咨询与建议

限定检索结果

文献类型

  • 746 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 752 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 557 篇 工学
    • 426 篇 计算机科学与技术...
    • 380 篇 软件工程
    • 143 篇 控制科学与工程
    • 107 篇 电气工程
    • 76 篇 信息与通信工程
    • 60 篇 电子科学与技术(可...
    • 44 篇 机械工程
    • 36 篇 动力工程及工程热...
    • 28 篇 仪器科学与技术
    • 26 篇 生物工程
    • 23 篇 土木工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 安全科学与工程
    • 17 篇 建筑学
    • 17 篇 航空宇航科学与技...
    • 16 篇 交通运输工程
    • 14 篇 化学工程与技术
    • 13 篇 环境科学与工程(可...
  • 163 篇 理学
    • 81 篇 数学
    • 37 篇 物理学
    • 28 篇 生物学
    • 26 篇 系统科学
    • 15 篇 统计学(可授理学、...
  • 135 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 50 篇 工商管理
    • 36 篇 图书情报与档案管...
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 24 篇 医学
    • 24 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 13 篇 法学
  • 7 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学

主题

  • 83 篇 application soft...
  • 39 篇 computer science
  • 26 篇 costs
  • 22 篇 software systems
  • 21 篇 software enginee...
  • 21 篇 control systems
  • 21 篇 computer aided s...
  • 19 篇 real time system...
  • 17 篇 hardware
  • 16 篇 computer archite...
  • 14 篇 application prog...
  • 12 篇 software tools
  • 12 篇 protocols
  • 12 篇 software
  • 11 篇 electrical capac...
  • 11 篇 space technology
  • 11 篇 software mainten...
  • 10 篇 fault tolerance
  • 10 篇 information tech...
  • 10 篇 bandwidth

机构

  • 3 篇 beijing engineer...
  • 3 篇 beijing institut...
  • 2 篇 radio and televi...
  • 2 篇 dept. of electri...
  • 2 篇 institute of mic...
  • 2 篇 caltech jet prop...
  • 2 篇 shandong institu...
  • 2 篇 college of compu...
  • 2 篇 school of econom...
  • 2 篇 school of comput...
  • 2 篇 umist manchester...
  • 2 篇 school of astron...
  • 2 篇 southwest jiaoto...
  • 2 篇 empirical softwa...
  • 2 篇 euratom enea sul...
  • 2 篇 the national eng...
  • 2 篇 shanghai institu...
  • 2 篇 university of ma...
  • 2 篇 school of comput...
  • 2 篇 florida atlantic...

作者

  • 3 篇 khoshgoftaar tm
  • 3 篇 rahaman hafizur
  • 2 篇 crisanti f
  • 2 篇 allen eb
  • 2 篇 fang yu
  • 2 篇 de tommasi g
  • 2 篇 shulong wang
  • 2 篇 chau sn
  • 2 篇 t.m. khoshgoftaa...
  • 2 篇 ren yongchang
  • 2 篇 goodfellow s.d.
  • 2 篇 li tao
  • 2 篇 mc cullen p
  • 2 篇 quan qiang
  • 2 篇 chen xiaoji
  • 2 篇 taylor j.h.
  • 2 篇 zhao yang
  • 2 篇 tan guozhen
  • 2 篇 zhangqin huang
  • 2 篇 wang fan

