咨询与建议

限定检索结果

文献类型

  • 3,630 篇 会议
  • 101 篇 期刊文献
  • 22 册 图书
  • 2 篇 学位论文

馆藏范围

  • 3,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,176 篇 工学
    • 1,076 篇 计算机科学与技术...
    • 832 篇 电气工程
    • 491 篇 控制科学与工程
    • 450 篇 软件工程
    • 208 篇 机械工程
    • 182 篇 信息与通信工程
    • 153 篇 动力工程及工程热...
    • 145 篇 石油与天然气工程
    • 129 篇 电子科学与技术(可...
    • 116 篇 土木工程
    • 112 篇 交通运输工程
    • 87 篇 仪器科学与技术
    • 77 篇 材料科学与工程(可...
    • 77 篇 化学工程与技术
    • 59 篇 建筑学
    • 58 篇 力学(可授工学、理...
    • 53 篇 航空宇航科学与技...
    • 52 篇 生物医学工程(可授...
    • 33 篇 生物工程
    • 32 篇 环境科学与工程(可...
  • 727 篇 理学
    • 395 篇 数学
    • 231 篇 物理学
    • 97 篇 系统科学
    • 84 篇 化学
    • 52 篇 统计学(可授理学、...
    • 40 篇 生物学
  • 308 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 97 篇 工商管理
    • 35 篇 图书情报与档案管...
  • 70 篇 经济学
    • 43 篇 应用经济学
  • 51 篇 医学
  • 30 篇 法学
  • 18 篇 教育学
  • 18 篇 农学
  • 9 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 545 篇 optimization
  • 274 篇 biological syste...
  • 243 篇 computational mo...
  • 166 篇 mathematical mod...
  • 107 篇 power system mod...
  • 86 篇 predictive model...
  • 83 篇 analytical model...
  • 75 篇 load modeling
  • 68 篇 data models
  • 67 篇 control systems
  • 64 篇 integrated circu...
  • 58 篇 particle swarm o...
  • 56 篇 real-time system...
  • 55 篇 genetic algorith...
  • 55 篇 solid modeling
  • 54 篇 modeling
  • 53 篇 costs
  • 53 篇 accuracy
  • 50 篇 training
  • 47 篇 simulation

机构

  • 7 篇 itmo univ st pet...
  • 6 篇 beijing jiaotong...
  • 5 篇 northeastern uni...
  • 4 篇 northeastern uni...
  • 4 篇 chonnam natl uni...
  • 4 篇 georgia inst tec...
  • 4 篇 zhejiang univ co...
  • 4 篇 department of te...
  • 4 篇 imec leuven
  • 4 篇 univ elect sci &...
  • 4 篇 institute of inf...
  • 4 篇 natl res tomsk p...
  • 4 篇 tsinghua univ de...
  • 4 篇 novosibirsk stat...
  • 4 篇 school of comput...
  • 4 篇 faculty of elect...
  • 3 篇 school of automa...
  • 3 篇 beijing jiaotong...
  • 3 篇 c mast ubi covil...
  • 3 篇 chinese acad sci...

作者

  • 9 篇 kamel salah
  • 6 篇 wang ya-xiong
  • 5 篇 jurado francisco
  • 5 篇 catalao joao p. ...
  • 5 篇 lotfi mohamed
  • 5 篇 yu xinjie
  • 5 篇 ou kai
  • 5 篇 chen chilian
  • 4 篇 frantzen marcus
  • 4 篇 li xin
  • 4 篇 zhang lei
  • 4 篇 li li
  • 4 篇 osorio gerardo j...
  • 4 篇 feng zhao
  • 4 篇 javadi mohammad
  • 4 篇 lei zhang
  • 4 篇 park il han
  • 4 篇 kazimierz duzink...
  • 4 篇 wang yu
  • 4 篇 zhang jun

