咨询与建议

限定检索结果

文献类型

  • 36,341 篇 会议
  • 588 篇 期刊文献
  • 477 册 图书
  • 1 篇 学位论文

馆藏范围

  • 37,406 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 17,729 篇 工学
    • 12,489 篇 计算机科学与技术...
    • 9,805 篇 软件工程
    • 3,331 篇 信息与通信工程
    • 2,909 篇 控制科学与工程
    • 2,767 篇 电子科学与技术(可...
    • 2,504 篇 电气工程
    • 1,034 篇 机械工程
    • 941 篇 仪器科学与技术
    • 864 篇 生物医学工程(可授...
    • 846 篇 生物工程
    • 681 篇 光学工程
    • 588 篇 动力工程及工程热...
    • 545 篇 安全科学与工程
    • 544 篇 建筑学
    • 531 篇 化学工程与技术
    • 502 篇 土木工程
    • 463 篇 材料科学与工程(可...
  • 6,666 篇 理学
    • 4,010 篇 数学
    • 1,603 篇 物理学
    • 1,165 篇 系统科学
    • 1,091 篇 统计学(可授理学、...
    • 975 篇 生物学
    • 448 篇 化学
  • 3,932 篇 管理学
    • 2,675 篇 管理科学与工程(可...
    • 1,500 篇 图书情报与档案管...
    • 1,421 篇 工商管理
  • 632 篇 医学
    • 573 篇 临床医学
    • 495 篇 基础医学(可授医学...
  • 524 篇 法学
    • 453 篇 社会学
  • 449 篇 经济学
    • 448 篇 应用经济学
  • 333 篇 教育学
  • 156 篇 农学
  • 103 篇 文学
  • 84 篇 军事学
  • 30 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 2,244 篇 computer archite...
  • 1,821 篇 computer science
  • 1,582 篇 hardware
  • 1,422 篇 application soft...
  • 1,284 篇 computational mo...
  • 1,232 篇 control systems
  • 834 篇 costs
  • 739 篇 software enginee...
  • 634 篇 real time system...
  • 631 篇 software systems
  • 624 篇 bandwidth
  • 621 篇 algorithm design...
  • 617 篇 testing
  • 613 篇 delay
  • 544 篇 computer network...
  • 533 篇 feature extracti...
  • 532 篇 protocols
  • 483 篇 monitoring
  • 464 篇 real-time system...
  • 455 篇 analytical model...

机构

  • 134 篇 school of comput...
  • 99 篇 department of el...
  • 64 篇 department of el...
  • 61 篇 department of sy...
  • 54 篇 department of el...
  • 51 篇 department of el...
  • 46 篇 ieee
  • 45 篇 school of electr...
  • 42 篇 department of el...
  • 41 篇 department of co...
  • 39 篇 department of el...
  • 38 篇 department of el...
  • 37 篇 department of el...
  • 37 篇 department of el...
  • 35 篇 department of el...
  • 35 篇 department of el...
  • 34 篇 department of el...
  • 34 篇 department of el...
  • 33 篇 school of comput...
  • 32 篇 department of co...

作者

  • 26 篇 li li
  • 26 篇 frank knoefel
  • 24 篇 m. n. s. swamy
  • 23 篇 m. omair ahmad
  • 21 篇 a. antoniou
  • 19 篇 jun wang
  • 17 篇 p. agathoklis
  • 17 篇 wu-sheng lu
  • 16 篇 j. leaney
  • 16 篇 hayashi eiji
  • 15 篇 randall geiger
  • 15 篇 m. sawan
  • 15 篇 liu yang
  • 14 篇 yu wang
  • 14 篇 sengupta anirban
  • 14 篇 arjuna madanayak...
  • 14 篇 li zhang
  • 13 篇 jaime ramirez-an...
  • 13 篇 fabrizio lombard...
  • 13 篇 t.m. khoshgoftaa...

