咨询与建议

限定检索结果

文献类型

  • 199 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 200 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126 篇 工学
    • 75 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 18 篇 机械工程
    • 16 篇 电气工程
    • 16 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 13 篇 电子科学与技术(可...
    • 13 篇 信息与通信工程
    • 7 篇 交通运输工程
    • 6 篇 土木工程
    • 5 篇 生物工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 动力工程及工程热...
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 网络空间安全
    • 2 篇 冶金工程
  • 50 篇 理学
    • 39 篇 数学
    • 10 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 6 篇 生物学
    • 5 篇 系统科学
    • 4 篇 化学
  • 23 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 6 篇 经济学
    • 5 篇 应用经济学
    • 2 篇 理论经济学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 20 篇 computational mo...
  • 12 篇 mathematical mod...
  • 7 篇 optimization
  • 7 篇 heuristic algori...
  • 6 篇 task analysis
  • 6 篇 machine learning
  • 6 篇 integrated circu...
  • 5 篇 load modeling
  • 5 篇 clustering algor...
  • 5 篇 cloud computing
  • 5 篇 solid modeling
  • 4 篇 computer archite...
  • 4 篇 robots
  • 4 篇 wireless sensor ...
  • 4 篇 predictive model...
  • 4 篇 vehicular ad hoc...
  • 4 篇 biological syste...
  • 4 篇 genetic algorith...
  • 4 篇 forecasting
  • 4 篇 adaptation model...

机构

  • 2 篇 school of mechan...
  • 2 篇 school of comput...
  • 2 篇 univ sains malay...
  • 2 篇 univ aden fac ed...
  • 2 篇 department of co...
  • 2 篇 school of contro...
  • 2 篇 college of compu...
  • 2 篇 univ aden fac en...
  • 1 篇 research initiat...
  • 1 篇 department of co...
  • 1 篇 information syst...
  • 1 篇 department of co...
  • 1 篇 bauman moscow st...
  • 1 篇 university malay...
  • 1 篇 fraunhofer itwm ...
  • 1 篇 institut teknolo...
  • 1 篇 china waterborne...
  • 1 篇 intelligent elec...
  • 1 篇 department of co...
  • 1 篇 key laboratory o...

作者

  • 2 篇 jing zhang
  • 2 篇 jantan aman
  • 2 篇 yue qi
  • 2 篇 he dongkang
  • 2 篇 ghanem waheed al...
  • 2 篇 jiang wenchao
  • 2 篇 jing huang
  • 2 篇 tianchi zhang
  • 1 篇 junyu zhang
  • 1 篇 jian jiao
  • 1 篇 stiawan d.
  • 1 篇 satyabrata das
  • 1 篇 klusek adrian
  • 1 篇 gao fan
  • 1 篇 ting-yun l.i.
  • 1 篇 bin wang
  • 1 篇 kumari renuka
  • 1 篇 deng qirong
  • 1 篇 wang yuqing
  • 1 篇 suzhen yang

