咨询与建议

限定检索结果

文献类型

  • 8,673 篇 会议
  • 442 篇 期刊文献
  • 29 册 图书

馆藏范围

  • 9,145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,634 篇 工学
    • 5,699 篇 计算机科学与技术...
    • 3,488 篇 软件工程
    • 1,155 篇 信息与通信工程
    • 932 篇 电气工程
    • 760 篇 控制科学与工程
    • 404 篇 生物工程
    • 327 篇 电子科学与技术(可...
    • 208 篇 机械工程
    • 199 篇 仪器科学与技术
    • 179 篇 生物医学工程(可授...
    • 157 篇 动力工程及工程热...
    • 140 篇 网络空间安全
    • 127 篇 安全科学与工程
    • 105 篇 材料科学与工程(可...
    • 105 篇 建筑学
    • 89 篇 光学工程
  • 2,210 篇 理学
    • 1,390 篇 数学
    • 549 篇 统计学(可授理学、...
    • 460 篇 生物学
    • 337 篇 系统科学
    • 316 篇 物理学
    • 92 篇 化学
  • 1,433 篇 管理学
    • 918 篇 管理科学与工程(可...
    • 660 篇 图书情报与档案管...
    • 452 篇 工商管理
  • 251 篇 法学
    • 225 篇 社会学
  • 155 篇 医学
    • 140 篇 临床医学
    • 110 篇 基础医学(可授医学...
  • 132 篇 经济学
    • 130 篇 应用经济学
  • 126 篇 教育学
    • 120 篇 教育学
  • 29 篇 农学
  • 10 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学
  • 1 篇 哲学

主题

  • 294 篇 measurement
  • 227 篇 performance anal...
  • 150 篇 performance
  • 147 篇 computational mo...
  • 123 篇 analytical model...
  • 121 篇 concurrent compu...
  • 119 篇 computer science
  • 112 篇 application soft...
  • 106 篇 real time system...
  • 106 篇 algorithm design...
  • 97 篇 time measurement
  • 95 篇 power system ana...
  • 95 篇 computer archite...
  • 86 篇 cloud computing
  • 85 篇 database systems
  • 83 篇 high performance...
  • 81 篇 static analysis
  • 81 篇 visualization
  • 81 篇 distributed comp...
  • 79 篇 monitoring

机构

  • 49 篇 carnegie mellon ...
  • 31 篇 univ washington ...
  • 29 篇 school of comput...
  • 24 篇 georgia inst tec...
  • 20 篇 univ michigan an...
  • 19 篇 microsoft res re...
  • 19 篇 carnegie mellon ...
  • 18 篇 oak ridge natl l...
  • 18 篇 purdue univ w la...
  • 16 篇 univ calif berke...
  • 15 篇 univ chicago il ...
  • 14 篇 inria
  • 14 篇 oak ridge nation...
  • 13 篇 northeastern uni...
  • 13 篇 tsinghua univ pe...
  • 13 篇 univ british col...
  • 12 篇 penn state univ ...
  • 12 篇 department of co...
  • 12 篇 carnegie mellon ...
  • 12 篇 swiss fed inst t...

作者

  • 14 篇 schulz martin
  • 13 篇 hoefler torsten
  • 11 篇 zimmermann roger
  • 10 篇 dongarra jack
  • 10 篇 abella jaume
  • 10 篇 wierman adam
  • 10 篇 vetter jeffrey s...
  • 9 篇 vishwanath venka...
  • 9 篇 nahrstedt klara
  • 9 篇 wang wei
  • 9 篇 anon
  • 9 篇 van houdt benny
  • 9 篇 mutlu onur
  • 9 篇 tiwari devesh
  • 8 篇 liu jiangchuan
  • 8 篇 oral sarp
  • 8 篇 boukerche azzedi...
  • 8 篇 squillante mark ...
  • 8 篇 qian feng
  • 8 篇 mueller frank

