咨询与建议

限定检索结果

文献类型

  • 8,759 篇 会议
  • 453 篇 期刊文献
  • 29 册 图书

馆藏范围

  • 9,242 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,790 篇 工学
    • 5,812 篇 计算机科学与技术...
    • 3,566 篇 软件工程
    • 1,175 篇 信息与通信工程
    • 943 篇 电气工程
    • 816 篇 控制科学与工程
    • 412 篇 生物工程
    • 327 篇 电子科学与技术(可...
    • 214 篇 机械工程
    • 201 篇 仪器科学与技术
    • 183 篇 生物医学工程(可授...
    • 158 篇 动力工程及工程热...
    • 141 篇 网络空间安全
    • 130 篇 安全科学与工程
    • 122 篇 建筑学
    • 107 篇 材料科学与工程(可...
    • 105 篇 土木工程
  • 2,221 篇 理学
    • 1,392 篇 数学
    • 549 篇 统计学(可授理学、...
    • 468 篇 生物学
    • 335 篇 系统科学
    • 319 篇 物理学
    • 93 篇 化学
  • 1,456 篇 管理学
    • 927 篇 管理科学与工程(可...
    • 675 篇 图书情报与档案管...
    • 459 篇 工商管理
  • 270 篇 法学
    • 243 篇 社会学
  • 162 篇 医学
    • 147 篇 临床医学
    • 116 篇 基础医学(可授医学...
  • 132 篇 经济学
    • 130 篇 应用经济学
  • 131 篇 教育学
    • 125 篇 教育学
  • 30 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学
  • 1 篇 哲学

主题

  • 296 篇 measurement
  • 228 篇 performance anal...
  • 151 篇 performance
  • 150 篇 computational mo...
  • 123 篇 analytical model...
  • 121 篇 concurrent compu...
  • 119 篇 computer science
  • 112 篇 application soft...
  • 110 篇 algorithm design...
  • 106 篇 real time system...
  • 103 篇 time measurement
  • 99 篇 power system ana...
  • 96 篇 computer archite...
  • 88 篇 cloud computing
  • 85 篇 database systems
  • 82 篇 visualization
  • 82 篇 distributed comp...
  • 81 篇 static analysis
  • 80 篇 monitoring
  • 79 篇 design

机构

  • 49 篇 carnegie mellon ...
  • 31 篇 school of comput...
  • 30 篇 univ washington ...
  • 24 篇 georgia inst tec...
  • 20 篇 univ michigan an...
  • 19 篇 microsoft res re...
  • 19 篇 carnegie mellon ...
  • 18 篇 oak ridge natl l...
  • 18 篇 purdue univ w la...
  • 15 篇 univ chicago il ...
  • 15 篇 univ calif berke...
  • 14 篇 inria
  • 14 篇 oak ridge nation...
  • 13 篇 northeastern uni...
  • 13 篇 tsinghua univ pe...
  • 13 篇 univ british col...
  • 12 篇 penn state univ ...
  • 12 篇 peking univ peop...
  • 12 篇 department of co...
  • 12 篇 swiss fed inst t...

作者

  • 15 篇 schulz martin
  • 13 篇 hoefler torsten
  • 12 篇 mutlu onur
  • 11 篇 zimmermann roger
  • 10 篇 dongarra jack
  • 10 篇 abella jaume
  • 10 篇 wierman adam
  • 10 篇 nahrstedt klara
  • 10 篇 vetter jeffrey s...
  • 9 篇 vishwanath venka...
  • 9 篇 wang wei
  • 9 篇 anon
  • 9 篇 van houdt benny
  • 9 篇 tiwari devesh
  • 8 篇 liu jiangchuan
  • 8 篇 oral sarp
  • 8 篇 boukerche azzedi...
  • 8 篇 squillante mark ...
  • 8 篇 qian feng
  • 8 篇 mueller frank

