咨询与建议

限定检索结果

文献类型

  • 1,927 篇 会议
  • 142 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 2,079 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,295 篇 工学
    • 1,181 篇 计算机科学与技术...
    • 861 篇 软件工程
    • 225 篇 信息与通信工程
    • 169 篇 控制科学与工程
    • 129 篇 电气工程
    • 77 篇 电子科学与技术(可...
    • 73 篇 生物医学工程(可授...
    • 72 篇 生物工程
    • 40 篇 建筑学
    • 36 篇 动力工程及工程热...
    • 35 篇 机械工程
    • 34 篇 光学工程
    • 29 篇 仪器科学与技术
    • 29 篇 化学工程与技术
    • 27 篇 力学(可授工学、理...
    • 27 篇 土木工程
  • 498 篇 理学
    • 377 篇 数学
    • 100 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 75 篇 生物学
    • 26 篇 化学
    • 23 篇 系统科学
  • 276 篇 管理学
    • 168 篇 图书情报与档案管...
    • 123 篇 管理科学与工程(可...
    • 88 篇 工商管理
  • 66 篇 教育学
    • 64 篇 教育学
  • 63 篇 医学
    • 61 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 24 篇 药学(可授医学、理...
  • 28 篇 法学
    • 23 篇 社会学
  • 18 篇 经济学
  • 9 篇 农学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 91 篇 mobile computing
  • 72 篇 distributed comp...
  • 69 篇 computer science
  • 53 篇 grid computing
  • 47 篇 application soft...
  • 40 篇 concurrent compu...
  • 39 篇 computational mo...
  • 36 篇 computer network...
  • 34 篇 computer archite...
  • 32 篇 cloud computing
  • 29 篇 virtual reality
  • 29 篇 ubiquitous compu...
  • 27 篇 internet
  • 26 篇 costs
  • 25 篇 laboratories
  • 23 篇 peer to peer com...
  • 23 篇 middleware
  • 20 篇 parallel process...
  • 20 篇 processor schedu...
  • 20 篇 hardware

机构

  • 20 篇 the hong kong po...
  • 18 篇 hong kong polyte...
  • 18 篇 department of co...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 12 篇 institute of com...
  • 12 篇 department of co...
  • 10 篇 nit calicut
  • 10 篇 depauw universit...
  • 10 篇 national institu...
  • 9 篇 school of comput...
  • 8 篇 college of compu...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 university of lo...
  • 6 篇 pablo de olavide...
  • 6 篇 department of co...
  • 6 篇 college of compu...
  • 6 篇 department of co...
  • 6 篇 school of comput...

作者

  • 25 篇 hong va leong
  • 18 篇 leong hong va
  • 15 篇 alvin chan
  • 12 篇 hong jiman
  • 11 篇 hung chih-cheng
  • 11 篇 chan alvin t.s.
  • 10 篇 liu ling
  • 10 篇 gloria childress...
  • 10 篇 george roussos
  • 8 篇 umesh bellur
  • 8 篇 song enmin
  • 7 篇 rajiv ramnath
  • 7 篇 pu calton
  • 7 篇 si antonio
  • 7 篇 ahamed sheikh iq...
  • 7 篇 chandran priya
  • 6 篇 federico divina
  • 6 篇 sheikh iqbal aha...
  • 6 篇 madhu kumar s.d.
  • 6 篇 raúl giráldez ro...

