咨询与建议

限定检索结果

文献类型

  • 1,158 篇 会议
  • 32 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,200 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 879 篇 工学
    • 650 篇 计算机科学与技术...
    • 455 篇 软件工程
    • 240 篇 控制科学与工程
    • 159 篇 电气工程
    • 118 篇 信息与通信工程
    • 115 篇 机械工程
    • 56 篇 动力工程及工程热...
    • 46 篇 交通运输工程
    • 46 篇 安全科学与工程
    • 39 篇 生物工程
    • 35 篇 电子科学与技术(可...
    • 33 篇 生物医学工程(可授...
    • 31 篇 仪器科学与技术
    • 24 篇 网络空间安全
    • 21 篇 光学工程
    • 19 篇 力学(可授工学、理...
    • 18 篇 化学工程与技术
  • 281 篇 理学
    • 162 篇 数学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 49 篇 生物学
    • 49 篇 系统科学
    • 33 篇 化学
  • 174 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 31 篇 医学
    • 30 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 20 篇 法学
    • 15 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 14 篇 教育学
  • 6 篇 农学
  • 1 篇 军事学

主题

  • 49 篇 control systems
  • 42 篇 computer science
  • 27 篇 real-time system...
  • 23 篇 access control
  • 21 篇 monitoring
  • 20 篇 hardware
  • 20 篇 mathematical mod...
  • 18 篇 process control
  • 17 篇 computational mo...
  • 16 篇 computer archite...
  • 16 篇 sensors
  • 15 篇 artificial intel...
  • 14 篇 software enginee...
  • 14 篇 smart cities
  • 14 篇 servers
  • 14 篇 software
  • 13 篇 neural networks
  • 13 篇 feature extracti...
  • 13 篇 equations
  • 13 篇 vehicles

机构

  • 10 篇 univ politehn bu...
  • 9 篇 computer science...
  • 7 篇 univ politehn bu...
  • 7 篇 college of compu...
  • 6 篇 three gorges int...
  • 6 篇 state key labora...
  • 5 篇 faculty of autom...
  • 4 篇 rudn univ people...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 faculty of compu...
  • 3 篇 division of elec...
  • 3 篇 department of sy...
  • 3 篇 department of el...
  • 3 篇 delft univ techn...
  • 3 篇 school of comput...
  • 3 篇 china three gorg...
  • 3 篇 department of au...
  • 3 篇 peter great st p...
  • 3 篇 chinese acad sci...

作者

  • 5 篇 li xiaokun
  • 4 篇 andrade rossana ...
  • 4 篇 yuan ye
  • 4 篇 nicolae tapus
  • 4 篇 wang haoran
  • 4 篇 wu hao
  • 4 篇 y. dote
  • 4 篇 guo xiwang
  • 4 篇 sterca adrian
  • 4 篇 qi liang
  • 4 篇 lucia vacariu
  • 4 篇 wang jiacun
  • 4 篇 smits aletta
  • 4 篇 detweiler chris
  • 4 篇 bartels ester
  • 3 篇 li weiling
  • 3 篇 vescan andreea
  • 3 篇 andrzej napieral...
  • 3 篇 mariana mocanu
  • 3 篇 octavian cret

