咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 1 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 812 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 715 篇 工学
    • 452 篇 计算机科学与技术...
    • 295 篇 软件工程
    • 146 篇 机械工程
    • 121 篇 控制科学与工程
    • 116 篇 电气工程
    • 100 篇 信息与通信工程
    • 84 篇 材料科学与工程(可...
    • 74 篇 仪器科学与技术
    • 50 篇 电子科学与技术(可...
    • 45 篇 土木工程
    • 31 篇 动力工程及工程热...
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 环境科学与工程(可...
    • 26 篇 冶金工程
    • 24 篇 化学工程与技术
    • 21 篇 航空宇航科学与技...
    • 20 篇 力学(可授工学、理...
    • 20 篇 生物医学工程(可授...
    • 19 篇 生物工程
  • 219 篇 理学
    • 117 篇 数学
    • 48 篇 物理学
    • 43 篇 系统科学
    • 27 篇 统计学(可授理学、...
    • 19 篇 化学
  • 135 篇 管理学
    • 102 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 43 篇 图书情报与档案管...
  • 19 篇 农学
  • 14 篇 医学
  • 13 篇 经济学
  • 12 篇 教育学
  • 11 篇 法学
  • 7 篇 艺术学
  • 6 篇 军事学

主题

  • 17 篇 computational mo...
  • 13 篇 analytical model...
  • 12 篇 biological syste...
  • 11 篇 modeling
  • 10 篇 computer aided d...
  • 9 篇 educational inst...
  • 8 篇 monitoring
  • 8 篇 wireless sensor ...
  • 7 篇 simulation
  • 7 篇 cloud computing
  • 6 篇 data mining
  • 6 篇 data acquisition
  • 6 篇 application
  • 6 篇 web services
  • 6 篇 solid modeling
  • 5 篇 internet of thin...
  • 5 篇 information syst...
  • 5 篇 plc
  • 5 篇 xml
  • 5 篇 real time system...

机构

  • 10 篇 chongqing normal...
  • 8 篇 college of compu...
  • 6 篇 college of physi...
  • 5 篇 chongqing instit...
  • 5 篇 college of compu...
  • 4 篇 school of softwa...
  • 4 篇 chongqing water ...
  • 4 篇 school of mathem...
  • 4 篇 school of inform...
  • 4 篇 school of mathem...
  • 4 篇 school of comput...
  • 3 篇 school of comput...
  • 3 篇 school of inform...
  • 3 篇 college of elect...
  • 3 篇 college of naval...
  • 3 篇 chongqing instit...
  • 3 篇 department of co...
  • 3 篇 college of compu...
  • 3 篇 department of co...
  • 3 篇 school of mechan...

作者

  • 6 篇 song li
  • 5 篇 ming li
  • 5 篇 ma yan
  • 5 篇 he guotian
  • 4 篇 yan ma
  • 4 篇 li song
  • 4 篇 li ming
  • 4 篇 ran yingchun
  • 4 篇 guotian he
  • 4 篇 wang gang
  • 3 篇 wang lei
  • 3 篇 wang jian
  • 3 篇 yingchun ran
  • 3 篇 xiang li
  • 3 篇 zhang kun
  • 3 篇 liu fuyan
  • 3 篇 wang song
  • 3 篇 wang lu
  • 3 篇 liu gang
  • 3 篇 zhang weimin

