咨询与建议

限定检索结果

文献类型

  • 41,477 篇 会议
  • 896 册 图书
  • 384 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 42,756 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 29,125 篇 工学
    • 22,483 篇 计算机科学与技术...
    • 15,086 篇 软件工程
    • 7,383 篇 控制科学与工程
    • 4,867 篇 信息与通信工程
    • 3,691 篇 电气工程
    • 2,263 篇 机械工程
    • 2,147 篇 生物工程
    • 2,067 篇 生物医学工程(可授...
    • 1,562 篇 电子科学与技术(可...
    • 1,381 篇 交通运输工程
    • 1,302 篇 动力工程及工程热...
    • 1,217 篇 安全科学与工程
    • 1,203 篇 光学工程
    • 1,158 篇 仪器科学与技术
    • 878 篇 化学工程与技术
  • 10,932 篇 理学
    • 5,931 篇 数学
    • 2,595 篇 生物学
    • 2,239 篇 物理学
    • 1,948 篇 系统科学
    • 1,724 篇 统计学(可授理学、...
    • 1,021 篇 化学
  • 6,635 篇 管理学
    • 4,440 篇 管理科学与工程(可...
    • 2,794 篇 图书情报与档案管...
    • 2,299 篇 工商管理
  • 2,091 篇 医学
    • 1,900 篇 临床医学
    • 1,788 篇 基础医学(可授医学...
    • 998 篇 公共卫生与预防医...
    • 932 篇 药学(可授医学、理...
  • 1,141 篇 法学
    • 952 篇 社会学
  • 813 篇 教育学
    • 801 篇 教育学
  • 672 篇 经济学
  • 437 篇 农学
  • 111 篇 文学
  • 82 篇 军事学
  • 21 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 1,502 篇 control systems
  • 1,268 篇 computer science
  • 809 篇 real-time system...
  • 692 篇 covid-19
  • 635 篇 access control
  • 611 篇 artificial intel...
  • 602 篇 computational mo...
  • 599 篇 computer archite...
  • 455 篇 internet of thin...
  • 420 篇 deep learning
  • 373 篇 protocols
  • 371 篇 accuracy
  • 343 篇 process control
  • 323 篇 feature extracti...
  • 319 篇 monitoring
  • 300 篇 reinforcement le...
  • 282 篇 training
  • 278 篇 machine learning
  • 276 篇 learning systems
  • 259 篇 traffic control

机构

  • 37 篇 school of comput...
  • 34 篇 college of compu...
  • 34 篇 department of el...
  • 30 篇 college of infor...
  • 25 篇 univ chinese aca...
  • 24 篇 univ politehn bu...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 tsinghua univers...
  • 19 篇 school of automa...
  • 18 篇 college of compu...
  • 18 篇 federal research...
  • 18 篇 center for astro...
  • 18 篇 school of comput...
  • 18 篇 department of ph...
  • 18 篇 department of ph...
  • 18 篇 the graduate sch...
  • 18 篇 department of ph...
  • 18 篇 graduate school ...

作者

  • 26 篇 andrzej napieral...
  • 25 篇 wang jing
  • 23 篇 liu yang
  • 22 篇 li yang
  • 20 篇 jui c.c.h.
  • 20 篇 oshima a.
  • 20 篇 tsuda r.
  • 20 篇 kim j.h.
  • 20 篇 bergman d.r.
  • 20 篇 allen m.
  • 20 篇 matsuyama t.
  • 20 篇 wong t.
  • 19 篇 ishii t.
  • 18 篇 zhang lei
  • 18 篇 machida k.
  • 18 篇 uchihori y.
  • 18 篇 kim s.w.
  • 18 篇 takamura m.
  • 17 篇 ohnishi m.
  • 16 篇 wang lei

