咨询与建议

限定检索结果

文献类型

  • 2,235 篇 会议
  • 56 篇 期刊文献
  • 3 册 图书
  • 1 篇 学位论文

馆藏范围

  • 2,295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,651 篇 工学
    • 1,194 篇 计算机科学与技术...
    • 704 篇 电气工程
    • 507 篇 软件工程
    • 478 篇 信息与通信工程
    • 191 篇 控制科学与工程
    • 101 篇 电子科学与技术(可...
    • 44 篇 航空宇航科学与技...
    • 43 篇 机械工程
    • 31 篇 生物工程
    • 30 篇 石油与天然气工程
    • 30 篇 交通运输工程
    • 25 篇 仪器科学与技术
    • 25 篇 动力工程及工程热...
    • 21 篇 建筑学
    • 20 篇 生物医学工程(可授...
    • 19 篇 土木工程
    • 18 篇 光学工程
    • 17 篇 材料科学与工程(可...
  • 265 篇 理学
    • 133 篇 数学
    • 78 篇 物理学
    • 43 篇 系统科学
    • 40 篇 生物学
    • 17 篇 统计学(可授理学、...
  • 187 篇 管理学
    • 152 篇 管理科学与工程(可...
    • 56 篇 工商管理
    • 36 篇 图书情报与档案管...
  • 75 篇 医学
    • 51 篇 基础医学(可授医学...
    • 33 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 25 篇 教育学
    • 24 篇 教育学
  • 15 篇 法学
  • 8 篇 军事学
  • 3 篇 农学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 171 篇 computer archite...
  • 167 篇 programming
  • 90 篇 hardware
  • 86 篇 network architec...
  • 80 篇 linear programmi...
  • 71 篇 neural networks
  • 68 篇 protocols
  • 64 篇 network topology
  • 63 篇 optimization
  • 58 篇 computational mo...
  • 52 篇 deep learning
  • 52 篇 computer network...
  • 51 篇 cloud computing
  • 50 篇 routing
  • 46 篇 network-on-chip
  • 45 篇 application soft...
  • 42 篇 switches
  • 42 篇 dynamic programm...
  • 40 篇 throughput
  • 40 篇 parallel program...

机构

  • 7 篇 univ calif berke...
  • 6 篇 xidian univ stat...
  • 5 篇 natl res univ hi...
  • 5 篇 deakin univ sch ...
  • 5 篇 swiss fed inst t...
  • 5 篇 mit cambridge ma...
  • 5 篇 tsinghua univ pe...
  • 5 篇 southeast univ n...
  • 5 篇 dalian univ tech...
  • 5 篇 russian acad sci...
  • 4 篇 pg demidov yaros...
  • 4 篇 georgia inst tec...
  • 4 篇 univ chinese aca...
  • 4 篇 shanghai jiao to...
  • 4 篇 peking universit...
  • 4 篇 pacific northwes...
  • 4 篇 univ calif san d...
  • 4 篇 kings coll londo...
  • 3 篇 columbia univers...
  • 3 篇 univ estadual ca...

作者

  • 10 篇 carle georg
  • 6 篇 magedanz thomas
  • 6 篇 emmerich paul
  • 5 篇 zhao bo
  • 5 篇 benini luca
  • 5 篇 georg carle
  • 4 篇 zhang tao
  • 4 篇 wang lei
  • 4 篇 garcia jordi
  • 4 篇 dongarra jack
  • 4 篇 hoefler torsten
  • 4 篇 li tao
  • 4 篇 turdakov denis
  • 4 篇 luca foschini
  • 4 篇 kellerer wolfgan...
  • 4 篇 vetter jeffrey s...
  • 4 篇 liu derong
  • 4 篇 chatha karam s.
  • 4 篇 li ming
  • 3 篇 blum niklas

