咨询与建议

限定检索结果

文献类型

  • 2,043 篇 会议
  • 51 册 图书
  • 45 篇 期刊文献

馆藏范围

  • 2,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,272 篇 工学
    • 1,024 篇 计算机科学与技术...
    • 582 篇 软件工程
    • 252 篇 电气工程
    • 157 篇 控制科学与工程
    • 69 篇 信息与通信工程
    • 50 篇 机械工程
    • 42 篇 材料科学与工程(可...
    • 36 篇 电子科学与技术(可...
    • 18 篇 安全科学与工程
    • 15 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 12 篇 土木工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 12 篇 生物工程
    • 11 篇 冶金工程
    • 10 篇 动力工程及工程热...
    • 10 篇 建筑学
  • 295 篇 理学
    • 226 篇 数学
    • 39 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 34 篇 系统科学
    • 22 篇 生物学
    • 16 篇 化学
  • 119 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 37 篇 工商管理
    • 32 篇 图书情报与档案管...
  • 47 篇 教育学
    • 46 篇 教育学
  • 25 篇 医学
    • 24 篇 临床医学
  • 10 篇 法学
    • 10 篇 社会学
  • 9 篇 经济学
  • 5 篇 农学
  • 4 篇 文学

主题

  • 172 篇 logic gates
  • 137 篇 fuzzy logic
  • 123 篇 programming
  • 118 篇 linear programmi...
  • 94 篇 logic programmin...
  • 64 篇 probabilistic lo...
  • 59 篇 dynamic programm...
  • 57 篇 optimization
  • 50 篇 semantics
  • 49 篇 computer science
  • 49 篇 training
  • 46 篇 logic
  • 44 篇 object oriented ...
  • 42 篇 computer archite...
  • 40 篇 computational mo...
  • 38 篇 hardware
  • 38 篇 artificial intel...
  • 37 篇 java
  • 35 篇 computer program...
  • 34 篇 integer programm...

机构

  • 6 篇 laboratory of co...
  • 5 篇 stevens inst tec...
  • 5 篇 institute of log...
  • 5 篇 university of to...
  • 5 篇 institute for lo...
  • 5 篇 chinese univ hon...
  • 4 篇 univ oxford oxfo...
  • 4 篇 school of electr...
  • 4 篇 ibm corp thomas ...
  • 3 篇 north carolina s...
  • 3 篇 creighton univ o...
  • 3 篇 univ politecn ca...
  • 3 篇 ecole polytech f...
  • 3 篇 tu wien austria
  • 3 篇 department of el...
  • 3 篇 rhein westfal th...
  • 3 篇 school of comput...
  • 3 篇 univ tokyo
  • 3 篇 school of mathem...
  • 3 篇 lancaster univer...

作者

  • 7 篇 inoue katsumi
  • 5 篇 sakama chiaki
  • 5 篇 gupta gopal
  • 4 篇 wang liang
  • 4 篇 iosif radu
  • 4 篇 pontelli enrico
  • 4 篇 liang wang
  • 4 篇 tompits hans
  • 4 篇 beck j. christop...
  • 3 篇 kumar amruth n.
  • 3 篇 chopra amit k.
  • 3 篇 proietti maurizi...
  • 3 篇 il han park
  • 3 篇 m.-r. akbarzadeh...
  • 3 篇 wei li
  • 3 篇 riguzzi fabrizio
  • 3 篇 schaub torsten
  • 3 篇 melin p
  • 3 篇 leonidas deligia...
  • 3 篇 mcdirmid sean

