咨询与建议

限定检索结果

文献类型

  • 40,137 篇 会议
  • 1,420 篇 期刊文献
  • 58 篇 学位论文
  • 44 册 图书
  • 1 篇 科技报告

馆藏范围

  • 41,660 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,213 篇 工学
    • 14,397 篇 计算机科学与技术...
    • 9,972 篇 控制科学与工程
    • 9,376 篇 电气工程
    • 6,810 篇 软件工程
    • 5,849 篇 信息与通信工程
    • 2,766 篇 机械工程
    • 1,552 篇 电子科学与技术(可...
    • 1,253 篇 交通运输工程
    • 1,099 篇 仪器科学与技术
    • 1,079 篇 动力工程及工程热...
    • 932 篇 石油与天然气工程
    • 820 篇 航空宇航科学与技...
    • 573 篇 生物工程
    • 509 篇 生物医学工程(可授...
    • 481 篇 材料科学与工程(可...
    • 438 篇 土木工程
    • 434 篇 力学(可授工学、理...
    • 379 篇 化学工程与技术
    • 335 篇 安全科学与工程
    • 297 篇 建筑学
  • 6,507 篇 理学
    • 3,304 篇 数学
    • 1,742 篇 物理学
    • 1,555 篇 系统科学
    • 827 篇 统计学(可授理学、...
    • 678 篇 生物学
    • 299 篇 化学
  • 3,391 篇 管理学
    • 3,008 篇 管理科学与工程(可...
    • 800 篇 工商管理
    • 500 篇 图书情报与档案管...
  • 655 篇 医学
    • 522 篇 临床医学
  • 285 篇 经济学
  • 257 篇 法学
  • 108 篇 军事学
  • 105 篇 教育学
  • 87 篇 农学
  • 63 篇 文学
  • 7 篇 艺术学

主题

  • 4,261 篇 control systems
  • 2,212 篇 neural networks
  • 1,718 篇 traffic control
  • 1,367 篇 telecommunicatio...
  • 1,143 篇 protocols
  • 978 篇 network topology
  • 954 篇 bandwidth
  • 950 篇 throughput
  • 900 篇 quality of servi...
  • 877 篇 performance anal...
  • 870 篇 communication sy...
  • 795 篇 real-time system...
  • 795 篇 delay
  • 779 篇 adaptive control
  • 762 篇 routing
  • 739 篇 artificial neura...
  • 699 篇 switches
  • 663 篇 voltage control
  • 617 篇 mathematical mod...
  • 601 篇 optimization

机构

  • 40 篇 univ chinese aca...
  • 37 篇 shanghai jiao to...
  • 29 篇 tsinghua univers...
  • 29 篇 department of el...
  • 28 篇 georgia inst tec...
  • 28 篇 ieee
  • 26 篇 beijing inst tec...
  • 26 篇 hubei key labora...
  • 26 篇 lovely professio...
  • 25 篇 school of automa...
  • 25 篇 college of infor...
  • 25 篇 northeastern uni...
  • 24 篇 natl univ singap...
  • 22 篇 univ naples fede...
  • 21 篇 college of contr...
  • 21 篇 indian inst tech...
  • 21 篇 southeast univ s...
  • 21 篇 school of electr...
  • 20 篇 univ sci & techn...
  • 20 篇 nanjing univ sci...

作者

  • 33 篇 liu yang
  • 30 篇 singh bhim
  • 27 篇 jun wang
  • 23 篇 wang lei
  • 21 篇 li li
  • 19 篇 zhang lei
  • 18 篇 zhang tao
  • 18 篇 li xin
  • 16 篇 lei wang
  • 16 篇 li yang
  • 16 篇 wu min
  • 16 篇 botta alessio
  • 15 篇 chih-min lin
  • 15 篇 wang jing
  • 15 篇 zhang chao
  • 14 篇 canonico roberto
  • 14 篇 lin chih-min
  • 14 篇 li peng
  • 14 篇 petrillo alberto
  • 14 篇 wang jian

