咨询与建议

限定检索结果

文献类型

  • 983 篇 会议
  • 37 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 1,043 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 704 篇 工学
    • 585 篇 计算机科学与技术...
    • 368 篇 软件工程
    • 146 篇 电气工程
    • 56 篇 控制科学与工程
    • 30 篇 信息与通信工程
    • 27 篇 材料科学与工程(可...
    • 19 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 11 篇 动力工程及工程热...
    • 11 篇 生物医学工程(可授...
    • 10 篇 生物工程
    • 7 篇 仪器科学与技术
    • 7 篇 石油与天然气工程
    • 6 篇 城乡规划学
    • 4 篇 核科学与技术
    • 4 篇 农业工程
  • 188 篇 理学
    • 155 篇 数学
    • 18 篇 系统科学
    • 17 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 10 篇 生物学
  • 69 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 22 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 16 篇 教育学
    • 16 篇 教育学
  • 11 篇 文学
    • 11 篇 新闻传播学
  • 9 篇 法学
    • 8 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 农学
    • 4 篇 作物学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 军事学

主题

  • 96 篇 logic gates
  • 77 篇 programming
  • 63 篇 logic programmin...
  • 40 篇 fuzzy logic
  • 35 篇 application soft...
  • 30 篇 probabilistic lo...
  • 29 篇 linear programmi...
  • 27 篇 programming prof...
  • 27 篇 computer archite...
  • 26 篇 computer science
  • 26 篇 dynamic programm...
  • 23 篇 software enginee...
  • 23 篇 protocols
  • 21 篇 uncertainty
  • 20 篇 object oriented ...
  • 20 篇 java
  • 20 篇 semantics
  • 18 篇 computer circuit...
  • 18 篇 costs
  • 17 篇 software systems

机构

  • 4 篇 univ potsdam pot...
  • 4 篇 vienna univ tech...
  • 4 篇 imdea software i...
  • 4 篇 institute for lo...
  • 3 篇 tu wien austria
  • 3 篇 graduate school ...
  • 3 篇 univ calabria de...
  • 3 篇 carnegie mellon ...
  • 3 篇 univ freiburg fr...
  • 3 篇 univ british col...
  • 3 篇 imperial coll lo...
  • 3 篇 department of in...
  • 2 篇 univ tecn federi...
  • 2 篇 ist austria klos...
  • 2 篇 univ savoie savo...
  • 2 篇 tel aviv univers...
  • 2 篇 zhongguancun lab...
  • 2 篇 univ ferrara dip...
  • 2 篇 south china univ...
  • 2 篇 univ neuchatel i...

作者

  • 8 篇 alviano mario
  • 6 篇 lamma evelina
  • 5 篇 schaub torsten
  • 4 篇 riguzzi fabrizio
  • 3 篇 lin yu
  • 3 篇 vardi moshe y.
  • 3 篇 gebser martin
  • 3 篇 bellodi elena
  • 3 篇 costa vitor sant...
  • 3 篇 shinji sakamoto
  • 3 篇 lakemeyer gerhar...
  • 3 篇 ikeda markus
  • 3 篇 zhou neng-fa
  • 3 篇 xu hongxiang
  • 3 篇 sabuncu orkunt
  • 3 篇 leonard barolli
  • 3 篇 schockaert steve...
  • 3 篇 pichler andreas
  • 3 篇 wang bin
  • 3 篇 de givry simon

