咨询与建议

限定检索结果

文献类型

  • 909 篇 会议
  • 16 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 929 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 572 篇 工学
    • 451 篇 计算机科学与技术...
    • 285 篇 软件工程
    • 135 篇 信息与通信工程
    • 134 篇 控制科学与工程
    • 62 篇 电气工程
    • 54 篇 交通运输工程
    • 46 篇 安全科学与工程
    • 43 篇 生物工程
    • 32 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 27 篇 动力工程及工程热...
    • 27 篇 石油与天然气工程
    • 24 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 20 篇 仪器科学与技术
    • 18 篇 光学工程
  • 228 篇 理学
    • 139 篇 数学
    • 51 篇 生物学
    • 31 篇 物理学
    • 28 篇 系统科学
    • 28 篇 统计学(可授理学、...
    • 16 篇 化学
  • 161 篇 管理学
    • 116 篇 管理科学与工程(可...
    • 82 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 30 篇 教育学
    • 30 篇 教育学
  • 29 篇 法学
    • 25 篇 社会学
  • 20 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 7 篇 农学
  • 4 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 36 篇 computer science
  • 26 篇 control systems
  • 21 篇 machine learning
  • 16 篇 artificial intel...
  • 13 篇 access control
  • 13 篇 reinforcement le...
  • 13 篇 computational mo...
  • 13 篇 real-time system...
  • 13 篇 costs
  • 12 篇 traffic control
  • 12 篇 bandwidth
  • 11 篇 deep learning
  • 11 篇 computer archite...
  • 11 篇 protocols
  • 10 篇 quality of servi...
  • 9 篇 automation
  • 9 篇 neural networks
  • 9 篇 hardware
  • 8 篇 mobile ad hoc ne...
  • 8 篇 computer communi...

机构

  • 7 篇 university polit...
  • 7 篇 faculty of autom...
  • 6 篇 national institu...
  • 6 篇 university polit...
  • 6 篇 computer science...
  • 5 篇 pazhou lab
  • 5 篇 chinese acad sci...
  • 4 篇 al-balqa applied...
  • 4 篇 faculty of autom...
  • 4 篇 university polit...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 guangdong univ t...
  • 3 篇 college of compu...
  • 3 篇 college of infor...
  • 3 篇 univ chinese aca...
  • 3 篇 univ jinan sch m...
  • 3 篇 department of gr...
  • 3 篇 department of co...
  • 3 篇 university polit...

作者

  • 7 篇 li hui
  • 5 篇 florea adina mag...
  • 5 篇 fagarasan ioana
  • 4 篇 adina magda flor...
  • 4 篇 min-chul lee
  • 4 篇 ghassan samara
  • 4 篇 myungjin cho
  • 4 篇 samara ghassan
  • 4 篇 mocanu stefan
  • 4 篇 liu derong
  • 4 篇 mustata alexandr...
  • 4 篇 hyun-woo kim
  • 4 篇 teng luyao
  • 4 篇 ştefan mocanu
  • 3 篇 bogdan-costel mo...
  • 3 篇 giorgian neculoi...
  • 3 篇 mihnea alexandru...
  • 3 篇 stamatescu grigo...
  • 3 篇 ding naikan
  • 3 篇 grigore stamates...

