咨询与建议

限定检索结果

文献类型

  • 1,739 篇 会议
  • 23 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,208 篇 工学
    • 1,099 篇 计算机科学与技术...
    • 695 篇 软件工程
    • 223 篇 信息与通信工程
    • 164 篇 电气工程
    • 122 篇 电子科学与技术(可...
    • 99 篇 控制科学与工程
    • 82 篇 生物工程
    • 61 篇 动力工程及工程热...
    • 50 篇 机械工程
    • 46 篇 生物医学工程(可授...
    • 32 篇 交通运输工程
    • 30 篇 光学工程
    • 29 篇 仪器科学与技术
    • 25 篇 环境科学与工程(可...
    • 24 篇 化学工程与技术
    • 22 篇 网络空间安全
    • 18 篇 安全科学与工程
    • 17 篇 力学(可授工学、理...
  • 498 篇 理学
    • 321 篇 数学
    • 96 篇 生物学
    • 83 篇 系统科学
    • 78 篇 物理学
    • 72 篇 统计学(可授理学、...
    • 34 篇 化学
  • 270 篇 管理学
    • 183 篇 管理科学与工程(可...
    • 121 篇 图书情报与档案管...
    • 116 篇 工商管理
  • 62 篇 医学
    • 55 篇 临床医学
  • 36 篇 法学
    • 35 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 198 篇 computer archite...
  • 80 篇 hardware
  • 79 篇 computational mo...
  • 66 篇 high performance...
  • 57 篇 cloud computing
  • 50 篇 grid computing
  • 41 篇 distributed comp...
  • 41 篇 field programmab...
  • 40 篇 bandwidth
  • 37 篇 kernel
  • 37 篇 graphics process...
  • 34 篇 resource managem...
  • 34 篇 computer network...
  • 33 篇 performance eval...
  • 32 篇 throughput
  • 31 篇 computer science
  • 31 篇 application soft...
  • 31 篇 analytical model...
  • 30 篇 program processo...
  • 29 篇 supercomputers

机构

  • 26 篇 college of compu...
  • 19 篇 university of ch...
  • 14 篇 school of comput...
  • 10 篇 college of compu...
  • 9 篇 school of comput...
  • 9 篇 college of compu...
  • 8 篇 school of comput...
  • 7 篇 school of data a...
  • 7 篇 school of comput...
  • 7 篇 institute of com...
  • 6 篇 computer network...
  • 6 篇 tsinghua univers...
  • 6 篇 school of cyber ...
  • 6 篇 changsha univers...
  • 5 篇 university of sc...
  • 5 篇 skl of computer ...
  • 5 篇 computer science...
  • 5 篇 school of comput...
  • 5 篇 hubei province k...
  • 5 篇 zhongguancun lab...

作者

  • 11 篇 duan yucong
  • 7 篇 zhang tao
  • 7 篇 li kenli
  • 7 篇 xu xiaolong
  • 6 篇 wang wei
  • 6 篇 gao guang r.
  • 5 篇 li peng
  • 5 篇 yunquan zhang
  • 5 篇 liu qin
  • 5 篇 wang dong
  • 5 篇 bader david a.
  • 5 篇 liu ruicheng
  • 5 篇 zhang rui
  • 5 篇 wan shouhong
  • 5 篇 wu jigang
  • 5 篇 panda dhabaleswa...
  • 5 篇 zhang jie
  • 5 篇 wang xiaoliang
  • 5 篇 chen long
  • 5 篇 li wei