语言

  • 1,013 篇 英文
  • 25 篇 其他
  • 8 篇 中文
  • 1 篇 法文
检索条件"任意字段=30th International Conference on Logic Programming"
1045 条 记 录,以下是711-720 订阅
排序:
Identification of Stable Links in MANETs
Identification of Stable Links in MANETs
收藏 引用
international conference on Distributed Computing Systems Workshop
作者: Alicia Triviño-Cabrera Jorge García-de-la-Nava Eduardo Casilari Universidad de Málaga Málaga Spain Dpto. Tecnología ElectrónicaUniversidad de MálagaMálaga (Spain) Dpto. Tecnología Electrónica Universidad de Málaga Málaga Spain
Mobile Ad Hoc Networks (MANET) are characterized by a highly dynamic topology as a consequence of the frequent and unpredictable changes in the link states. Routing protocols must cope with this eventuality so when ro... 详细信息
来源: 评论
Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks
Multi-Dimensional Conflict Graph Based Computing for Optimal...
收藏 引用
IEEE international conference on Distributed Computing Systems
作者: Hongkun Li Yu Cheng Chi Zhou Pengjun Wan Dept. Electrical & Computer Engineering Illinois Institute of Technology Dept. computer science Illinois Institute of Technology
Optimal capacity analysis in multi-radio multichannel wireless networks by nature incurs the formulation of a mixed integer programming, which is NP-hard in general. the current state of the art mainly resorts to heur... 详细信息
来源: 评论
REnvDB, a RESTful Database for Pervasive Environmental Wireless Sensor Networks
REnvDB, a RESTful Database for Pervasive Environmental Wirel...
收藏 引用
international conference on Distributed Computing Systems Workshop
作者: Filippo De Stefani Paolo Gamba Emanuele Goldoni Alberto Savioli Davide Silvestri Flavio Toffalini Dept. of Electronics University of Pavia Pavia Italy
Every application of a Wireless Sensor Network (WSN) requires the data collected from sensor nodes to be reachable from the outside, in order to allow its processing and to obtain information from the monitored phenom... 详细信息
来源: 评论
A Cross-Layer Scheme for Access Point Selection in Wireless Mesh Networks
A Cross-Layer Scheme for Access Point Selection in Wireless ...
收藏 引用
international conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Pin Lv Yingwen Chen Wei Xiao Ming Xu Dept. of Network Eng. Nat. Univ. of Defense Technol. Changsha China
In wireless mesh networks (WMNs), a station (STA) often has a group of candidate access points (APs) to be associated with. How to select the most appropriate AP has been an open problem. In IEEE 802.11 standards, the... 详细信息
来源: 评论
Algebra for Infinite Forests with an Application to the Temporal logic EF  1
收藏 引用
30th international conference on Concurrency theory
作者: Bojanczyk, Mikolaj Idziaszek, Tomasz Univ Warsaw PL-00325 Warsaw Poland
We define an extension of forest algebra for omega-forests. We show how the standard algebraic notions (free object, syntactic algebra, morphisms, etc.) extend to the infinite case. To prove its usefulness, we use the... 详细信息
来源: 评论
A General Approach to the Verification of Cryptographic Protocols Using Answer Set programming
收藏 引用
10th international conference on logic programming and Nonmonotonic Reasoning
作者: Delgrande, James P. Grote, Torsten Hunter, Aaron Simon Fraser Univ Sch Comp Sci Burnaby BC V5A 1S6 Canada
We introduce a general approach to cryptographic protocol verification based oil answer set programming. In our approach, cryptographic protocols are represented as extended logic programs where the answer Sets corres... 详细信息
来源: 评论
A logic-Based Framework for Reasoning about Composite Data Structures  1
收藏 引用
30th international conference on Concurrency theory
作者: Bouajjani, Ahmed Dragoi, Cezara Enea, Constantin Sighireanu, Mihaela Univ Paris Diderot LIAFA CNRS F-75205 Paris 13 France
We define a logic, called CSL, for the specification of complex data structures, and we show its use in program verification. Our framework allows to handle programs with dynamic linked structures and arrays carrying ... 详细信息
来源: 评论
Information Socurity and Cryptology - 4th international conference, Inscrypt 2008, Revised Selected Papers
收藏 引用
4th international conference on Information Security and Cryptology, Inscrypt 2008
the proceedings contain 30 papers. the topics discussed include: the state of hash functions and the NIST SHA-3 competition;key evolution systems in untrusted update environments;secure and privacy-preserving informat...
来源: 评论
Leveraging digital business ecosystems for enterprise agility: the tri-logic development strategy of ***
Leveraging digital business ecosystems for enterprise agilit...
收藏 引用
30th international conference on Information Systems, ICIS 2009
作者: Tan, Barney Pan, Shan L Lu, Xianghua Huang, Lihua National University of Singapore 3 Science Drive 2 Singapore 117543 Singapore Fudan University Siyuan Faculty Building 670 Guoshun Rd Shanghai 200433 China
the existing discourse on IT-enabled enterprise agility views the internal organizational processes of IT capability development and organizational learning as the primary means of attaining agility, but has neglected... 详细信息
来源: 评论
Scaling of advanced floating body Z-RAM storage cells: A modeling approach
Scaling of advanced floating body Z-RAM storage cells: A mod...
收藏 引用
IFIP international conference on Very Large Scale Integration (VLSI-SoC)
作者: Viktor Sverdlov Siegfried Selberherr Institute for Microelectronics TU Wien Wien Austria
A modeling approach to study advanced floating body Z-RAM memory cells is developed. In particular, the scalability of the cells is investigated. First, a Z-RAM cell based on a 50nm gate length double-gate structure c... 详细信息
来源: 评论