咨询与建议

限定检索结果

文献类型

  • 998 篇 会议
  • 68 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,076 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 697 篇 工学
    • 568 篇 计算机科学与技术...
    • 497 篇 软件工程
    • 147 篇 控制科学与工程
    • 132 篇 信息与通信工程
    • 89 篇 电气工程
    • 70 篇 机械工程
    • 59 篇 动力工程及工程热...
    • 51 篇 生物工程
    • 48 篇 交通运输工程
    • 44 篇 电子科学与技术(可...
    • 37 篇 安全科学与工程
    • 27 篇 光学工程
    • 25 篇 生物医学工程(可授...
    • 23 篇 仪器科学与技术
    • 22 篇 化学工程与技术
    • 19 篇 材料科学与工程(可...
    • 17 篇 建筑学
    • 17 篇 土木工程
  • 393 篇 理学
    • 299 篇 数学
    • 59 篇 生物学
    • 54 篇 系统科学
    • 48 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 28 篇 化学
  • 195 篇 管理学
    • 148 篇 管理科学与工程(可...
    • 77 篇 工商管理
    • 70 篇 图书情报与档案管...
  • 40 篇 教育学
    • 40 篇 教育学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 23 篇 法学
    • 20 篇 社会学
  • 16 篇 医学
  • 13 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 66 篇 software enginee...
  • 65 篇 linear programmi...
  • 53 篇 programming
  • 40 篇 software enginee...
  • 33 篇 artificial intel...
  • 29 篇 optimization
  • 26 篇 dynamic programm...
  • 25 篇 programming tech...
  • 24 篇 costs
  • 22 篇 computational mo...
  • 19 篇 programming lang...
  • 18 篇 programming prof...
  • 18 篇 integer programm...
  • 18 篇 logics and meani...
  • 17 篇 training
  • 16 篇 computer communi...
  • 16 篇 students
  • 14 篇 machine learning
  • 14 篇 engineering educ...
  • 13 篇 computer science

机构

  • 4 篇 department of sy...
  • 4 篇 zhejiang univers...
  • 4 篇 school of comput...
  • 4 篇 state grid sichu...
  • 4 篇 school of inform...
  • 4 篇 school of mechan...
  • 3 篇 school of automa...
  • 3 篇 school of inform...
  • 3 篇 school of comput...
  • 3 篇 cent res inst el...
  • 3 篇 eindhoven univer...
  • 3 篇 department of co...
  • 3 篇 college of infor...
  • 3 篇 school of electr...
  • 3 篇 school of comput...
  • 3 篇 school of inform...
  • 3 篇 polytechnic inst...
  • 3 篇 department of co...
  • 3 篇 school of inform...
  • 3 篇 school of inform...

作者

  • 4 篇 hideki katagiri
  • 4 篇 sanxing cao
  • 4 篇 yin guodong
  • 3 篇 zhang tao
  • 3 篇 laksono pringgo ...
  • 3 篇 chen hao
  • 3 篇 kosuke kato
  • 3 篇 rosyidi cucuk nu...
  • 3 篇 miller j
  • 3 篇 takano hirotaka
  • 3 篇 asano hiroshi
  • 3 篇 liu wei
  • 3 篇 zhang chen
  • 3 篇 shen tong
  • 3 篇 smith m
  • 3 篇 el-kenawy el-say...
  • 3 篇 yang liu
  • 3 篇 martin a
  • 3 篇 abotaleb mostafa
  • 3 篇 mugridge r

