咨询与建议

限定检索结果

文献类型

  • 1,158 篇 会议
  • 32 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,200 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 879 篇 工学
    • 650 篇 计算机科学与技术...
    • 455 篇 软件工程
    • 240 篇 控制科学与工程
    • 159 篇 电气工程
    • 118 篇 信息与通信工程
    • 115 篇 机械工程
    • 56 篇 动力工程及工程热...
    • 46 篇 交通运输工程
    • 46 篇 安全科学与工程
    • 39 篇 生物工程
    • 35 篇 电子科学与技术(可...
    • 33 篇 生物医学工程(可授...
    • 31 篇 仪器科学与技术
    • 24 篇 网络空间安全
    • 21 篇 光学工程
    • 19 篇 力学(可授工学、理...
    • 18 篇 化学工程与技术
  • 281 篇 理学
    • 162 篇 数学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 49 篇 生物学
    • 49 篇 系统科学
    • 33 篇 化学
  • 174 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 31 篇 医学
    • 30 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 20 篇 法学
    • 15 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 14 篇 教育学
  • 6 篇 农学
  • 1 篇 军事学

主题

  • 49 篇 control systems
  • 42 篇 computer science
  • 27 篇 real-time system...
  • 23 篇 access control
  • 21 篇 monitoring
  • 20 篇 hardware
  • 20 篇 mathematical mod...
  • 18 篇 process control
  • 17 篇 computational mo...
  • 16 篇 computer archite...
  • 16 篇 sensors
  • 15 篇 artificial intel...
  • 14 篇 software enginee...
  • 14 篇 smart cities
  • 14 篇 servers
  • 14 篇 software
  • 13 篇 neural networks
  • 13 篇 feature extracti...
  • 13 篇 equations
  • 13 篇 vehicles

机构

  • 10 篇 univ politehn bu...
  • 9 篇 computer science...
  • 7 篇 univ politehn bu...
  • 7 篇 college of compu...
  • 6 篇 three gorges int...
  • 6 篇 state key labora...
  • 5 篇 faculty of autom...
  • 4 篇 rudn univ people...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 faculty of compu...
  • 3 篇 division of elec...
  • 3 篇 department of sy...
  • 3 篇 department of el...
  • 3 篇 delft univ techn...
  • 3 篇 school of comput...
  • 3 篇 china three gorg...
  • 3 篇 department of au...
  • 3 篇 peter great st p...
  • 3 篇 chinese acad sci...

作者

  • 5 篇 li xiaokun
  • 4 篇 andrade rossana ...
  • 4 篇 yuan ye
  • 4 篇 nicolae tapus
  • 4 篇 wang haoran
  • 4 篇 wu hao
  • 4 篇 y. dote
  • 4 篇 guo xiwang
  • 4 篇 sterca adrian
  • 4 篇 qi liang
  • 4 篇 lucia vacariu
  • 4 篇 wang jiacun
  • 4 篇 smits aletta
  • 4 篇 detweiler chris
  • 4 篇 bartels ester
  • 3 篇 li weiling
  • 3 篇 vescan andreea
  • 3 篇 andrzej napieral...
  • 3 篇 mariana mocanu
  • 3 篇 octavian cret

