咨询与建议

限定检索结果

文献类型

  • 3,505 篇 会议
  • 48 册 图书
  • 36 篇 期刊文献

馆藏范围

  • 3,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,880 篇 工学
    • 1,546 篇 计算机科学与技术...
    • 802 篇 软件工程
    • 342 篇 电气工程
    • 298 篇 控制科学与工程
    • 289 篇 信息与通信工程
    • 77 篇 生物工程
    • 68 篇 机械工程
    • 62 篇 电子科学与技术(可...
    • 53 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 42 篇 建筑学
    • 41 篇 土木工程
    • 33 篇 交通运输工程
    • 32 篇 光学工程
    • 31 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 26 篇 材料科学与工程(可...
  • 468 篇 理学
    • 243 篇 数学
    • 148 篇 物理学
    • 82 篇 生物学
    • 76 篇 系统科学
    • 74 篇 统计学(可授理学、...
  • 337 篇 管理学
    • 235 篇 管理科学与工程(可...
    • 140 篇 工商管理
    • 115 篇 图书情报与档案管...
  • 58 篇 法学
    • 50 篇 社会学
  • 43 篇 医学
    • 41 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 23 篇 教育学
    • 23 篇 教育学
  • 9 篇 农学
  • 7 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 303 篇 computer archite...
  • 193 篇 cloud computing
  • 161 篇 high performance...
  • 159 篇 real-time system...
  • 157 篇 computational mo...
  • 113 篇 distributed comp...
  • 109 篇 hardware
  • 104 篇 conferences
  • 103 篇 control systems
  • 90 篇 protocols
  • 83 篇 security
  • 81 篇 privacy
  • 80 篇 costs
  • 78 篇 application soft...
  • 78 篇 software archite...
  • 70 篇 scalability
  • 69 篇 computer science
  • 67 篇 software
  • 61 篇 resource managem...
  • 61 篇 servers

机构

  • 16 篇 university of ch...
  • 16 篇 school of cyber ...
  • 14 篇 school of comput...
  • 13 篇 institute of com...
  • 9 篇 college of compu...
  • 9 篇 chinese academy ...
  • 9 篇 faculty of elect...
  • 8 篇 institute of inf...
  • 6 篇 school of data s...
  • 6 篇 college of physi...
  • 6 篇 college of intel...
  • 6 篇 st petersburg el...
  • 6 篇 school of electr...
  • 5 篇 shanghai jiao to...
  • 5 篇 jozef stefan ins...
  • 5 篇 bgs systems inc
  • 5 篇 peng cheng labor...
  • 5 篇 national univers...
  • 5 篇 shanghai key lab...
  • 5 篇 school of transp...

作者

  • 8 篇 sang hyuk son
  • 6 篇 chen gang
  • 6 篇 jing liu
  • 5 篇 takizawa makoto
  • 5 篇 enokido tomoya
  • 5 篇 yulei wu
  • 4 篇 moris behnam
  • 4 篇 nakamura shigena...
  • 4 篇 gonçalves fabríc...
  • 4 篇 zhen xu
  • 4 篇 lin xiao
  • 4 篇 jin-hee lee
  • 4 篇 baranauskas mari...
  • 4 篇 jia zhang
  • 4 篇 santambrogio mar...
  • 4 篇 hai jin
  • 4 篇 li jun
  • 4 篇 wenaus t.
  • 4 篇 wang yu
  • 4 篇 hao yin