语言

  • 40,504 篇 英文
  • 775 篇 其他
  • 379 篇 中文
  • 9 篇 西班牙文
  • 4 篇 土耳其文
  • 2 篇 捷克文
  • 2 篇 德文
  • 2 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=Conference on Performance and Control of Network Systems II"
41660 条 记 录,以下是751-760 订阅
排序:
Tariff Versus Sanction Under Bounded Rationality  11th
Tariff Versus Sanction Under Bounded Rationality
收藏 引用
11th International conference on network Games, control and Optimization
作者: Pokou, Fredy Fochesato, Marta Le Cadre, Helene Univ Lille Inria CNRS Cent LilleUMR 9189 CRIStAL F-59000 Lille France Swiss Fed Inst Technol Automat Control Lab Dept Elect Engn & Informat Technol Phys Str CH-38092 Zurich Switzerland
We formulate the design of a taxation mechanism as a Stackelberg game assuming: a) perfect competition, with exogenous prices;b) imperfect competition, captured through a variational inequality approach, with endogeno... 详细信息
来源: 评论
A study on Anomaly-based Intrusion Detection systems Employing Supervised Deep Learning Techniques  8
A study on Anomaly-based Intrusion Detection Systems Employi...
收藏 引用
8th International conference on Inventive systems and control, ICISC 202
作者: Shaffi, Abubucker.S. Chacko, John Velloreuzhathil Eliyan, Greeshma Balaji, S. Gulf College Department of Computing Sciences Oman Al Zahra College for Women Department of Information Technology Ghala Muscat Oman
The rise of smart cities, driverless automobiles, smart watches, and mobile banking has led to increased reliance on the Internet. Although technology has enormous advantages for people and society, it also introduces... 详细信息
来源: 评论
Dynamic Bidirectional-controlled Inverter-Based Grid Optimized by Neural networks
Dynamic Bidirectional-Controlled Inverter-Based Grid Optimiz...
收藏 引用
2024 Vehicle Power and Propulsion conference
作者: Alzayed, Mohamad Lemaire, Michel Chaoui, Hicham Massicotte, Daniel Carleton Univ DoE Ottawa ON Canada UQTR DoEC Trois Rivieres PQ Canada Univ Quebec Trois Rivieres Dept Elect & Comp Engn Trois Rivieres PQ Canada Carleton Univ Dept Elect Ottawa ON Canada
Grid-based voltage source inverters frequently utilize the droop control technique combined with inner/outer voltage and current regulation mechanisms to ensure a dependable electricity supply. This study seeks to int... 详细信息
来源: 评论
Advanced Persistent Threats Detection based on Deep Learning Approach  6
Advanced Persistent Threats Detection based on Deep Learning...
收藏 引用
IEEE 6th International conference on Industrial Cyber-Physical systems (ICPS)
作者: Eke, Hope Nkiruka Petrovski, Andrei Robert Gordon Univ Sch Comp Aberdeen Scotland Natl Subsea Ctr Sch Comp Aberdeen Scotland
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navig... 详细信息
来源: 评论
Learning state observers for recurrent neural network models  63
Learning state observers for recurrent neural network models
收藏 引用
63rd IEEE conference on Decision and control, CDC 2024
作者: Bonassi, Fabio Andersson, Carl Mattsson, Per Schon, Thomas B. Uppsala University Department of Information Technology Lägerhyddsvägen 1 Uppsala751 05 Sweden
In this paper, we discuss the problem of learning state observers for Recurrent Neural network (RNN) black-box models of dynamical systems. State observers are indeed key to designing state-feedback control laws, such... 详细信息
来源: 评论
network communication optimization of RCCL communication library in Multi-NIC systems  3
Network communication optimization of RCCL communication lib...
收藏 引用
3rd International conference on Algorithms, Microchips, and network Applications, AMNA 2024
作者: He, Shuaiming Wan, Wei Li, Junhong School of Computer and Artificial Intelligence Zhengzhou University Henan Zhengzhou450001 China Co. Ltd. Beijing100193 China Tsinghua University Software School Beijing100084 China
With the widespread application of deep learning frameworks, large-scale computing and GPU programming are receiving increased attention. For upper-layer applications that utilize GPUs for computational communication,... 详细信息
来源: 评论
Advanced Intrusion Detection systems Leveraging Knowledge Graph-Based Techniques  12
Advanced Intrusion Detection Systems Leveraging Knowledge Gr...
收藏 引用
2024 12th International conference on systems and control, ICSC 2024
作者: Daoud, Mohamed Amine Mostefaoui, Sid Ahmed Mokhtar Meghazi, Hadj Madani Labbadi, Ourida Zenina, Chaima Bouguessa, Abdelkader Ibn-Khaldoun University of Tiaret LRIAS Lab Dept. of Computer Sciences Algeria Ibn-Khaldoun University of Tiaret Dept. of Computer Sciences Algeria
The integration of intrusion detection systems (IDS) is crucial for strengthening network security. Improving IDS performance requires advanced techniques for handling intrusion detection data, with machine learning p... 详细信息
来源: 评论
Using Machine Learning to control Congestion in SDN: A Review
Using Machine Learning to Control Congestion in SDN: A Revie...
收藏 引用
International conference on Emerging Trends and Applications in Artificial Intelligence, ICETAI 2023
作者: Yassin, Tabarak Ali, Omar Department of Information and Communication Engineering Al-Khwarizmi College of Engineering University of Baghdad Baghdad Iraq
Congestion is a major issue in networks, as it decreases efficiency and wastes bandwidth. While the basic operations of TCP remain the same, there are different flavors of TCP developed for specific network environmen... 详细信息
来源: 评论
Can graph neural network-based detection mitigate the impact of hardware imperfections?
Can graph neural network-based detection mitigate the impact...
收藏 引用
International Balkan conference on Communications and networking (BalkanCom)
作者: Mitsiou, Lamprini Trevlakis, Stylianos Tsiolas, Argiris Vergados, Dimitrios J. Michalas, Angelos Boulogeorgos, Alexandros-Apostolos A. InnoCube PC Res & Dev Dept Thessaloniki 55535 Greece Univ Western Macedonia Dept Elect & Comp Engn Kozani 50100 Greece
Until recently, researchers used machine learning methods to compensate for hardware imperfections at the symbol level, indicating that optimum radio-frequency transceiver performance is possible. Nevertheless, such a... 详细信息
来源: 评论
Construction of Security control and Protection of Internal and External networks of Communication Terminals Under the Heterogeneous network Environment
Construction of Security Control and Protection of Internal ...
收藏 引用
International conference on Artificial Intelligence and Communication Technologies, ICAICT 2023
作者: Zhang, Jian Zeng, Ying Li, Bo Li, Xingnan Shi, Zhan Electric Power Dispatching and Control Center of Guangdong Power Grid Co. Ltd. Guangzhou510000 China
The construction of network security control and protection system of internal and external communication terminals under the heterogeneous network environment can promote the research and development of power network... 详细信息
来源: 评论