语言

  • 1,174 篇 英文
  • 13 篇 其他
  • 10 篇 中文
  • 3 篇 俄文
检索条件"任意字段=19th International Conference on Control Systems and Computer Science, CSCS 2013"
1200 条 记 录,以下是1091-1100 订阅
排序:
Microcode with Embedded Timing Constraints
Microcode with Embedded Timing Constraints
收藏 引用
19th international conference on Architecture of Computing systems, ARCS 2006
作者: Fechner, Bernhard Department of Computer Science FernUniversitat in Hagen Hagen58084 Germany
Watchdogs are a well-known and widespread means to increase the safety of microprocessors. the programmer or the compiler must insert instructions to reset the watchdog. If the programmer or compiler chose the wrong t... 详细信息
来源: 评论
Scheduling temporal data for real-time requests in roadside-to-vehicle communication
Scheduling temporal data for real-time requests in roadside-...
收藏 引用
IEEE international conference on Embedded and Real-Time Computing systems and Applications (RTCSA)
作者: Kai Liu Victor C.S. Lee Joseph K.Y. Ng Sang H. Son Dept of Computer Science City University of Hong Kong Kowloon Hong Kong Dept of Computer Science Hong Kong Baptist University Kowloon Hong Kong Dept of Information and Communication Engineering DGIST Daegu Korea
Recent advances in wireless communication technologies have spawned many new applications in vehicular networks. Data dissemination via roadside-to-vehicle communication is a vital approach to enabling most of these a... 详细信息
来源: 评论
Morphological shape description and shape recognition using geometric spectrum on multidimensional binary images
Morphological shape description and shape recognition using ...
收藏 引用
international conference on Industrial Electronics, control and Instrumentation
作者: C.C. Pu F.Y. Shih Department of Information Management Mingshin Institute of Technology and Commerce Hsinchu Taiwan Department of Computer and Information Science New Jersey Institute of Technology Newark NJ USA
A useful morphological shape description tool called geometric spectrum (G-spectrum) for quantifying the geometric features of multidimensional binary images is described. the basis of this tool relies upon the cardin... 详细信息
来源: 评论
On the power-aware resource allocation for linear-pipelined real-time tasks
On the power-aware resource allocation for linear-pipelined ...
收藏 引用
international conference on Advanced Information Networking and Applications (AINA)
作者: Chun-Chao Yeh Department of Computer Science National Taiwan Ocean University Taiwan
In this paper, we extend previous works on task assignment problems for a set of linear-pipeline tasks over a set of processors. Different from previous works, we revisit the problems with two additional system factor... 详细信息
来源: 评论
Real-time simulation for continuous processing of an electrolytic tinning line
Real-time simulation for continuous processing of an electro...
收藏 引用
international conference on Industrial Electronics, control and Instrumentation
作者: Eung-Seok Kim Joon-Soo Lee Hyun-Sik Ahn Young-Jo Cho Sang-Rok Oh Ick Choy Kwang-Bae Kim Hai-Won Yang Control Systems Lab Korea Institute of Science and Technology Seoul South Korea Department of Electronics Eng Kookmin University Seoul South Korea Department of Electrical Eng Hanyang University Seoul South Korea
In this paper, a real-time simulation is performed to insure the continuous processing of an electrolytic tinning line (ETL). An ETL is modelled mathematically and a simple type of tension and speed controllers are de... 详细信息
来源: 评论
Detecting Domain Generation Algorithms in Malware Traffic Using Constrained Resources
Detecting Domain Generation Algorithms in Malware Traffic Us...
收藏 引用
IEEE international conference on Intelligent computer Communication and Processing (ICCP)
作者: Victor Moşolea Ciprian Oprişa Computer Science Department Technical University of Cluj-Napoca Bitdefender Cluj-Napoca Romania
A large number of malware samples use Domain Generation Algorithms (DGA) for locating and connecting to the Command and control server. this technique enables the malware authors to avoid the C&C domain being seiz...
来源: 评论
Improvement of fuzzy auto-tuning method of DC chopper system using manipulated value
Improvement of fuzzy auto-tuning method of DC chopper system...
收藏 引用
international conference on Industrial Electronics, control and Instrumentation
作者: K. Izumi M. Tsuji J. Oyama E. Yamada Department of Electrical Engineering and Computer Science Nagasaki University Nagasaki Japan
An auto-tuning using fuzzy reasoning is discussed for the I-PD control systems. We have previously (1993) proposed one method about same topic. In this paper, we have proposed two new methods of reasoning and compared... 详细信息
来源: 评论
False Data Injection Attacks Against High Voltage Transmission systems
False Data Injection Attacks Against High Voltage Transmissi...
收藏 引用
international conference on Distributed Computing in Sensor systems (DCOSS)
作者: Panagiotis Radoglou-Grammatikis Magda Zafeiropoulou Maria Atanasova Pencho Zlatev Sofia Giannakidou thomas Lagkas Vasileios Argyriou Evangelos K. Markakis Ioannis Moscholios Panagiotis Sarigiannidis Department of Electrical and Computer Engineering University of Western Macedonia Kozani Greece Innovative Energy and Information Technologies LTD (IEIT BIC-IZOT Sofia Bulgaria K3Y Ltd Sofia Bulgaria Department of Computer Science International Hellenic University Kavala Campus Greece Department of Networks and Digital Media Kingston University London Surrey UK Department of Electrical and Computer Engineering Hellenic Mediterranean University Crete Greece Department of Informatics & Telecommunications University of Peloponnese Tripolis Greece
the digitisation of the smart electrical grid provides several advantages and valuable services, such as self-monitoring, pervasive control and smart healing. However, despite the benefits of this progression, critica...
来源: 评论
Optimal control of Drones for a Train-Drone Railway Diagnostic System
Optimal Control of Drones for a Train-Drone Railway Diagnost...
收藏 引用
IEEE international conference on Automation science and Engineering (CASE)
作者: Silvia Proia Graziana Cavone Raffaele Carli Mariagrazia Dotoli Department of Electrical and Information Engineering Polytechnic of Bari Italy Department of Civil Computer and Aeronautics Technologies Engineering University Roma Tre Italy
the inspection of railway systems with traditional wayside detectors allows mainly the detection of wheels and axle bearings defects and can be time-demanding, unsafe, and heavily dependent on humans. To overcome thes...
来源: 评论
Dynamic channel assignment based on interference measurement with threshold for multi-beam mobile satellite networks
Dynamic channel assignment based on interference measurement...
收藏 引用
Asia-Pacific conference on Communications
作者: Masahiro Umehira Sunao Fujita Zhen Gao Jing Wang Graduate School of Science and Engineering Ibaraki University Hitachi-shi Ibaraki Japan Research Institute of Information Technology Tsinghua University Beijing P.R. China
Satellite and terrestrial integrated mobile communication systems (STICS) is proposed to secure communications services anytime and anywhere. In the case of natural disasters or special event, it is required for satel... 详细信息
来源: 评论