语言

  • 1,174 篇 英文
  • 13 篇 其他
  • 10 篇 中文
  • 3 篇 俄文
检索条件"任意字段=19th International Conference on Control Systems and Computer Science, CSCS 2013"
1200 条 记 录,以下是1171-1180 订阅
排序:
Learning to control an Octopus arm with Gaussian process temporal difference methods  05
Learning to control an Octopus arm with Gaussian process tem...
收藏 引用
Proceedings of the 19th international conference on Neural Information Processing systems
作者: Yaakov Engel Peter Szabo Dmitry Volkinshtein AICML Dept. of Computing Science University of Alberta Edmonton Canada Dept. of Electrical Engineering Technion Institute of Technology Haifa Israel
the Octopus arm is a highly versatile and complex limb. How the Octopus controls such a hyper-redundant arm (not to mention eight of them!) is as yet unknown. Robotic arms based on the same mechanical principles may r...
来源: 评论
Deepfake Detection Analysis Based on Video Face Analysis
Deepfake Detection Analysis Based on Video Face Analysis
收藏 引用
international computer sciences and Information Technologies (CSIT)
作者: Oleh Pitsun Nazar Melnyk Khrystyna Lipianina-Honcharenko Department of Computer Engineering West Ukrainian National University Ternopil Ukraine Department for Information-Computing Systems and Control West Ukrainian National University Ternopil Ukraine
the article examines the detection of manipulation of multimedia content, in particular in the form of videos and photos. the concept of deepfake is considered, the means and technologies involved in deepfake are anal... 详细信息
来源: 评论
An autonomous fallers monitoring kit: Release 0.0  19th
An autonomous fallers monitoring kit: Release 0.0
收藏 引用
19th international conference on Intelligent systems Design and Applications, ISDA 2019
作者: de la Cal, Enrique DaSilva, Alvaro Fáñez, Mirko Villar, Jose Ramón Sedano, Javier Suárez, Victor Computer Science Department University of Oviedo Oviedo Spain Instituto Tecnológico de Castilla y León Pol. Ind. Villalonquejar Burgos09001 Spain Control and Automatica Department EPI University of Oviedo Gijón Spain
Fall is one of the main causes of the reduction of the Quality of Live in Elderly, since it has a high impact in mortality rate as well as in the probability of different disabilities like Fractures, head injuries, et... 详细信息
来源: 评论
Multi-Layer Security Framework for IoT Devices
Multi-Layer Security Framework for IoT Devices
收藏 引用
Roedunet international conference (RoEduNet)
作者: Alexandru Vochescu Ioana Culic Alexandru Radovici Faculty of Automatic Control and Computer Science “Politehnica” University of Bucharest Bucharest Romania “Politehnica” University of Bucharest Bucharest Romania
One of the most engaging domains in the IT technology is represented by the Internet of things (loT) area. IoT solution are more and more present in our lives: from the daily-use devices such as smart watches or rings... 详细信息
来源: 评论
Robust dimensioning and routing for dynamic WDM networks
Robust dimensioning and routing for dynamic WDM networks
收藏 引用
international conference on Wireless and Optical Communications ( WOCC)
作者: Steven S. Lumetta Xiaolan J. Zhang Sun-il Kim Electrical and Computer Engineering Coordinated Science Laboratory University of Illinois Urbana-Champaign USA Electrical and Computer Systems Engineering University of Alaska Anchorage USA
Advances in device technology and dense wavelength division multiplexing have enabled modern optical backbones to provide high data rate services in a cost-effective manner. At the same time, applications are emerging... 详细信息
来源: 评论
ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detection Scheme for ICS
ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detect...
收藏 引用
international conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Chao Sang Jianhua Li Jun Wu Wu Yang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University China Graduate School of Information Production and Systems Waseda University Japan College of Computer Science and Technology Harbin Engineering University China
Today, with more and more devices in the industrial control system (ICS), the risk becomes higher and brings more attack surfaces. the need for reliable anomaly detection systems is increasing. Traditional SCADA-based... 详细信息
来源: 评论
the Specificity of Authorial Style Determined by the Cramer-von-Mises Test
The Specificity of Authorial Style Determined by the Cramer-...
收藏 引用
international computer sciences and Information Technologies (CSIT)
作者: Iryna Khomytska Iryna Bazylevych Vasyl Teslyuk Olena Durytska Applied Linguistics Lviv Polytechnic National University Lviv Ukraine Mathematical Statistics and Differential Equations Ivan Franko National University of Lviv Lviv Ukraine Automated Control Systems Lviv Polytechnic National University Lviv Ukraine
In this research, we have made an attempt to evaluate the strength of the Cramer-von-Mises test of uniformity on the material of modern American fiction. the novelty of this study is application of the test for reveal... 详细信息
来源: 评论
Blockchain-Enabled Collaborative Intrusion Detection in Software Defined Networks
Blockchain-Enabled Collaborative Intrusion Detection in Soft...
收藏 引用
IEEE international conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wenjun Fan Younghee Park Shubham Kumar Priyatham Ganta Xiaobo Zhou Sang-Yoon Chang Computer Science Department College of Engineering and Applied Science University of Colorado Colorado Springs Colorado Springs CO United States Computer Engineering Department San Jose State University San Jose CA United States
Collaborative intrusion detection system (CIDS) shares the critical detection-control information across the nodes for improved and coordinated defense. Software-defined network (SDN) introduces the controllers for th... 详细信息
来源: 评论
Pseudonymisation in the context of GDPR-compliant medical research
Pseudonymisation in the context of GDPR-compliant medical re...
收藏 引用
international Workshop on Design of Reliable Communication Networks (DRCN)
作者: Ioannis Basdekis Christos Kloukinas Carlos Agostinho Ioannis Vezakis Andreia Pimenta Luigi Gallo Georgios Spanoudakis SPHYNX Technology Solutions AG Zug Switzerland Dept. of Computer Science City University of London London United Kingdom Center of Technology and Systems UNINOVA Portugal SPHYNX Analytics Ltd Nicosia Cyprus Secretaria Regional de Saúde e Proteção Civil SRS Madeira Portugal Institute for High Performance Computing and Networking National Research Council Italy
Pseudonymisation is a data protection technique often used to protect the privacy of individuals when their personal data are being used for research purposes. Not only is it a key ingredient of the General Data Prote... 详细信息
来源: 评论
Selection from read-only memory with limited workspace
Selection from read-only memory with limited workspace
收藏 引用
19th international Computing and Combinatorics conference, COCOON 2013
作者: Elmasry, Amr Juhl, Daniel Dahl Katajainen, Jyrki Satti, Srinivasa Rao Department of Computer Engineering and Systems Alexandria University Alexandria 21544 Egypt Department of Computer Science University of Copenhagen Universitetsparken 5 2100 Copenhagen East Denmark School of Computer Science and Engineering Seoul National University 599 Gwanakro Gwanak-Gu Seoul 151-744 Korea Republic of
In the classic selection problem the task is to find the kth smallest of N elements. We study the complexity of this problem on a space-bounded random-access machine: the input is given in a read-only array and the ca... 详细信息
来源: 评论