语言

  • 1,033 篇 英文
  • 41 篇 其他
  • 6 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=6th International Conference on the Art, Science, and Engineering of Programming, Programming 2022"
1076 条 记 录,以下是701-710 订阅
排序:
Mitigation Strategies for Lifeline Systems Based on the Interdependent Network Design Problem  2
Mitigation Strategies for Lifeline Systems Based on the Inte...
收藏 引用
2nd international conference on Vulnerability and Risk Analysis and Management, ICVRAM 2014 and the 6th international Symposium on Uncertainty Modeling and Analysis, ISUMA 2014
作者: González, Andrés D. Sánchez-Silva, Mauricio Dueñas-Osorio, Leonardo Medaglia, Andrés L. Department of Civil and Environmental Engineering Rice University 6100 Main Street MS-318 TX77005-1827 United States Department of Civil and Environmental Engineering Department of Industrial Engineering Universidad de Los Andes Bogota Cra 1 Este No19A-40 Colombia Department of Civil and Environmental Engineering Universidad de Los Andes Bogota Cra 1 Este No19A-40 Colombia Department of Civil and Environmental Engineering Rice University 6100 Main Street HoustonTX77005-1827 United States Department of Industrial Engineering Universidad de Los Andes Bogota Cra 1 Este No19A-40 Colombia
the objective of this paper is to present a methodology that integrates Mixed Integer programming (MIP) optimization methods into the calculation of metrics related to the reliability and resilience of a system of int... 详细信息
来源: 评论
6th international Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2014
6th International Symposium on Leveraging Applications of Fo...
收藏 引用
6th international Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2014
the proceedings contain 59 papers. the special focus in this conference is on engineering Virtualized Systems, Statistical Model Checking, Risk-Based Testing, Medical Cyber-Physical Systems, Scientific Workflows, Eval...
来源: 评论
An analytical model for estimating execution cost of 1D array expressions
An analytical model for estimating execution cost of 1D arra...
收藏 引用
international conference on Computer science and Information Technology (CSIT)
作者: Youssef Omran Gdura Computer Engineering Department University of Tripoli Tripoli Libya
Compiler writers have developed various techniques, such as constant folding, subexpression elimination, loop transformation and vectorization, to help compilers in code optimization for performance improvement. Yet, ... 详细信息
来源: 评论
EAGL: An elliptic curve arithmetic GPU-based library for bilinear pairing
EAGL: An elliptic curve arithmetic GPU-based library for bil...
收藏 引用
6th international conference on Pairing-Based Cryptography, Pairing 2013
作者: Pu, Shi Liu, Jyh-Charn Department of Computer Science and Engineering Texas A and M University TAMU 3112 College Station TX 77843-3112 United States
In this paper we present the Elliptic curve Arithmetic GPU-based Library (EAGL), a self-contained GPU library, to support parallel computing of bilinear pairings based on the Compute Unified Device Architecture (CUDA)... 详细信息
来源: 评论
FuAET: A tool for developing fuzzy self-Adaptive software systems  2014
FuAET: A tool for developing fuzzy self-Adaptive software sy...
收藏 引用
6th Asia-Pacific Symposium on Internetware, Internetware 2014
作者: Yang, Qiliang Tao, Xianping Xie, Hongwei Xing, Jianchun Song, Wei College of Defense Engineering Pla University of Science and Technology Nanjing210007 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210093 China School of Computer Science and Technology Nanjing University of Science and Technology Nanjing210094 China
Handling uncertainty in software self-Adaptation has become an important and challenging issue. In our previous work, we proposed a fuzzy control based approach named Software Fuzzy Self-Adaptation (SFSA) to address f... 详细信息
来源: 评论
A survey on security in Cognitive Radio networks
A survey on security in Cognitive Radio networks
收藏 引用
international conference on Computer science and Information Technology (CSIT)
作者: Mahmoud Khasawneh Anjali Agarwal Department of Electrical and Computer Engineering Concordia University Montreal Canada
Cognitive radio (CR) has been introduced to accommodate the steady increment in the spectrum demand. In CR networks, unlicensed users, which are referred to as secondary users (SUs), are allowed to dynamically access ... 详细信息
来源: 评论
APE: End User Development for Emergency Management Training
APE: End User Development for Emergency Management Training
收藏 引用
conference on Games and Virtual Worlds for Serious Applications, VS-GAMES
作者: Zeno Menestrina Antonella De Angeli Paolo Busetta Dept. of Information Engineering and Computer Science University of Trento Trento Italy Delta Informatica Spa Trento Italy
Serious games are pedagogical tools used in many domains and considered a viable solution to professional training. Core elements for the construction of effective serious games are the Non-Player Characters (NPCs) wh... 详细信息
来源: 评论
A Stochastic Workload Distribution Approach for an Ad Hoc Mobile Cloud
A Stochastic Workload Distribution Approach for an Ad Hoc Mo...
收藏 引用
IEEE international conference on Cloud Computing Technology and science (CloudCom)
作者: Tram Truong-Huu Chen-Khong tham Dusit Niyato Department of Electrical & Computer Engineering National University of Singapore Singapore School of Computer Engineering Nanyang Technological University Singapore
Mobile devices like smartphones have become the computing device of choice for many users, heralding the era of mobile computing. Many applications have been developed to run on mobile devices. However, despite the in... 详细信息
来源: 评论
Determination of food age using neural network
Determination of food age using neural network
收藏 引用
international conference on Adaptive science & Technology (ICAST)
作者: Ima Okon Essiet George Adinoyi Audu Department of Electrical Engineering Bayero University Kano Nigeria
artificial intelligence (AI) is the aspect of computing concerned with programming computers to behave like humans. In spite of the fact that no artificial intelligence system is capable of fully simulating human beha... 详细信息
来源: 评论
EasyCache: A transparent in-memory data caching approach for internetware  2014
EasyCache: A transparent in-memory data caching approach for...
收藏 引用
6th Asia-Pacific Symposium on Internetware, Internetware 2014
作者: Wang, Wei Liu, Zhaohui Jiang, Yong Yuan, Xinchen Wei, Jun Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Computer Science Chinese Academy of Sciences Beijing100190 China
Developers usually use in-memory data caching system like Hazelcast with the application server to offload the backend database for scaling Internetware. Unfortunately, such caches do not integrate well with the datab... 详细信息
来源: 评论