咨询与建议

限定检索结果

文献类型

  • 7,609 篇 会议
  • 317 篇 期刊文献
  • 4 册 图书
  • 2 篇 学位论文

馆藏范围

  • 7,932 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,293 篇 工学
    • 2,970 篇 计算机科学与技术...
    • 1,616 篇 软件工程
    • 1,522 篇 电气工程
    • 851 篇 信息与通信工程
    • 664 篇 控制科学与工程
    • 597 篇 电子科学与技术(可...
    • 323 篇 仪器科学与技术
    • 302 篇 机械工程
    • 178 篇 动力工程及工程热...
    • 170 篇 生物医学工程(可授...
    • 166 篇 交通运输工程
    • 154 篇 生物工程
    • 151 篇 光学工程
    • 139 篇 安全科学与工程
    • 100 篇 材料科学与工程(可...
    • 83 篇 建筑学
    • 79 篇 土木工程
    • 78 篇 测绘科学与技术
    • 77 篇 化学工程与技术
  • 1,079 篇 理学
    • 423 篇 数学
    • 392 篇 物理学
    • 169 篇 生物学
    • 133 篇 系统科学
    • 96 篇 统计学(可授理学、...
    • 81 篇 化学
  • 627 篇 管理学
    • 554 篇 管理科学与工程(可...
    • 258 篇 工商管理
    • 103 篇 图书情报与档案管...
  • 173 篇 医学
    • 149 篇 临床医学
    • 93 篇 基础医学(可授医学...
  • 72 篇 法学
  • 65 篇 经济学
  • 51 篇 农学
  • 27 篇 军事学
  • 21 篇 教育学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 868 篇 real time system...
  • 769 篇 real-time system...
  • 513 篇 embedded systems
  • 490 篇 hardware
  • 444 篇 embedded system
  • 398 篇 application soft...
  • 391 篇 computer archite...
  • 258 篇 computational mo...
  • 240 篇 timing
  • 225 篇 processor schedu...
  • 205 篇 monitoring
  • 180 篇 resource managem...
  • 177 篇 quality of servi...
  • 165 篇 wireless sensor ...
  • 164 篇 energy consumpti...
  • 164 篇 costs
  • 160 篇 control systems
  • 159 篇 operating system...
  • 148 篇 bandwidth
  • 144 篇 computer science

机构

  • 28 篇 eindhoven univer...
  • 22 篇 beijing key labo...
  • 21 篇 eindhoven univer...
  • 20 篇 beijing key labo...
  • 18 篇 university of te...
  • 17 篇 beijing inst tec...
  • 17 篇 karlsruhe instit...
  • 15 篇 school of electr...
  • 14 篇 karlsruhe instit...
  • 14 篇 college of compu...
  • 13 篇 department of co...
  • 11 篇 department of co...
  • 11 篇 delft university...
  • 11 篇 university of ch...
  • 10 篇 school of comput...
  • 10 篇 computer enginee...
  • 10 篇 department of co...
  • 10 篇 hong kong univer...
  • 9 篇 department of el...
  • 9 篇 tsinghua univers...

作者

  • 24 篇 jian-jia chen
  • 24 篇 tei-wei kuo
  • 17 篇 kees goossens
  • 15 篇 zhuang yin
  • 14 篇 benny akesson
  • 13 篇 saniie jafar
  • 13 篇 jafar saniie
  • 12 篇 obermaisser roma...
  • 12 篇 benini luca
  • 12 篇 chen liang
  • 11 篇 sikora axel
  • 10 篇 twan basten
  • 10 篇 chao wang
  • 10 篇 dip goswami
  • 10 篇 shangping ren
  • 10 篇 jörg henkel
  • 10 篇 kuo tei-wei
  • 10 篇 roman obermaisse...
  • 10 篇 zonghua gu
  • 10 篇 zebo peng

