咨询与建议

限定检索结果

文献类型

  • 86,209 篇 会议
  • 2,735 册 图书
  • 1,726 篇 期刊文献
  • 4 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 90,670 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 46,753 篇 工学
    • 38,434 篇 计算机科学与技术...
    • 31,982 篇 软件工程
    • 6,383 篇 控制科学与工程
    • 6,314 篇 信息与通信工程
    • 5,566 篇 电气工程
    • 3,216 篇 机械工程
    • 2,952 篇 电子科学与技术(可...
    • 2,059 篇 生物工程
    • 1,599 篇 生物医学工程(可授...
    • 1,487 篇 安全科学与工程
    • 1,407 篇 动力工程及工程热...
    • 1,374 篇 仪器科学与技术
    • 1,274 篇 建筑学
    • 1,206 篇 土木工程
    • 1,147 篇 材料科学与工程(可...
    • 1,038 篇 光学工程
    • 1,029 篇 交通运输工程
  • 13,170 篇 理学
    • 7,357 篇 数学
    • 2,661 篇 物理学
    • 2,363 篇 系统科学
    • 2,245 篇 生物学
    • 1,766 篇 统计学(可授理学、...
  • 11,155 篇 管理学
    • 7,853 篇 管理科学与工程(可...
    • 4,113 篇 工商管理
    • 4,080 篇 图书情报与档案管...
  • 2,147 篇 教育学
    • 2,121 篇 教育学
  • 1,383 篇 医学
    • 1,181 篇 临床医学
    • 1,036 篇 基础医学(可授医学...
  • 1,378 篇 法学
    • 1,077 篇 社会学
  • 1,313 篇 经济学
    • 1,304 篇 应用经济学
  • 382 篇 农学
  • 257 篇 文学
  • 194 篇 军事学
  • 62 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 8,329 篇 application soft...
  • 7,119 篇 software enginee...
  • 5,925 篇 computer archite...
  • 5,306 篇 software
  • 5,226 篇 computer science
  • 4,429 篇 software systems
  • 4,167 篇 hardware
  • 3,535 篇 computer aided s...
  • 3,262 篇 control systems
  • 2,661 篇 computational mo...
  • 2,223 篇 costs
  • 2,093 篇 programming
  • 1,818 篇 artificial intel...
  • 1,746 篇 computer softwar...
  • 1,740 篇 real time system...
  • 1,624 篇 testing
  • 1,516 篇 real-time system...
  • 1,420 篇 software design
  • 1,369 篇 protocols
  • 1,350 篇 information syst...

机构

  • 204 篇 college of compu...
  • 117 篇 school of comput...
  • 59 篇 school of comput...
  • 56 篇 college of compu...
  • 54 篇 school of comput...
  • 49 篇 department of co...
  • 40 篇 college of compu...
  • 37 篇 department of el...
  • 37 篇 school of comput...
  • 36 篇 school of electr...
  • 36 篇 department of el...
  • 34 篇 institute of inf...
  • 33 篇 state key labora...
  • 32 篇 school of comput...
  • 32 篇 department of el...
  • 31 篇 department of co...
  • 31 篇 department of el...
  • 29 篇 department of co...
  • 28 篇 school of comput...
  • 27 篇 tsinghua univers...

作者

  • 49 篇 anon
  • 37 篇 bernady o. apduh...
  • 36 篇 bosch jan
  • 34 篇 o'connor rory v.
  • 28 篇 shaoying liu
  • 28 篇 li yang
  • 26 篇 dubinsky yael
  • 26 篇 ebrahim babaei
  • 22 篇 zhu huibiao
  • 21 篇 lei wang
  • 21 篇 dong jin song
  • 20 篇 katz guy
  • 19 篇 zhang lei
  • 17 篇 levent yilmaz
  • 17 篇 rui wang
  • 17 篇 wenyun zhao
  • 17 篇 shahar maoz
  • 17 篇 vardi moshe y.
  • 16 篇 weiming shen
  • 16 篇 noraziah a.

