咨询与建议

限定检索结果

文献类型

  • 3,505 篇 会议
  • 48 册 图书
  • 36 篇 期刊文献

馆藏范围

  • 3,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,880 篇 工学
    • 1,546 篇 计算机科学与技术...
    • 802 篇 软件工程
    • 342 篇 电气工程
    • 298 篇 控制科学与工程
    • 289 篇 信息与通信工程
    • 77 篇 生物工程
    • 68 篇 机械工程
    • 62 篇 电子科学与技术(可...
    • 53 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 42 篇 建筑学
    • 41 篇 土木工程
    • 33 篇 交通运输工程
    • 32 篇 光学工程
    • 31 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 26 篇 材料科学与工程(可...
  • 468 篇 理学
    • 243 篇 数学
    • 148 篇 物理学
    • 82 篇 生物学
    • 76 篇 系统科学
    • 74 篇 统计学(可授理学、...
  • 337 篇 管理学
    • 235 篇 管理科学与工程(可...
    • 140 篇 工商管理
    • 115 篇 图书情报与档案管...
  • 58 篇 法学
    • 50 篇 社会学
  • 43 篇 医学
    • 41 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 23 篇 教育学
    • 23 篇 教育学
  • 9 篇 农学
  • 7 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 303 篇 computer archite...
  • 193 篇 cloud computing
  • 161 篇 high performance...
  • 159 篇 real-time system...
  • 157 篇 computational mo...
  • 113 篇 distributed comp...
  • 109 篇 hardware
  • 104 篇 conferences
  • 103 篇 control systems
  • 90 篇 protocols
  • 83 篇 security
  • 81 篇 privacy
  • 80 篇 costs
  • 78 篇 application soft...
  • 78 篇 software archite...
  • 70 篇 scalability
  • 69 篇 computer science
  • 67 篇 software
  • 61 篇 resource managem...
  • 61 篇 servers

机构

  • 16 篇 university of ch...
  • 16 篇 school of cyber ...
  • 14 篇 school of comput...
  • 13 篇 institute of com...
  • 9 篇 college of compu...
  • 9 篇 chinese academy ...
  • 9 篇 faculty of elect...
  • 8 篇 institute of inf...
  • 6 篇 school of data s...
  • 6 篇 college of physi...
  • 6 篇 college of intel...
  • 6 篇 st petersburg el...
  • 6 篇 school of electr...
  • 5 篇 shanghai jiao to...
  • 5 篇 jozef stefan ins...
  • 5 篇 bgs systems inc
  • 5 篇 peng cheng labor...
  • 5 篇 national univers...
  • 5 篇 shanghai key lab...
  • 5 篇 school of transp...

作者

  • 8 篇 sang hyuk son
  • 6 篇 chen gang
  • 6 篇 jing liu
  • 5 篇 takizawa makoto
  • 5 篇 enokido tomoya
  • 5 篇 yulei wu
  • 4 篇 moris behnam
  • 4 篇 nakamura shigena...
  • 4 篇 gonçalves fabríc...
  • 4 篇 zhen xu
  • 4 篇 lin xiao
  • 4 篇 jin-hee lee
  • 4 篇 baranauskas mari...
  • 4 篇 jia zhang
  • 4 篇 santambrogio mar...
  • 4 篇 hai jin
  • 4 篇 li jun
  • 4 篇 wenaus t.
  • 4 篇 wang yu
  • 4 篇 hao yin