语言

  • 8,770 篇 英文
  • 440 篇 其他
  • 27 篇 中文
  • 5 篇 葡萄牙文
  • 3 篇 西班牙文
检索条件"任意字段=Proceedings of the ACM on Measurement and Analysis of Computing Systems"
9242 条 记 录,以下是881-890 订阅
排序:
Traceability measurement analysis of Sustained Internet-Wide Scanners via Darknet  7
Traceability Measurement Analysis of Sustained Internet-Wide...
收藏 引用
7th IEEE Conference on Dependable and Secure computing, DSC 2024
作者: Han, Chansu Tanaka, Akira Takahashi, Takeshi Dadkhah, Sajjad Ghorbani, Ali A. Lin, Tsung-Nan National Institute of Information and Communications Technology Tokyo Japan Canadian Institute for Cybersecurity University of New Brunswick Fredericton Canada National Taiwan University Department of Electrical Engineering Taipei Taiwan
Darknet observation networks have experienced a significant surge in sophisticated and diverse Internet-wide scanning activities and investigative scanner operations. In addition to malware scanning attacks, reconnais... 详细信息
来源: 评论
Stationary Behavior of Constant Stepsize SGD Type Algorithms: An Asymptotic Characterization
Stationary Behavior of Constant Stepsize SGD Type Algorithms...
收藏 引用
作者: Chen, Zaiwei Mou, Shancong Maguluri, Siva Theja Georgia Institute of Technology 755 Ferst Dr NW AtlantaGA30332 United States
Stochastic approximation (SA) and stochastic gradient descent (SGD) algorithms are work-horses for modern machine learning algorithms. Their constant stepsize variants are preferred in practice due to fast convergence... 详细信息
来源: 评论
Prevalence and Salience of Problematic Microtransactions in Top-Grossing Mobile and PC Games: A Content analysis of User Reviews  22
Prevalence and Salience of Problematic Microtransactions in ...
收藏 引用
CHI Conference on Human Factors in computing systems (CHI)
作者: Petrovskaya, Elena Deterding, Sebastian Zendle, David Univ York York N Yorkshire England
Microtransactions have become a major monetisation model in digital games, shaping their design, impacting player experience, and raising ethical concerns. Research in this area has chiefly focused on loot boxes. This... 详细信息
来源: 评论
Response Time analysis for Energy-Harvesting Mixed-Criticality systems
Response Time Analysis for Energy-Harvesting Mixed-Criticali...
收藏 引用
25th Design, Automation and Test in Europe Conference and Exhibition (DATE)
作者: Wang, Kankan Lin, Yuhan Deng, Qingxu Northeastern Univ Shenyang Liaoning Peoples R China
With the increasing demand for real-time computing applications on energy-harvesting embedded devices which are deployed wherever it is not possible or practical to recharge, the worst-case performance analysis become... 详细信息
来源: 评论
Workflow Engines in the Compute Continuum: a Comparative analysis  23
Workflow Engines in the Compute Continuum: a Comparative Ana...
收藏 引用
proceedings of the IEEE/acm 16th International Conference on Utility and Cloud computing
作者: Marco Garofalo Gabriele Morabito Maria Fazio Antonio Celesti Massimo Villari MIFT Department University of Messina MESSINA Italy BIOMORF Department University of Messina MESSINA Italy
The intersection of Cloud and Edge computing has ushered in a new era of distributed computing, known as Continuum computing. This computational paradigm shift leverages the computational strength of Cloud infrastruct... 详细信息
来源: 评论
Towards AI Accountability Infrastructure: Gaps and Opportunities in AI Audit Tooling  25
Towards AI Accountability Infrastructure: Gaps and Opportuni...
收藏 引用
2025 CHI Conference on Human Factors in computing systems, CHI 2025
作者: Ojewale, Victor Steed, Ryan Vecchione, Briana Birhane, Abeba Raji, Inioluwa Deborah Brown University ProvidenceRI United States Heinz College of Information Systems and Public Policy Carnegie Mellon University PittsburghPA United States Data & Society Research Institute New YorkNY United States School of Computer Science and Statistics Trinity College Dublin Dublin Ireland Eecs University of California Berkeley BerkeleyCA United States
Audits are critical mechanisms for identifying the risks and limitations of deployed artificial intelligence (AI) systems. However, the effective execution of AI audits remains incredibly difficult, and practitioners ... 详细信息
来源: 评论
Exploring Early Adopters’ Use of AI Driven Multi-Agent systems to Inform Human-Agent Interaction Design: Insights from Industry Practice
Exploring Early Adopters’ Use of AI Driven Multi-Agent Syst...
收藏 引用
2025 CHI Conference on Human Factors in computing systems, CHI EA 2025
作者: Naik, Suchismita Snellinger, Amanda Toombs, Austin L. Saponas, Scott Hall, Amanda K. Purdue University West LafayetteIN United States Microsoft Research RedmondWA United States Department of Informatics Indiana University BloomingtonIN United States
This case study explores the experiences of Microsoft employees, who are early adopters of multi-agent generative AI systems, as they experiment with these technologies to design, test, and deploy new tools attempting... 详细信息
来源: 评论
proceedings of the 11th Euro-American Conference on Telematics and Information systems, EATIS 2022
Proceedings of the 11th Euro-American Conference on Telemati...
收藏 引用
11th Euro-American Conference on Telematics and Information systems, EATIS 2022
The proceedings contain 20 papers. The topics discussed include: transforming ideas and developing entrepreneurship skills in computing sciences and informatics engineering courses;low-cost clusters on big data – a s...
来源: 评论
Round Numbers Can Sharpen Cognition  22
Round Numbers Can Sharpen Cognition
收藏 引用
CHI Conference on Human Factors in computing systems (CHI)
作者: Nguyen, Huy A. Hofman, Jake M. Goldstein, Daniel G. Carnegie Mellon Univ Pittsburgh PA 15213 USA Microsoft Res New York NY USA
Scientists and journalists strive to report numbers with high precision to keep readers well-informed. Our work investigates whether this practice can backfire due to the cognitive costs of processing multi-digit prec... 详细信息
来源: 评论
Data Distribution and Redistribution - A formal and practical analysis of the DDS Security Standard  25
Data Distribution and Redistribution - A formal and practica...
收藏 引用
40th Annual acm Symposium on Applied computing, SAC 2025
作者: Lauser, Timm Müller, Maximilian Baumgart, Ingmar Krauß, Christoph Darmstadt University of Applied Sciences Darmstadt Germany FZI Research Center for Information Technology Karlsruhe Germany
The Data Distribution Service (DDS) is a popular communication middleware for the Internet of Things (IoT), providing its own security mechanisms specified in the DDS Security standard. In this work, we formally analy... 详细信息
来源: 评论