语言

  • 89,186 篇 英文
  • 1,017 篇 其他
  • 437 篇 中文
  • 32 篇 西班牙文
  • 18 篇 葡萄牙文
  • 15 篇 德文
  • 14 篇 土耳其文
  • 13 篇 俄文
  • 9 篇 法文
  • 4 篇 捷克文
  • 4 篇 日文
  • 2 篇 乌克兰文
  • 1 篇 朝鲜文
检索条件"任意字段=Israel Conference on Computer Systems and Software Engineering"
90676 条 记 录,以下是4721-4730 订阅
排序:
Performance Evaluation of ECC based Cryptographic Accumulator on Resource-Constrained Platform
Performance Evaluation of ECC based Cryptographic Accumulato...
收藏 引用
2024 Innovations in Intelligent systems and Applications conference, ASYU 2024
作者: Toros, Armağan Çekiş, İsmet Kaan Korkmaz, Kübra Özçelik, İlker Computer Engineering Eskişehir Osmangazi University Eskişehir Turkey Software Engineering Eskişehir Osmangazi University Eskişehir Turkey
Cryptographic accumulators are efficient data structures used for membership testing in various applications, including resource-constrained devices like IoT systems. This paper explores the performance of an ECC-base... 详细信息
来源: 评论
The Original Method of Controlling a computer Using Distance Sensors  16
The Original Method of Controlling a Computer Using Distance...
收藏 引用
16th IEEE International conference on Advanced Trends in Radioelectronics, Telecommunications and computer engineering, TCSET 2022
作者: Savaryn, Pavlo Strekha, Vadym Brych, Mykola Brych, Lesia Kabak, Vitalii Polishchuk, Mykola Lutsk National Technical University Department of Digital Education Technologies Lutsk Ukraine Lutsk National Technical University Department of Computer Science Lutsk Ukraine Internet of Things and Software Defined Networks Lab Lviv Polytechnic National University Lviv Ukraine Centre for International Education Lviv Polytechnic National University Lviv Ukraine Lutsk National Technical University Department of Computer Engineering and Cybersecurity Lutsk Ukraine
The article provides a brief overview of human-computer interaction methods and systems, and the research made in this area. We have designed the architecture of the system and tested a method of controlling a compute... 详细信息
来源: 评论
Graphical Password Authentication Using Decentralized Single-Sign-On
Graphical Password Authentication Using Decentralized Single...
收藏 引用
2023 IEEE World conference on Communication and Computing, WCONF 2023
作者: Shinde, Rishikesh Dnyandev Jathar, Kishori Ravindra Pardeshi, Abhay Dilip Thorat, S.A. Government College of Engineering and Research Avasari Department of Computer Engineering Pune India
Authentication is a crucial process that verifies the identity of an individual or system seeking access to resources or services. Password-based authentication systems, which are the most common and widely used, can ... 详细信息
来源: 评论
Towards Evidence-Based Cybersecurity Assessment of Programmable systems to Ensure the Protection of Critical IT Infrastructure  12
Towards Evidence-Based Cybersecurity Assessment of Programma...
收藏 引用
12th IEEE International conference on Intelligent Data Acquisition and Advanced Computing systems: Technology and Applications, IDAACS 2023
作者: Illiashenko, Oleg Kharchenko, Vyacheslav Odarushchenko, Oleg National Aerospace University 'KhAI' Department of Computer Systems and Networks Kharkiv61070 Ukraine Institute of Information Science and Technologies 'Alessandro Faedo' - Isti Cnr Software Engineering & Dependable Computing Laboratory Pisa56124 Italy Research and Production Enterprise Rpc Radics Llc Kropyvnytskyi25009 Ukraine
The paper is devoted to developing scientific principles, methods, means, and information technology of model-oriented verification and evidence-based assessment using functional safety and cybersecurity cases for pro... 详细信息
来源: 评论
Metalearning Linear Bandits by Prior Update  25
Metalearning Linear Bandits by Prior Update
收藏 引用
International conference on Artificial Intelligence and Statistics
作者: Peleg, Amit Pearl, Naama Meir, Ron Technion Viterbi Fac ECE Haifa Israel Univ Haifa Haifa Israel
