咨询与建议

限定检索结果

文献类型

  • 177,433 篇 会议
  • 2,106 篇 期刊文献
  • 745 册 图书
  • 8 篇 学位论文
  • 2 篇 专利
  • 1 件 标准
  • 1 篇 科技报告

馆藏范围

  • 180,297 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 90,247 篇 工学
    • 64,897 篇 计算机科学与技术...
    • 43,530 篇 软件工程
    • 15,176 篇 控制科学与工程
    • 14,691 篇 电气工程
    • 13,682 篇 信息与通信工程
    • 9,158 篇 机械工程
    • 5,998 篇 电子科学与技术(可...
    • 4,622 篇 仪器科学与技术
    • 4,183 篇 生物医学工程(可授...
    • 4,110 篇 生物工程
    • 3,805 篇 动力工程及工程热...
    • 3,060 篇 安全科学与工程
    • 2,904 篇 土木工程
    • 2,836 篇 建筑学
    • 2,805 篇 交通运输工程
    • 2,620 篇 材料科学与工程(可...
    • 2,543 篇 光学工程
    • 2,436 篇 化学工程与技术
  • 27,494 篇 理学
    • 14,252 篇 数学
    • 6,773 篇 物理学
    • 4,704 篇 系统科学
    • 4,592 篇 生物学
    • 3,793 篇 统计学(可授理学、...
  • 21,383 篇 管理学
    • 16,045 篇 管理科学与工程(可...
    • 6,868 篇 工商管理
    • 6,766 篇 图书情报与档案管...
  • 4,384 篇 医学
    • 3,598 篇 临床医学
    • 2,983 篇 基础医学(可授医学...
  • 2,941 篇 教育学
    • 2,807 篇 教育学
  • 2,633 篇 法学
  • 2,375 篇 经济学
    • 2,307 篇 应用经济学
  • 1,573 篇 农学
  • 809 篇 文学
  • 469 篇 艺术学
  • 421 篇 军事学
  • 12 篇 哲学
  • 10 篇 历史学

主题

  • 21,017 篇 computational mo...
  • 13,591 篇 application soft...
  • 10,274 篇 biological syste...
  • 10,073 篇 computer archite...
  • 7,409 篇 computer science
  • 5,054 篇 mathematical mod...
  • 5,022 篇 analytical model...
  • 4,715 篇 predictive model...
  • 4,713 篇 hardware
  • 4,529 篇 data models
  • 4,340 篇 accuracy
  • 3,990 篇 power system mod...
  • 3,871 篇 control systems
  • 3,749 篇 training
  • 3,470 篇 computer simulat...
  • 3,340 篇 computer network...
  • 3,306 篇 feature extracti...
  • 3,294 篇 solid modeling
  • 3,083 篇 humans
  • 3,020 篇 object oriented ...

机构

  • 131 篇 school of comput...
  • 102 篇 computer science...
  • 85 篇 department of co...
  • 82 篇 school of comput...
  • 80 篇 college of compu...
  • 73 篇 chitkara univers...
  • 69 篇 department of el...
  • 61 篇 school of comput...
  • 55 篇 institute of inf...
  • 54 篇 china electric p...
  • 52 篇 school of automa...
  • 51 篇 department of el...
  • 51 篇 college of compu...
  • 49 篇 institute for in...
  • 49 篇 school of comput...
  • 46 篇 huazhong univers...
  • 45 篇 department of el...
  • 42 篇 department of co...
  • 41 篇 school of electr...
  • 40 篇 school of comput...

作者

  • 80 篇 lei wang
  • 64 篇 jian wang
  • 60 篇 wang lei
  • 43 篇 rui wang
  • 37 篇 feng liu
  • 37 篇 li xin
  • 35 篇 xi chen
  • 33 篇 bin wang
  • 32 篇 wei wang
  • 29 篇 wang wei
  • 28 篇 li wei
  • 27 篇 zhang tao
  • 27 篇 li yang
  • 27 篇 wei zhang
  • 26 篇 wei he
  • 24 篇 shiva mehta
  • 24 篇 mohamed abid
  • 23 篇 wei hu
  • 23 篇 zhang ning
  • 23 篇 ying li

