咨询与建议

限定检索结果

文献类型

  • 36,341 篇 会议
  • 588 篇 期刊文献
  • 477 册 图书
  • 1 篇 学位论文

馆藏范围

  • 37,406 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 17,729 篇 工学
    • 12,489 篇 计算机科学与技术...
    • 9,805 篇 软件工程
    • 3,331 篇 信息与通信工程
    • 2,909 篇 控制科学与工程
    • 2,767 篇 电子科学与技术(可...
    • 2,504 篇 电气工程
    • 1,034 篇 机械工程
    • 941 篇 仪器科学与技术
    • 864 篇 生物医学工程(可授...
    • 846 篇 生物工程
    • 681 篇 光学工程
    • 588 篇 动力工程及工程热...
    • 545 篇 安全科学与工程
    • 544 篇 建筑学
    • 531 篇 化学工程与技术
    • 502 篇 土木工程
    • 463 篇 材料科学与工程(可...
  • 6,666 篇 理学
    • 4,010 篇 数学
    • 1,603 篇 物理学
    • 1,165 篇 系统科学
    • 1,091 篇 统计学(可授理学、...
    • 975 篇 生物学
    • 448 篇 化学
  • 3,932 篇 管理学
    • 2,675 篇 管理科学与工程(可...
    • 1,500 篇 图书情报与档案管...
    • 1,421 篇 工商管理
  • 632 篇 医学
    • 573 篇 临床医学
    • 495 篇 基础医学(可授医学...
  • 524 篇 法学
    • 453 篇 社会学
  • 449 篇 经济学
    • 448 篇 应用经济学
  • 333 篇 教育学
  • 156 篇 农学
  • 103 篇 文学
  • 84 篇 军事学
  • 30 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 2,244 篇 computer archite...
  • 1,821 篇 computer science
  • 1,582 篇 hardware
  • 1,422 篇 application soft...
  • 1,284 篇 computational mo...
  • 1,232 篇 control systems
  • 834 篇 costs
  • 739 篇 software enginee...
  • 634 篇 real time system...
  • 631 篇 software systems
  • 624 篇 bandwidth
  • 621 篇 algorithm design...
  • 617 篇 testing
  • 613 篇 delay
  • 544 篇 computer network...
  • 533 篇 feature extracti...
  • 532 篇 protocols
  • 483 篇 monitoring
  • 464 篇 real-time system...
  • 455 篇 analytical model...

机构

  • 134 篇 school of comput...
  • 99 篇 department of el...
  • 64 篇 department of el...
  • 61 篇 department of sy...
  • 54 篇 department of el...
  • 51 篇 department of el...
  • 46 篇 ieee
  • 45 篇 school of electr...
  • 42 篇 department of el...
  • 41 篇 department of co...
  • 39 篇 department of el...
  • 38 篇 department of el...
  • 37 篇 department of el...
  • 37 篇 department of el...
  • 35 篇 department of el...
  • 35 篇 department of el...
  • 34 篇 department of el...
  • 34 篇 department of el...
  • 33 篇 school of comput...
  • 32 篇 department of co...

作者

  • 26 篇 li li
  • 26 篇 frank knoefel
  • 24 篇 m. n. s. swamy
  • 23 篇 m. omair ahmad
  • 21 篇 a. antoniou
  • 19 篇 jun wang
  • 17 篇 p. agathoklis
  • 17 篇 wu-sheng lu
  • 16 篇 j. leaney
  • 16 篇 hayashi eiji
  • 15 篇 randall geiger
  • 15 篇 m. sawan
  • 15 篇 liu yang
  • 14 篇 yu wang
  • 14 篇 sengupta anirban
  • 14 篇 arjuna madanayak...
  • 14 篇 li zhang
  • 13 篇 jaime ramirez-an...
  • 13 篇 fabrizio lombard...
  • 13 篇 t.m. khoshgoftaa...

