咨询与建议

限定检索结果

文献类型

  • 2,232 篇 会议
  • 54 篇 期刊文献
  • 3 册 图书
  • 1 篇 学位论文

馆藏范围

  • 2,290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,649 篇 工学
    • 1,192 篇 计算机科学与技术...
    • 701 篇 电气工程
    • 506 篇 软件工程
    • 479 篇 信息与通信工程
    • 192 篇 控制科学与工程
    • 101 篇 电子科学与技术(可...
    • 44 篇 航空宇航科学与技...
    • 43 篇 机械工程
    • 31 篇 生物工程
    • 30 篇 石油与天然气工程
    • 30 篇 交通运输工程
    • 25 篇 仪器科学与技术
    • 25 篇 动力工程及工程热...
    • 21 篇 建筑学
    • 20 篇 生物医学工程(可授...
    • 19 篇 土木工程
    • 18 篇 光学工程
    • 17 篇 材料科学与工程(可...
  • 265 篇 理学
    • 133 篇 数学
    • 78 篇 物理学
    • 43 篇 系统科学
    • 40 篇 生物学
    • 17 篇 统计学(可授理学、...
  • 189 篇 管理学
    • 153 篇 管理科学与工程(可...
    • 57 篇 工商管理
    • 37 篇 图书情报与档案管...
  • 76 篇 医学
    • 51 篇 基础医学(可授医学...
    • 33 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 25 篇 教育学
    • 24 篇 教育学
  • 15 篇 法学
  • 8 篇 军事学
  • 3 篇 农学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 171 篇 computer archite...
  • 165 篇 programming
  • 91 篇 hardware
  • 86 篇 network architec...
  • 80 篇 linear programmi...
  • 71 篇 neural networks
  • 68 篇 protocols
  • 64 篇 network topology
  • 62 篇 optimization
  • 57 篇 computational mo...
  • 52 篇 deep learning
  • 52 篇 computer network...
  • 49 篇 routing
  • 49 篇 cloud computing
  • 45 篇 application soft...
  • 45 篇 network-on-chip
  • 42 篇 dynamic programm...
  • 41 篇 switches
  • 40 篇 throughput
  • 39 篇 parallel program...

机构

  • 7 篇 univ calif berke...
  • 6 篇 xidian univ stat...
  • 5 篇 natl res univ hi...
  • 5 篇 deakin univ sch ...
  • 5 篇 swiss fed inst t...
  • 5 篇 mit cambridge ma...
  • 5 篇 tsinghua univ pe...
  • 5 篇 southeast univ n...
  • 5 篇 dalian univ tech...
  • 5 篇 russian acad sci...
  • 4 篇 pg demidov yaros...
  • 4 篇 georgia inst tec...
  • 4 篇 univ chinese aca...
  • 4 篇 shanghai jiao to...
  • 4 篇 peking universit...
  • 4 篇 pacific northwes...
  • 4 篇 univ calif san d...
  • 3 篇 columbia univers...
  • 3 篇 univ estadual ca...
  • 3 篇 nanjing univ aer...

作者

  • 10 篇 carle georg
  • 6 篇 magedanz thomas
  • 6 篇 emmerich paul
  • 5 篇 zhao bo
  • 5 篇 benini luca
  • 5 篇 georg carle
  • 4 篇 zhang tao
  • 4 篇 wang lei
  • 4 篇 garcia jordi
  • 4 篇 dongarra jack
  • 4 篇 hoefler torsten
  • 4 篇 li tao
  • 4 篇 turdakov denis
  • 4 篇 luca foschini
  • 4 篇 kellerer wolfgan...
  • 4 篇 vetter jeffrey s...
  • 4 篇 liu derong
  • 4 篇 chatha karam s.
  • 4 篇 li ming
  • 4 篇 lee seyong