语言

  • 177,188 篇 英文
  • 1,912 篇 其他
  • 1,224 篇 中文
  • 67 篇 俄文
  • 22 篇 法文
  • 19 篇 土耳其文
  • 12 篇 西班牙文
  • 10 篇 葡萄牙文
  • 9 篇 德文
  • 4 篇 乌克兰文
  • 1 篇 捷克文
  • 1 篇 波兰文
  • 1 篇 斯洛伐克文
  • 1 篇 斯洛文尼亚文
检索条件"任意字段=International Conference on Computer Application and System Modeling"
180298 条 记 录,以下是21-30 订阅
排序:
modeling and Digital Twins: Insights and Strategies for Software Engineers
收藏 引用
IEEE SOFTWARE 2025年 第2期42卷 92-96页
作者: Abrahao, Silvia Staron, Miroslaw Michael, Judith Combemale, Benoit Chechik, Marsha Univ Politecn Valencia Dept Comp Syst & Computat Software Engn Valencia 46022 Spain Chalmers Univ Technol Comp Sci & Engn Dept Interact Design & Software Engn Div SE-41296 Gothenburg Sweden Univ Gothenburg SE-41296 Gothenburg Sweden Rhein Westfal TH Aachen Chair Software Engn D-52062 Aachen Germany Univ Rennes Dept Comp Sci F-35065 Rennes France Univ Toronto Dept Comp Sci Toronto ON M5S 2E4 Canada
Software modeling and digital twins are transforming the way software engineers design, operate, and maintain complex systems. In this column, we highlight cutting-edge research presented at the ACM/IEEE 27th Internat... 详细信息
来源: 评论
Platform-specific code generation method for the tyche embedded operating system based on AADL models  3
Platform-specific code generation method for the tyche embed...
收藏 引用
3rd international conference on Algorithms, Network, and Communication Technology, ICANCT 2024
作者: Chen, Li Jia, Zhangtao An, Heng Li, Haoyu Beijing Computer Technology and Application Research Institute Beijing China
The Tyche Embedded Operating system is a highly customized real-time embedded operating system, widely applied in fields such as aerospace, medical devices, and industrial automation. Renowned for its robust support f... 详细信息
来源: 评论
Constant Voltage Output Control Technique for Wireless Power Transfer system Based on S-S Topology  5
Constant Voltage Output Control Technique for Wireless Power...
收藏 引用
5th IEEE international conference on Power, Electronics and computer applications, ICPECA 2025
作者: Qian, Penghui Chen, Tingyang Ji, Kai Chen, Fengwei Fu, Tingqiang Li, Ke College of Automation Chongqing University Chongqing400044 China National Key Laboratory of Electromagnetic Energy Wuhan China Chongqing University Chongqing China
This paper addresses the modeling and control of an S-S wireless power transfer (WPT) system in the presence of load variation. The WPT systems can experience output voltage instability due to external or internal sys... 详细信息
来源: 评论
Research on intelligent monitoring and quality control of BIM technology based on computer vision in the construction process of villages and towns  3
Research on intelligent monitoring and quality control of BI...
收藏 引用
3rd international conference on Algorithms, Network, and Communication Technology, ICANCT 2024
作者: Cao, Zhifang Guangdong Innovative Technical College Guangdong Dongguan523960 China
In the field of construction, the application of Building Information modeling (BIM) technology combined with computer vision offers a promising avenue for enhancing the quality control and intelligent monitoring of v... 详细信息
来源: 评论
Endpoint Detection for Streaming ASR with Phoneme modeling  24
Endpoint Detection for Streaming ASR with Phoneme Modeling
收藏 引用
5th international conference on computer Science and Management Technology, ICCSMT 2024
作者: Xie, Zhiwei He, Chengcheng Li, Yanbing Silamu, Wushouer College of Computer Science and Technology Xinjiang University Xinjiang Urumqi China Xinjiang Laboratory of Multi-Language Information Technology Xinjiang University Xinjiang Urumqi China
Endpoint detection in speech recognition identifies when a natural sentence stops during *** research on integrating endpoint detection and speech recognition into a single streaming ASR model is limited, with past me... 详细信息
来源: 评论
Simulation verification method of complex control system based on SysML
Simulation verification method of complex control system bas...
收藏 引用
2024 international conference on computer application and Information Security, ICCAIS 2024
作者: Yu, Bing Zeng, Sifeng An, Baoran Institute of Computer Application China Academy of Engineering Physics Sichuan Mianyang 621900 China
The development stage of laser facility control system is a complex system engineering, which involves the collaborative research and development of multi-department and multi-disciplinary personnel in the long-term d... 详细信息
来源: 评论
Point cloud denoising method based on iterativePFN  4
Point cloud denoising method based on iterativePFN
收藏 引用
4th international conference on computer Vision, application, and Algorithm, CVAA 2024
作者: Zhang, Yaxu Cui, Li Department of Computer Science and Technology Yanbian University Jilin Yanji China
3D point clouds acquired by using advanced scanning equipment have been used in a variety of applications like automated vehicles, 3D modeling, and cultural heritage preservation. Due to limitations of the devices, po... 详细信息
来源: 评论
Automated execution algorithm for smart contracts in payment systems based on blockchain and big data  4
Automated execution algorithm for smart contracts in payment...
收藏 引用
4th international conference on computer Vision, application, and Algorithm, CVAA 2024
作者: Lin, Shuhong Ruan, Juanping Chen, Lihong Lin, Yishan Zou, Limei Pan, Liumei Fu Jian Yi Li Dian Li Ke Ji Co. Ltd. Fuzhou350001 China State Grid Info & Telecom Group Fuzhou350001 China
Smart contracts, as one of the important applications of blockchain technology, provide the possibility for automated execution of payment systems. This article explores an automated execution algorithm for smart cont... 详细信息
来源: 评论
application of the Tree-of-Thoughts Framework to LLM-Enabled Domain modeling  43rd
Application of the Tree-of-Thoughts Framework to LLM-Enabled...
收藏 引用
43rd international conference on Conceptual modeling
作者: Silva, Jonathan Ma, Qin Cabot, Jordi Kelsen, Pierre Proper, Henderik A. Univ Luxembourg Esch Sur Alzette Luxembourg Luxembourg Inst Sci & Technol Esch Sur Alzette Luxembourg TU Wien Vienna Austria
Domain modeling is typically an iterative process where modeling experts interact with domain experts to complete and refine the model. Recently, we have seen several attempts to assist, or even replace, the modeler w... 详细信息
来源: 评论
computer network information security monitoring system  2
Computer network information security monitoring system
收藏 引用
2nd international conference on Big Data, Computational Intelligence, and applications, BDCIA 2024
作者: Lin, Hongkai Wuhan Business University Hubei Wuhan430056 China
Although traditional protection methods can improve the security of the network to a certain extent, its effect is often limited in the face of complex network environment and various attacks. Therefore, it is an impo... 详细信息
来源: 评论