语言

  • 788 篇 英文
  • 23 篇 中文
  • 1 篇 俄文
检索条件"任意字段=2012 2nd International Conference on Computer Application and System Modeling, ICCASM 2012"
812 条 记 录,以下是591-600 订阅
排序:
Performance Evaluation of Virtualization Technologies for Windows Programs Running on Linux Operating system
Performance Evaluation of Virtualization Technologies for Wi...
收藏 引用
2nd international conference on Network Computing and Information Security (NCIS 2012)
作者: Huang, Conghui Chen, Jing Zhang, Li Luo, Qiao Air Force Engn Univ Coll Informat & Nav Xian Peoples R China
system virtual machine, kernel virtualization in kernel space and kernel virtualization in user space are the three virtualization technologies for Windows programs running on Linux operating system. system virtual ma... 详细信息
来源: 评论
A M2MC based approach for mapping two ADL models  12
A M2MC based approach for mapping two ADL models
收藏 引用
2nd international conference on Computational Science, Engineering and Information, CCSEIT 2012
作者: Kadati, Sai Bharath Baseer, K.K. Rama Mohan Reddy, A. Shoba Bindu, C. Information Technology SVEC Tirupati India JNIAS/JNTUA University Hyderabad Sri Venkateswara University Tirupati India JawaharLal Nehru Technological University Anantapur India
Architectural modeling has advised many domain-specific notations, where as each one focus on a specific application domain, analysis type, or modeling environment. In IT industry, a system architecture and structured... 详细信息
来源: 评论
Multi tree view of complex attack - Stuxnet
Multi tree view of complex attack - Stuxnet
收藏 引用
2nd international conference on Advances in Computing and Information Technology, ACITY-2012
作者: Mishra, Shivani Kant, Krishna Yadav, R.S. CSED Motilal Nehru National Institute of Technology Allahabad Uttar Pradesh India Computer Engineering and Applications Department GLA University Mathura India
Stuxnet attack on critical infrastructures is considered as paradigm shift in malware attack approach. The complexity and sophistication involved in this attack make it unique. Attacking approach of the malware, on co... 详细信息
来源: 评论
Improving L-system music rendering using a hybrid of stochastic and context-sensitive grammars in a visual language framework
Improving L-system music rendering using a hybrid of stochas...
收藏 引用
2nd international ICST conference on Arts and Technology, ArtsIT 2011
作者: Kim, Lim Chen Talib, Abdullah Zawawi School of Computer Sciences Universiti Sains Malaysia USM 11800 Pulau Pinang Malaysia
L-systems have been extensively utilized in plant modeling and music rendering. However, the music generated was not very pleasant as the grammars used are very simple. This paper describes a hybrid method that genera... 详细信息
来源: 评论
Feasibility, challenges, and performance of wireless multi-hop routing for feeder level communication in a Smart Grid
Feasibility, challenges, and performance of wireless multi-h...
收藏 引用
2nd international conference on Energy-Efficient Computing and Networking, e-Energy 2011
作者: Karimi, Babak Namboodiri, Vinod Aravinthan, Visvakumar Jewell, Ward Electrical Engineering and Computer Science Wichita State University KS United States Electrical and Computer Engineering Clemson University SC United States
In a Smart Grid communication network at the power distribution level, several technologies have been suggested to meet communication needs. In this work these technologies are compared with an explanation of why wire... 详细信息
来源: 评论
Integration of XML databases by schema restructuring
Integration of XML databases by schema restructuring
收藏 引用
2nd international conference on Data Engineering and Management, ICDEM 2010
作者: Kanchana, R. Rajagopal, Aishwarya Kaavya, S. Bakiyalakshmi, R. Department of Computer Science and Engineering SSN College of Engineering Anna University Chennai India
Querying XML databases and their integration is an emerging area in applications related to database management systems. XML documents having similar data may differ in their organization. Hence a single query may not... 详细信息
来源: 评论
Condition and Key Issues Analysis on the Smarter Tourism Construction in China
Condition and Key Issues Analysis on the Smarter Tourism Con...
收藏 引用
2nd international conference on Multimedia and Signal Processing (CMSP 2012)
作者: Huang, Xian-kai Yuan, Jia-zheng Shi, Mei-yu Beijing Union Univ Tourism Inst Beijing 100101 Peoples R China Beijing Key Lab Informat Serv Engn Beijing 100101 Peoples R China Union Univ Comp Technol Inst Beijing Beijing 100101 Peoples R China
Smart Tourism, cored in massive tourism resources data center, supported by IOT and cloud computing, focused on tourists through intelligent identification, intelligent monitoring and location based service, is a new ... 详细信息
来源: 评论
Research on hardware security of embedded system in cloud environment
Research on hardware security of embedded system in cloud en...
收藏 引用
2012 2nd international conference on Key Engineering Materials, ICKEM 2012
作者: Li, Jing Zhang, Huanguo Zhao, Bo Guo, Xi He, Fan School of Computer Wuhan University Wuhan 430072 Hubei China Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education Wuhan University Wuhan 430072 Hubei China School of Computer Science and Technology Wuhan University of Technology 1040 Heping Road Wuhan 430063 China
Cloud computing is an important innovation of current computing models. At present, the research on the security of cloud computing is mainly concentrated on PCs and servers. The security of embedded system in cloud e... 详细信息
来源: 评论
Study on land cover/use change in Changping District of Beijing based on RS technology
Study on land cover/use change in Changping District of Beij...
收藏 引用
2012 2nd international conference on Remote Sensing, Environment and Transportation Engineering, RSETE 2012
作者: Cui, Shanshan Liu, Yun Zhang, Jinfang Wang, Zhiying Zhao, Qun Beijing Key Laboratory of New Technology in Agricultural Application Beijing University of Agriculture Beijing 102206 China
Land use is a particular area, where there is the special product to affect feature of natural, economic, technological and social condition. Remote sensing plays a significant role in analysis on land use change. In ... 详细信息
来源: 评论
A remote mutual situation-aware model by detecting entrance and exit behaviors in smart home
A remote mutual situation-aware model by detecting entrance ...
收藏 引用
2012 2nd international conference on Electric and Electronics, EEIC 2012
作者: Zhang, Mengqiao Wang, Junbo Cheng, Zixue Jing, Lei Chen, Yongping Yamagishi, Kaoru Guo, Song Pham, Anh T. Graduate School of Computer Science and Engineering University of Aizu Aizu-Wakamatsu Fukushima Japan School of Computer Science and Engineering University of Aizu Aizu-Wakamatsu Fukushima Japan
Internet of Things (IoT) is becoming a hot topic in the research field recently. Smart home, which provides comfortable living environment to users with advanced technologies, is an important application field in IoT.... 详细信息
来源: 评论