咨询与建议

限定检索结果

文献类型

  • 11,593 篇 会议
  • 817 篇 期刊文献

馆藏范围

  • 12,410 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,119 篇 工学
    • 1,087 篇 电气工程
    • 1,080 篇 计算机科学与技术...
    • 471 篇 软件工程
    • 395 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 132 篇 电子科学与技术(可...
    • 103 篇 仪器科学与技术
    • 88 篇 机械工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 40 篇 交通运输工程
    • 38 篇 航空宇航科学与技...
    • 29 篇 材料科学与工程(可...
    • 21 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 12 篇 土木工程
    • 12 篇 安全科学与工程
  • 187 篇 理学
    • 66 篇 物理学
    • 57 篇 系统科学
    • 35 篇 数学
    • 17 篇 生物学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 48 篇 医学
    • 33 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 23 篇 教育学
    • 23 篇 教育学
  • 16 篇 农学
    • 11 篇 作物学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,410 篇 software algorit...
  • 3,703 篇 software
  • 1,971 篇 algorithm design...
  • 1,795 篇 hardware
  • 829 篇 computer archite...
  • 786 篇 heuristic algori...
  • 772 篇 application soft...
  • 646 篇 computer science
  • 636 篇 software enginee...
  • 597 篇 software systems
  • 562 篇 computational mo...
  • 540 篇 prediction algor...
  • 535 篇 optimization
  • 515 篇 clustering algor...
  • 466 篇 testing
  • 424 篇 signal processin...
  • 403 篇 accuracy
  • 370 篇 costs
  • 335 篇 machine learning...
  • 328 篇 software testing

机构

  • 17 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 college of compu...
  • 8 篇 department of el...

