咨询与建议

限定检索结果

文献类型

  • 2,454 篇 会议
  • 99 册 图书
  • 86 篇 期刊文献

馆藏范围

  • 2,639 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,652 篇 工学
    • 1,295 篇 计算机科学与技术...
    • 658 篇 软件工程
    • 368 篇 电气工程
    • 252 篇 控制科学与工程
    • 110 篇 信息与通信工程
    • 106 篇 机械工程
    • 61 篇 电子科学与技术(可...
    • 40 篇 动力工程及工程热...
    • 36 篇 交通运输工程
    • 34 篇 仪器科学与技术
    • 24 篇 建筑学
    • 24 篇 石油与天然气工程
    • 24 篇 生物医学工程(可授...
    • 22 篇 生物工程
    • 22 篇 公安技术
    • 21 篇 安全科学与工程
    • 20 篇 土木工程
  • 405 篇 理学
    • 302 篇 数学
    • 60 篇 系统科学
    • 54 篇 物理学
    • 47 篇 统计学(可授理学、...
    • 28 篇 生物学
    • 25 篇 化学
  • 238 篇 管理学
    • 178 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 60 篇 工商管理
  • 71 篇 教育学
    • 71 篇 教育学
  • 33 篇 经济学
    • 26 篇 应用经济学
  • 28 篇 医学
    • 19 篇 基础医学(可授医学...
  • 26 篇 法学
    • 18 篇 社会学
  • 9 篇 农学
  • 9 篇 艺术学
  • 4 篇 文学
  • 1 篇 哲学

主题

  • 184 篇 logic gates
  • 172 篇 fuzzy logic
  • 150 篇 programming
  • 107 篇 logic programmin...
  • 94 篇 linear programmi...
  • 76 篇 artificial intel...
  • 71 篇 dynamic programm...
  • 59 篇 software enginee...
  • 59 篇 probabilistic lo...
  • 58 篇 optimization
  • 57 篇 computer science
  • 57 篇 semantics
  • 48 篇 software
  • 46 篇 logic design
  • 44 篇 formal logic
  • 44 篇 computer archite...
  • 43 篇 mathematical mod...
  • 42 篇 mathematical log...
  • 42 篇 computer program...
  • 41 篇 logic

机构

  • 7 篇 institute for lo...
  • 5 篇 institute of log...
  • 5 篇 university of am...
  • 5 篇 department of in...
  • 4 篇 natl tech univ a...
  • 4 篇 international bu...
  • 4 篇 tu wien austria
  • 4 篇 graduate school ...
  • 4 篇 university of al...
  • 4 篇 imdea software i...
  • 4 篇 carnegie mellon ...
  • 4 篇 university of te...
  • 4 篇 university of mi...
  • 3 篇 university of la...
  • 3 篇 department of co...
  • 3 篇 free univ bozen ...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 ibm corp armonk ...
  • 3 篇 cesnet prague cz...

作者

  • 7 篇 woltran stefan
  • 6 篇 eiter thomas
  • 5 篇 leone nicola
  • 5 篇 faber wolfgang
  • 5 篇 tompits hans
  • 5 篇 raidl günther r.
  • 4 篇 tian cong
  • 4 篇 tokhi m. o.
  • 4 篇 sakama chiaki
  • 4 篇 jânio monteiro
  • 4 篇 frangopoulos chr...
  • 4 篇 barnes tiffany
  • 4 篇 pedro j. s. card...
  • 4 篇 michael h. lees
  • 4 篇 l.g. votta
  • 4 篇 jack j. dongarra
  • 4 篇 leonard barolli
  • 4 篇 dimopoulos georg...
  • 4 篇 roberto lam
  • 4 篇 valeria v. krzhi...

