咨询与建议

限定检索结果

文献类型

  • 41,477 篇 会议
  • 896 册 图书
  • 384 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 42,756 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 29,125 篇 工学
    • 22,483 篇 计算机科学与技术...
    • 15,086 篇 软件工程
    • 7,383 篇 控制科学与工程
    • 4,867 篇 信息与通信工程
    • 3,691 篇 电气工程
    • 2,263 篇 机械工程
    • 2,147 篇 生物工程
    • 2,067 篇 生物医学工程(可授...
    • 1,562 篇 电子科学与技术(可...
    • 1,381 篇 交通运输工程
    • 1,302 篇 动力工程及工程热...
    • 1,217 篇 安全科学与工程
    • 1,203 篇 光学工程
    • 1,158 篇 仪器科学与技术
    • 878 篇 化学工程与技术
  • 10,932 篇 理学
    • 5,931 篇 数学
    • 2,595 篇 生物学
    • 2,239 篇 物理学
    • 1,948 篇 系统科学
    • 1,724 篇 统计学(可授理学、...
    • 1,021 篇 化学
  • 6,635 篇 管理学
    • 4,440 篇 管理科学与工程(可...
    • 2,794 篇 图书情报与档案管...
    • 2,299 篇 工商管理
  • 2,091 篇 医学
    • 1,900 篇 临床医学
    • 1,788 篇 基础医学(可授医学...
    • 998 篇 公共卫生与预防医...
    • 932 篇 药学(可授医学、理...
  • 1,141 篇 法学
    • 952 篇 社会学
  • 813 篇 教育学
    • 801 篇 教育学
  • 672 篇 经济学
  • 437 篇 农学
  • 111 篇 文学
  • 82 篇 军事学
  • 21 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 1,502 篇 control systems
  • 1,268 篇 computer science
  • 809 篇 real-time system...
  • 692 篇 covid-19
  • 635 篇 access control
  • 611 篇 artificial intel...
  • 602 篇 computational mo...
  • 599 篇 computer archite...
  • 455 篇 internet of thin...
  • 420 篇 deep learning
  • 373 篇 protocols
  • 371 篇 accuracy
  • 343 篇 process control
  • 323 篇 feature extracti...
  • 319 篇 monitoring
  • 300 篇 reinforcement le...
  • 282 篇 training
  • 278 篇 machine learning
  • 276 篇 learning systems
  • 259 篇 traffic control

机构

  • 37 篇 school of comput...
  • 34 篇 college of compu...
  • 34 篇 department of el...
  • 30 篇 college of infor...
  • 25 篇 univ chinese aca...
  • 24 篇 univ politehn bu...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 tsinghua univers...
  • 19 篇 school of automa...
  • 18 篇 college of compu...
  • 18 篇 federal research...
  • 18 篇 center for astro...
  • 18 篇 school of comput...
  • 18 篇 department of ph...
  • 18 篇 department of ph...
  • 18 篇 the graduate sch...
  • 18 篇 department of ph...
  • 18 篇 graduate school ...

作者

  • 26 篇 andrzej napieral...
  • 25 篇 wang jing
  • 23 篇 liu yang
  • 22 篇 li yang
  • 20 篇 jui c.c.h.
  • 20 篇 oshima a.
  • 20 篇 tsuda r.
  • 20 篇 kim j.h.
  • 20 篇 bergman d.r.
  • 20 篇 allen m.
  • 20 篇 matsuyama t.
  • 20 篇 wong t.
  • 19 篇 ishii t.
  • 18 篇 zhang lei
  • 18 篇 machida k.
  • 18 篇 uchihori y.
  • 18 篇 kim s.w.
  • 18 篇 takamura m.
  • 17 篇 ohnishi m.
  • 16 篇 wang lei

