咨询与建议

限定检索结果

文献类型

  • 11,708 篇 会议
  • 771 篇 期刊文献

馆藏范围

  • 12,479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,072 篇 计算机科学与技术...
    • 1,032 篇 电气工程
    • 455 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 29 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 185 篇 理学
    • 63 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,479 篇 software algorit...
  • 3,731 篇 software
  • 1,965 篇 algorithm design...
  • 1,777 篇 hardware
  • 826 篇 computer archite...
  • 805 篇 heuristic algori...
  • 761 篇 application soft...
  • 706 篇 software enginee...
  • 645 篇 computer science
  • 598 篇 software systems
  • 571 篇 computational mo...
  • 559 篇 prediction algor...
  • 545 篇 optimization
  • 521 篇 clustering algor...
  • 473 篇 testing
  • 428 篇 accuracy
  • 412 篇 signal processin...
  • 371 篇 costs
  • 348 篇 machine learning...
  • 320 篇 software testing

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...
  • 8 篇 college of compu...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,401 篇 英文
  • 49 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12479 条 记 录,以下是121-130 订阅
KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates
收藏 引用
IEEE ACCESS 2024年 12卷 18606-18626页
作者: Choi, Yongryeol Kim, Mingi Kim, Youngbeom Song, Jingyo Jin, Jaehwan Kim, Heeseok Seo, Seog Chung Kookmin Univ Dept Informat Secur Cryptol & Math Seoul 02707 South Korea Kookmin Univ Dept Financial Informat Secur Seoul 02707 South Korea LG Uplus Wired Network Dev Team Seoul 07795 South Korea Korea Univ Dept Cyber Secur Sejong 30019 South Korea
As the global migration to post-quantum cryptography (PQC) continues to progress actively, in Korea, the Post-Quantum Cryptography Research Center has been established to acquire PQC technology, leading the KpqC Compe... 详细信息
来源: 评论
Optimizing UE Power Efficiency: AI/ML Approach for Upgrade Time Determination
收藏 引用
IEEE ACCESS 2024年 12卷 122878-122887页
作者: Subramaniam, Karthikeyan Kumar, Naveen Balusamy, Sudhakar Sahoo, Chittaranjan Chandrasekaran, Ganesh Samsung Res & Dev Inst Management SW Grp Bengaluru India Samsung Res & Dev Inst Bearer Software Bengaluru 560037 India Samsung Res & Dev Inst SDN & Cloud Solut Bengaluru 560037 India Samsung Res & Dev Inst Element Management Syst Software Bengaluru 560037 India Samsung Res & Dev Inst Serv Management Orchestrator & Slice Manager Part Bengaluru 560037 India
The transition of Control Plane (CP) block functions into software entities, as proposed by 3GPP, necessitates periodic downtime for maintenance activities such as software upgrades or failures. This downtime requires... 详细信息
来源: 评论
Multiarmed Bandit algorithms on Zynq System-on-Chip: Go Frequentist or Bayesian?
收藏 引用
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024年 第2期35卷 2602-2615页
作者: Santosh, S. V. Sai Darak, Sumit J. Univ Texas Austin Dept Elect & Comp Engn Austin TX 78712 USA IIIT Delhi Elect & Commun Dept New Delhi 110020 India
Multiarmed Bandit (MAB) algorithms identify the best arm among multiple arms via exploration-exploitation trade-off without prior knowledge of arm statistics. Their usefulness in wireless radio, Internet of Things (Io... 详细信息
来源: 评论
Intuitionistic Fuzzy Dimensional Analysis in Multi-Criteria Decision-Making: A Computational Approach
收藏 引用
IEEE ACCESS 2024年 12卷 193254-193262页
作者: Perez-Dominguez, Luis Asuncion Callejas-Cuervo, Mauro Garcia-Luna, Francesco Univ Autonoma Ciudad Juarez Dept Ind & Mfg Engn Ciudad Juarez 32310 Mexico Univ Pedag & Tecnol Colombia Dept Engn Tunja 47215 Colombia
Cloud computing is a trending topic that has raised attention to attack complicated problems. Likewise, the multi-criteria decision-making methods present extensive interest in decision-analysis situations. As a resul... 详细信息