语言

  • 2,575 篇 英文
  • 39 篇 其他
  • 19 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"任意字段=19th International Conference on Logic Programming"
2639 条 记 录,以下是181-190 订阅
排序:
Comparative study of the intelligent techniques (fuzzy logic and neural network) of the ABS system  19
Comparative study of the intelligent techniques (fuzzy logic...
收藏 引用
19th IEEE international Multi-conference on Systems, Signals and Devices, SSD 2022
作者: Hamou, Ait Abbas Khaled, Mouheb Cylia, Aliouat Billel, Naceri Akli Mohand Oulhadj University-Bouira Laboratory of Materials and Durable Development-LM2D Drissi Yahia Street Bouira10000 Algeria University of Djelfa Laboratory of the Applied and Automation and Industrial Diagnostic Laadi Bouira17000 Algeria Akli Mohand Oulhadj University-Bouira Electrical Engineering Department Bouira Algeria
Antilock braking system improves vehicle stability and direction control ability, allowing the wheel to stop without reducing and locking the distance to stop. A model of a quarter auto model of electronically monitor... 详细信息
来源: 评论
Peel | Pile? Cross-Framework Portability of Quantum Software  19
Peel | Pile? Cross-Framework Portability of Quantum Software
收藏 引用
19th IEEE international conference on Software Architecture (ICSA)
作者: Schonberger, Manuel Franz, Maja Scherzinger, Stefanie Mauerer, Wolfgang Tech Univ Appl Sci Regensburg Regensburg Germany Univ Passau Chair Scalable Database Syst Passau Germany Siemens AG Corp Res Munich Germany
In recent years, various vendors have made quantum software frameworks available. Yet with vendor-specific frameworks, code portability seems at risk, especially in a field where hardware and software libraries have n... 详细信息
来源: 评论
Approximate Linear Program for Multi-Type Inpatient Allocation Admission Scheduling Problem  19
Approximate Linear Program for Multi-Type Inpatient Allocati...
收藏 引用
19th IEEE international conference on Automation Science and Engineering, CASE 2023
作者: Gong, Xuran Dai, Jiajun Geng, Na Shanghai Jiao Tong University Department of Industrial Engineering & Management Shanghai China Sino-US Global Logistics Institute Shanghai Jiao Tong University Shanghai China
this paper studies an inpatient allocation admission scheduling problem by considering the sharing of inpatient beds among patients from different medical departments. Hospital managers need to make admission control ... 详细信息
来源: 评论
Body-Decoupled Grounding via Solving: A Novel Approach on the ASP Bottleneck (Extended Abstract)  39
Body-Decoupled Grounding via Solving: A Novel Approach on th...
收藏 引用
39th international conference on logic programming, ICLP 2023
作者: Besin, Viktor Hecher, Markus Woltran, Stefan TU Wien Austria Massachusetts Institute of Technology United States
Answer-Set programming (ASP) has seen tremendous progress over the last two decades and is nowadays successfully applied in many real-world domains. However, for certain problems, the well-known ASP grounding bottlene... 详细信息
来源: 评论
Perceiving the Narrative Style for Fake News Detection Using Deep Learning  23
Perceiving the Narrative Style for Fake News Detection Using...
收藏 引用
23rd IEEE international conference on High Performance Computing and Communications, 7th IEEE international conference on Data Science and Systems, 19th IEEE international conference on Smart City and 7th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Sun, Mengtao Hameed, Ibrahim A. Wang, Hao Pasquine, Mark Norwegian University of Science and Technology Dept. Ict and Natural Sciences Ålesund Norway Norwegian University of Science and Technology Dept. Computer Science Gjovik Norway Norwegian University of Science and Technology Dept. International Business Ålesund Norway
Existing deep-learning-based features have shown strong enough results (more than 90% accuracy) if a large amount of annotated data is available. However, in reality, data annotation is labor-intensive and expensive. ... 详细信息
来源: 评论
DyDom: Detecting Malicious Domains with Spatial-Temporal Analysis on Dynamic Graphs  23
DyDom: Detecting Malicious Domains with Spatial-Temporal Ana...
收藏 引用
23rd IEEE international conference on High Performance Computing and Communications, 7th IEEE international conference on Data Science and Systems, 19th IEEE international conference on Smart City and 7th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Li, Yixin Luo, Xi Wang, Liming Xu, Zhen Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Cyberspace Institute of Advanced Technology Guangzhou University China
Domain Name System (DNS) has been widely abused by cybercriminals as the critical infrastructure to supply their activities. thus malicious domains detection is a crucial assignment to combat and mitigate cybercrimes.... 详细信息
来源: 评论
Global Cyclic Queuing and Forwarding Mechanism for Large-Scale Deterministic Networks  23
Global Cyclic Queuing and Forwarding Mechanism for Large-Sca...
收藏 引用
23rd IEEE international conference on High Performance Computing and Communications, 7th IEEE international conference on Data Science and Systems, 19th IEEE international conference on Smart City and 7th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Mo, Yijun Yang, Zihan Liu, Huiyu He, Tianliu School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Delay and jitter sensitive industrial control and remote driving application-driven network by best-effort to deterministic service. To meet the deterministic application of delay and jitter demands, industry and acad... 详细信息
来源: 评论
ICER 2023 - Proceedings of the 2023 ACM conference on international Computing Education Research V.1
ICER 2023 - Proceedings of the 2023 ACM Conference on Intern...
收藏 引用
19th Annual ACM international Computing Education Research conference, ICER 2023
the proceedings contain 35 papers. the topics discussed include: the search for meaning: inferential strategic reading comprehension in programming;examples of unsuccessful use of code comprehension strategies: a reso...
来源: 评论
Introduction to the special issue of the 19th international conference on Runtime Verification
收藏 引用
international JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER 2021年 第4期23卷 545-546页
作者: Finkbeiner, Bernd Mariani, Leonardo CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany Univ Milano Bicocca Viale Sarca 336 I-2016 Milan Italy
来源: 评论
A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes  23
A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Se...
收藏 引用
23rd IEEE international conference on High Performance Computing and Communications, 7th IEEE international conference on Data Science and Systems, 19th IEEE international conference on Smart City and 7th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Gao, Yue Shi, Jinqiao Wang, Xuebin Shi, Ruisheng Zhao, Can Li, Chenglong Institute of Information Engineering Chinese Academy of Sciences China National Engineering Laboratory for Information Security Technologies China School of Cyber Security University of Chinese Academy of Sciences China Beijing University of Post and Telecommunications China Institute for Network Sciences and Cyberspace Tsinghua University China
With the increasing popularity of Bitcoin, considerable attention has been paid to its privacy and anonymity. To protect users' privacy better from the P2P network perspective, Bitcoin encourages users to connect ... 详细信息
来源: 评论