语言

  • 36,786 篇 英文
  • 380 篇 中文
  • 254 篇 其他
  • 12 篇 葡萄牙文
  • 9 篇 土耳其文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 乌克兰文
检索条件"任意字段=International Symposium and Workshop on Systems Engineering of Computer Based Systems"
37407 条 记 录,以下是31-40 订阅
排序:
A Mini Review on Purchaser Security in the Metaverse: Challenges and Solutions
A Mini Review on Purchaser Security in the Metaverse: Cha...
收藏 引用
PhD symposium, Posters, Demos, and A Web for more inclusive, sustainable and prosperous societies, WEB-for-GOOD 2024 and 1st international workshop on AI and Web Data Analytics, AIWDA 2024 form the 25th international Conference on Web Information systems engineering, WISE 2024
作者: Aloudat, Mohammad Barhamgi, Mahmoud Yaacoub, Elias Department of Computer Science and Engineering Qatar University Doha Qatar
This mini review examines the security challenges faced by purchasers in the metaverse, focusing on issues such as data protection, privacy, identity theft, financial fraud, and software vulnerabilities. The metaverse... 详细信息
来源: 评论
An FPT-based mmW Cavity-Backed Antenna
An FPT-Based mmW Cavity-Backed Antenna
收藏 引用
2025 IEEE international workshop on Antenna Technology, iWAT 2025
作者: Osorio, Anthony Koutinos, Anastasios Zekios, Constantinos L. Georgakopoulos, Stavros V. Florida International University Department of Electrical and Computer Engineering Miami United States
In this work, a cavity-backed antenna with increased bandwidth and minimum design complexity for operation at millimeter wave (mmW) frequencies is proposed. Namely, by leveraging our recently proposed frequency pullin... 详细信息
来源: 评论
RailCabs and Birds in Julia Context-Role Ensemble engineering in Practice  12th
RailCabs and Birds in Julia Context-Role Ensemble Engineerin...
收藏 引用
12th international symposium on Leveraging Applications of Formal Methods, Verification and Validation
作者: Assmann, Uwe Gutsche, Christian Tech Univ Dresden Inst Software & Multimediatech Dresden Germany Ctr Tactile Internet CeTI Dresden Germany Boysen TU Dresden Res Training Grp Dresden Germany
Because ensembles and swarms occur everywhere in nature, in social and in technical contexts, their modeling and programming is one of the challenges of modern software systems engineering. While it is well-known how ... 详细信息
来源: 评论
Architecting Space Microdatacenters: A System-level Approach  31
Architecting Space Microdatacenters: A System-level Approach
收藏 引用
31st IEEE international symposium on High Performance computer Architecture, HPCA 2025
作者: Bleier, Nathan Eason, Rick Lembeck, Michael Kumar, Rakesh University of Michigan Department of Electrical Engineering & Computer Science Ann ArborMI United States University of Illinois Department of Electrical and Computer Engineering UrbanaIL United States University of Illinois Department of Aerospace Engineering UrbanaIL United States
Server-based computing in space has been recently proposed due to potential benefits in terms of capability, latency, security, sustainability, and cost. Despite this, there has been no work asking the question: how s... 详细信息
来源: 评论
GraphTFD: A Fraud Detection System based on Graph Transformer
GraphTFD: A Fraud Detection System Based on Graph Transform...
收藏 引用
PhD symposium, Posters, Demos, and A Web for more inclusive, sustainable and prosperous societies, WEB-for-GOOD 2024 and 1st international workshop on AI and Web Data Analytics, AIWDA 2024 form the 25th international Conference on Web Information systems engineering, WISE 2024
作者: Yu, Chengcheng Fei, Lujing Zhou, Wenqian Chen, Lin Wang, Jiahui Meng, Xiankai Chen, Fangshu School of Computer and Information Engineering Shanghai Polytechnic University Shanghai China
Fraud detection is critical in identifying and preventing fraudulent activities across various industries, safeguarding financial assets, and maintaining trust in business. Although graph-based fraud detection methods... 详细信息
来源: 评论
Attributed Point-to-Point Communication in R-CHECK  12th
