咨询与建议

限定检索结果

文献类型

  • 41,546 篇 会议
  • 894 册 图书
  • 363 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 42,802 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 29,181 篇 工学
    • 22,520 篇 计算机科学与技术...
    • 15,102 篇 软件工程
    • 7,411 篇 控制科学与工程
    • 4,892 篇 信息与通信工程
    • 3,708 篇 电气工程
    • 2,267 篇 机械工程
    • 2,147 篇 生物工程
    • 2,070 篇 生物医学工程(可授...
    • 1,569 篇 电子科学与技术(可...
    • 1,383 篇 交通运输工程
    • 1,305 篇 动力工程及工程热...
    • 1,221 篇 安全科学与工程
    • 1,208 篇 光学工程
    • 1,158 篇 仪器科学与技术
    • 880 篇 化学工程与技术
  • 10,955 篇 理学
    • 5,950 篇 数学
    • 2,596 篇 生物学
    • 2,239 篇 物理学
    • 1,950 篇 系统科学
    • 1,729 篇 统计学(可授理学、...
    • 1,024 篇 化学
  • 6,648 篇 管理学
    • 4,446 篇 管理科学与工程(可...
    • 2,802 篇 图书情报与档案管...
    • 2,301 篇 工商管理
  • 2,097 篇 医学
    • 1,906 篇 临床医学
    • 1,792 篇 基础医学(可授医学...
    • 1,004 篇 公共卫生与预防医...
    • 932 篇 药学(可授医学、理...
  • 1,144 篇 法学
    • 955 篇 社会学
  • 813 篇 教育学
    • 801 篇 教育学
  • 674 篇 经济学
  • 438 篇 农学
  • 111 篇 文学
  • 86 篇 军事学
  • 21 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 1,502 篇 control systems
  • 1,266 篇 computer science
  • 813 篇 real-time system...
  • 694 篇 covid-19
  • 636 篇 access control
  • 601 篇 artificial intel...
  • 596 篇 computational mo...
  • 592 篇 computer archite...
  • 455 篇 internet of thin...
  • 421 篇 deep learning
  • 367 篇 accuracy
  • 364 篇 protocols
  • 341 篇 process control
  • 324 篇 feature extracti...
  • 319 篇 monitoring
  • 306 篇 reinforcement le...
  • 280 篇 training
  • 273 篇 learning systems
  • 269 篇 machine learning
  • 268 篇 traffic control

机构

  • 37 篇 school of comput...
  • 34 篇 college of compu...
  • 33 篇 department of el...
  • 31 篇 college of infor...
  • 27 篇 univ politehn bu...
  • 25 篇 univ chinese aca...
  • 23 篇 college of compu...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 tsinghua univers...
  • 19 篇 school of automa...
  • 19 篇 chitkara univers...
  • 18 篇 college of compu...
  • 18 篇 federal research...
  • 18 篇 center for astro...
  • 18 篇 school of comput...
  • 18 篇 department of ph...
  • 18 篇 department of ph...
  • 18 篇 the graduate sch...
  • 18 篇 department of ph...

作者

  • 26 篇 andrzej napieral...
  • 25 篇 wang jing
  • 22 篇 li yang
  • 21 篇 liu yang
  • 20 篇 jui c.c.h.
  • 20 篇 oshima a.
  • 20 篇 tsuda r.
  • 20 篇 kim j.h.
  • 20 篇 bergman d.r.
  • 20 篇 allen m.
  • 20 篇 matsuyama t.
  • 20 篇 wong t.
  • 20 篇 ishii t.
  • 19 篇 uchihori y.
  • 18 篇 zhang lei
  • 18 篇 machida k.
  • 18 篇 ohnishi m.
  • 16 篇 wang lei
  • 16 篇 pashchenko f. f.
  • 16 篇 kim s.w.