语言

  • 41,702 篇 英文
  • 833 篇 其他
  • 328 篇 中文
  • 17 篇 俄文
  • 10 篇 西班牙文
  • 2 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 乌克兰文
检索条件"任意字段=19th International Conference on Control Systems and Computer Science"
42758 条 记 录,以下是101-110 订阅
排序:
Detection and Alarm of Abnormal Operation and Maintenance Behaviors in Power systems Based on Multiple Features  24
Detection and Alarm of Abnormal Operation and Maintenance Be...
收藏 引用
8th international conference on computer science and Artificial Intelligence, CSAI 2024
作者: Zhao, Hang Feng, Sibo Lu, Kai Ning, Zhiyan Wang, Yang Liu, Jinli Beijing Kedong Electric Power Control System Co. Ltd. Beijing China
A power grid log recorded the operating state of the system. A multi-dimensional characteristic anomaly detection model is proposed in response to the problem of low accuracy in detecting abnormal behavior in power gr... 详细信息
来源: 评论
SACC: Secure-Cooperative Adaptive Cruise control for Unmanned Vehicles  7th
SACC: Secure-Cooperative Adaptive Cruise Control for Unmanne...
收藏 引用
8th Asia Pacific Web and Web-Age Information Management Joint international conference on Web and Big Data
作者: Ran, Wen Li, Changlong Sha, Edwin H-M. East China Normal Univ Dept Comp Sci Shanghai Peoples R China
With the development of autonomous driving, the data security of the collaboration between vehicles plays a more important role. the research of auto drive systems is still in its infancy, this paper shows that the se... 详细信息
来源: 评论
Test Architecture Generation by Leveraging BERT and control and Data Flows  28th
Test Architecture Generation by Leveraging BERT and Control ...
收藏 引用
28th international conference on Engineering of Complex computer systems (ICECCS)
作者: Wang, Guangyu Wu, Ji Yang, Haiyan Sun, Qing Yu, Tao Beihang Univ Sch Comp Sci & Engn Beijing Peoples R China
In practices, test cases are often designed by test engineers based on the functionalities of the System under Test (SUT) in parallel and independently. this can lead to a lack of a comprehensive overview of the test ... 详细信息
来源: 评论
Design of automated testing system for electronic safety and disarming devices based on Labview  24
Design of automated testing system for electronic safety and...
收藏 引用
8th international conference on computer science and Application Engineering, CSAE 2024
作者: Yan, Rong Huang, Qiangqiang Wu, Yunlong Yan, Xuan Zhu, Yanan Zhang, Ziqiang Sixth Factory Beijing Xinfeng Aerospace Equipment Co. Ltd. Beijing China School of computer science and technology Southwest University of Science and Technology Mianyang China
the electronic safety and arming device test system is developed to ensure the reliability of weapon systems. In view of the low test efficiency and high requirements for testers in manual testing during the current t... 详细信息
来源: 评论
Authentication and Verification in Human-Robot Cooperative Robotic Cells using Stereo Vision and Gesture control  6
Authentication and Verification in Human-Robot Cooperative R...
收藏 引用
6th IEEE international conference on Image Processing, Applications and systems, IPAS 2025
作者: Kovacs, Gabor Sziranyi, Tamas HUN-REN Institute for Computer Science and Control Machine Perception Research Laboratory Budapest Hungary
the integration of human-robot interaction (HRI) technologies with industrial automation has become increasingly essential for enhancing productivity and safety in manufacturing environments. In this paper, we propose... 详细信息
来源: 评论
Routing and Charge Planning Strategies for Ridesharing EV Fleets  11
Routing and Charge Planning Strategies for Ridesharing EV Fl...
收藏 引用
11th international conference on Vehicle Technology and Intelligent Transport systems, VEHITS 2025
作者: Singh, Ashutosh Gupta, Arobinda Dept. of Computer Science & Engineering Indian Institute of Technology KharagpurWB-721302 India
Ridesharing systems have become an important part of urban transportation. At the same time, electric vehicle (EV) adoption is also growing at a fast pace as an eco-friendly and sustainable transportation option. To o... 详细信息
来源: 评论
Active Nodes Maximization in a Virus Spread Model: An SI2R Malware Propagation Model  11th
Active Nodes Maximization in a Virus Spread Model: An SI2R M...
收藏 引用
11th international conference on Network Games, control and Optimization
作者: Ngoufo, Arthur Kouam, Willie Hayel, Yezekael Deugoue, Gabriel Kamhoua, Charles Univ Dschang Dschang Cameroon Avignon Univ CERI LIA Avignon France DEVCOM Army Res Lab Adelphi MD USA
the threat of malware is increasing and poses significant computer security risks to both individuals and organizations. Understanding the tactics employed by these malicious software entities and their dynamics durin... 详细信息
来源: 评论
Achieving Fairness Generalizability for Learning-based Congestion control with Jury  25
Achieving Fairness Generalizability for Learning-based Conge...
收藏 引用
20th European conference on computer systems, EuroSys 2025, co-located 30th ACM international conference on Architectural Support for Programming Languages and Operating systems, ASPLOS 2025
作者: Tian, Han Liao, Xudong Sun, Decang Zeng, Chaoliang Jin, Yilun Zhang, Junxue Wan, Xinchen Wang, Zilong Wang, Yong Chen, Kai University of Science and Technology of China China iSING Lab Hong Kong University of Science and Technology Hong Kong BitIntelligence China
Internet congestion control (CC) has long posed a challenging control problem in networking systems, with recent approaches increasingly incorporating deep reinforcement learning (DRL) to enhance adaptability and perf... 详细信息
来源: 评论
A Maximum Principle for a State-Constrained Optimal control Problem Whose Data is Measurable in the Time-Variable  15th
A Maximum Principle for a State-Constrained Optimal Contro...
收藏 引用
15th international conference on Optimization and Applications, OPTIMA 2024
作者: Karamzin, Dmitry Federal Research Center "Computer Science and Control" of Russian Academy of Sciences Vavilova Street 44 Moscow119333 Russia
A state-constrained optimal control problem is examined whose data depends on the time variable t. It is assumed that the dependence on the time-variable is measurable. Under the additional hypothesis that the control... 详细信息
来源: 评论
A Cost-Sensitive Approach for Managing Intrusion Alerts in OT Environments  19th
A Cost-Sensitive Approach for Managing Intrusion Alerts in...
收藏 引用
19th international conference on Critical Information Infrastructures Security, CRITIS 2024
作者: Howe, Alex Morin, Andrew Papa, Mauricio Moore, Tyler Tandy School of Computer Science The University of Tulsa TulsaOK United States School of Cyber Studies The University of Tulsa TulsaOK United States
Network Intrusion Detection systems (NIDS) are traditionally built to minimize the total number of misclassifications without considering financial implications. However, false positives and false negatives both impos... 详细信息
来源: 评论