咨询与建议

限定检索结果

文献类型

  • 11,735 篇 会议
  • 774 篇 期刊文献

馆藏范围

  • 12,509 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,072 篇 计算机科学与技术...
    • 1,032 篇 电气工程
    • 455 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 29 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 185 篇 理学
    • 63 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,509 篇 software algorit...
  • 3,747 篇 software
  • 1,965 篇 algorithm design...
  • 1,781 篇 hardware
  • 828 篇 computer archite...
  • 812 篇 heuristic algori...
  • 762 篇 application soft...
  • 708 篇 software enginee...
  • 645 篇 computer science
  • 599 篇 software systems
  • 574 篇 computational mo...
  • 560 篇 prediction algor...
  • 552 篇 optimization
  • 523 篇 clustering algor...
  • 475 篇 testing
  • 430 篇 accuracy
  • 413 篇 signal processin...
  • 372 篇 costs
  • 350 篇 machine learning...
  • 322 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,431 篇 英文
  • 49 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12509 条 记 录,以下是181-190 订阅
排序:
Make Shuffling Great Again: A Side-Channel-Resistant Fisher-Yates Algorithm for Protecting Neural Networks
收藏 引用
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 2025年
作者: Puskac, Leonard Benovic, Marek Breier, Jakub Hou, Xiaolu Slovak Univ Technol Bratislava Fac Informat & Informat Technol Bratislava 84216 Slovakia TTControl GmbH A-1040 Vienna Austria
Neural network (NN) models implemented in embedded devices have been shown to be susceptible to side-channel attacks (SCAs), allowing recovery of proprietary model parameters, such as weights and biases. There are alr... 详细信息
来源: 评论
A software Implementation and Research of Ensemble algorithms for Solving the Different Types of Data Classification Problem
A Software Implementation and Research of Ensemble Algorithm...
收藏 引用
IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON
作者: Nikita A. Zelenchuk Olga K. Alsova Dept. of Computer Science Novosibirsk State Technical University Novosibirsk Russia
Many algorithms for solving classification problems have been studied and developed at the moment, but the problem of improving the quality (accuracy, stability) of classification solutions remains relevant. This prob... 详细信息
来源: 评论
An Empirical Study on software Aging of Long-Running Object Detection algorithms
An Empirical Study on Software Aging of Long-Running Object ...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security (QRS)
作者: Roberto Pietrantuono Domenico Cotroneo Ermeson Andrade Fumio Machida University of Naples Federico II Naples Italy Federal Rural University of Pernambuco Recife Brazil University of Tsukuba Tsukuba Japan
Efficient and effective object detection is a key problem in Computer Vision. Numerous object detection algorithms have been developed, whose aim is to achieve two conflicting goals, namely accuracy and efficiency, wh... 详细信息
来源: 评论
Applications of the Partial Fraction Decomposition to Pole Variation Rate for Root Locus Construction
收藏 引用
IEEE CONTROL SYSTEMS LETTERS 2024年 8卷 2925-2930页
作者: Tebaldi, Davide Zanasi, Roberto Univ Modena & Reggio Emilia Dept Engn Enzo Ferrari I-41125 Modena Italy
The applications of the partial fraction decomposition in control and systems engineering are several. In this letter, we use the partial fraction decomposition to address the pole variation rate problem, namely to st... 详细信息
来源: 评论
A Novel 3D-to-3D Diffeomorphic Registration Algorithm With Applications to Left Ventricle Segmentation in MR and Ultrasound Sequences
收藏 引用
IEEE ACCESS 2023年 11卷 3144-3159页
作者: Krishnaswamy, Deepa Noga, Michelle Becher, Harald Boulanger, Pierre Punithakumar, Kumaradevan Univ Alberta Dept Radiol & Diagnost Imaging Edmonton AB T6G 2B7 Canada Mazankowski Alberta Heart Inst Servier Virtual Cardiac Ctr Edmonton AB T6G 2B7 Canada Mazankowski Alberta Heart Inst Edmonton AB T6G 2B7 Canada Univ Alberta Dept Comp Sci Edmonton AB T6G 2E8 Canada
Left ventricular segmentation is a difficult and time-consuming task performed by clinicians, requiring the use of manual contours. We propose a novel three-dimensional diffeomorphic registration algorithm for endocar... 详细信息
来源: 评论
Graphical and Numerical Study of a Newly Developed Root-Finding Algorithm and Its Engineering Applications
收藏 引用
IEEE ACCESS 2023年 11卷 2375-2383页
作者: Naseem, Amir Rehman, M. A. Qureshi, Sania Ide, Nasr Al Din Univ Management & Technol Dept Math Lahore 54770 Pakistan Mehran Univ Engn & Technol Dept Basic Sci & Related Studies Jamshoro 76062 Pakistan Near East Univ Dept Math TR-99138 Mersin Turkiye Aleppo Univ Fac Sci Dept Math Aleppo Syria
The primary objective of this paper is to develop a new method for root-finding by combining forward and finite-difference techniques in order to provide an efficient, derivative-free algorithm with a lower processing... 详细信息
来源: 评论
Hyperparameter Optimization for AST Differencing
收藏 引用
IEEE TRANSACTIONS ON software ENGINEERING 2023年 第10期49卷 4814-4828页
作者: Martinez, Matias Falleri, Jean-Remy Monperrus, Martin Univ Politecn Cataluna Barcelona 08034 Spain Univ Bor deaux CNRS Bordeaux INP LaBRIUMR 5800 F-33400 Deaux France Inst Univ France Paris France KTH Royal Inst Technol S-11428 Stockholm Sweden
Computing the differences between two versions of the same program is an essential task for software development and software evolution research. AST differencing is the most advanced way of doing so, and an active re... 详细信息
来源: 评论
Don't Lie to Me: Avoiding Malicious Explanations With STEALTH
收藏 引用
IEEE software 2023年 第3期40卷 43-53页
作者: Alvarez, Lauren Menzies, Tim North Carolina State Univ Raleigh NC 27606 USA North Carolina State Univ Comp Sci Raleigh NC 27606 USA
STEALTH is a method for using some artificial intelligence-generated models without suffering from malicious attacks or associated unfairness issues. STEALTH asks so few queries (one per data cluster) that malicious a... 详细信息
来源: 评论
Air-Ground Collaborative Edge Intelligence for Future Generation Networks
收藏 引用
IEEE NETWORK 2023年 第2期37卷 118-125页
作者: Tang, Jianhang Nie, Jiangtian Zhang, Yang Duan, Yiqun Xiong, Zehui Niyato, Dusit Guizhou Univ Guiyang Peoples R China Nanyang Technol Univ Singapore Singapore Nanjing Univ Aeronaut & Astronaut Nanjing Peoples R China Univ Technol Sydney Sydney NSW Australia Singapore Univ Technol & Design Singapore Singapore
The air-ground integrated mobile edge computing (MEC) is expected to fulfill the ever-growing resource demands of artificial intelligence (AI)-enabled applications in sixth-generation (6G) wireless networks, ranging f... 详细信息
来源: 评论
Analyzing the Behavioral Artifacts for Malicious software Detection Using Machine Learning algorithms
Analyzing the Behavioral Artifacts for Malicious Software De...
收藏 引用
Advances in Computing, Communication Control and Networking (ICAC3N), International Conference on
作者: Nikkam Chandini C. Kiran Mai Department of Computer Science and Engineering VNRVJIET Hyderabad India
Malicious software intentionally affects your computer system. Malware is analyzed using static or dynamic analysis techniques. These techniques are used to classify and predict unique patterns for correctly identifyi... 详细信息
来源: 评论