语言

  • 3,536 篇 英文
  • 36 篇 其他
  • 27 篇 中文
  • 7 篇 葡萄牙文
检索条件"任意字段=22nd International Conference on Architecture of Computing Systems"
3589 条 记 录,以下是21-30 订阅
排序:
Model-Driven Security Analysis of Self-Sovereign Identity systems  22
Model-Driven Security Analysis of Self-Sovereign Identity Sy...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Ding, Yepeng Sato, Hiroyuki Univ Tokyo Tokyo Japan
Best practices of self-sovereign identity (SSI) are being intensively explored in academia and industry. Reusable solutions obtained from best practices are generalized as architectural patterns for systematic analysi... 详细信息
来源: 评论
A Comprehensive Machine Learning Methodology for Embedded systems PHM  22
A Comprehensive Machine Learning Methodology for Embedded Sy...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Pimentel, Juliano McEwan, Alistair A. Yu, Hong Qing Univ Derby Sch Comp & Engn Derby DE22 1GB England
Techniques of Machine Learning (ML) have recently been widely used in several applications, but not much for embedded systems, particularly those of safety-critical functionality, and are expected to help solve comple... 详细信息
来源: 评论
Coexistence Analysis of 10-10.5 GHz IMT and EESS (passive) systems  22
Coexistence Analysis of 10-10.5 GHz IMT and EESS (passive) S...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Wang, Xiaoqian Wang, Cheng Cai, Yuqian Zhao, Xiaoyan Wang, Weidong Minist Educ Key Lab Universal Wireless Commun Beijing Peoples R China Beijing Univ Posts & Telecommun Sch Elect Engn Informat & Elect Technol Lab Beijing Peoples R China
With the commercialization of international Mobile Telecommunications (IMT) technology, this paper studies the problem of ensuring coexistence between new frequency bands and existing satellite systems, which has led ... 详细信息
来源: 评论
Dynamic Scheduling of AES Cores for Aperiodic Tasks on Multi-tenant Cloud FPGAs  22
Dynamic Scheduling of AES Cores for Aperiodic Tasks on Multi...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Donchez, Stephen Wang, Xiaofang Villanova Univ Dept Elect & Comp Engn Villanova PA 19085 USA
Field Programmable Gate Arrays (FPGAs) have long been utilized in systems benefiting from hardware acceleration of processes unsuitable for execution on a traditional processor. Accordingly, as much of the world pivot... 详细信息
来源: 评论
Design and Implementation of Mask Detection System Based on Improved YOLOv5s  22
Design and Implementation of Mask Detection System Based on ...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Zhao, Changyu Yan, Zhuo Xu, Huangxin Chen, Xueliang Li, Zheng Zhong, Xinyu Liu, Cuiwei Xiao, Anyan Lv, Xingyan Shenyang Aerosp Univ Sch Artificial Intelligence Shenyang Peoples R China Shenyang Aerosp Univ Sch Comp Sci Shenyang Peoples R China
In this paper, we propose a lightweight mask detection algorithm and implement an intelligent vehicle system. The algorithm uses YOLOv5s as the backbone network, and at the same time incorporates the SE attention mech... 详细信息
来源: 评论
Demo: MeowSorter: Identifying Stray and Pet Cats Through Facial Features  24
Demo: MeowSorter: Identifying Stray and Pet Cats Through Fac...
收藏 引用
22nd Annual international conference on Mobile systems, Applications and Services (MOBISYS)
作者: Motoyama, Rina Isokawa, Naohiro Okoshi, Tadashi Nakazawa, Jin Keio Univ Tokyo Japan
In this paper, we propose a MeowSorter that identifies stray and pet cats using deep learning technology, to address the problem that lost cats with owners are mistakenly identified as stray cats and wrongfully euthan... 详细信息
来源: 评论
Research and Discussion on Digital Twin architecture of 5G Bearer Network  22
Research and Discussion on Digital Twin Architecture of 5G B...
收藏 引用
22nd international conference on Optical Communications and Networks, ICOCN 2024
作者: Wang, Yu Cui, Xiao Zhu, Jian Guo, Bingli Beijing China Huawei Technologies Co. LTD Wuhan China Beijing University of Posts and Telecommunications Beijing China
Based on the research of digital twin technology in the field of information communication, this paper mainly proposes the architecture of digital twin for 5G bearer network, and the deployment strategy of digital twi... 详细信息
来源: 评论
Performance Evaluation of Flight Energy Consumption of UAVs in IRS-assisted UAV systems  22
Performance Evaluation of Flight Energy Consumption of UAVs ...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Luo, Xiuyi Lu, Chongrui Ouyang, Siyi Xia, Siyu Wuhan Univ Technol Sch Informat Engn Wuhan Peoples R China Wuhan Univ Technol Lib Wuhan Peoples R China
The research regarding the cooperation between unmanned aerial vehicles (UAVs) and intelligent reflecting surface (IRS) has attracted great attenuation in recent years. However, one of the key technical weaknesses is ... 详细信息
来源: 评论
Anomaly based malware threat detection on Linux systems  22
Anomaly based malware threat detection on Linux Systems
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Ramamoorthy, Jayanthi Shashidhar, Narasimha K. Zhou, Bing Sam Houston State Univ Dept Comp Sci Huntsville TX 77340 USA
There has been a steady increase in malware targeting Linux-based systems. With the proliferation of embedded IoT devices and cloud architectures that use Linux or Unix-based Operating systems, this trend is expected ... 详细信息
来源: 评论
Affinity-Based Resource and Task Allocation in Edge computing systems  22
Affinity-Based Resource and Task Allocation in Edge Computin...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Zou, Wenbing Liu, Xiulei Hou, Shoulu Zhang, Ye Miao, Lin Gong, Yi Li, Ning Beijing Informat Sci & Technol Univ Beijing Peoples R China
Edge computing has become a promising technology to mitigate the latency of various cloud services. Task scheduling in edge computing is challenging due to the heterogeneous devices and multiple tasks. This paper prop... 详细信息
来源: 评论