语言

  • 41,697 篇 英文
  • 882 篇 其他
  • 331 篇 中文
  • 17 篇 俄文
  • 10 篇 西班牙文
  • 2 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 乌克兰文
检索条件"任意字段=19th International Conference on Control Systems and Computer Science"
42804 条 记 录,以下是31-40 订阅
排序:
A Novel Study on Modelling and Adaptive Optimal control of a Tubular Reactor Based on Gaussian Processes  19th
A Novel Study on Modelling and Adaptive Optimal Control of a...
收藏 引用
19th international conference on Artificial Intelligence: Methodology, systems, and Applications, AIMSA 2024
作者: Grancharova, Alexandra Xie, Junhong Kocijan, Juš Department of Industrial Automation University of Chemical Technology and Metallurgy Sofia Sofia Bulgaria Department of Systems and Control Jozef Stefan Institute Ljubljana Slovenia University of Nova Gorica Rožna Dolina Slovenia
Number of engineering systems can be characterized as complex since they have a dynamic and nonlinear behaviour incorporating a stochastic uncertainty. On the other hand, as a machine learning method, Gaussian process... 详细信息
来源: 评论
ResNet-50 for Flower Image Classification: A Comparative Study of Segmentation and Non-Segmentation Approaches  19
ResNet-50 for Flower Image Classification: A Comparative Stu...
收藏 引用
19th international conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Manga, Abdul Rachman Nirmala Azis, Huzain Fattah, Farniwati Salim, Yulita Darwis, Herdianti Departement of Computer Science Universitas Muslim Indonesia Makassar Indonesia
Flower image classification poses a challenge in digital image processing, requiring effective methods for feature extraction and classification. the aim of this research is to improve the accuracy of flower image cla... 详细信息
来源: 评论
Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol  19th
Homomorphic Encryption Based ECDSA Generation Over Five Part...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Aggarwal, Akshit Swain, Srinibas Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India School of Computer and Mathematical Sciences University of Adelaide Adelaide Australia
Secure computation of multiparty protocol (MPP) is being widely used to address privacy issues in various technologies, such as cryptocurrencies, blockchain, and many more. the security of MPP is computed in various s... 详细信息
来源: 评论
Usage of Cybersecurity Standards in Operational Technology systems  19th
Usage of Cybersecurity Standards in Operational Technology...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Kannelønning, Kristian Katsikas, Sokratis Department of Information Security and Communication Technology NTNU - Norwegian University of Science and Technology Postboks 191 Gjøvik2802 Norway
the escalating frequency of cyber attacks against industrial installations over the past decade underscores the growing imperative to fortify cybersecurity in organizations. the advent of Industry 4.0 has interconnect... 详细信息
来源: 评论
Machine Learning Based Parameter Estimation of Energy Models in Digital Production Environments  19thth
Machine Learning Based Parameter Estimation of Energy Model...
收藏 引用
19th international conference on computer Aided systems theory, EUROCAST 2024
作者: Fichtl, Fabian Ullrich, Marco Heieck, Frieder Lüdemann-Ravit, Bernd Sonthofen Mittagstrasse 28A Sonthofen87527 Germany
the growing relevance of data science in engineering highlights the challenges of modelling complex systems using conventional methods, which are often time-consuming. this paper explores the application of various ma... 详细信息
来源: 评论
AI-Assisted Assurance Profile Creation for System Security Assurance  19th
AI-Assisted Assurance Profile Creation for System Security ...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Yamin, Muhammad Mudassar Wen, Shao-Fang Katt, Basel Norwegian University of Science and Technology Gjøvik Norway
Security systems Assurance (SSA) is crucial as digital threats evolve and cybersecurity becomes more complex. Recent advancements in large language models (LLMs) have opened new avenues for enhancing SSA strategies. T... 详细信息
来源: 评论
POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access control  19th
POP-HIT: Partially Order-Preserving Hash-Induced Transformat...
收藏 引用
19th international conference on Security and Privacy in Communication Networks
作者: Dubasi, Yatish Li, Qinghua Luu, Khoa Univ Arkansas Fayetteville AR 72701 USA
Server-based face recognition access control (SFRAC) is a widely used biometric authentication method where a camera captures a user's face image and sends the face information to a backend server to determine an ... 详细信息
来源: 评论
Monitoring Real-Time systems Under Parametric Delay  19th
Monitoring Real-Time Systems Under Parametric Delay
收藏 引用
19th international conference on Integrated Formal Methods
作者: Fraenzle, Martin Grosen, thomas M. Larsen, Kim G. Zimmermann, Martin Carl von Ossietzky Univ Oldenburg Oldenburg Germany Aalborg Univ Aalborg Denmark
Timed Buchi automata provide a very expressive formalism for expressing requirements of real-time systems. Online monitoring of embedded real-time systems can then be achieved by symbolic execution of such automata on... 详细信息
来源: 评论
Proceedings - 2023 24th international conference on control systems and computer science, CSCS 2023
Proceedings - 2023 24th International Conference on Control ...
收藏 引用
24th international conference on control systems and computer science, CSCS 2023
the proceedings contain 103 papers. the topics discussed include: evolutionary hyper-heuristics for improving global optimization algorithms;multi-objective decision making system based on spatial -temporal logics;ana...
来源: 评论
Recognition of Remakes and Fake Facial Images  19th
Recognition of Remakes and Fake Facial Images
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Bobulski, Janusz Kubanek, Mariusz Department of Computer Sciences Czestochowa University of Technology Czestochowa42-201 Poland
computer Vision techniques are extensively utilised in entertainment, enhancing realism in games and movies. Within video games, these techniques enable the recognition of objects, characters, and player movements, th... 详细信息
来源: 评论