语言

  • 3,536 篇 英文
  • 36 篇 其他
  • 27 篇 中文
  • 7 篇 葡萄牙文
检索条件"任意字段=22nd International Conference on Architecture of Computing Systems"
3589 条 记 录,以下是41-50 订阅
排序:
Poster: MLess: Deep Learning Application Platform for Smart Cities  24
Poster: MLess: Deep Learning Application Platform for Smart ...
收藏 引用
22nd Annual international conference on Mobile systems, Applications and Services (MOBISYS)
作者: Makino, Seiki Okoshi, Tadashi Nakazawa, Jin Keio Univ Fujisawa Kanagawa Japan
Many smart city applications utilize deep learning technologies to process the data generated by sensors and smart devices. However, current application hosting platforms are not suitable for deep learning application... 详细信息
来源: 评论
Actionable Contextual Explanations for Cyber-Physical systems  22
Actionable Contextual Explanations for Cyber-Physical System...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Jha, Sanjiv S. Mayer, Simon Garcia, Kimberly Univ St Gallen Inst Comp Sci St Gallen Switzerland
Over the past two decades, Cyber-Physical systems (CPS) have emerged as critical components in various industries, integrating digital and physical elements to improve efficiency and automation, from smart manufacturi... 详细信息
来源: 评论
A First Look at Digital Rights Management systems for Secure Mobile Content Delivery  22
A First Look at Digital Rights Management Systems for Secure...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Rafi, Amir Shepherd, Carlton Markantonakis, Konstantinos Royal Holloway Univ London Informat Secur Grp Egham Surrey England Newcastle Univ Sch Comp Newcastle Upon Tyne Tyne & Wear England
Digital rights management (DRM) solutions aim to prevent the copying or distribution of copyrighted material. On mobile devices, a variety of DRM technologies have become widely deployed. However, a detailed security ... 详细信息
来源: 评论
Quantum Predator -Prey Brain Storm Optimization for Robust Optimal Allocation of D-STATCOM Devices  22
Quantum Predator -Prey Brain Storm Optimization for Robust O...
收藏 引用
22nd international conference on Intelligent systems Applications to Power systems
作者: Kawauchi, Yusuke Someya, Naohisa Mori, Hiroyuki Chiang, Hsiao-Dong Meiji Univ Dept Network Design Tokyo Japan J Power Transmiss Network Co Ltd Hashimoto Branch Hashimoto Wakayama Japan Cornel Univ Dept Elect & Comp Engn Ithaca NY 14853 USA
This paper presents a groundbreaking solution to minimize distribution network losses by optimizing D-STATCOM ( Distribution Static Compensator) device allocation. The proposed method uses Quantum Predator-Prey Brain ... 详细信息
来源: 评论
Personalized Privacy-Preserving Semi-Centralized Recommendation System in a Trust-Based Agent Network  22
Personalized Privacy-Preserving Semi-Centralized Recommendat...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Wen, Qi Leung, Carson K. Pazdor, Adam G. M. Univ Manitoba Winnipeg MB Canada
In the current big data era, recommendation systems play an important role in our daily life to help us make faster and better decisions from massive numbers of choices. Personalized recommendation has gained its popu... 详细信息
来源: 评论
Towards Efficient and Reconfigurable Neuromorphic computing using an Embedded FPGA in 22nmFDX  22
Towards Efficient and Reconfigurable Neuromorphic Computing ...
收藏 引用
22nd IEEE Interregional NEWCAS conference (NEWCAS)
作者: Ghonem, Ahmed Zaky Elewa, Sherif Maher Tawfik, Eslam Yahya Ohio State Univ Columbus OH 43210 USA
There is a rising demand for AI workloads running on the edge that are increasingly complex, calling for more efficient computing platforms. Neuromorphic computing is a class of electronic circuits that aim to mimic a... 详细信息
来源: 评论
Two-level Computation Offloading to Optimize the Energy Consumption of UAV-mounted Edge Nodes  10
Two-level Computation Offloading to Optimize the Energy Cons...
收藏 引用
10th Workshop on Micro Aerial Vehicle Networks, systems, and Applications (DroNet) / 22nd Annual international conference on Mobile systems, Applications and Services (MOBISYS)
作者: Srivastava, Parth Peddoju, Sateesh K. Indian Inst Technol Roorkee Roorkee Uttarakhand India
The utilization of Unmanned Aerial Vehicles (UAVs) in Internet of Things (IoT) applications has recently gained widespread popularity. Recently, fixed-edge servers have been used for computation offloading services to... 详细信息
来源: 评论
Design of a Reconfigurable Activation Function for All-Optical Neural Networks  22
Design of a Reconfigurable Activation Function for All-Optic...
收藏 引用
22nd IEEE Interregional NEWCAS conference (NEWCAS)
作者: Destras, Oceane Le Beux, Sebastien de Magalhaes, Felipe Gohring Nicolescu, Gabriela Polytech Montreal Dept Genie Informat & Genie Logiciel Montreal PQ Canada Concordia Univ Dept Elect & Comp Engn Montreal PQ Canada
Photonic integrated circuits present a promising avenue for the integration of Deep Neural Networks (DNNs), offering solutions to the speed and power consumption constraints inherent to their electronic counterparts. ... 详细信息
来源: 评论
A Framework for Privacy Policy Enforcement for Connected Automotive systems  22
A Framework for Privacy Policy Enforcement for Connected Aut...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Bkakria, Anis Brika, Lydia IRT SystemX Palaiseau France
The GDPR is a set of regulations designed to give users control over their personal data and applies to any connected object that processes such data. One of the most complex environments covered by the GDPR is the co... 详细信息
来源: 评论
R-SACE: RIS-Enabled Sensing-Aided Communication Enhancement in ISAC systems  22
R-SACE: RIS-Enabled Sensing-Aided Communication Enhancement ...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Li, Xiaohui Chen, Yunpei Wang, Hong Sheng, Shuran Nanjing Univ Posts & Telecommun Sch Commun & Informat Engn Nanjing Peoples R China Taiyuan Univ Technol Coll Elect Informat & Opt Engn Taiyuan Peoples R China Shanghai Dianji Univ Sch Elect Informat Engn Shanghai Peoples R China
Integrated sensing and communication (ISAC) and reconfigurable intelligent surface (RIS) are two critical enablers for sixth-generation (6G) communication systems. Sensing-aided communication enhancement (SACE) is one... 详细信息
来源: 评论