语言

  • 2,065 篇 英文
  • 9 篇 其他
  • 3 篇 中文
  • 2 篇 葡萄牙文
检索条件"任意字段=Applied Computing 2004 - Proceedings of the 2004 ACM Symposium on Applied Computing"
2079 条 记 录,以下是121-130 订阅
排序:
An End-to-end Multi-task Object Detection using Embedded GPU in Autonomous Driving  22
An End-to-end Multi-task Object Detection using Embedded GPU...
收藏 引用
22nd International symposium on Quality Electronic Design (ISQED)
作者: Zhou, Shanglin Xie, Mimi Jin, Yufang Miao, Fei Ding, Caiwen Univ Connecticut Storrs CT 06269 USA Univ Texas San Antonio San Antonio TX USA
Autonomous driving has gained popularity due to its high reliability compared to human drivers. Autonomous vehicles combine variety of sensors to perceive their surroundings, and use deep learning (DL) to extract comp... 详细信息
来源: 评论
TrustEV: Trustworthy Electric Vehicle Charging and Billing  20
TrustEV: Trustworthy Electric Vehicle Charging and Billing
收藏 引用
35th Annual acm symposium on applied computing (SAC)
作者: Fuchs, Andreas Kern, Dustin Krauss, Christoph Zhdanova, Maria Fraunhofer SIT Darmstadt Germany
In the emerging Electric Vehicle (EV) charging infrastructure, vehicles authenticate themselves for charging and billing using Plug-and-Charge (PnC) protocols such as ISO 15118 and the respective cryptographic credent... 详细信息
来源: 评论
Mining Data on computing Majors Knowledge Game  2022
Mining Data on Computing Majors Knowledge Game
收藏 引用
proceedings of the 53rd acm Technical symposium on Computer Science Education V. 2
作者: Sam Thach Cecily Heiner Oregon Institute of Technology Klamath Falls OR USA
computing as a discipline is still very young, and there is much confusion about distinguishing the majors within the discipline. In the early 2000's, paper surveys were administered to distinguish between five co... 详细信息
来源: 评论
On Making Xen Detect Hypercalls and Memory Accesses for Simulating Virtualization-Enabled Processors  20
On Making Xen Detect Hypercalls and Memory Accesses for Simu...
收藏 引用
35th Annual acm symposium on applied computing (SAC)
作者: Mhatre, Swapneel C. Chandran, Priya Natl Inst Technol Calicut Dept Comp Sci & Engn Calicut Kerala India
Due to the widespread use of cloud-based systems that are shared by multiple users, new processors are enhanced for security in virtualization. However, it is a challenging task to develop simulators for such processo... 详细信息
来源: 评论
An Overview of Reference Architectures for Cloud of Things  20
An Overview of Reference Architectures for Cloud of Things
收藏 引用
35th Annual acm symposium on applied computing (SAC)
作者: Dias, Diogenes Delicato, Flavia C. Pires, Paulo F. Rocha, Atslands R. Nakagawa, Elisa Y. Univ Sao Paulo Sao Carlos Brazil Fluminense Fed Univ Niteroi RJ Brazil Fed Univ Ceara UFC Fortaleza Ceara Brazil
Cloud of Things (CoT) is a new paradigm that explores the synergy between Internet of Things (IoT) and cloud computing and has increasingly promoted the development of complex software intensive systems in diverse and... 详细信息
来源: 评论
Evaluation of federated learning aggregation algorithms: Application to human activity recognition  20
Evaluation of federated learning aggregation algorithms: App...
收藏 引用
2020 acm International Joint Conference on Pervasive and Ubiquitous computing and 2020 acm International symposium on Wearable Computers, UbiComp/ISWC 2020
作者: Ek, Sannara Portet, François Lalanda, Philippe Vega, German Grenoble Alpes University France
Pervasive computing promotes the integration of connected electronic devices in our living spaces in order to assist us through appropriate services. Two major developments have gained significant momentum recently: a... 详细信息
来源: 评论
DAHA: Accelerating GNN Training with Data and Hardware Aware Execution Planning  50th
DAHA: Accelerating GNN Training with Data and Hardware Aware...
收藏 引用
50th International Conference on Very Large Data Bases, VLDB 2024
作者: Li, Zhiyuan Jian, Xun Wang, Yue Shao, Yingxia Chen, Lei The Hong Kong University of Science and Technology Hong Kong Shenzhen Institute of Computing Sciences China Beijing University of Posts and Telecommunications China Data Science and Analytics Thrust The Hong Kong University of Science and Technology Guangzhou Hong Kong
Graph neural networks (GNNs) have been gaining a reputation for effective modeling of graph data. Yet, it is challenging to train GNNs efficiently. Many frameworks have been proposed but most of them suffer from high ... 详细信息
来源: 评论
Using Application Knowledge to Reduce Cold Starts in FaaS Services  20
Using Application Knowledge to Reduce Cold Starts in FaaS Se...
收藏 引用
35th Annual acm symposium on applied computing (SAC)
作者: Bermbach, David Karakaya, Ahmet-Serdar Buchholz, Simon TU Berlin Berlin Germany Einstein Ctr Digital Future Mobile Cloud Comp Res Grp Berlin Germany
In Function-as-a-Service platforms (FaaS), which have become very popular lately, code is deployed in the unit of single functions and the cloud provider handles resource management. There, a key problem is the so-cal... 详细信息
来源: 评论
Onion: Identifying Incident-Indicating Logs for Cloud Systems  2021
Onion: Identifying Incident-Indicating Logs for Cloud System...
收藏 引用
29th acm Joint Meeting on European Software Engineering Conference and symposium on the Foundations of Software Engineering (ESEC/FSE)
作者: Zhang, Xu Xu, Yong Qin, Si He, Shilin Qiao, Bo Li, Ze Zhang, Hongyu Li, Xukun Dang, Yingnong Lin, Qingwei Chintalapati, Murali Rajmohan, Saravanakumar Zhang, Dongmei Microsoft Res Beijing Peoples R China Microsoft Azure Redmond WA USA Univ Newcastle Callaghan NSW Australia Microsoft 365 Redmond WA USA
In cloud systems, incidents affect the availability of services and require quick mitigation actions. Once an incident occurs, operators and developers often examine logs to perform fault diagnosis. However, the large... 详细信息
来源: 评论
Resource Allocation for Edge computing with Multiple Tenant Configurations  20
Resource Allocation for Edge Computing with Multiple Tenant ...
收藏 引用
35th Annual acm symposium on applied computing (SAC)
作者: Araldo, Andrea Di Stefano, Alessandro Di Stefano, Antonella Telecom SudParis Inst Polytech Paris Paris France Univ Catania Dept Elect Elect & Informat Engn Catania Italy
Edge computing (EC) consists in deploying computational resources, e.g., memory, CPUs, at the Edge of the network, e.g., base stations, access points, and run there a part of the computation currently running on the C... 详细信息
来源: 评论