咨询与建议

限定检索结果

文献类型

  • 10,301 篇 会议
  • 252 篇 期刊文献
  • 185 册 图书
  • 2 篇 学位论文

馆藏范围

  • 10,740 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,861 篇 工学
    • 4,309 篇 计算机科学与技术...
    • 3,043 篇 软件工程
    • 722 篇 电气工程
    • 684 篇 信息与通信工程
    • 521 篇 控制科学与工程
    • 376 篇 电子科学与技术(可...
    • 161 篇 机械工程
    • 147 篇 动力工程及工程热...
    • 98 篇 网络空间安全
    • 97 篇 生物工程
    • 91 篇 安全科学与工程
    • 87 篇 仪器科学与技术
    • 79 篇 建筑学
    • 71 篇 土木工程
    • 71 篇 生物医学工程(可授...
    • 64 篇 化学工程与技术
    • 57 篇 材料科学与工程(可...
    • 55 篇 光学工程
    • 54 篇 力学(可授工学、理...
  • 1,331 篇 理学
    • 955 篇 数学
    • 213 篇 系统科学
    • 163 篇 统计学(可授理学、...
    • 157 篇 物理学
    • 120 篇 生物学
    • 67 篇 化学
  • 1,047 篇 管理学
    • 827 篇 管理科学与工程(可...
    • 409 篇 工商管理
    • 253 篇 图书情报与档案管...
  • 120 篇 经济学
    • 120 篇 应用经济学
  • 71 篇 法学
    • 58 篇 社会学
  • 45 篇 教育学
  • 40 篇 医学
  • 26 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 1,688 篇 application soft...
  • 898 篇 distributed comp...
  • 873 篇 computer science
  • 873 篇 computer archite...
  • 848 篇 hardware
  • 728 篇 concurrent compu...
  • 668 篇 parallel process...
  • 558 篇 software enginee...
  • 557 篇 computational mo...
  • 446 篇 real time system...
  • 345 篇 runtime
  • 326 篇 costs
  • 324 篇 software systems
  • 319 篇 processor schedu...
  • 317 篇 fault tolerance
  • 315 篇 resource managem...
  • 292 篇 software
  • 289 篇 operating system...
  • 287 篇 scalability
  • 283 篇 bandwidth

机构

  • 35 篇 school of comput...
  • 23 篇 ibm thomas j. wa...
  • 22 篇 department of co...
  • 21 篇 school of softwa...
  • 20 篇 college of compu...
  • 20 篇 school of electr...
  • 19 篇 state key labora...
  • 19 篇 department of el...
  • 19 篇 department of co...
  • 18 篇 department of co...
  • 16 篇 school of comput...
  • 15 篇 department of el...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 14 篇 department of el...
  • 14 篇 beijing jiaotong...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 13 篇 institute of inf...

作者

  • 20 篇 m. takizawa
  • 20 篇 rajkumar buyya
  • 20 篇 k.h. kim
  • 18 篇 dhabaleswar k. p...
  • 18 篇 jack dongarra
  • 17 篇 m. kandemir
  • 17 篇 h.j. siegel
  • 16 篇 a. choudhary
  • 14 篇 m. parashar
  • 14 篇 howard jay siege...
  • 13 篇 l.r. welch
  • 13 篇 parashar manish
  • 13 篇 gao guang r.
  • 12 篇 dongarra jack
  • 12 篇 h. casanova
  • 12 篇 hari subramoni
  • 12 篇 welch lonnie r.
  • 12 篇 xiao qin
  • 12 篇 maciejewski anth...
  • 11 篇 jun wang