语言

  • 3,464 篇 英文
  • 185 篇 其他
  • 107 篇 中文
  • 6 篇 土耳其文
  • 3 篇 俄文
检索条件"任意字段=20th Conference on System Modeling and Optimization"
3755 条 记 录,以下是3311-3320 订阅
排序:
Visualizing enterprise-wide security (VIEWS)
Visualizing enterprise-wide security (VIEWS)
收藏 引用
Annual Computer Security Applications conference
作者: J.J. Brennan D. Faatz M. Rudell C. Zimmerman MITRE Corporation USA
this paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. the authors' recent experience with providing security architecture and engineering support to orga... 详细信息
来源: 评论
VR modeler: from image sequences to 3D models  04
VR modeler: from image sequences to 3D models
收藏 引用
Proceedings of the 20th Spring conference on Computer Graphics
作者: Mario Sormann Joachim Bauer Christopher Zach Andreas Klaus Konrad Karner VRVis Research Center
In this paper we present a novel interactive modeling system, called VR Modeler, to create 3D geometric models from a set of photographs. In our approach standard automatic reconstruction techniques are assisted by a ... 详细信息
来源: 评论
Incremental quality driven software migration to object oriented systems
Incremental quality driven software migration to object orie...
收藏 引用
International conference on Software Maintenance (ICSM)
作者: Ying Zou Department of Electrical & Computer Engineering Queen's University Kingston ONT Canada
In the context of software maintenance, legacy software systems are continuously re-engineered in order to correct errors, provide new functionality, or port them into modern platforms. However, software re-engineerin... 详细信息
来源: 评论
Embedding distributed generation in a national energy planning procedure
Embedding distributed generation in a national energy planni...
收藏 引用
AFRICON conference
作者: C. Cormio M. Dicorato A. Minoia M. Trovato
In this work, the conditions and the degree of DG exploitation are investigated in a national energy planning. To this purpose, a bottom-up energy system optimization model is used to support policy planning for the s... 详细信息
来源: 评论
Automatic generation and analysis of NIDS attacks
Automatic generation and analysis of NIDS attacks
收藏 引用
Annual Computer Security Applications conference
作者: S. Rubin S. Jha B.P. Miller Computer Sciences Department University of Wisconsin Madison USA
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the attack payload to a NIDS signature, att... 详细信息
来源: 评论
BOSS: browsing OPTICS-plots for similarity search
BOSS: browsing OPTICS-plots for similarity search
收藏 引用
International conference on Data Engineering
作者: S. Brecheisen H.-P. Kriegel P. Kroger M. Pfeifle M. Viermetz M. Potke Institute for Computer Science University of Munich (LMU) Germany Sd and m AG software design and management Germany
An increasing number of database applications have emerged for which efficient and effective support for similarity search is substantial. Particularly, the task of finding similar shapes in 2D and 3D becomes more and... 详细信息
来源: 评论
An intrusion detection tool for AODV-based ad hoc wireless networks
An intrusion detection tool for AODV-based ad hoc wireless n...
收藏 引用
Annual Computer Security Applications conference
作者: G. Vigna S. Gwalani K. Srinivasan E.M. Belding-Royer R.A. Kemmerer Department of Computer Science University of California Santa Barbara USA Department of Computer Science University of California Santa Barbara
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and redundant transmission. these technique... 详细信息
来源: 评论
Future of simulation in biotechnology industry  04
Future of simulation in biotechnology industry
收藏 引用
Simulation Winter conference
作者: P.V. Saraph Bayer HealthCare-Biological Products Berkeley CA USA
In the 21st century, the biotechnology industry has the potential to inspire a number of management tools and theories, just as the automobile industry did in the 20th century. this paper explores the opportunities fo... 详细信息
来源: 评论
Identification of a model to simulate the automobile accessibility movement
Identification of a model to simulate the automobile accessi...
收藏 引用
IEEE International conference on systems, Man and Cybernetics
作者: M. Lempereur P. Pudlo P. Gorce F.-X. Lepoutre LAMM UMR CNRS 8530 Universita de Valenciennes et du Hainaut-Cambrésis Valenciennes France éLESPEA 31-62 Université de Tlemcen La Garde France
the presented works are a part of the realization of an automobile accessibility movement simulator. the aim of this paper is to propose an optimization step of the kinematic model representing the human body. this mo... 详细信息
来源: 评论
optimization methods for minimum power multicasting in wireless networks with sectored antennas
Optimization methods for minimum power multicasting in wirel...
收藏 引用
IEEE conference on Wireless Communications and Networking
作者: A.K. Das R.J. Marks M. El-Sharkawi P. Arabshahi A. Gray Department of Electrical Engineering University of Washington Seattle WA USA School of Engineering and Computer Science Baylor University Waco TX USA Jet Propulsion Laboratory Pasadena CA USA
In this paper the problem of minimum power multicasting in wireless networks with sectored antennas is considered. For omnidirectional antenna systems, a transmission from node i to node j will also reach all nodes wh... 详细信息
来源: 评论