语言

  • 1,714 篇 英文
  • 51 篇 其他
  • 3 篇 中文
  • 1 篇 波兰文
检索条件"任意字段=21st International Symposium on Computer Architecture and High Performance Computing"
1769 条 记 录,以下是441-450 订阅
排序:
Design and Validation of Cloud storage Systems using Rewriting Logic  21
Design and Validation of Cloud Storage Systems using Rewriti...
收藏 引用
21st international symposium on Symbolic and Numeric Algorithms for Scientific computing (SYNASC)
作者: Olveczky, Peter Csaba Univ Oslo Dept Informat Oslo Norway
Most large modern-day applications (Facebook, Gmail, eBay, etc.) rely on widely distributed and replicated storage of data for scalability, availability, and disaster tolerance. Since maintaining high degrees of data ... 详细信息
来源: 评论
Autonomous image segmentation by Competitive Unsupervised GrowCut  21
Autonomous image segmentation by Competitive Unsupervised Gr...
收藏 引用
21st international symposium on Symbolic and Numeric Algorithms for Scientific computing (SYNASC)
作者: Marginean, Radu Andreica, Anca Diosan, Laura Balint, Zoltan Babes Bolyai Univ Fac Math & Comp Sci Cluj Napoca Romania Cty Clin Emergency Hosp IMOGEN Res Inst Oradea Romania Babes Bolyai Univ Fac Phys Cluj Napoca Romania
In this paper, we introduce Competitive Unsupervised GrowCut, a cellular automata-based, unsupervised and autonomous algorithm that combines the label merging component of Unsupervised GrowCut with the soft label prop... 详细信息
来源: 评论
Combining TF-IDF, V-GAN, and XGB to Improve Next-Generation Web Application Firewalls' Ability to Detect SQL Injection Attacks
Combining TF-IDF, V-GAN, and XGB to Improve Next-Generation ...
收藏 引用
ACS/IEEE international Conference on computer Systems and Applications
作者: Emna Fakhfakh Maha Charfeddine Nesrine Tarhouni Mohamed Amine Guettat Securas Technologies Sfax Tunisia Research Groups in Intelligent Machines National Engineering School of Sfax University of Sfax Sfax Tunisia Securas Technologies Plaisir France
SQL injection attacks are one of the most devastating vulnerabilities on the web, which can be used to leak sensitive information, gain unauthorized access, and result in financial losses. We utilized five distinct Ma... 详细信息
来源: 评论
Developing Distributed high-performance computing Capabilities of an Open Science Platform for Robust Epidemic Analysis
Developing Distributed High-performance Computing Capabiliti...
收藏 引用
IEEE international symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW)
作者: Nicholson Collier Justin M. Wozniak Abby stevens Yadu Babuji Mickaël Binois Arindam Fadikar Alexandra Würth Kyle Chard Jonathan Ozik Decision and Infrastructure Sciences Argonne National Laboratory Lemont IL U.S.A Data Science and Learning Argonne National Laboratory Lemont IL U.S.A Computer Science University of Chicago Chicago IL U.S.A Acumes project-team Inria centre at Université Côte d’Azur Sophia Antipolis France
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among domain experts, mathematical modelers, and scienti...
来源: 评论
Solar-Powered UV-LEDs for Microbial Disinfection: Design, Challenges and Applications
Solar-Powered UV-LEDs for Microbial Disinfection: Design, Ch...
收藏 引用
international symposium on high Capacity Optical Networks and Enabling Technologies, HONET
作者: Trailokya Bhattarai Nita Khanal Abasifreke Ebong Mariya Munir M.Yasin Akhtar Raja Department of Electrical & Computer Engineering UNC Charlotte Charlotte USA Department of Civil and Environment Engineering UNC Charlotte Charlotte NC USA Department of Electrical & Computer Engineering and Phys & OSE UNC Charlotte Charlotte NC USA
Ultraviolet-Light Emitting Diodes (UV-LEDs) application as sustainable and effective microbial deactivation in healthcare, water treatment, food safety, and surface disinfection has increased recently. This paper expl... 详细信息
来源: 评论
A Hybrid Intelligence Model Forecasts the Temperature of a Battery Used in Electric Vehicles  21st
A Hybrid Intelligence Model Forecasts the Temperature of a...
收藏 引用
21st international symposium on Distributed computing and Artificial Intelligence, DCAI 2024
作者: Rubiños, Manuel Arcano-Bea, Paula Díaz-Longueira, Antonio Michelena, Álvaro Vega, Rafael Vega Casteleiro-Roca, José-Luis Andújar, José Manuel CTC Department of Industrial Engineering CITIC University of A Coruña EPEF Calle Mendizábal s/n Campus de Esteiro A Coruña Ferrol15403 Spain Department of Electronic Engineering Computer Systems and Automatic University of Huelva Campus de El Carmen Huelva Huelva21071 Spain
Battery technology is advancing due to the requirement to store reliable energy in electric transportation systems and portable electronics devices. Assessing battery conditions and increasing the autonomy of electric... 详细信息
来源: 评论
Personalized Learning Resource Recommendation Based On Learner Profile
Personalized Learning Resource Recommendation Based On Learn...
收藏 引用
IEEE international symposium on Parallel and Distributed Processing with Applications and IEEE international Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: WeiJie Peng HaiKun Liu Chao Qi School of Computer Science Shaanxi Normal University Xi’an China
The online learning platform is overloaded with learning resources, and learners are prone to “information maze” when facing massive learning resources. An effective way to solve information maze is to recommend res... 详细信息
来源: 评论
Anonymous Hierarchical Identity-based Encryption EHR Sharing Mechanism Based on SM9
Anonymous Hierarchical Identity-based Encryption EHR Sharing...
收藏 引用
IEEE international symposium on Parallel and Distributed Processing with Applications and IEEE international Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Zuobin Ying Minghao Liu Siofong Kong Shengmin Xu Jinbo Xiong Faculty of Data Science City University of Macau Macau China College of Computer and Cyber Security Fujian Normal University Fuzhou China
The identity-based encryption (IBE) scheme SM9 is a commercial encryption standard in China and has been used as a basic building block for authentication. Currently, to accommodate large-scale application scenarios, ... 详细信息
来源: 评论
Knowledge Tracing with Multi-Feature Fusion and Question Difficulty
Knowledge Tracing with Multi-Feature Fusion and Question Dif...
收藏 引用
IEEE international symposium on Parallel and Distributed Processing with Applications and IEEE international Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Haikun Liu Weijie Peng Chao Qi School of Computer Science Shaanxi Normal University Xi’an China
Knowledge Tracing (KT) aims to trace students’ knowledge state and predict their performance on questions in online tutoring system. For the moment, most methods assume that all questions are equal to every student, ... 详细信息
来源: 评论
Group-based Sparse Coding with Adaptive Dictionary Learning for Image Denoising
Group-based Sparse Coding with Adaptive Dictionary Learning ...
收藏 引用
international symposium on Distributed computing and Applications to Business, Engineering and Science (DCABES)
作者: Jiaying Wang Meiqing Wang Hang Cheng Rong Liu Fei Chen College of Mathematics and Statistics Fuzhou University Fuzhou China College of Computer Science and Data Science Fuzhou University Fuzhou China
Group sparse coding (GSC) is a powerful mechanism that has achieved great success in many low-level vision tasks, showing great potential in image denoising. Traditional group sparse coding generally uses overcomplete... 详细信息
来源: 评论