咨询与建议

限定检索结果

文献类型

  • 4,548 篇 会议
  • 82 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 4,645 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,559 篇 工学
    • 2,365 篇 计算机科学与技术...
    • 1,164 篇 软件工程
    • 494 篇 电气工程
    • 407 篇 信息与通信工程
    • 213 篇 控制科学与工程
    • 212 篇 电子科学与技术(可...
    • 98 篇 网络空间安全
    • 80 篇 动力工程及工程热...
    • 80 篇 生物工程
    • 68 篇 光学工程
    • 65 篇 机械工程
    • 56 篇 生物医学工程(可授...
    • 36 篇 建筑学
    • 30 篇 化学工程与技术
    • 29 篇 环境科学与工程(可...
  • 614 篇 理学
    • 375 篇 数学
    • 144 篇 物理学
    • 93 篇 生物学
    • 74 篇 系统科学
    • 69 篇 统计学(可授理学、...
  • 465 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 129 篇 工商管理
    • 65 篇 公共管理
  • 111 篇 法学
    • 103 篇 社会学
  • 104 篇 医学
    • 73 篇 公共卫生与预防医...
    • 31 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 65 篇 文学
    • 65 篇 新闻传播学
  • 39 篇 经济学
    • 38 篇 应用经济学
  • 17 篇 教育学
  • 10 篇 农学
  • 1 篇 艺术学

主题

  • 1,194 篇 computer archite...
  • 426 篇 hardware
  • 344 篇 high performance...
  • 295 篇 computational mo...
  • 255 篇 concurrent compu...
  • 236 篇 application soft...
  • 214 篇 computer science
  • 205 篇 parallel process...
  • 179 篇 distributed comp...
  • 178 篇 costs
  • 171 篇 delay
  • 170 篇 grid computing
  • 168 篇 bandwidth
  • 164 篇 field programmab...
  • 154 篇 resource managem...
  • 153 篇 cloud computing
  • 144 篇 computer network...
  • 142 篇 throughput
  • 129 篇 processor schedu...
  • 125 篇 scalability

机构

  • 22 篇 institute of com...
  • 16 篇 graphic era deem...
  • 14 篇 chitkara univers...
  • 13 篇 university of ch...
  • 11 篇 college of compu...
  • 10 篇 school of comput...
  • 10 篇 computer science...
  • 9 篇 georgia inst tec...
  • 9 篇 computer systems...
  • 9 篇 intel corp santa...
  • 8 篇 department of co...
  • 8 篇 department of el...
  • 8 篇 ibm thomas j. wa...
  • 8 篇 barcelona superc...
  • 8 篇 mathematics and ...
  • 8 篇 quantum universi...
  • 8 篇 中国电子科技集团...
  • 8 篇 mathematics and ...
  • 8 篇 key laboratory o...
  • 8 篇 univ fed rio gra...

作者

  • 14 篇 navaux philippe ...
  • 10 篇 satvik vats
  • 9 篇 vats satvik
  • 9 篇 i. foster
  • 9 篇 d.k. panda
  • 8 篇 dhabaleswar k. p...
  • 8 篇 dongarra jack
  • 8 篇 loh gabriel h.
  • 8 篇 guedes dorgival
  • 8 篇 viktor k. prasan...
  • 8 篇 prasanna viktor ...
  • 8 篇 mutlu onur
  • 7 篇 shiva mehta
  • 7 篇 borin edson
  • 7 篇 chong frederic t...
  • 7 篇 torrellas josep
  • 7 篇 kim nam sung
  • 7 篇 li chao
  • 7 篇 zhou huiyang
  • 7 篇 ferreira renato