作者

  • 11 篇 david lo
  • 11 篇 ling chen
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 10 篇 hui li
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 8 篇 jun li
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,328 篇 英文
  • 53 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12410 条 记 录,以下是251-260 订阅
排序:
Self-Adaptive Ising Machines for Constrained Optimization
Self-Adaptive Ising Machines for Constrained Optimization
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Corentin Delacour Department of Electrical and Computer Engineering University of California Santa Barbara
Ising machines (IM) are physics-inspired alternatives to von Neumann architectures for solving hard optimization tasks. By mapping binary variables to coupled Ising spins, IMs can naturally solve unconstrained combina... 详细信息
来源: 评论
OpenCV-based Recognition Method for Computer Interlocking Host Computer Interface
OpenCV-based Recognition Method for Computer Interlocking Ho...
收藏 引用
IEEE Information Technology and Mechatronics Engineering Conference (ITOEC)
作者: Jiapeng Li Wenzhen Kuang Tao He Yajie Li Yanpeng Wu Key Lab of Opt-Electronic Technology and Intelligent Control of Minisitry of Education Lanzhou Jiaotong University Lanzhou China Automatic Control Institute Lanzhou Jiaotong University Lanzhou China Gansu Rail Transit Signal and Control Evaluation Industry Technology Center Lanzhou
In order to improve the efficiency of identifying the operation of computer interlocking host computer interface and promote the improvement of automation, combined with the display standards and requirements of the h... 详细信息
来源: 评论
Evaluating Code Emulating Upsets on Microcontroller Devices
Evaluating Code Emulating Upsets on Microcontroller Devices
收藏 引用
IEEE Southeastcon
作者: Cebron Williams Daniel B. Limbrick John Kelly Christopher Doss Department of Electrical and Computer Engineering North Carolina Agricultural and Technical State University Greensboro NC United States
Fault attacks pose a significant threat to the functionality and reliability of embedded systems, particularly microcontrollers that are widely used in critical applications such as consumer electronics, medical devic... 详细信息
来源: 评论
PEARL: FPGA-Based Reinforcement Learning Acceleration with Pipelined Parallel Environments
PEARL: FPGA-Based Reinforcement Learning Acceleration with P...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Jiayi Li Hongxiao Zhao Wenshuo Yue Yihan Fu Daijing Shi Anjunyi Fan Yuchao Yang Bonan Yan Institute for Artificial Intelligence Peking University Beijing China Beijing Advanced Innovation Center for Integrated Circuits School of Integrated Circuits Peking University Beijing China School of Electronic and Computer Engineering Peking University Shenzhen China Chinese Institute for Brain Research Beijing China
Reinforcement learning (RL) is an effective machine learning approach that enables artificial intelligence agents to perform complex tasks and make decisions in dynamic situations. Training an RL agent demands its rep... 详细信息
来源: 评论
The Concept of Genetic Reverse-Engineering to Restore the Program’s Source Code from a Binary Code: Theory and Applying Practice
The Concept of Genetic Reverse-Engineering to Restore the Pr...
收藏 引用
International Communication Systems and Networks and Workshops, COMSNETS
作者: Konstantin Izrailov Igor Kotenko Computer Security Problems Laboratory St. Petersburg Federal Research Center of the Russian Academy of Sciences Saint-Petersburg Russia
The work is devoted to solving the problem of restoring the representation of the source code of a program (and in the future, algorithms, architecture, etc.) in the form of a binary code, which will allow searching f... 详细信息
来源: 评论
Detecting Cross-Domain Ambiguity In Requirements Through Natural Language Processing, A Systematic Literature Review
Detecting Cross-Domain Ambiguity In Requirements Through Nat...
收藏 引用
International Conference on Advancements in Computational Sciences (ICACS)
作者: Ibrahim Khalil Israr Ahmad Uzair Rasheed Wasi Haider Butt Zaeem Anwaar Department of Computer and Software Engineering CEME NUST Islamabad Pakistan
A strong foundation for a project is the first step to measuring or estimating the success parameters of a project. Requirement engineers gather and elicit the requirements of the project in detail after the feasibili... 详细信息
来源: 评论
The Impact of Technological Progress on the Competencies of Electronics, Radio Engineering, Communications and ICT Specialists
The Impact of Technological Progress on the Competencies of ...
收藏 引用
Systems of Signals Generating and Processing in the Field of on Board Communications
作者: Tatyana A. Kuzovkova Alexander D. Kuzovkov Olga I. Sharavova Ivan M. Sharavov Moscow Technical University of Communications and Informatics Moscow Russia
The development strategy of the electronics industry and the high rates of scientific and technological progress in electronics, radio engineering, communications and ICT require the formation of new competencies of t... 详细信息
来源: 评论
Comparative Analysis of Conventional and Post-Quantum Cryptographic algorithms
Comparative Analysis of Conventional and Post-Quantum Crypto...
收藏 引用
IEEE Southeastcon
作者: Jordan Shropshire Lindsay Nadobny Campbell Hodge Micah Israel Department of Computer Science University of South Alabama Alabama USA
Although quantum computers are still in their infancy, their operational costs are already beginning to decline. Within the next decade, quantum computing systems are expected to become commonplace in large businesses... 详细信息
来源: 评论
Low-Power High-Speed CNN Accelerator with Matrix Reodering Techniques for Small Footprint Memory Access
Low-Power High-Speed CNN Accelerator with Matrix Reodering T...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Hoseong Kim Daejin Park School of Electronics Engineering Kyungpook National University Daegu Korea
In the evolution of artificial intelligence (AI), large - scale data volumes are needed to best represent the information. This dataset is expressed by a matrix or tensor. When data volumes increase, the operational t... 详细信息
来源: 评论
Accurate Estimation of Fiducial Marker Positions Using Motion Capture System
Accurate Estimation of Fiducial Marker Positions Using Motio...
收藏 引用
IEEE/SICE International Symposium on System Integration
作者: Matus Tanonwong Naoya Chiba Koichi Hashimoto Department of System Information Sciences Graduate School of Information Sciences Tohoku University Sendai Japan
In this paper, we present a method for aligning the coordinates of multiple cameras and sensors into a unified coordinate system using a motion capture system. Our simulated convenience store environment includes came... 详细信息
来源: 评论