语言

  • 2,100 篇 英文
  • 25 篇 其他
  • 15 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"任意字段=22nd International Conference on Logic Programming"
2139 条 记 录,以下是381-390 订阅
排序:
Comprehensiveness, Automation and Lifecycle: A New Perspective for Rust Security
Comprehensiveness, Automation and Lifecycle: A New Perspecti...
收藏 引用
IEEE international conference on Software Quality, Reliability and Security (QRS)
作者: Shuang Hu Baojian Hua Yang Wang School of Software Engineering University of Science and Technology of China China
Rust is an emerging programming language designed for secure system programming that provides both security guarantees and runtime efficiency and has been increasingly used to build software infrastructures such as OS... 详细信息
来源: 评论
A Tight Approximation Algorithm for the Cluster Vertex Deletion Problem  22nd
A Tight Approximation Algorithm for the Cluster Vertex Delet...
收藏 引用
22nd international conference on Integer programming and Combinatorial Optimization (IPCO)
作者: Aprile, Manuel Drescher, Matthew Fiorini, Samuel Huynh, Tony Univ Padua Dipartimento Matemat Padua Italy Univ Libre Bruxelles Dept Math Brussels Belgium Monash Univ Sch Math Melbourne Vic Australia
We give the first 2-approximation algorithm for the cluster vertex deletion problem. This is tight, since approximating the problem within any constant factor smaller than 2 is UGC-hard. Our algorithm combines the pre... 详细信息
来源: 评论
Noise-based logic versus Quantum Supremacy
Noise-based Logic versus Quantum Supremacy
收藏 引用
international Symposium on Computational Intelligence and Informatics
作者: Laszlo B Kish Department of Electrical and Computer Engineering Texas A&M University USA
Quantum Supremacy is an expression coined to indicate that there are some hard computational problems that quantum computers can solve exponentially faster than a classical-physical Turing machine (that is, a digital ... 详细信息
来源: 评论
3D Human Movement Pose Generation Based on Pre-trained AI Model with Skeleton Constraint Analysis and Intelligent Prediction
3D Human Movement Pose Generation Based on Pre-trained AI Mo...
收藏 引用
international conference on Communication Technology (ICCT)
作者: Jinwei Lin Monash University School of Information Technology Selangor Malaysia
This paper research will focus on the application and implementation of coordinate data transformation from 2D to 3D, in terms of the human skeleton recognition area. Then the processed 3D skeleton nodes data will be ... 详细信息
来源: 评论
Beamforming Optimization in MU-MISO URLLC Systems
Beamforming Optimization in MU-MISO URLLC Systems
收藏 引用
international conference on Communication Technology (ICCT)
作者: Changqing Ye Hong Jiang Liping Deng Honglang Zhu Southwest University of Science and Technology Xichang University Mian Yang Xi Chang China Southwest University of Science and Technology Mian Yang China Xichang University Xi Chang China
This paper considers a downlink ultra reliable low latency communication (URLLC) system in which a BS equipped with multi antenna arrays simultaneously serves multi single antenna user equipments (UEs) by transmitting... 详细信息
来源: 评论
programming-based laboratory assignments for undergraduate students of power engineering fields  21
Programming-based laboratory assignments for undergraduate s...
收藏 引用
22nd international conference on Computer Systems and Technologies, CompSysTech 2021
作者: Nazarov, Serdar Jumayev, Bayram Bayramhan street 62 Mary city745400 Turkmenistan
Studying only theoretical part of working principles of electrical devices, being used in automation, control and power engineering, is not enough for students to fully comprehend the topic. Moreover, in order to keep... 详细信息
来源: 评论
Frequency Measurement for Laser Stabilization Based on the Beat-sampling Method
Frequency Measurement for Laser Stabilization Based on the B...
收藏 引用
international conference on Communication Technology (ICCT)
作者: Yanbin Shui Zhongtao Shen Xuan Wang Changqing Feng Shubin Liu State Key Laboratory of Particle Detection and Electronics University of Science and Technology of China Hefei China Department of Modern Physics University of Science and Technology of China Hefei China
Frequency measurement is one of the important parts of the laser frequency stabilization system. In this paper, a novel high-precision frequency measurement technique based on the beat-sampling method is presented. Th... 详细信息
来源: 评论
Multi-Stage Product Quality Prediction Based on CNN-BiGRU-Attention
Multi-Stage Product Quality Prediction Based on CNN-BiGRU-At...
收藏 引用
IEEE international conference on Industrial Informatics (IndIN)
作者: Chen Yan Yifu Sun Xi Liu School of Systems Science and Engineering Sun Yat-sen University Guangzhou China
Accurate product quality prediction can help the enterprise improve the overall emergency response capability of quality issues and reduce quality-related cost losses. In the manufacturing process of multi-stage produ... 详细信息
来源: 评论
Towards Extending the Range of Bugs That Automated Program Repair Can Handle
Towards Extending the Range of Bugs That Automated Program R...
收藏 引用
IEEE international conference on Software Quality, Reliability and Security (QRS)
作者: Omar I. Al-Bataineh Leon Moonen Simula Research Laboratory Oslo Norway
Modern automated program repair (APR) is well-tuned to finding and repairing bugs that introduce observable erroneous behavior to a program. However, a significant class of bugs does not lead to such observable behavi... 详细信息
来源: 评论
A Novel Semi-supervised Anomaly Detection Method for Network Intrusion Detection
A Novel Semi-supervised Anomaly Detection Method for Network...
收藏 引用
international conference on Communication Technology (ICCT)
作者: Xinran Wang Xiaofeng Qiu School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Deep learning techniques have become an increasingly popular solution for network intrusion detection system (NIDS). Semi-supervised deep anomaly detection methods used in network intrusion detection always need a hig... 详细信息
来源: 评论