语言

  • 2,186 篇 英文
  • 97 篇 其他
  • 11 篇 中文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE Conference on Open Architectures and Network Programming"
2295 条 记 录,以下是801-810 订阅
排序:
AdvRush: Searching for Adversarially Robust Neural architectures
AdvRush: Searching for Adversarially Robust Neural Architect...
收藏 引用
International conference on Computer Vision (ICCV)
作者: Jisoo Mok Byunggook Na Hyeokjun Choe Sungroh Yoon Seoul National University Seoul South Korea ASRI INMC ISRC and Institute of Engineering Research Seoul National University
Deep neural networks continue to awe the world with their remarkable performance. Their predictions, however, are prone to be corrupted by adversarial examples that are imperceptible to humans. Current efforts to impr... 详细信息
来源: 评论
Domain adaptive object detection with generative adversarial network
Domain adaptive object detection with generative adversarial...
收藏 引用
2020 International conference on Internet of Things and Intelligent Applications, ITIA 2020
作者: Huang, Xiaohua Huang, Wei Li, Yi Shao, Xiuyan Li, Hang Yu, Xiang Han, Lei Nanjing Institute of Technology School of Computer Engineering Nanjing China
Domain adaptive object detection has emerged to alleviate the lack of massive amounts of labeled data in the target field. Currently, Generative Adversarial network (GAN) has been exhibited its benefits to the Faster ... 详细信息
来源: 评论
RED-SEA: network Solution for Exascale architectures
RED-SEA: Network Solution for Exascale Architectures
收藏 引用
Euromicro Symposium on Digital System Design
作者: Andrea Biagioni Paolo Cretaro Ottorino Frezza Francesca Lo Cicero Alessandro Lonardo Michele Martinelli Pier Stanislao Paolucci Elena Pastorelli Francesco Simula Matteo Turisini Piero Vicini Roberto Ammendola Pascale Bernier-Bruna Claire Chen Said Derradji Stephane Guez Pierre-Axel Lagadec Gregoire Pichon Etienne Walter Gaetan De Gassowski Matthieu Hautreaux Stephane Mathieu Gilles Moreau Marc Perache Hugo Taboada Torsten Hoefler Timo Schneider Matteo Barnaba Giuseppe Piero Brandino Francesco De Giorgi Matteo Poggi Iakovos Mavroidis Yannis Papaefstathiou Nikolaos Tampouratzis Benjamin Kalisch Ulrich Krackhardt Mondrian Nuessle Pantelis Xirouchakis Vangelis Mageiropoulos Michalis Gianioudis Harisis Loukas Aggelos Ioannou Nikos Kallimanis Nikos Chrysos Manolis Katevenis Wolfang Frings Dominik Gottwald Felime Guimaraes Max Holicki Volker Marx Yannik Muller Carsten Clauss Hugo Falter Xu Huang Jennifer Lopez Barillao Thomas Moschny Simon Pickartz Francisco J. Alfaro Jesus Escudero-Sahuquillo Pedro Javier Garcia Francisco J. Quiles Jose L. Sanchez Adrián Castelló Jose Duro Maria Engracia Gomez Enrique Quintana Julio Sahuquillo Eugenio Stabile INFN Sezione di Roma Italy INFN Sezione di Roma Tor Vergata Italy Atos France CEA France ETH Zürich Switzerland Exact Lab Italy Exapsys Greece Extoll Germany Forth Greece Julich Research Centre Germany ParTec Germany University of Castilla-La Mancha Spain Universidad Politecnica de Valencia Spain
In order to enable Exascale computing, next generation interconnection networks must scale to hundreds of thousands of nodes, and must provide features to also allow the HPC, HPDA, and AI applications to reach Exascal... 详细信息
来源: 评论
Quantifying Influential Communities in Granular Social networks Using Fuzzy Theory  20th
Quantifying Influential Communities in Granular Social Netwo...
收藏 引用
20th International conference on Computational Science and Its Applications (ICCSA)
作者: Kumari, Anisha Behera, Ranjan Kumar Shukla, Abhishek Sai Sahoo, Satya Prakash Misra, Sanjay Rath, Sanatanu Kumar Veer Surendra Sai Univ Technol Dept CSE Burla Odisha India PwC Serv Delivery Ctr Bengaluru India Covenant Univ Dept Elect & Informat Engn Ota 1023 Nigeria Natl Inst Technol Dept CSE Rourkela India
Community detection and centrality analysis in social networks are identified as pertinent research topics in the field of social network analysis. Community detection focuses on identifying the subgraphs (communities... 详细信息
来源: 评论
Multivariate Prediction of Correct Lane for Autonomous Electric Vehicle Using Deep Learning Models  8