语言

  • 41,702 篇 英文
  • 833 篇 其他
  • 328 篇 中文
  • 17 篇 俄文
  • 10 篇 西班牙文
  • 2 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 乌克兰文
检索条件"任意字段=19th International Conference on Control Systems and Computer Science"
42758 条 记 录,以下是41-50 订阅
排序:
Hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis  19th
Hunting Vulnerabilities in the Maritime Domain: A Domain ...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Zafar, Abdullah Amro, Ahmed Norwegian University of Science and Technology NTNU GjØvik Norway
the maritime domain, constituting over 80% of global trade, is a critical component of the world economy, facilitating the transfer of vast quantities of goods across the globe. In this way, the success of other cruci... 详细信息
来源: 评论
Enabling Android Application Monitoring by Characterizing Security-Critical Code Fragments  19th
Enabling Android Application Monitoring by Characterizing S...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Eikerling, Hendrik Kampkötter, Anemone Safe and Secure IoT Systems Fraunhofer IEM Paderborn Germany Department of Computer Science Technische Universität Dortmund Dortmund Germany
Resource-constrained devices, such as Android smartphones, cannot currently benefit from protection through application monitoring, since usual approaches are too resource intensive. To develop an efficient and effect... 详细信息
来源: 评论
Algorithms for the Collaborative Delivery Problem with Monitored Constraints  19th
Algorithms for the Collaborative Delivery Problem with Mo...
收藏 引用
19th international conference and Workshops on Algorithms and Computation, WALCOM 2025
作者: Blank, Lotte Huynh, Kien C. Luo, Kelin Naredla, Anurag Murty Institute of Computer Science University of Bonn Bonn Germany Communications and Transport Systems ITN Linköping University Linköping Sweden Department of Computer Science and Engineering University at Buffalo GetzvilleNY United States
We provide efficient algorithms to solve package delivery problems in which a sequence of drones work together to ‘optimally’ deliver a package from a source s to a target t. the package may be transferred from... 详细信息
来源: 评论
Proposition of a Novel Type of Attacks Targetting Explainable AI Algorithms in Cybersecurity  19th
Proposition of a Novel Type of Attacks Targetting Explain...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Szelest, Sebastian Pawlicki, Marek Pawlicka, Aleksandra Kozik, Rafal Choraś, Michal ITTI Sp. z o.o. Poznań Poland Bydgoszcz University of Science and Technology Bydgoszcz Poland University of Warsaw Warsaw Poland
Artificial intelligence systems, particularly those utilizing deep neural networks, are increasingly integrated into critical sectors like healthcare, finance, and security. these systems’ reliance underscores the im... 详细信息
来源: 评论
Contemporary Impact of Cyberbullying on Youngsters: An Appraisal of Psychological, Emotional, Physical Health, and Academic Implications  19
Contemporary Impact of Cyberbullying on Youngsters: An Appra...
收藏 引用
19th international conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Faith, Fatokun B. Long, Zalizah Awang Hamid, Suraya Malaysian Institute of Information Technology Universiti Kuala Lumpur Kuala Lumpur Malaysia Department of Information Systems Faculty of Computer Science IT Universiti Malaya Kuala Lumpur Malaysia
Cyberbullying is now a serious issue in contemporary times. the impact of cyberbullying on youngsters is of enormous concern in the public health sector as well as in the cybersecurity field. Several researchers have ... 详细信息
来源: 评论
Spatiotemporal Traffic Analysis: Deep Hybrid Approach for Resource and Cyberattacks Prediction  19
Spatiotemporal Traffic Analysis: Deep Hybrid Approach for Re...
收藏 引用
19th international conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Lee, Hyeonmin Kim, Dongchan Beom, Donggyu Byun, Gyurin Vo, Van-Vi Choo, Hyunseung Department of AI Systems Engineering Sungkyunkwan University Suwon16419 Korea Republic of Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of Convergence Research Institute Sungkyunkwan University Suwon16419 Korea Republic of Department of Computer Science and Engineering Sungkyunkwan University Suwon16419 Korea Republic of
this study proposes a hybrid deep learning approach to address the complexity and dynamic characteristics of modern network environments. the research integrates Graph Neural Networks (GNNs) and Convolutional Long and... 详细信息
来源: 评论
Integrating Temporal Analysis with Hybrid Machine Learning and Deep Learning Models for Enhanced Air Quality Prediction  19
Integrating Temporal Analysis with Hybrid Machine Learning a...
收藏 引用
19th international conference on Ubiquitous Information Management and Communication, IMCOM 2025
作者: Omer, Muhammad Ali, Sardar Jaffar Raza, Syed M. Le, Duc-Tai Choo, Hyunseung Dept. of Computer Science and Engineering Sungkyunkwan University Suwon Korea Republic of Dept. of AI Systems Engineering Sungkyunkwan University Suwon Korea Republic of James Watt School of Engineering University of Glasgow Glasgow United Kingdom Dept. of Electrical and Computer Engineering Sungkyunkwan University Suwon Korea Republic of
Air pollution remains a critical issue, adversely affecting public health and the environment. In this study, we utilize the Air Quality index dataset from Kaggle to analyze temporal and seasonal variations of key pol... 详细信息
来源: 评论
computer Vision Based Quality control for Molding Injection Machines  19th
Computer Vision Based Quality Control for Molding Injection...
收藏 引用
19th international conference on Soft Computing Models in Industrial and Environmental Applications, SOCO 2024
作者: Moreno, Ramón García, Oscar Del Río Cristobal, Miguel Shankar Muthuselvam, Revanth María Sanjuan, José Vallejo, Andrés Wang, Ting Department of Advanced Manufacturing 4.0 Antolin Engineering Burgos Spain Instituto Tecnológico Catilla y Leon Burgos Spain College of Electrical Engineering and Control Science Nanjing Tech University and Southeast University Nanjing China
this paper presents a comprehensive study on the application of computer vision, specifically Convolutional Neural Networks (CNNs), for quality control in automotive interior manufacturing using Injection Molding Mach... 详细信息
来源: 评论
Assuring Privacy of AI-Powered Community Driven Android Code Vulnerability Detection  19th
Assuring Privacy of AI-Powered Community Driven Android Cod...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer Security, ESORICS 2024
作者: Senanayake, Janaka Kalutarage, Harsha Piras, Luca Al-Kadri, Mhd Omar Petrovski, Andrei School of Computing Robert Gordon University AberdeenAB10 7QB United Kingdom Department of Computer Science Middlesex University LondonNW4 4BT United Kingdom University of Doha for Science and Technology Doha Qatar
the challenge of training AI models is heightened by the limited availability of data, particularly when public datasets are insufficient. While obtaining data from private sources may seem like a viable solution, pri... 详细信息
来源: 评论
19th international conference and Workshops on Algorithms and Computation, WALCOM 2025
19th International Conference and Workshops on Algorithms an...
收藏 引用
19th international conference and Workshops on Algorithms and Computation, WALCOM 2025
the proceedings contain 26 papers. the special focus in this conference is on Algorithms and Computation. the topics include: Computing Conforming Partitions with Low Stabbing Number for Rectilinear Polygons...
来源: 评论