Fully Bayesian approaches to sequential decision-making assume that problem parameters are generated from a known prior. In practice, such information is often lacking. This problem is exacerbated in setups with parti... 详细信息
来源: 评论
Extending Meta-Model of Problem Frames for Metaverse Human-computer Interaction System
Extending Meta-Model of Problem Frames for Metaverse Human-C...
收藏 引用
IEEE International Requirements engineering conference Workshops (REW)
作者: Yilong Yang Yuyu Cheng Juntao Gao Zhi Li School of Software Beihang University Beijing China School of Software Northeast Petroleum University Daqing China School of Software Guangxi Normal University Guangxi China
The metaverse integrates digital and physical realities into a parallel virtual environment, which has become a key direction for the future of the digital world. With the development of this paradigm, the need for hu... 详细信息
来源: 评论
Industrial Experience Deploying Heterogeneous Platforms for Use in Multi-modal Power systems Design Workflows
Industrial Experience Deploying Heterogeneous Platforms for ...
收藏 引用
22nd Smoky Mountains Computational Sciences and engineering conference (SMC)
作者: Gallo, Andrew Claydon, Ian Tucker, Eric Arthur, Richard Gen Elect Global Res Ctr Niskayuna NY 12309 USA
We will present our industrial experience deploying software and heterogeneous hardware platforms to support end-to-end workflows in the power systems design engineering space. Such workflows include classical physics... 详细信息
来源: 评论
Tamper-forgery Image Detection in Security Digital Image: A Review  3
Tamper-forgery Image Detection in Security Digital Image: A ...
收藏 引用
3rd IEEE International conference on Blockchain and Distributed systems Security, ICBDS 2024
作者: Thorat, Nilesh N. Dhotre, Prashant Kulal, Nilesh Pimpalkar, Aarti P Patil, Vijaya S. Kolekar, Sachin M. Mit Art Design and Technology University Mit School of Computing Computer Science & Engineering Department Pune India Mit Art Design and Technology University Mit School of Computing Information Technology Department Pune India
Concerns with image security exist in every sector that uses digital photographs. Historically, public safety and forensics have depended on images from the crime scene, biometric photos, suspect photos, and other sou... 详细信息
来源: 评论
Optimizing the Reuse of Building Demolition Materials for Coastal Dunes Reestablishment  4th
Optimizing the Reuse of Building Demolition Materials for...
收藏 引用
4th International conference on Numerical Computations: Theory and Algorithms, NUMTA 2023
作者: Brunetti, Guglielmo Federico Antonio Bevacqua, Marida Maiolo, Maria Rita Amisano, Maristella Department of Environmental Engineering University of Calabria Rende Italy Department of Business and Legal Sciences University of Calabria Rende Italy
Effective strategies for designing and managing coastal defenses against erosion require a multidisciplinary approach. From a regulatory perspective, the Italian Dm 152/2022 "End of Waste" governs the reuse ... 详细信息
来源: 评论
To Build 3D Indoor Navigation Application for Museum Visitors  2nd
To Build 3D Indoor Navigation Application for Museum Visitor...
收藏 引用
2nd International conference on Emerging Trends in Expert Applications and Security, ICE-TEAS 2023
作者: Singh, Aastha Rawat, Anushka Singore, Bhawana Gupta, Sumita Gambhir, Sapna Panchal, Jitesh H. Department of Computer Science & Engineering Amity University of Engineering & Technology Amity University UP Noida India Department of Computer Engineering J.C. Bose University of Science & Engineering YMCA Faridabad India Department of Mechanical Engineering Purdue University West Lafayette United States
Museums are filled with abundance of rich history, culture and amazing architectural grandeur. But yet many people would much rather prefer to watch a documentary or read a book than to visit a museum. With the aim of... 详细信息
来源: 评论