语言

  • 198 篇 英文
  • 1 篇 法文
  • 1 篇 中文
检索条件"任意字段=2018 International Conference on Computer Modeling, Simulation and Algorithm(CMSA2018)"
200 条 记 录,以下是51-60 订阅
排序:
Fmotar: A fast multi-objective thermal aware routing algorithm for three-dimensional network-on-chips  50
Fmotar: A fast multi-objective thermal aware routing algorit...
收藏 引用
50th Summer computer simulation conference, SCSC 2018, Part of the 2018 Summer simulation Multi-conference, SummerSim 2018
作者: Majumdar, Amartya Dash, Ranjita K. Risco-Martín, José L. Turuk, Ashok K. Department of Computer Science and Engineering NIT Rourkela RourkelaOdisha India Department of Computer Architecture and Automatics Complutense University of Madrid Madrid Spain
Three-dimensional Network-on-Chip (3D NoC) is gaining popularity among designers due to its scalability, higher bandwidth, fault tolerance, and reliability. However, stacking of multiple dies leads to increase in powe... 详细信息
来源: 评论
A case-based reasoning and clustering framework for the development of intelligent agents in simulation systems  31
A case-based reasoning and clustering framework for the deve...
收藏 引用
31st international Florida Artificial Intelligence Research Society conference, FLAIRS 2018
作者: Lucca, Marcos R.B. Lopes, Alcides G. Silva, Luis A.L. Freitas, Edison P. Graduate Program in Computer Science Federal University of Santa Maria Av. Roraima 1000 Santa Maria97105-900 Brazil Graduate Program in Computer Science Federal University of Rio Grande do Sul CP 15064 Porto Alegre91501-970 Brazil
Artificial Intelligence (AI) techniques are essential to the modeling of realistic behaviors for agents in simulation systems. Although Case-Based Reasoning (CBR) and Clustering techniques are being explored in the im... 详细信息
来源: 评论
Leveraging virtual environments to train a deep learning algorithm  17
Leveraging virtual environments to train a deep learning alg...
收藏 引用
17th international conference on modeling and Applied simulation, MAS 2018
作者: Reed, Dean Thomas, Troyle Eifert, Latika Reynolds, Shane Hurter, Jonathan Tucker, Frank Institute for Simulation and Training University of Central Florida United States Army Research Laboratory-Human Research and Engineering Directorate Advanced Training and Simulation Division SFC Paul Ray Smith Center Italy
Open source datasets are the typical source used to train computers to accurately detect visual objects (e.g., humans, animals, and inanimate objects) through various machine learning methods (e.g., Deep Learning (DL)... 详细信息
来源: 评论
Research on the Optimization of Model Parameters Based on Particle Filter
Research on the Optimization of Model Parameters Based on Pa...
收藏 引用
2018 international conference on computer modeling, simulation and algorithm(cmsa2018)
作者: Weinan Cui Chong Chen Xiangli Cui Qian He Mingda Zhu China Academy of Information and Communications Technology College of Geophysics and Information Engineering China University of Petroleum State Key Laboratory of Petroleum Resources and Prospecting China University of Petroleum Research Institute of Petroleum Exploration & Development-Northwest (NWGI)
With the significant advancements in Information and Communications Technology(ICT), computer simulations have been widely used in natural sciences and engineering analysis. algorithms for parameters optimization in c... 详细信息
来源: 评论
2018 15th international computer conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2018
2018 15th International Computer Conference on Wavelet Activ...
收藏 引用
15th international computer conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2018
The proceedings contain 54 papers. The topics discussed include: an efficient 2 bits-level for image encryption based on DNA, multi-delayed Chebyshev map and cellular automata;an improved framework called DU++ applied...
来源: 评论
Terrorist Network Monitoring with Identifying Code  11th
Terrorist Network Monitoring with Identifying Code
收藏 引用
11th international conference on Social Computing, Behavioral-Cultural modeling, and Prediction (SBP) / conference of the Behavioral-Representation-in-modeling-and-simulation- Society (BRiMS)
作者: Sen, Arunabha Goliber, Victoria Horan Zhou, Chenyang Basu, Kaustav Arizona State Univ Tempe AZ 85287 USA
On multiple incidences of terrorist attacks in recent times across Europe, it has been observed that the perpetrators of the attack were in the suspect databases of the law enforcement authorities, but weren't und... 详细信息
来源: 评论
modeling and simulation of Emergency Evacuation from Industry Buildings under Toxic Cloud Release  2
Modeling and Simulation of Emergency Evacuation from Industr...
收藏 引用
2nd Borneo international conference on Applied Mathematics and Engineering, BICAME 2018
作者: Benseghir, Hocine Mohd Idris, Mohd Fadzil Bin Ibrahim, Abdullah Kabir, Muhammad Nomani University Malaysia Pahang Faculty of Engineering Technology Gambang Kuantan26300 Malaysia University Malaysia Pahang Faculty of Computer Systems and Software Engineering Gambang Kuantan26300 Malaysia
Toxic cloud caused by accidents in the industries is extremely dangerous for the occupants. Thus, in case of such accidents, the occupants must be immediately evacuated from industry buildings. In this paper, we explo... 详细信息
来源: 评论
A sequence anomaly detection approach based on isolation forest algorithm for time-series  2nd
A sequence anomaly detection approach based on isolation for...
收藏 引用
2nd international Workshop on High Performance Computing for Advanced modeling and simulation in Nuclear Energy and Environmental Science, HPCMS 2018, and 1st international Workshop on HPC Supported Data Analytics for Edge Computing, HiDEC 2018 held at the 32nd ACM international conference on Supercomputing, ACM ICS 2018
作者: Weng, Yu Liu, Lei College of Information Engineering Minzu University of China Beijing100081 China
Anomalous behavior detection in many applications is becoming more and more important, especially for computer security and sensor networks domains, in which data are typical time-series. However, the sequence anomaly... 详细信息
来源: 评论
Mathematical modeling shows the frequency of Ca2+ sparks in cells depends on the ryanodine receptor's arrangement  6th
Mathematical modeling shows the frequency of Ca<SUP>2+</SUP>...
收藏 引用
6th Annual international Young Scientists conference on HPC and Computational Science (YSC)
作者: Iaparov, B. I. Kharnzin, S. Yu. Moskvin, A. S. Solovyova, O. E. Ural Fed Univ 19 Mira Str Ekaterinburg 620002 Russia UB RAS Inst Immunol & Physiol 106 Pervomayskaya Str Ekaterinburg 620219 Russia
Calcium dynamics plays key role in many intracellular processes. Studying of calcium sparks, that is events of calcium release via groups of ryanodine receptors, or RyR channels, is of a great importance for live scie... 详细信息
来源: 评论
Complex Design of Granulation Units with Application of computer simulation and Software modeling: Case "Vortex Granulator"  13th
Complex Design of Granulation Units with Application of Comp...
收藏 引用
13th international conference on Modern Information Technology and IT Education, SITITO 2018
作者: Artyukhov, Artem Artyukhova, Nadiia Sumy State University Rimskogo-Korsakova Str. 2 Sumy40000 Ukraine
The article is devoted to the description of the complex method to design granulation unit, which is based on the joint use of the computer modeling results on the simulation models and software modeling based on aut... 详细信息
来源: 评论