咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 11 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 167 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 42 篇 信息与通信工程
    • 30 篇 电气工程
    • 21 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 5 篇 安全科学与工程
    • 5 篇 网络空间安全
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
  • 72 篇 理学
    • 47 篇 数学
    • 22 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 10 篇 生物学
    • 3 篇 化学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 6 篇 医学
  • 5 篇 法学
    • 4 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 10 篇 genetic algorith...
  • 8 篇 artificial intel...
  • 8 篇 constraint theor...
  • 6 篇 machine learning
  • 6 篇 game theory
  • 6 篇 clustering algor...
  • 5 篇 computer science
  • 5 篇 algorithm design...
  • 4 篇 quality of servi...
  • 4 篇 computational mo...
  • 4 篇 graph theory
  • 4 篇 computers
  • 4 篇 decision making
  • 4 篇 computer vision
  • 4 篇 computer network...
  • 3 篇 computer simulat...
  • 3 篇 object detection
  • 3 篇 systems engineer...
  • 3 篇 algorithms
  • 3 篇 logic gates

机构

  • 3 篇 univ penn dept c...
  • 3 篇 electronics and ...
  • 3 篇 division of comp...
  • 2 篇 ben-gurion unive...
  • 2 篇 univ cambridge 6...
  • 2 篇 duke univ dept e...
  • 2 篇 tu wien austria
  • 2 篇 institute of sys...
  • 2 篇 school of mathem...
  • 2 篇 department of co...
  • 2 篇 dacya complutens...
  • 2 篇 med mobile 535 2...
  • 2 篇 college of compu...
  • 2 篇 deis universit d...
  • 2 篇 school of comput...
  • 1 篇 lahore pakistan
  • 1 篇 department of co...
  • 1 篇 university of ca...
  • 1 篇 dept. of mechani...
  • 1 篇 key laboratory o...

作者

  • 3 篇 parlato gennaro
  • 3 篇 sokolsky oleg
  • 3 篇 park junkil
  • 3 篇 pajic miroslav
  • 3 篇 lee insup
  • 3 篇 la torre salvato...
  • 3 篇 fischer bernd
  • 2 篇 holeman isaac
  • 2 篇 mohd azlishah ot...
  • 2 篇 tomasco ermenegi...
  • 2 篇 inverso omar
  • 2 篇 segal michael
  • 2 篇 lengál ondřej
  • 2 篇 ross peter
  • 2 篇 hamzah asyrani s...
  • 2 篇 yahaya abd rahim
  • 2 篇 mohd fairuz iska...
  • 2 篇 marchetti-spacca...
  • 2 篇 corne david
  • 1 篇 roihan ahmad