语言

  • 4,522 篇 英文
  • 101 篇 其他
  • 20 篇 中文
  • 3 篇 葡萄牙文
  • 1 篇 法文
检索条件"任意字段=15th Symposium on Computer Architecture and High Performance Computing"
4645 条 记 录,以下是781-790 订阅
排序:
CLEAR: An Efficient Traffic Sign Recognition Technique for Cyber-Physical Transportation Systems
CLEAR: An Efficient Traffic Sign Recognition Technique for C...
收藏 引用
IEEE International Conference on Utility and Cloud computing (UCC)
作者: Meghna Rai Bhawna Khosla Yash Dhawan Himanshi Kharotia Neeraj Kumar Ajay Bandi Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala India Northwest Missouri State University USA
In this modern era, the popularity of autonomous systems has increased manifold because they are replacing people in various jobs and are expected to become the backbone of modern society. Specifically, self-driving v... 详细信息
来源: 评论
Baldur: A Power-Efficient and Scalable Network Using All-Optical Switches  26
Baldur: A Power-Efficient and Scalable Network Using All-Opt...
收藏 引用
26th IEEE International symposium on high performance computer architecture (HPCA)
作者: Jokar, Mohammad Reza Qiu, Junyi Chong, Frederic T. Goddard, Lynford L. Dallesasse, John M. Feng, Milton Li, Yanjing Univ Chicago Dept Comp Sci Chicago IL 60637 USA Univ Illinois Dept Elect & Comp Engn 1406 W Green St Urbana IL 61801 USA
We present the first all-optical network, Baldur, to enable power-efficient and high-speed communications in future exascale computing systems. the essence of Baldur is its ability to perform packet routing on-the-fly... 详细信息
来源: 评论
the Proposal of Fuzzy Observation and Detection of Massive Data DDOS Attack threat  15th
The Proposal of Fuzzy Observation and Detection of Massive D...
收藏 引用
15th National Conference of Operational and Systems Research, BOS 2018 and 17th International Workshop on Intuitionistic Fuzzy Sets and General Nets, IWIFSGN 2018
作者: Zarzycki, Hubert Apiecionek, Lukasz Czerniak, Jacek M. Ewald, Dawid Department of Computer Science Casimir the Great University in Bydgoszcz ul. Chodkiewicza 30 Bydgoszcz85-064 Poland University of Information Technology and Management Copernicus ul. Inowroclawska 56 Wroclaw53-648 Poland
this article presents a potential implementation of OFN notation for discovering and protecting network from Distributed Denial of Service attacks. DDoS attacks are able to block web servers and could be launched from... 详细信息
来源: 评论
Complex Human Activities Recognition Based on high performance 1D CNN Model
Complex Human Activities Recognition Based on High Performan...
收藏 引用
IEEE International symposium on Embedded Multicore Socs (MCSoC)
作者: Raman Maurya T. Hui Teo Shi Hui Chua Hwang-Cherng Chow I-Chyn Wey Engineering Product Development Singapore University of Technology and Design Singapore Engineering Product Development Science Mathematics and Technology Singapore University of Technology and Design Singapore Department of Electronic Engineering Chang Gung University Taiwan Department of Electrical Engineering Chang Gung University Taiwan
Human activity recognition (HAR) is an emerging scientific research field that has wide area of applications in different fields such as healthcare, social-sciences and human-computer interaction etc. In many cases, h... 详细信息
来源: 评论
MANET Routing Protocol performance Comparison: DSDV, AODV, and DSR
MANET Routing Protocol Performance Comparison: DSDV, AODV, a...
收藏 引用
Innovative Approaches in Smart Technologies (ISAS), International symposium on
作者: Kamred Udham Singh Ankit Kumar Gaurav Kumar Tanupriya Choudhury Ketan Kotecha School of Computing Graphic Era Hill University Dehradun India Department of Computer Engineering & Applications GLA University Mathura UP India CSE Dept. Symbiosis Institute of Technology Symbiosis International (Deemed University) Pune Maharashtra India Symbiosis Centre for Applied Artificial Intelligence Symbiosis Institute of Technology Symbiosis International (Deemed University) Pune Maharashtra India
Mobile Ad hoc Networks (MANETs) may self-configure and rely on wireless connections rather than a permanent infrastructure; hence this research delves into their intricacies. this research aims to better understand ho...
来源: 评论
Modelling and analysis of vienna rectifier for more electric aircraft applications using wide band-gap materials  15
Modelling and analysis of vienna rectifier for more electric...
收藏 引用
15th International Engineering and computing Research Conference, EURECA 2021
作者: Loong, Ling Jin Vaithilingam, Chockalingam Aravind Rajendran, Gowthamraj Muneeswaran, Venkatkumar High Impact Research Lab School of Computer Science and Engineering Taylor's University Lakeside Campus Selangor Subang Jaya47500 Malaysia George Green Institute for Electromagnetics Research School of Electrical and Electronic Engineering University of Nottingham NottinghamNG7 2RD United Kingdom
this paper presents a comprehensive study on the switching effects of wide bandgap devices and the importance of power electronics in an aircraft application. Silicon (Si), silicon carbide (SiC), and gallium nitride (... 详细信息
来源: 评论
Advances in Yoga Training Tools: A CNN-RF Based Pose Identification System
Advances in Yoga Training Tools: A CNN-RF Based Pose Identif...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Satvik Vats Shiva Mehta Computer Science and Engineering Graphic Era Hill University Graphic Era Deemed to be University Dehradun India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
A hybrid model that is presented in this article is called CNN-RF which uses convolutional Neural Networks in conjunction with Random Forest algorithms. there is a novel model that supports the task of yin yoga from t... 详细信息
来源: 评论
Distinctive Zucchini Classification in India: Leveraging CNN and RNN Models
Distinctive Zucchini Classification in India: Leveraging CNN...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Satvik Vats Rishabh Sharma Computer Science and Engineering Graphic Era Hill University Graphic Era Deemed to be University Dehradun India Chitkara University Institute of Engineering and Technology Chitkara University Rajpura Punjab India
the proposed study works at three types of zucchini-Arka Sumeet, Arka Anamika, and Ahkra Manik-in India. It uses a mix of Convolutional Neural Networks (CNN) and recurrent Neural Networks (RNN) models to classify them... 详细信息
来源: 评论
ParkinSense: A Fuzzy Inference System designed to aid in diagnosing Parkinson’s Disease
ParkinSense: A Fuzzy Inference System designed to aid in dia...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Aaryan Mahadik Veena Trivedi Kunal Khubchandani Raj Tandon Bhavika Valecha TE Computer Engg VESIT Chembur CMPN Dept Faculty VESIT Chembur
Parkinson’s Disease (PD) is a progressive neurodegenerative disorder that poses significant challenges in early detection and precise classification of its severity. this research paper introduces a machine learning ... 详细信息
来源: 评论
Machine Learning Vulnerabilities at the Edge: A Study of Multi-stage Gray-box Attacks*
Machine Learning Vulnerabilities at the Edge: A Study of Mul...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Ayush Sinha Ishan Shrivastava Nachiket Tapas O. P. Vyas C3iHub Indian Institute of Technology Kanpur U.P India Department of Information Technology Indian Institute of Information Technology Allahabad Devghat Jhalwa Prayagraj India Department of Computer Science and Engineering Chhattisgarh Swami Vivekanand Technical University Bhilai Chhattisgarh India
the growing use of machine learning (ML) models at the network edge has created new opportunities for adversaries to exploit vulnerabilities. Adversarial machine learning (AML) attacks manipulate input data, causing m... 详细信息
来源: 评论