语言

  • 7,720 篇 英文
  • 156 篇 其他
  • 55 篇 中文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=IEEE Symposium on Real-Time and Embedded Technology and Applications"
7932 条 记 录,以下是431-440 订阅
排序:
Fixed-Wing UAV Path-Following Control via NMPC on the Lowest Level
Fixed-Wing UAV Path-Following Control via NMPC on the Lowest...
收藏 引用
2023 ieee Conference on Control technology and applications, CCTA 2023
作者: Reinhardt, Dirk Gros, Sebastien Johansen, Tor Arne Norwegian University of Science and Technology Department of Engineering Cybernetics Trondheim Norway
This paper introduces a Nonlinear Model Predictive Control (NMPC) approach for the path-following control of fixed-wing unmanned aerial vehicles (UAVs). Unlike other NMPC approaches that rely on kinematic guidance mod... 详细信息
来源: 评论
PEARTS: Provable Execution in real-time embedded Systems
PEARTS: Provable Execution in Real-Time Embedded Systems
收藏 引用
ieee symposium on Security and Privacy
作者: Antonio Joia Neto Norrathep Rattanavipanon Ivan De Oliveira Nunes Rochester Institute of Technology Prince of Songkla University
embedded devices are increasingly ubiquitous and vital, often supporting safety-critical functions. However, due to strict cost and energy constraints, they are typically implemented with Micro-Controller Units (MCUs)... 详细信息
来源: 评论
A method for detecting re-entry vulnerabilities in large local area network smart contracts based on eBPF  4
A method for detecting re-entry vulnerabilities in large loc...
收藏 引用
4th International symposium on Computer technology and Information Science, ISCTIS 2024
作者: Yun, Lei Li, Dan CEPREI Laboratory Guangzhou511370 China Key Laboratory of Ministry of Industry and Information Technology Guangzhou510000 China
As one of the important applications of blockchain technology, smart contracts aim to achieve decentralized trusted transactions. However, the security of smart contracts has always been a focus of industry attention,... 详细信息
来源: 评论
ASAP: Reconciling Asynchronous real-time Operations and Proofs of Execution in Simple embedded Systems  22
ASAP: Reconciling Asynchronous Real-Time Operations and Proo...
收藏 引用
59th ACM/ieee Design Automation Conference (DAC) - From Chips to Systems - Learn Today, Create Tomorrow
作者: Caulfield, Adam Rattanavipanon, Norrathep Nunes, Ivan De Oliveira Rochester Inst Technol Rochester NY 14623 USA Prince Songkla Univ Hat Yai Thailand
embedded devices are increasingly ubiquitous and their importance is hard to overestimate. While they often support safety-critical functions (e.g., in medical devices and sensor-alarm combinations), they are usually ... 详细信息
来源: 评论
Wavelength Selection Considerations for Optical Wireless Positioning Systems  28
Wavelength Selection Considerations for Optical Wireless Pos...
收藏 引用
28th ieee symposium on Computers and Communications, ISCC 2023
作者: De Bruycker, Jorik Leloup, Frederic B. Stevens, Nobby KU Leuven WaveCore ESAT Ghent Technology Campus Ghent Belgium
Indoor Positioning Systems act as an important technology to provide real-time location estimation, enabling a large variety of industrial applications. In this context, Optical Wireless Positioning employs the propag... 详细信息
来源: 评论
Continuous-Emission Markov Models for real-time applications: Bounding Deadline Miss Probabilities
Continuous-Emission Markov Models for Real-Time Applications...
收藏 引用
ieee symposium on real-time and embedded technology and applications
作者: Anna Friebe Filip Marković Alessandro Vittorio Papadopoulos Thomas Nolte Mälardalen University (MDU) Sweden Max Planck Institute for Software Systems (MPI-SWS) Germany
Probabilistic approaches have gained attention over the past decade, providing a modeling framework that enables less pessimistic analysis of real-time systems. Among the different proposed approaches, Markov chains h...
来源: 评论
Application to Detect Driver Distraction Using Haar Cascade Method
Application to Detect Driver Distraction Using Haar Cascade ...
收藏 引用
2023 ieee symposium on Wireless technology and applications, ISWTA 2023
作者: Zainuddin, Natasyha Zizi, Tuan Khalisah Tan Zizi Tuan Ramli, Suzaimah Shukran, Mohd LAfizi Mohd Wook, Muslihah Binti Nasional Defence University of Malaysia Faculty of Defence Science & Technology Sungai Besi Camp Kuala Lumpur Malaysia
Road accidents are a terrible fact of life. A traffic collision is usually mentioned in at least one of the daily news reports in Malaysia. The number of victims and damage done can be disastrous depending on the seve... 详细信息
来源: 评论
An Efficient Decentralized Mutual Authentication Scheme Between Avatars for Metaverse  21
An Efficient Decentralized Mutual Authentication Scheme Betw...
收藏 引用
21st ieee International symposium on Parallel and Distributed Processing with applications, 13th ieee International Conference on Big Data and Cloud Computing, 16th ieee International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Huang, Peng Xu, Zisang Liang, Wei Xu, Jianbo Zheng, Bin Changsha University of Science and Technology School of Computer and Communication Engineering Changsha China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China
With the development of network technology and the blockchain, the metaverse as an emerging network paradigm has received extensive attention. In metaverse, users can create multiple virtual avatars to obtain differen... 详细信息
来源: 评论
Pig Detection Method Based on Improved YOLOv8 and MobileNetV3
Pig Detection Method Based on Improved YOLOv8 and MobileNetV...
收藏 引用
2024 International symposium on Digital Home, ISDH 2024
作者: Cao, Shuai Li, Fang School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
How to effectively solve the many challenges faced by pig testing in pig breeding management, such as difficulties in data collection, insufficient real-time performance, and high model complexity, is an urgent proble... 详细信息
来源: 评论
A Field Practical Approach to Memory Bandwidth Allocation for Consolidating Multi-Domain Automotive applications on a Single SoC
A Field Practical Approach to Memory Bandwidth Allocation fo...
收藏 引用
ieee symposium on real-time and embedded technology and applications
作者: Hayeon Park Jiwoong Lee Hoyong Lee Taekyoung Kwon Wan Choi Sangmi Moon Chang-Gun Lee Dept. of Computer Science and Engineering Seoul National University Republic of Korea Dept. of Electrical and Computer Engineering Seoul National University Republic of Korea Dept. of IT Artificial Intelligence Korea Nazarene University Republic of Korea
Along with the advent of a high-end SoC with multiple CPU clusters and many GPUs, the automotive industry has a strong motivation to consolidate multi-domain applications on such a single SoC for wiring harness reduct... 详细信息
来源: 评论