咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 11 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 167 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 42 篇 信息与通信工程
    • 30 篇 电气工程
    • 21 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 5 篇 网络空间安全
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
  • 72 篇 理学
    • 47 篇 数学
    • 22 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 10 篇 生物学
    • 3 篇 化学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 6 篇 医学
  • 5 篇 法学
    • 4 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 10 篇 genetic algorith...
  • 8 篇 artificial intel...
  • 8 篇 constraint theor...
  • 6 篇 machine learning
  • 6 篇 game theory
  • 6 篇 clustering algor...
  • 5 篇 computer science
  • 5 篇 algorithm design...
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 4 篇 graph theory
  • 4 篇 computers
  • 4 篇 decision making
  • 4 篇 computer vision
  • 4 篇 computer network...
  • 3 篇 computer simulat...
  • 3 篇 object detection
  • 3 篇 systems engineer...
  • 3 篇 algorithms
  • 3 篇 logic gates

机构

  • 3 篇 univ penn dept c...
  • 3 篇 electronics and ...
  • 3 篇 division of comp...
  • 2 篇 ben-gurion unive...
  • 2 篇 univ cambridge 6...
  • 2 篇 duke univ dept e...
  • 2 篇 tu wien austria
  • 2 篇 institute of sys...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 dacya complutens...
  • 2 篇 med mobile 535 2...
  • 2 篇 college of compu...
  • 2 篇 deis universit d...
  • 2 篇 school of comput...
  • 1 篇 lahore pakistan
  • 1 篇 department of co...
  • 1 篇 university of ca...
  • 1 篇 dept. of mechani...
  • 1 篇 key laboratory o...

作者

  • 3 篇 parlato gennaro
  • 3 篇 sokolsky oleg
  • 3 篇 park junkil
  • 3 篇 pajic miroslav
  • 3 篇 lee insup
  • 3 篇 la torre salvato...
  • 3 篇 fischer bernd
  • 2 篇 holeman isaac
  • 2 篇 mohd azlishah ot...
  • 2 篇 tomasco ermenegi...
  • 2 篇 inverso omar
  • 2 篇 segal michael
  • 2 篇 lengál ondřej
  • 2 篇 ross peter
  • 2 篇 hamzah asyrani s...
  • 2 篇 yahaya abd rahim
  • 2 篇 mohd fairuz iska...
  • 2 篇 marchetti-spacca...
  • 2 篇 corne david
  • 1 篇 roihan ahmad