来源: 评论
Improved Bluetooth-Based Indoor Localization for Devices Heterogeneity Using Back-Propagation Neural Network
收藏 引用
IEEE SENSORS JOURNAL 2024年 第17期24卷 27763-27776页
作者: Yu, Min Wan, Jilin Liu, Yang Sun, Chao Zhou, Baoding Jiangxi Normal Univ Coll Software Nanchang 330022 Peoples R China Sinopec Geophys Corp Appl Technol Res Inst BDS Operat Serv Ctr Nanjing 211100 Peoples R China Shenzhen Univ Coll Civil & Transportat Engn Shenzhen 518060 Peoples R China Shenzhen Univ Inst Urban Smart Transportat & Safety Maintenance Shenzhen 518060 Peoples R China
Positioning accuracy can be compromised by the heterogeneity of software and hardware among different intelligent mobile devices. This is due to the fact that the heterogeneity of different devices leads to a signific... 详细信息
来源: 评论
Enhancing Bug-Inducing Commit Identification: A Fine-Grained Semantic Analysis Approach
收藏 引用
IEEE TRANSACTIONS ON software ENGINEERING 2024年 第11期50卷 3037-3052页
作者: Tang, Lingxiao Ni, Chao Huang, Qiao Bao, Lingfeng Zhejiang Univ State Key Lab Blockchain & Data Secur Hangzhou 310007 Peoples R China Hangzhou High Tech Zone Binjiang Blockchain & Data Hangzhou 310052 Peoples R China Zhejiang Gongshang Univ Sch Comp Sci & Technol Hangzhou 310018 Peoples R China
The SZZ algorithm and its variants have been extensively utilized for identifying bug-inducing commits based on bug-fixing commits. However, these algorithms face challenges when there are no deletion lines in the bug... 详细信息
来源: 评论
A Systematic Review of AI-Enabled Frameworks in Requirements Elicitation
收藏 引用
IEEE ACCESS 2024年 12卷 154310-154336页
作者: Siddeshwar, Vaishali Alwidian, Sanaa Makrehchi, Masoud Ontario Tech Univ Dept Elect Comp & Software Engn Oshawa ON L1G 0C5 Canada
Employing Artificial Intelligence techniques to address challenges in requirements elicitation is gaining traction. Although nine systematic literature reviews have been published on AI-based solutions in the requirem... 详细信息
来源: 评论
Space-Hard Obfuscation Against Shared Cache Attacks and its Application in Securing ECDSA for Cloud-Based Blockchains
收藏 引用
IEEE TRANSACTIONS ON CLOUD COMPUTING 2024年 第2期12卷 625-643页
作者: Shi, Yang Li, Yimin Luo, Tianyuan Jiang, Xiong Du, Bowen Fan, Hongfei Tongji Univ Sch Software Engn Shanghai 201804 Peoples R China
In cloud computing environments, virtual machines (VMs) running on cloud servers are vulnerable to shared cache attacks, such as Spectre and Foreshadow. By exploiting memory sharing among VMs, these attacks can compro... 详细信息
来源: 评论
Fast and Scalable Design Space Exploration for Deep Learning on Embedded Systems
收藏 引用
IEEE ACCESS 2024年 12卷 148254-148266页
作者: Kutukcu, Basar Baidya, Sabur Dey, Sujit Univ Calif San Diego Dept Elect & Comp Engn La Jolla CA 92092 USA Univ Louisville Dept Comp Sci & Engn Louisville KY 40292 USA
Deep learning algorithms are used in various advanced applications, including computer vision, large language models and many others due to their increasing success over traditional approaches. Enabling these algorith... 详细信息
来源: 评论
Make Shuffling Great Again: A Side-Channel-Resistant Fisher-Yates Algorithm for Protecting Neural Networks
收藏 引用
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 2025年
作者: Puskac, Leonard Benovic, Marek Breier, Jakub Hou, Xiaolu Slovak Univ Technol Bratislava Fac Informat & Informat Technol Bratislava 84216 Slovakia TTControl GmbH A-1040 Vienna Austria
Neural network (NN) models implemented in embedded devices have been shown to be susceptible to side-channel attacks (SCAs), allowing recovery of proprietary model parameters, such as weights and biases. There are alr... 详细信息
来源: 评论