Multivariate Prediction of Correct Lane for Autonomous Elect...
收藏 引用
8th International conference on Control, Mechatronics and Automation, ICCMA 2020
作者: Setta, Islam G. Abou Shehata, Omar M. Awad, Mohammed A. Ain Shams University Faculty of Engineering Department of Design and Production Engineering Cairo Egypt Ain Shams University Faculty of Engineering Department of Mechatronics Engineering Cairo Egypt
The target of a self-driving car researches is to build a better autonomous driver. We control the car to be able to drive itself without falling off the track using appropriate accelerating and braking. Using udacity... 详细信息
来源: 评论
Revenue-Sharing based Computation-Resource Allocation for Mobile Blockchain
Revenue-Sharing based Computation-Resource Allocation for Mo...
收藏 引用
39th ieee International conference on Computer Communications (ieee INFOCOM)
作者: Wu, Yuan Xu, Xu Qian, Liping Ji, Bo Shi, Zhiguo Jia, Weijia Univ Macau State Key Lab Internet Things Smart City Taipa Macau Peoples R China Zhejiang Univ Technol Coll Informat Engn Hangzhou Peoples R China Temple Univ Dept Comp & Informat Sci Philadelphia PA 19122 USA Zhejiang Univ Coll Informat Sci & Elect Engn Hangzhou Peoples R China
In this paper, we investigate the revenue-sharing based computation-resource allocation for mobile Blockchain, in which conventional mobile devices (i.e., the edge-computing users, EUs) can acquire computation-resourc... 详细信息
来源: 评论
Meta-ensemble based classifier approach for attack detection in multi-tenant distributed systems
Meta-ensemble based classifier approach for attack detection...
收藏 引用
2020 International conference for Emerging Technology, INCET 2020
作者: Patil, Pravin Ingle, Rajesh Pune Institute of Computer Technology Dept. of Computer Engineering Maharashtra India
Distributed systems in a network have always been vulnerable to cyber attacks due to exposure of vulnerabilities in shared memories, configurations, and network access. Being co-holders in the same server provides att... 详细信息
来源: 评论
Planning of Soft open Point Integrated with ESS in Active Distribution network
Planning of Soft Open Point Integrated with ESS in Active Di...
收藏 引用
ieee Asia Power and Energy Engineering conference (APEEC)
作者: Zijia Ding Chunyi Wang Fei Wang Liang Feng Guangxiao Li Zhendong Xu Jining Power Supply Company of State Grid Shandong electric power Jining Shandong China State Grid Shandong electric power company Jinan Shandong China College of Electrical Engineering and Automation Shandong University of Science and Technology Qingdao Shandong China
With the increasing penetration of renewable energy in the distribution network, a large number of distributed generation access network, making the traditional passive network into active network, and changing the po... 详细信息
来源: 评论
Changes in Intent: Behavioral Predictions of Distributed SDN Controller Reconfiguration
Changes in Intent: Behavioral Predictions of Distributed SDN...
收藏 引用
ieee International conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Yuming Wu Nishok Narasimha Mohanasamy Lalita Jagadeesan Muntasir Raihan Rahman Univ. of Illinois Urbana-Champaign Nokia Bell Labs Microsoft
Intent-based programming enables software-defined networks (SDN) to be able to dynamically reconfigure themselves through automatic intent recomputation in response to network events, such as host mobility. This allow... 详细信息
来源: 评论
Piranha: Reducing Feature Flag Debt at Uber  42
Piranha: Reducing Feature Flag Debt at Uber
收藏 引用
42nd ACM/ieee International conference on Software Engineering - Companion Proceedings (ICSE-Companion) / 42nd ACM/ieee International conference on Software Engineering - Software Engineering in Practice (ICSE-SEIP)
作者: Ramanathan, Murali Krishna Clapp, Lazaro Barik, Rajkishore Sridharan, Manu Uber Technol Inc New York NY 10001 USA Univ Calif Riverside Riverside CA 92521 USA
Feature flags are commonly used in mobile app development and can introduce technical debt related to deleting their usage from the codebase. This can adversely affect the overall reliability of the apps and increase ... 详细信息
来源: 评论