语言

  • 916 篇 英文
  • 11 篇 其他
  • 4 篇 中文
检索条件"任意字段=24th International Conference on Control Systems and Computer Science, CSCS 2023"
929 条 记 录,以下是821-830 订阅
排序:
Directed correspondence search: Finding feature correspondences in images using the Harmony Search algorithm
Directed correspondence search: Finding feature corresponden...
收藏 引用
international conference on Image and Vision Computing New Zealand, IVCNZ
作者: Jaco Fourie Richard Green Steven Mills Computer Science and Software Engineering University of Canterbury Christchurch New Zealand Geospatial Research Centre Limited Christchurch New Zealand
A robot's ability to correctly recognise landmarks as ones previously seen is a key feature in visual navigation algorithms. Each newly captured scene contains multiple visual features with an unknown number of ne... 详细信息
来源: 评论
Obstacle avoidance on a mobile inverted pendulum robot
Obstacle avoidance on a mobile inverted pendulum robot
收藏 引用
international conference on Image and Vision Computing New Zealand, IVCNZ
作者: Robert Tang Richard Green Mechatronics Engineering University of Canterbury New Zealand Computer Science University of Canterbury New Zealand
Optical flow and monocular vision have been used as a means of providing obstacle avoidance to a telerobotics platform. the robotic platform, controlled to avoid obstacles through an unstructured indoor environment, i... 详细信息
来源: 评论
Authorization and Obligation Policies in Dynamic systems
Authorization and Obligation Policies in Dynamic Systems
收藏 引用
24th international conference on Logic Programming (ICLP)
作者: Gelfond, Michael Lobo, Jorge Texas Tech Univ Lubbock TX 79409 USA IBM Corp TJ Watson Res Ctr Yorktown Hts NY USA
the paper defines a for specifying authorization and obligation policies of an intelligent agent acting in a changing environment and presents several ASP based algorithms for checking compliance of an event with a po... 详细信息
来源: 评论
A security punctuation framework for enforcing access control on streaming data
A security punctuation framework for enforcing access contro...
收藏 引用
24th IEEE international conference on Data Engineering/ 1st international Workshop on Secure Semantic Web
作者: Nehme, Rimma V. Rundensteiner, Elke A. Bertino, Elisa Purdue Univ Dept Comp Sci W Lafayette IN 47906 USA Worcester Polytech Inst Dept Comp Sci Worcester MA 01609 USA
the management of privacy and security in the context of data stream management systems (DSMS) remains largely an unaddressed problem to date. Unlike in traditional DBMSs where access control policies are persistently... 详细信息
来源: 评论
Semantic Web and firewall alignment
Semantic Web and firewall alignment
收藏 引用
international conference on Data Engineering Workshops
作者: Simon N. Foley William M. Fitzgerald Department of Computer Science University College Cork Ireland Telecommunications Software & Systems Group Waterford Institute of Technology Ireland
Secure Semantic Web applications, particularly those involving access control, are typically focused at the application-domain only, rather than taking a more holistic approach to also include the underlying infrastru... 详细信息
来源: 评论
systems biology: Models and logics  24th
Systems biology: Models and logics
收藏 引用
24th international conference on Logic Programming, ICLP 2008
作者: Piazza, C. Policriti, A. Dept. of Math. and Computer Science University of Udine Udine Italy Institute of Applied Genomics Udine Italy
the field of systems biology focuses on creating a finely detailed picture of biological mechanisms. Recently, the need has arisen for more and more sophisticated and mathematically well founded computational tools, c... 详细信息
来源: 评论
Ontology based policy interoperability in geo-spatial domain
Ontology based policy interoperability in geo-spatial domain
收藏 引用
international conference on Data Engineering Workshops
作者: Mohammad Farhan Husain Mohmmad Alam Tahseen Al-Khateeb Latifur Khan Dept. of Computer Science & Engineering University of Texas at Dallas Richardson TX USA
With advances of digital technology two or more organizations form a federation for a temporary purpose. It is possible that an employee of an organization needs to access resource of another organization. While langu... 详细信息
来源: 评论
On Skylining with Flexible Dominance Relation
On Skylining with Flexible Dominance Relation
收藏 引用
international conference on Data Engineering
作者: Tian Xia Donghui Zhang Yufei Tao College of Computer and Information Science Northeastern University Boston MA USA Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong China
Given a set of d dimensional objects, a skyline query finds the objects ("skyline") that are not dominated by others. However, skylines do not always provide useful query results to users, and existing metho... 详细信息
来源: 评论
Database, Heal thyself
Database, Heal Thyself
收藏 引用
24th international conference on Data Engineering Workshop (ICDE 2008), vol.1
作者: Rimma V. Nehme Department of Computer Science Purdue University West Lafayette IN USA
the ability of a database management system (DBMS) to detect problems or problem trends (which have not yet manifested as problems) and either take corrective actions, and/or provide advice or an automated notificatio... 详细信息
来源: 评论
Auditing SQL Queries
Auditing SQL Queries
收藏 引用
international conference on Data Engineering
作者: Rajeev Motwani Shubha U. Nabar Dilys thomas Computer Science Department University of Stanford USA Google Inc. India
We study the problem of auditing a batch of SQL queries: given a forbidden view of a database that should have been kept confidential, a batch of queries that were posed over this database and answered, and a definiti... 详细信息
来源: 评论