语言

  • 2,231 篇 英文
  • 47 篇 其他
  • 10 篇 中文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE Conference on Open Architectures and Network Programming"
2290 条 记 录,以下是431-440 订阅
排序:
6GSMART-ICC Project: Industrial Cloud-Continuum Orchestration for Smart Cyber-Physical Systems
6GSMART-ICC Project: Industrial Cloud-Continuum Orchestratio...
收藏 引用
ieee conference on Standards for Communications and networking (CSCN)
作者: E. Carmona-Cejudo J.M. Palacios J. Benedicto J. Fernández Hidalgo J. Palomares K. Rasol i2CAT Foundation Barcelona Spain Minsait Madrid Spain Eviden Barcelona Spain
By combining computational capabilities next to data sources with fifth-generation (5G) connectivity, edge computing can enable novel industrial use cases. Further, by integrating public network offerings with industr... 详细信息
来源: 评论
A Comparative Study of Software architectures in Constrained Device IoT Deployments
A Comparative Study of Software Architectures in Constrained...
收藏 引用
ieee International conference on Internet of Things and Intelligence Systems (IoTaIS)
作者: du Plessis, Shani Correia, Noelia Univ Algarve CEOT Faro Portugal Univ Algarve CEOT Fac Sci & Technol Faro Portugal
The Internet of Things (IoT) is an area that has consistently seen growth and development and will no doubt continue to do so. One group of IoT devices - constrained devices - has seen significant developments in rece... 详细信息
来源: 评论
network Centrality as a New Perspective on Microservice Architecture  22
Network Centrality as a New Perspective on Microservice Arch...
收藏 引用
22nd ieee International conference on Software Architecture, ICSA 2025
作者: Bakhtin, Alexander Esposito, Matteo Lenarduzzi, Valentina Taibi, Davide University of Oulu Finland
Context: Over the past decade, the adoption of Microservice Architecture (MSA) has led to the identification of various patterns and anti-patterns, such as Nano/Mega/Hub services. Detecting these anti-patterns often i... 详细信息
来源: 评论
Integration, testing and performance analysis of ETSI-MEC with Different OAI 5G architectures
Integration, testing and performance analysis of ETSI-MEC wi...
收藏 引用
India Council International Subsections conference (INDISCON), ieee
作者: Shashvat Sanadhya Pimmy Gandotra Brejesh Lall Department of EE/BSTTM IIT Delhi New Delhi India Department of ECE/BSTTM JIIT/IITD Noida/Delhi New Delhi India Department of EE IIT Delhi New Delhi India
For the realization of flexible, customized, diverse 5G and beyond 5G (B5G) services, network slicing (NS) has emerged as a competent technology. Further, the multi-access edge computing (MEC) technology plays a key r... 详细信息
来源: 评论
Handwritten Mathematical Symbol Recognition using Neural network architectures  6
Handwritten Mathematical Symbol Recognition using Neural Net...
收藏 引用
6th International conference on Electronics, Communication and Aerospace Technology, ICECA 2022
作者: Padmanandam, Kayal Yadav, Alekhya Aishwarya Harshitha, N. Bvrit Hyderabad College of Engineering for Women Hyderabad500090 India Bvrit Hyderabad College of Engineering for Women Department of Information Technology Hyderabad500090 India
Mathematical symbol recognition is a topic of attention that convert physical documents into digital format. Despite the existing techniques to recognize handwritten characters and symbols, recognition accuracy is uns... 详细信息
来源: 评论
Joint Latency and Reliability-Aware Controller Placement  35
Joint Latency and Reliability-Aware Controller Placement
收藏 引用
35th International conference on Information networking (ICOIN)
作者: Rasol, Kurdman Abdulrahman Rasol Domingo-Pascual, Jordi Univ Politecn Catalunya UPC Dept Comp Architecture Barcelona Catalonia Spain
In network architectures based on Software Defined networking (SDN) the control plane (control logic) is separated from the network data plane (forwarding plane) while traditional network routers combine both. Softwar... 详细信息
来源: 评论
Multi-Source Coordinated Fault Recovery Strategy for Flexible Distribution networks with SOP
Multi-Source Coordinated Fault Recovery Strategy for Flexibl...
收藏 引用
2025 International conference on Electrical Automation and Artificial Intelligence, ICEAAI 2025
作者: Chen, Dan Deng, Jiaxiang Shi, Jian Zhao, Kai Guan, Tianyi Liu, Mengsen Xue, Zhang State Grid Beijing Electric Power Company Fengtai Electric Power Supply Company Beijing China College of Electrical Engineering Shanghai University of Electric Power Shanghai China
The issue of large-scale power outages in electrical systems triggered by extreme natural disasters, cyber-attacks, and cascading failures - characterized as high-risk, low-probability (HILP) events - requires an effe... 详细信息
来源: 评论
Memory-Guided Coordinate Encoding network for Anomaly Detection
Memory-Guided Coordinate Encoding Network for Anomaly Detect...
收藏 引用
ieee International conference on Systems, Man and Cybernetics
作者: Xingang Wang Hong Zhang Rui Cao Jinyan Zhou Xingchao Lu Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Video anomaly detection remains challenging due to the complexity of visual scenes. Video surveillance is often fixed lens, and existing approaches, either using autoencoder architectures or generative adversarial net...
来源: 评论
open-Ended Fine-Grained 3D Object Categorization by Combining Shape and Texture Features in Multiple Colorspaces  20
Open-Ended Fine-Grained 3D Object Categorization by Combinin...
收藏 引用
20th ieee-RAS International conference on Humanoid Robots (HUMANOIDS)
作者: Keunecke, Nils Kasaei, S. Hamidreza Univ Groningen Dept Artificial Intelligence Groningen Netherlands
As a consequence of an ever-increasing number of service robots, there is a growing demand for highly accurate real-time 3D object recognition. Considering the expansion of robot applications in more complex and dynam... 详细信息
来源: 评论
Estimating Speedup Factor for Personal HSMs Based on Secure Elements  6
Estimating Speedup Factor for Personal HSMs Based on Secure ...
收藏 引用
6th Cyber Security in networking conference, CSNet 2022
作者: Urien, Pascal Telecom Paris Palaiseau91120 France
This paper presents experimental results in order to estimate speedup factor for personal HSM. A personal HSM is built over a grid of secure elements, and runs two TLS daemons, one for secure element programming, and ... 详细信息
来源: 评论