语言

  • 741 篇 英文
  • 11 篇 其他
检索条件"任意字段=3rd IEEE Symposium on Application-Specific Systems and Software Engineering Technology"
752 条 记 录,以下是61-70 订阅
排序:
A Differential Coefficient Inspired Method for Malicious software Detection
A Differential Coefficient Inspired Method for Malicious Sof...
收藏 引用
3rd International symposium on Intelligent Information technology application
作者: Liang Yiwen Yang He Li Tao Liu Changdong Wuhan Univ Comp Sch Wuhan 430072 Peoples R China
Malicious software is one of the most popular security threats of computer networks. It is difficult for traditional solutions to deal with dynamical and variable behaviors against malicious software. Danger Model the... 详细信息
来源: 评论
Characterizing Generalized Windmill Graphs in terms of Complexity Measures via Eccentricity Dependent Topological Indices  3
Characterizing Generalized Windmill Graphs in terms of Compl...
收藏 引用
3rd International symposium on Computer technology and Information Science, ISCTIS 2023
作者: Wang, Wenhu Vladimir, Mariano Abisado, Mideth Mujahid, Nabeel School of Software Pingdingshan University China College of Computing and Information Technologies National University Philippines Bahauddin Zakariya University Cenrre for Advanced Studies in Pure and Applied Mathematics Pakistan
Windmill graphs have a crucial role in the field of computer science, mathematics, electrical engineering and physics. Generalized windmill graphs are a generalization of the classic windmill graphs with applications ... 详细信息
来源: 评论
Smart load shedding system
Smart load shedding system
收藏 引用
2012 3rd ieee International symposium on Power Electronics for Distributed Generation systems, PEDG 2012
作者: Petrichenko, Roman Chuvychin, Vladimir Faculty of Electrical and Power Engineering Riga Technical University Riga Latvia
This paper describes a methodology of application of smart grid technology for improvement of existing emergency automation system. Existing and new developed automation systems are considered in the paper. Authors ap... 详细信息
来源: 评论
A flexible, extensible simulation environment for testing real-time specifications
A flexible, extensible simulation environment for testing re...
收藏 引用
3rd ieee Real-Time technology and applications symposium
作者: Brockmeyer, M Jahanian, F Heitmeyer, C Labaw, B Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor MI 48109-2122 United States Center for High Assurance Computer Systems Naval Research Laboratory Washington DC 20375 United States
This paper describes MTSim, an extensible, customizable simulation platform for the Modechart toolset (MT) [3]. MTSim provides support for ''plugging in'' user-defined viewers useful in, simulating sys... 详细信息
来源: 评论
Self-Adaptive Energy-Efficent applications: The HADAS Developing Approach  15
Self-Adaptive Energy-Efficent Applications: The HADAS Develo...
收藏 引用
15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and technology Congress(DASC/PiCom/DataCom/CyberSciTech)
作者: Horcas, Jose-Miguel Pinto, Monica Fuentes, Lidia Gamez, Nadia Univ Malaga CAOSD Grp Dept Lenguajes & Ciencias Comp Malaga Spain Univ Int la Rioja La Rioja Spain
software systems have a strong impact on the energy consumption of the hardware they use. For this reason, software developers should be more aware of the energy consumed by their systems. Moreover, software systems s... 详细信息
来源: 评论
Idea: Simulation Based Security Requirement Verification for Transaction Level Models
Idea: Simulation Based Security Requirement Verification for...
收藏 引用
3rd International symposium on engineering Secure software and systems, ESSoS 2011
作者: Loinig, Johannes Steger, Christian Weiss, Reinhold Haselsteiner, Ernst Graz Univ Technol Inst Tech Informat Graz Austria NXP Semicond Austria GmbH Grazumgebung Austria
Verification of security requirements in embedded systems is a crucial task - especially in very dynamic design processes like a hardware/software codesign flow. In such a case the system's modules and components ... 详细信息
来源: 评论
Hardware and software Development for the Navigation, Guidance, and Control System of a Remotely Operated Vehicle  3
Hardware and Software Development for the Navigation, Guidan...
收藏 引用
3rd ieee Colombian Conference on Automatic Control (CCAC)
作者: Aristizabal, Luis M. Rua, Santiago Zuluaga, Carlos A. Posada, Norha L. Vasquez, Rafael E. Univ Pontificia Bolivariana Escuela Ingn Medellin Colombia
This paper addresses the development of hardware and software systems needed for the operation of a Class II remotely operated vehicle, by using a systems engineering approach. The concept design included using Qualit... 详细信息
来源: 评论
application of filtration system in the network security
Application of filtration system in the network security
收藏 引用
2012 ieee 3rd International Conference on software engineering and Service Science, ICSESS 2012
作者: Lu, Jinhao Dong, Chi Department of Computer Science Northeast Petroleum University Qin Huangdao China Petroleum Engineering Institute Northeast Petroleum University Da Qing China
With the Internet spread and deepening of the application. Internet and e-commerce business development has become an inevitable trend. Network security is more and more attention by people. Therefore, the use of an e... 详细信息
来源: 评论
The assessment of EEG in patients with spinal cord injury to movements
The assessment of EEG in patients with spinal cord injury to...
收藏 引用
3rd International symposium on Intelligent Information technology application Workshops, IITAW 2009
作者: Li, Wei Huang, Yue Xu, Jiang Chen, Xi Wang, Xiaojun Image Processing and Intelligent Control Key Laboratory of Education Ministry of China Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan 430074 China
Electroencephalography (EEG) is widely used in the field of neural engineering. EEG signals can describe the brain activities while the subjects with para/tetraplegia perform movement with their limbs. This paper revi... 详细信息
来源: 评论
A framework that uses repositories for Information systems and knowledge integration  2
A framework that uses repositories for Information Systems a...
收藏 引用
1999 ieee symposium on application-specific systems and software engineering and technology (ASSET 99)
作者: Georgalas, N British Telecom Labs Ipswich IP5 3RE Suffolk England
Recent market conditions have forced companies to change their policies regarding systems development. Open architectures and distributed paradigms become first role players in the implementation of flexible, componet... 详细信息
来源: 评论