语言

  • 275 篇 英文
  • 2 篇 中文
检索条件"任意字段=1st International ICST Conference on Theory and Practice of Algorithms in Computer Systems"
276 条 记 录,以下是101-110 订阅
排序:
Comprehensive Analysis of Cybersecurity: Examining Existing Literature and Identifying Potential Areas for Future Research  1
Comprehensive Analysis of Cybersecurity: Examining Existing ...
收藏 引用
1st IEEE international conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Rani, Poonam Sehrawat, Harkesh University Institute of Engineering and Technology Maharshi Dayanand University Computer Science & Engineering Rohtak India
In recent years, many scholars and experts have discovered that mobile communication systems and techniques are susceptible to a wide range of cyberattacks. These assaults not only inflict pain and damage to private f... 详细信息
来源: 评论
A genetic algorithm solving a weekly course-timetabling problem  1st
A genetic algorithm solving a weekly course-timetabling prob...
收藏 引用
1st international conference on practice and theory of Automated Timetabling, PATAT 1995
作者: Erben, Wilhelm Keppler, Jügen Department of Computer Science Fachhochschule Konstanz KonstanzD-78462 Germany
In this paper we describe a heavily constrained university timetabling problem, and our genetic algorithm based approach to solve it. A problem- specific chromosome representation and knowledge-augmented genetic opera... 详细信息
来源: 评论
Integrating AORTA with model-based data specification languages  1st
收藏 引用
1st international conference on Fundamental Approaches to Software Engineering at the Joint European conferences on theory and practice of Software
作者: Bradley, S Henderson, W Kendall, D Robson, A Univ Durham Dept Comp Sci Durham DH1 3LE England Northumbria Univ Dept Comp Newcastle Upon Tyne NE1 8ST Tyne & Wear England
AORTA has been proposed as an implementable real-time algebra for concurrent systems where event times, rather than values of data, are critical. In this paper we discuss an extension to AORTA to include a formal data... 详细信息
来源: 评论
1st international conference on Principles of Security and Trust, POst 2012 held as part of the European Joint conferences on theory and practice of Software, ETAPS 2012
1st International Conference on Principles of Security and T...
收藏 引用
1st international conference on Principles of Security and Trust, POst 2012 and Held as Part of the European Joint conferences on theory and practice of Software, ETAPS 2012
The proceedings contain 21 papers. The special focus in this conference is on Principles of Security and Trust. The topics include: Symbolic and computational models;four nodes topologies are sufficient;parametric ver...
来源: 评论
Prediction and management in energy harvested wireless sensor nodes
Prediction and management in energy harvested wireless senso...
收藏 引用
2009 1st international conference on Wireless Communication, Vehicular Technology, Information theory and Aerospace and Electronic systems Technology, Wireless VITAE 2009
作者: Piorno, Joaquín Recas Bergonzini, Carlo Atienza, David Rosing, Tajana Simunic DACYA Complutense University of Madrid Spain DEIS Universit degli Studi di Bologna Italy Switzerland Computer Science and Engineering University of California San Diego CA United States
Solar panels are frequently used in wireless sensor nodes because they can theoretically provide quite a bit of harvested energy. However, they are not a reliable, consistent source of energy because of the Sun's ... 详细信息
来源: 评论
Cognitive Computing and systems Analysis of Alumni Economic theory and practice  1st
Cognitive Computing and Systems Analysis of Alumni Economic ...
收藏 引用
1st international conference on Cognitive Computation and systems, ICCCS 2022
作者: Lv, Shijie Zou, Xiaohui China Alumni Economic Research Institute No. 160 Fuxingmennei Street Beijing China Searle Research Center No. 100 Renshan Road Guangdong Hengqin519000 China Peking University Alumni Association Beijing100871 China
It aims to inspire domestic and foreign alumni to participate in the construction of the Second Centenary National Demonstration Zone of the Communist Party of China by reviewing the cognitive computing and system ana... 详细信息
来源: 评论
1st international conference on Decision and Game theory for Security, GameSec 2010
1st International Conference on Decision and Game Theory for...
收藏 引用
1st international conference on Decision and Game theory for Security, GameSec 2010
The proceedings contain 18 papers. The special focus in this conference is on Decision and Game theory for Security. The topics include: A localization game in wireless sensor networks;effective multimodel anomaly det...
来源: 评论
The Method of Dynamic systems Reliability Modeling Based on Hybrid theory and Interval Analysis  1
The Method of Dynamic Systems Reliability Modeling Based on ...
收藏 引用
1st international conference on Reliability systems Engineering (ICRSE)
作者: Zhao, Zitan Guo, Jianbin Zeng, Shengkui Beihang Univ Sch Reliabil & Syst Engn Beijing 100191 Peoples R China
In engineering, the process of a dynamic system is formulated by a set of continuous variables and a set of discrete states and failure can be seen as the unexpected state in the process. Moreover, the discrete events... 详细信息
来源: 评论
Parallel detection architecture for long-tail problem in intelligent transportation systems  1
Parallel detection architecture for long-tail problem in int...
收藏 引用
1st IEEE international conference on Digital Twins and Parallel Intelligence, DTPI 2021
作者: Li, Jingyi Zhang, Hui Li, Yidong School of Computer and Information Technology Beijing Jiaotong University Beijing China
Object detection plays an important role in intelligent transportation systems, especially due to the rise of autonomous vehicles and smart traffic management. Although object detection techniques in traffic scenes ha... 详细信息
来源: 评论
Greedy Embedding, Routing and Content Addressing for Darknets
Greedy Embedding, Routing and Content Addressing for Darknet...
收藏 引用
1st international conference on Networked systems (Netsys)
作者: Hoefer, Andreas Roos, stefanie strufe, Thorsten Tech Univ Darmstadt Peer To Peer Networks Grp Darmstadt Germany
To achieve anonymous and censorship-resistant overlay communication, darknets restrict overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a decentralized addressing schem... 详细信息
来源: 评论