Attributed Point-to-Point Communication in R-CHECK
收藏 引用
12th international symposium on Leveraging Applications of Formal Methods, Verification and Validation
作者: Abd Alrahman, Yehia Azzopardi, Shaun Di Stefano, Luca Piterman, Nir Univ Gothenburg Gothenburg Sweden Chalmers Univ Technol Gothenburg Sweden Univ Malta Msida Malta TU Wien Inst Comp Engn Treitlstr 3 A-1040 Vienna Austria
Autonomous multi-agent, or more generally, collective adaptive systems, use different modes of communication to support their autonomy and ease of interaction. In order to enable modelling and reasoning about such sys... 详细信息
来源: 评论
Software engineering Experiences of an Optimist
Software Engineering Experiences of an Optimist
收藏 引用
6th international School on engineering Trustworthy Software systems, SETSS 2024
作者: He, Jifeng Tongji University Shanghai China
This edited transcript records a keynote address at the SETSS 2024 workshop. It provides some thoughts on formal software engineering approach in the light of experience and recent developments such as Artif... 详细信息
来源: 评论
Once and for All: How to Compose Modules - The Composition Calculus  12th
Once and for All: How to Compose Modules - The Composition C...
收藏 引用
12th international symposium on Leveraging Applications of Formal Methods, Verification and Validation
作者: Fettke, Peter Reisig, Wolfgang German Res Ctr Artificial Intelligence DFKI Saarbrucken Germany Saarland Univ Saarbrucken Germany Humboldt Univ Berlin Germany
Computability theory is traditionally conceived as the theoretical basis of informatics. Nevertheless, numerous proposals transcend computability theory, in particular by emphasizing interaction of modules, or compone... 详细信息
来源: 评论
Scientific Documents Recommendation based on Graph Convolutional Network
Scientific Documents Recommendation Based on Graph Convolut...
收藏 引用
PhD symposium, Posters, Demos, and A Web for more inclusive, sustainable and prosperous societies, WEB-for-GOOD 2024 and 1st international workshop on AI and Web Data Analytics, AIWDA 2024 form the 25th international Conference on Web Information systems engineering, WISE 2024
作者: Li, Jianmin School of Cyber Security and Computer Hebei University Baoding071002 China Hebei Machine Vision Engineering Research Center Hebei University Baoding071002 China
The rapid growth in the number of scientific documents makes it increasingly necessary to provide researchers with efficient paper recommendation services. Since scientific documents contain many mathematical expressi... 详细信息
来源: 评论
Best-Practices-based Training for Improving Cybersecurity in Power Grids  19th
Best-Practices-Based Training for Improving Cybersecurity i...
收藏 引用
19th international workshop on Data Privacy Management, DPM 2024, 8th international workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European symposium on Research in computer Security, ESORICS 2024
作者: Kavallieratos, Georgios Amro, Ahmed Gkioulos, Vasileios Stamatescu, Grigore Rantos, Kostantinos Lagkas, Thomas Demertzis, Konstantinos Paterakis, Fotis Lekidis, Alexios Dalamagkas, Christos Kotsiuba, Igor Katsikas, Sokratis Norwegian University of Science and Technology Gjøvik Norway TÜV Austria Romania 139B Calea Plevnei Bucharest060011 Romania Department of Automation and Industrial Informatics University Politehnica of Bucharest 313 Splaiul Independentei Bucharest060042 Romania Department of Informatics Democritus University of Thrace Kavala65404 Greece School of Science Department of Computer Science Kavala Campus International Hellenic University Kavala65404 Greece Athens Greece Innovation Hub of Public Power Corporation S.A. Attica Greece Durham University Durham United Kingdom
The increased financial value of the power grids and the multitude of potential attackers, including such with advanced capabilities, makes the enhancement of cybersecurity in power grids very important. In order to s... 详细信息
来源: 评论