语言

  • 36,786 篇 英文
  • 380 篇 中文
  • 254 篇 其他
  • 12 篇 葡萄牙文
  • 9 篇 土耳其文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 乌克兰文
检索条件"任意字段=International Symposium and Workshop on Systems Engineering of Computer Based Systems"
37407 条 记 录,以下是21-30 订阅
排序:
Design and Implementation of Operation and Maintenance Management System for Teaching Building based on IoT+WebGIS 3D Visualization  24
Design and Implementation of Operation and Maintenance Manag...
收藏 引用
8th international Conference on Electronic Information Technology and computer engineering, EITCE 2024
作者: Zhao, Yongheng Seng, Bingfeng Liu, Xiaojing Wang, Shuhong School of Computer Technology and Application Qinghai University Qinghai Xining China Qinghai Provincial Key Laboratory of Media Integration Technology and Communication Qinghai Xining China
Building an operation and maintenance system for teaching buildings that integrates"three-dimensional visualization" and"digital informatization" is essential for realizing a smart campus. To addre... 详细信息
来源: 评论
Recognition of Remakes and Fake Facial Images  19th
Recognition of Remakes and Fake Facial Images
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European symposium on Research in computer Security, ESORICS 2024
作者: Bobulski, Janusz Kubanek, Mariusz Department of Computer Sciences Czestochowa University of Technology Czestochowa42-201 Poland
computer Vision techniques are extensively utilised in entertainment, enhancing realism in games and movies. Within video games, these techniques enable the recognition of objects, characters, and player movements, th... 详细信息
来源: 评论
Fairness Analysis of Machine Learning-based Code Reviewer Recommendation  5th
Fairness Analysis of Machine Learning-Based Code Reviewer Re...
收藏 引用
5th international workshop on Algorithmic Bias in Search and Recommendation
作者: Mohajer, Mohammad Mahdi Belle, Alvine Boaye Harzevili, Nima Shiri Wang, Junjie Hemmati, Hadi Wang, Song Jiang, Zhen Ming (Jack) York Univ Toronto ON Canada Chinese Acad Sci Inst Software Beijing Peoples R China
Ensuring the fairness of machine learning (ML) applications is critical to the reliability of modern artificial intelligence systems. Despite extensive study on this topic, the fairness of ML models in the software en... 详细信息
来源: 评论
Card-based Cryptographic Protocols for Three-Input Functions with a Standard Deck of Cards Using Private Operations  19th
Card-Based Cryptographic Protocols for Three-Input Function...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European symposium on Research in computer Security, ESORICS 2024
作者: Kobayashi, Naoki Manabe, Yoshifumi School of Informatics Kogakuin University Tokyo Shinjuku163-8677 Japan
This paper shows card-based cryptographic protocols to calculate several Boolean functions with a standard deck of cards using private operations. They are multi-party secure computations executed by multiple semi-hon... 详细信息
来源: 评论
A RAG-based Question-Answering Solution for Cyber-Attack Investigation and Attribution  19th
A RAG-Based Question-Answering Solution for Cyber-Attack In...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European symposium on Research in computer Security, ESORICS 2024
作者: Rajapaksha, Sampath Rani, Ruby Karafili, Erisa University of Southampton University Road SouthamptonSO17 1BJ United Kingdom
In the constantly evolving field of cybersecurity, it is imperative for analysts to stay abreast of the latest attack trends and pertinent information that aids in the investigation and attribution of cyber-attacks. I... 详细信息
来源: 评论
Closed-Loop System Identification of an Unstable Nonlinear System Using Koopman Operator  4
Closed-Loop System Identification of an Unstable Nonlinear S...
收藏 引用
4th international symposium on Instrumentation, Control, Artificial Intelligence, and Robotics, ICA-SYMP 2025
作者: Maneeloke, Benjaset Boonto, Sudchai Sanposh, Peerayot Tipsuwan, Yodyium Chinthaned, Natthawut Tanaprasitpattana, Warit Kasetsart University Dept. of Electrical Engineering Bangkok Thailand King Mongkut's University of Technology Thonburi Dept. of Control Systems and Instrumentation Engineering Bangkok Thailand Kasetsart University Dept. of Computer Engineering Bangkok Thailand
This paper presents a novel methodology for closed-loop system identification of unstable nonlinear systems using the Koopman operator with Extended Dynamic Mode Decomposition with control (EDMDc). The study highlight... 详细信息
来源: 评论
How Well Do LLMs Understand DEECo Ensemble-based Component Architectures  12th
How Well Do LLMs Understand DEECo Ensemble-Based Component A...
收藏 引用
12th international symposium on Leveraging Applications of Formal Methods, Verification and Validation
作者: Topfer, Michel Khalyeyev, Danylo Bures, Tomis Hnetynka, Petr Plasil, Frantisek Charles Univ Prague Prague Czech Republic
Ensemble-based component systems have been used for many years to develop collective adaptive systems (CAS). The DEECo component model offers a framework for modeling and implementing ensemble-based component systems.... 详细信息
来源: 评论
Short Paper: Machine Learning-based Secure Malware Detection Using Features from Binary Executable Headers  19th
Short Paper: Machine Learning-Based Secure Malware Detection...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European symposium on Research in computer Security, ESORICS 2024
作者: Bulut, Irfan Rúa, Enrique Argones COSIC KU Leuven Kasteelpark Arenberg 10 Leuven3001 Belgium
As the number of intelligent systems has dramatically increased, malware has become increasingly harmful. Consequently, detecting previously unknown malware swiftly has emerged as a critical issue in cybersecurity, ai... 详细信息
来源: 评论
Fault-Tolerant Controller Design for PMSM Drives with Single-Phase Fault Inverters  4
Fault-Tolerant Controller Design for PMSM Drives with Single...
收藏 引用
4th international symposium on Instrumentation, Control, Artificial Intelligence, and Robotics, ICA-SYMP 2025
作者: Buakaew, Sornchai Pongyart, Witthawas King Mongkut's University of Technology North Bangkok Faculty of Engineering Department of Electrical and Computer Engineering Bangkok Thailand
Permanent magnet synchronous motors (PMSMs) are commonly used in various electrical drive applications due to their high efficiency and performance. However, these systems are susceptible to several types of faults. T... 详细信息
来源: 评论
Enhancing Domain-Specific ASR Performance Using Finetuning and Zero-Shot Prompting: A Study in the Medical Domain  6
Enhancing Domain-Specific ASR Performance Using Finetuning a...
收藏 引用
6th Doctoral symposium on Intelligence Enabled Research, DoSIER 2024
作者: Maulik, Utsav Bandyopadhyay Mitra, Pabitra Sarkar, Sudeshna Dept. of Computer Science and Engineering IIT Kharagpur West Bengal India
Domain Adaptation has emerged as an important development in Speech Recognition systems for improving the transcription accuracy of the input audio. This study explores the enhancement of Domain-specific Automatic Spe... 详细信息
来源: 评论