语言

  • 9,016 篇 英文
  • 97 篇 其他
  • 25 篇 中文
  • 5 篇 葡萄牙文
  • 3 篇 西班牙文
检索条件"任意字段=Proceedings of the ACM on Measurement and Analysis of Computing Systems"
9145 条 记 录,以下是61-70 订阅
排序:
State-Level Perspectives of High School Computer Science Education Policy: A Complex systems analysis  2024
State-Level Perspectives of High School Computer Science Edu...
收藏 引用
Conference on Research on Equitable and Sustained Participation in Engineering, computing, and Technology (RESPECT)
作者: Mak, Janice Capurro, Carolina Torrejon Arizona State Univ Tempe AZ 85281 USA
Policymakers and intermediary organizations have focused on secondary computer science (CS) as a policy goal with 30 states requiring high schools to offer CS, 37 states counting CS as math or science course, and 8 st... 详细信息
来源: 评论
MetaVRadar: Measuring Metaverse Virtual Reality Network Activity
收藏 引用
proceedings of the acm on measurement and analysis of computing systems 2023年 第3期7卷 1-29页
作者: Lyu, Minzhao Tripathi, Rahul Dev Sivaraman, Vijay Univ New South Wales Sydney NSW Australia
The "metaverse", wherein users can enter virtual worlds to work, study, play, shop, socialize, and entertain, is fast becoming a reality, attracting billions of dollars in investment from companies such as M... 详细信息
来源: 评论
analysis of Security Permissions on Android and iOS from a Privacy Perspective  50
Analysis of Security Permissions on Android and iOS from a P...
收藏 引用
50th Latin American computing Conference (CLEI)
作者: Luna, Carlos Galuppo, Raul Ignacio Univ La Republ Fac Ingn Montevideo Uruguay Univ Nacl Rosario FCEIA Rosario Argentina
Security on mobile devices is fundamental, as they are managing confidential information in particular. Two of the most popular operating systems for mobile devices are Android and iOS. This work presents and analyzes... 详细信息
来源: 评论
Towards Network-friendly and Privacy-preserving Immersive computing
Towards Network-friendly and Privacy-preserving Immersive Co...
收藏 引用
2024 CoNEXT Student Workshop
作者: Cheng, Ruizhi George Mason Univ Fairfax VA 22030 USA
Immersive computing has transformed the way we interact with digital and physical worlds by blurring boundaries between them. However, as these technologies evolve, they introduce growing challenges related to increas... 详细信息
来源: 评论
Optimized Cross-Path Attacks via Adversarial Reconnaissance
收藏 引用
proceedings of the acm on measurement and analysis of computing systems 2023年 第3期7卷 1-30页
作者: Huang, Yudi Lin, Yilei He, Ting Penn State Univ University Pk PA 16802 USA Meta Santa Clara CA USA
While softwarization and virtualization technologies make modern communication networks appear easier to manage, they also introduce highly complex interactions within the networks that can cause unexpected security t... 详细信息
来源: 评论
CarbonScaler: Leveraging Cloud Workload Elasticity for Optimizing Carbon-Efficiency
收藏 引用
proceedings of the acm on measurement and analysis of computing systems 2023年 第3期7卷 1-28页
作者: Hanafy, Walid A. Liang, Qianlin Bashir, Noman Irwin, David Shenoy, Prashant Univ Massachusetts Amherst Amherst MA 01003 USA
Cloud platforms are increasing their emphasis on sustainability and reducing their operational carbon footprint. A common approach for reducing carbon emissions is to exploit the temporal flexibility inherent to many ... 详细信息
来源: 评论
Influences in Mixing Measures  2024
Influences in Mixing Measures
收藏 引用
56th Annual acm Symposium on Theory of computing (STOC)
作者: Koehler, Frederic Lifshitz, Noam Minzer, Dor Mossel, Elchanan Univ Chicago Chicago IL USA Hebrew Univ Jerusalem Jerusalem Israel MIT Cambridge MA 02139 USA
The theory of influences in product measures has profound applications in theoretical computer science, combinatorics, and discrete probability. This deep theory is intimately connected to functional inequalities and ... 详细信息
来源: 评论
Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks
收藏 引用
proceedings of the acm on measurement and analysis of computing systems 2024年 第3期8卷 1-27页
作者: Hu, Xiaohui Feng, Hang Xia, Pengcheng Tyson, Gareth Wu, Lei Zhou, Yajin Wang, Haoyu Huazhong Univ Sci & Technol Hubei Engn Res Ctr Big Data Secur Sch Cyber Sci & Engn Hubei Key Lab Distributed Syst Secur Wuhan Peoples R China Zhejiang Univeristy Hangzhou Peoples R China Hong Kong Univ Sci & Technol GZ Hong Kong Peoples R China
The Web3 ecosystem is increasingly evolving to multi-chain, with decentralized applications (dApps) distributing across different blockchains, which drives the need for cross-chain bridges for blockchain interoperabil... 详细信息
来源: 评论
Cavity in the Loop
Cavity in the Loop
收藏 引用
2024 Workshops of the International Conference for High Performance computing, Networking, Storage and analysis, SC Workshops 2024
作者: Scheunert, David Gehrunger, Jonas Hochberger, Christian Lens, Dieter Klingbeil, Harald Computer Systems Group Technische Universität Darmstadt Darmstadt Germany GSI Helmholtzzentrum für Schwerionenforschung GmbH Darmstadt Germany Accelerator Technology Group Technische Universität Darmstadt Darmstadt Germany
Particle accelerators are physically and technically complex systems. Their operation requires demanding beam control systems. To support the development of new components in a beam phase control system for a synchrot... 详细信息
来源: 评论
Fully Automated Selfish Mining analysis in Efficient Proof systems Blockchains  24
Fully Automated Selfish Mining Analysis in Efficient Proof S...
收藏 引用
43rd acm SIGACT-SIGOPS Symposium on Principles of Distributed computing, PODC 2024
作者: Chatterjee, Krishnendu Ebrahimzadeh, Amirali Karrabi, Mehrdad Pietrzak, Krzysztof Yeo, Michelle Žikelić, Dorde Ist Austria Austria Sharif University of Technology Iran National University of Singapore Singapore Singapore Management University Singapore
We study selfish mining attacks in longest-chain blockchains like Bitcoin, but where the proof of work is replaced with efficient proof systems - like proofs of stake or proofs of space - and consider the problem of c... 详细信息
来源: 评论