语言

  • 275 篇 英文
  • 2 篇 中文
检索条件"任意字段=1st International ICST Conference on Theory and Practice of Algorithms in Computer Systems"
276 条 记 录,以下是161-170 订阅
排序:
Simulation and scheduling of real-time computer vision algorithms  1st
收藏 引用
1st international conference on computer Vision systems, ICVS 1999
作者: Torres, F. Candelas, F.A. Puente, S.T. Jiménez, L.M. Fernândez, C. Agullö, R.J. Physics Systems Engineering and Signal Theory Department University of Alicante Spain Science and Technology Dept. System Engineering and Automation Div University Miguel Hernández Spain
A fully integrated development tool for computer vision systems has been built in the framework of this paper. There are many applications that help the user in the design of such systems, using graphical interfaces a... 详细信息
来源: 评论
Topology layout technology of energy internet  2nd
Topology layout technology of energy internet
收藏 引用
2nd international Workshop on High Performance Computing for Advanced Modeling and Simulation in Nuclear Energy and Environmental Science, HPCMS 2018, and 1st international Workshop on HPC Supported Data Analytics for Edge Computing, HiDEC 2018 held at the 32nd ACM international conference on Supercomputing, ACM ICS 2018
作者: Chen, Liandong Zhang, Boyao Liu, Fang Li, Jingquan Sun, Chenjun State Grid Hebei Electric Power Company Shijiazhuang China Department of High Performance Computing Technology and Application Development Computer Network Information Center Chinese Academy of Science Beijing China University of Chinese Academy of Sciences Beijing China
With the development of economy, the number of substations and the number of lines is continuously increasing, and the Energy Internet is becoming increasingly complex and changes frequently. It is more and more diffi... 详细信息
来源: 评论
Parallel rough set based knowledge acquisition using mapreduce from big data
Parallel rough set based knowledge acquisition using mapredu...
收藏 引用
1st international Workshop on Big Data, streams and Heterogeneous Source Mining: algorithms, systems, Programming Models and Applications, BigMine-12 - Held in Conjunction with SIGKDD conference
作者: Zhang, Junbo Li, Tianrui Pan, Yi School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 China Department of Computer Science Georgia State University Atlanta GA 30303 United States
Nowadays, with the volume of data growing at an unprecedented rate, big data mining and knowledge discovery have become a new challenge. Rough set theory for knowledge acquisition has been successfully applied in data... 详细信息
来源: 评论
The phase-transition niche for evolutionary algorithms in timetabling  1st
The phase-transition niche for evolutionary algorithms in ti...
收藏 引用
1st international conference on practice and theory of Automated Timetabling, PATAT 1995
作者: Ross, Peter Corne, David Terashima-Marm, Hugo Department of Artificial Intelligence University of Edinburgh 80 South Bridge EdinburghEHl 1HN United Kingdom Parallel Emergent k Distributed Architectures Laboratory Department of Computer Science University of Reading ReadingRG6 6AY United Kingdom Centre for Artificial Intelligence ITESM Monterrey Mexico
Constraint satisfaction problems tend to display phase transitions with respect to the effort required by specific problem solving strategies. So far, little is known concerning the causes of phase transitions, or the... 详细信息
来源: 评论
Robust Encryption System Based Watermarking theory by Using Chaotic algorithms: A Reviewer Paper  1
Robust Encryption System Based Watermarking Theory by Using ...
收藏 引用
1st Iraqi Academics Syndicate international conference for Pure and Applied Sciences, IICPS 2020
作者: Al-Asady, Heba Abdul-Jaleel Al-Thahab, Osama Qasim Jumah Hreshee, Saad S. University of Babylon College of Engineering Dept. of Electrical Engineering Babylon Iraq The Islamic University Computer Technical Engineering Department College of Technical Engineering Najaf Iraq
In the previous decade, the mixing between chaotic supposition and cryptography frames considers a significant field of data security. Chaos-based image encryption is given a lot of attention in the exploration of dat... 详细信息
来源: 评论
Surveillance using Unmanned Aerial Vehicle for Triggered Activity Capturing  1
Surveillance using Unmanned Aerial Vehicle for Triggered Act...
收藏 引用
1st IEEE international conference on Industrial Electronics: Developments and Applications, ICIDeA 2022
作者: Banerjee, Shobhan Swain, Tanmaya Mishra, Jyotiprakash Rath, Manas Kumar Samant, Tapaswini BITS Department of Engineering Technology Rajasthan Pilani India School of Computer Engineering Kalinga Institute of Industrial Technology Bhubaneswar India
Unmanned aerial vehicles (UAVs) are being used extensively these days, for various applications such as package delivery, surveillance systems, shooting purposes, and whatnot. Artificial Intelligence in theory talks a... 详细信息
来源: 评论
Requirements vs. software design: An explanation based on the distinction between concepts and their representations
Requirements vs. software design: An explanation based on th...
收藏 引用
3rd international Multi-conference on Computing in the Global Information Technology, ICCGI 2008
作者: Kaindl, Hermann Svetinovic, Davor Institute of Computer Technology Vienna University of Technology A-1040 Vienna Austria Lero - the Irish Software Engineering Research Centre Department of Computer Science and Information Systems University of Limerick Ireland
still, requirements and software design are often confused with one another. We provide a new (partial) explanation for this phenomenon, based on the insight that representations of concepts related to requirements an... 详细信息
来源: 评论
Secure IoT Model Based on PRESENT Lightweight Modified and Chaotic Key Generator  1
Secure IoT Model Based on PRESENT Lightweight Modified and C...
收藏 引用
1st international conference Information Technology to Enhance E-Learning and other Application, IT-ELA 2020
作者: Abdulraheem, Ameer N. Nema, Bashar M. Mustansiriyah University Department of Computer Science Baghdad Iraq
The rapid development of the Internet of Things (IoT) technologies has increased the number of connected devices with constrained resources. Therefore, there is an urgent need to develop secure, lightweight cryptograp... 详细信息
来源: 评论
Type inference with inequalities  4th
收藏 引用
4th international Joint conference on theory and practice of Software Development, TAPSOFT 1991
作者: Schwartzbach, Michael I. Computer Science Department Aarhus University Ny Munkegade Århus CDK-8000 Denmark
Type inference can be phrased as constraint-solving over types. We consider an implicitly typed language equipped with recursive types, multiple inheritance, 1st order parametric polymorphism, and assignments. Type co... 详细信息
来源: 评论
Knowledge Processing and Data Analysis - First international conference, KPP 2007, Revised Selected Papers
收藏 引用
1st international conference on Knowledge Processing in practice, KPP 2007
The proceedings contain 21 papers. The topics discussed include: conceptual knowledge processing: theory and practice;non-symmetric indiscernibility;computing graph-based lattices from smallest projections;combined lo...
来源: 评论