语言

  • 10,665 篇 英文
  • 39 篇 其他
  • 34 篇 中文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Symposium on Software Engineering for Parallel and Distributed Systems"
10740 条 记 录,以下是4851-4860 订阅
排序:
A Few-shot Learning Approach for Anomaly Detection in Cooperative Tracking Control System  21
A Few-shot Learning Approach for Anomaly Detection in Cooper...
收藏 引用
21st IEEE international symposium on parallel and distributed Processing with Applications, 13th IEEE international Conference on Big Data and Cloud Computing, 16th IEEE international Conference on Social Computing and Networking and 13th international Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Rong, Jieqi Liu, Weirong Yu, Xiaoquan Ren, Wanwan Shu, Boyu Peng, Jun Central South University Computer Science and Engineering Changsha China Central South University School of Traffic and Transportation Engineering Changsha China Central South University School of Automation Changsha China
Cooperative tracking control for multiple heavy-haul trains can improve the safety and efficiency of heavy-haul railway transportation. However, the false data injection attack for the tracking control system is a ser... 详细信息
来源: 评论
Mathematical and engineering Methods in Computer Science  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Zdeněk Kotásek Lukáš Sekanina Tomáš Vojnar Jan Bouda Ivana Černá David Antoš
This volume constitutes the thoroughly refereed post-conference proceedings of the 7th international Doctoral Workshop on Mathematical and engineering Methods in Computer Science, MEMICS 2011, held in Lednice, Czech R... 详细信息
来源: 评论
Robust hand tracking in low-resolution video sequences
Robust hand tracking in low-resolution video sequences
收藏 引用
3rd IASTED international Conference on Advances in Computer Science and Technology, ACST 2007
作者: Nyan, Bo Bo Dailey, Matthew N. Uyyanonvara, Bunyarit Sirindhorn International Institute of Technology Thammasat University Klong Luang Pathumthani Thailand Computer Science and Information Management Asian Institute of Technology Klong Luang Pathumthani Thailand
Automatic detection and tracking of human hands in video imagery has many applications. While some success has been achieved in human-computer interaction applications, hand tracking would also be extremely useful in ... 详细信息
来源: 评论
XML Document Recommendation by Using Case Based Reasoning
XML Document Recommendation by Using Case Based Reasoning
收藏 引用
ACIS international Conference on software engineering, Artificial Intelligence, Networking, and parallel/distributed Computing (SNPD)
作者: Sutheetutt Vacharaskunee Sarun Intakosum Software Systems Engineering Laboratory Department of Mathematics and Computer Science Faculty of Science King Mongkut''s Institute of Technology Ladkrabang Bangkok Thailand
Case Based Reasoning (CBR) is the process of solving new problem based on the solutions of similar previous problems. XML is a markup language that allows document owners describe their data in their own formats. Ther... 详细信息
来源: 评论
Incorporating Security Requirements into Communication Protocols in Multi-agent software systems
Incorporating Security Requirements into Communication Proto...
收藏 引用
IEEE international Conference on parallel and distributed Computing, Applications and Technologies (PDCAT)
作者: Yuxiu Luo Giannakis Antoniou Leon Sterling Department of Coumputer Science and software Engineering University of Melbourne VIC Australia
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages of software development. However, there... 详细信息
来源: 评论
Design flow for optimizing performance in processor systems with on-chip coarse-grain reconfigurable logic  06
Design flow for optimizing performance in processor systems ...
收藏 引用
international symposium on parallel and distributed Processing (IPDPS)
作者: M.D. Galanis G. Dimitroulakos C.E. Goutis VLSI Design Laboratory Electrical and Computer Engineering Department University of Patras Rio Greece
A design flow for processor platforms with on-chip coarse-grain reconfigurable logic is presented. The reconfigurable logic is realized by a 2-dimensional array of processing elements. Performance is improved by accel... 详细信息
来源: 评论
SAT-based Bounded Model Checking for SE-LTL
SAT-based Bounded Model Checking for SE-LTL
收藏 引用
ACIS international Conference on software engineering, Artificial Intelligence, Networking, and parallel/distributed Computing (SNPD)
作者: Zhou Conghua Ju Shiguang School of Computer Science and Telecommunication Engineering Jiangsu University China
For concurrent software systems state/event linear temporal logic SE-LTL is a specification language with high expressive power and the ability to reason about both states and events. Until now, SE-LTL model checking ... 详细信息
来源: 评论
Reducing false transactional conflicts with speculative sub-blocking state-An empirical study for ASF transactional memory system
Reducing false transactional conflicts with speculative sub-...
收藏 引用
2013 IEEE 37th Annual Computer software and Applications Conference, COMPSAC 2013
作者: Nai, Lifeng Lee, Hsien-Hsin S. School of Electrical and Computer Engineering Georgia Institute of Technology United States
Conflict detection and resolution are among the most fundamental issues in transactional memory systems. Hardware transactional memory (HTM) systems such as AMD's Advanced Synchronization Facility (ASF) employ inh... 详细信息
来源: 评论
Speculative security checks in sandboxing systems
Speculative security checks in sandboxing systems
收藏 引用
international symposium on parallel and distributed Processing (IPDPS)
作者: Y. Oyama K. Onoue A. Yonezawa Japan Science and Technology Agency University of Tokyo Japan University of Tokyo Japan
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system calls invoked by an application and contro... 详细信息
来源: 评论
parallel processors and an approach to the development of inference engine
Parallel processors and an approach to the development of in...
收藏 引用
ACIS international Conference on software engineering, Artificial Intelligence, Networking, and parallel/distributed Computing (SNPD)
作者: V.B. Prasad Electrical and Computer Engineering Department Bradley University Peoria IL USA
The reliable and fault tolerant computers are key to the success to aerospace, and communication industries where failures of the system can cause a significant economic impact and loss of life. Designing a reliable d... 详细信息
来源: 评论