024
作者: Soni, Monika Pawar, Avinash M. Godbole, Aditee Sharma, Ashutosh Tiwaskar, S.A. Kokane, Chandrakant Deelip Auricle Global Society of Education and Research Bikaner India Bharati Vidyapeeth’s College of Engineering for Women Maharashtra Pune India Nagpur Campus Pune India Electronics and Communication Engineering Arya College of Engineering Jaipur India Computer Engineering VIIT Pune India Nutan Maharashtra Institute of Engineering and Technology Maharashtra Pune India
the increasing complexity and sophistication of cybersecurity threats necessitate the development of strong and flexible incident response systems. this study presents a hybrid methodology that utilizes various machin... 详细信息
来源: 评论
Pronunciation Correction for Hearing Impairment by Web Connection with Volunteers  12th
Pronunciation Correction for Hearing Impairment by Web Conne...
收藏 引用
12th international conference on Frontiers of Intelligent computing: theory and applications, FICTA 2024
作者: Park, JungHyun Chadwick International School Incheon Korea Republic of
Pronunciation plays a crucial role in shaping first impressions during initial conversations, and unclear pronunciation is often misconstrued to be closely linked to intelligence. Consequently, individuals with hearin... 详细信息
来源: 评论
Decision systems for Adaptive Cybersecurity Incident Response  12th
Decision Systems for Adaptive Cybersecurity Incident Respons...
收藏 引用
12th international conference on Frontiers of Intelligent computing: theory and applications, FICTA 2024
作者: Goyal, Dinesh Gandhi, Yatin Dongre, Deepika Shailesh Bhagat, Gorakh P. Pawar, Rohit Department of Computer Engineering Poornima Institute of Engineering and Technology Rajasthan Jaipur India Competent Softwares Maharashtra Pune India Artificial Intelligence and Data Science VIIT Pune India Electronics and Communication Engineering Arya College of Engineering Jaipur India Department of Mechanical Engineering Dr. D. Y. Patil Institute of Technology Pimpri Maharashtra Pune India Shri Ramdeobaba College of Engineering and Management Maharashtra Nagpur India
Traditional methods of responding to cybersecurity incidents often use set playbooks or routines that don’t change, which might not work well with the constantly changing nature of modern cyber dangers. the idea behi... 详细信息
来源: 评论