咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12566 条 记 录,以下是4291-4300 订阅
排序:
Highly Dynamic Bipedal Locomotion via an Improved Virtual Model Algorithm
Highly Dynamic Bipedal Locomotion via an Improved Virtual Mo...
收藏 引用
IEEE International Conference on Robotics and Biomimetics
作者: Zhengguo Zhu Weiliang Zhu Zhongkai Sun Yibin Li Xuewen Rong Guoteng Zhang School of Control Science and Engineering Shandong University Jinan China
In this paper, we propose a new virtual model control(VMC) algorithm combining inverse dynamic control and optimization. In our framework, inverse dynamics algorithm finds the feedforward term of the expected torque o... 详细信息
来源: 评论
Statistical Tests for Replacement Blocks Assessment
Statistical Tests for Replacement Blocks Assessment
收藏 引用
IEEE NW Russia Young Researchers in Electrical and Electronic Engineering Conference (EIConRusNW)
作者: Ilya V. Chugunkov Bogdana V. Kliuchnikova Iuliia S. Riakhovskaia Vladimir I. Chugunkov National Research Nuclear University MEPhI (Moscow Engineering Physics Institute) Moscow Russia National Research University MPEI (Moscow Power Engineering Institute) Moscow Russia
The basic operations of the round function of any block cipher are substitution and permutation. The article discusses approaches to the implementation of the replacement operation. The main cryptographic primitive, n... 详细信息
来源: 评论
Regularized Semi-Nonnegative Matrix Factorization Using L2,1-Norm for Data Compression
Regularized Semi-Nonnegative Matrix Factorization Using L2,1...
收藏 引用
Data Compression Conference (DCC)
作者: Anthony Rhodes Bin Jiang Portland State University Portland OR USA
We present a robust, parts-based data compression algorithm, L21 Semi-Nonnegative Matrix Factorization (L21 SNF) for mixed-sign data. To resolve the instability issue caused by the Frobenius norm due to the effects of... 详细信息
来源: 评论
The Visualization of Cross-media Knowledge Graph of Tang and Song Poetry
The Visualization of Cross-media Knowledge Graph of Tang and...
收藏 引用
software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD-Winter), ACIS International Winter Conference on
作者: Wenjuan Jiang Chunfang Li Changti Wu School of Computer Science and Cybersecurity Communication University of China Beijing China
The special grammar and abstruse rhetoric of Tang and Song poetry doomed the diversity of poetry research. In order to help scholars explore the information space of poetry, we took into account the breadth and depth ... 详细信息
来源: 评论
Simulation of Fast Transformation Procedures in Galois Fields to Estimate Efficiency of Perspective Signals Generation and Processing Devices
Simulation of Fast Transformation Procedures in Galois Field...
收藏 引用
Systems of Signals Generating and Processing in the Field of on Board Communications
作者: V. Y. Mikhaylov R. B. Mazepa Moscow Aviation Institute (National Research University) Moscow Russia
The object of consideration is design automation and prototyping of complex signals and their generation and processing devices. The subject of the analysis is the substantiation of the structure, composition and impl... 详细信息
来源: 评论
Design and Sizing of Home PV/Battery System with Energy Cost Constraint using Web Application
Design and Sizing of Home PV/Battery System with Energy Cost...
收藏 引用
International Electrical Engineering Congress (iEECON)
作者: Thanakorn Tungjittrong Nithiphat Teerakawanich Kasetsart University Bangkok Thailand
This paper presents the sizing optimization of photovoltaic panels and batteries in home energy management systems using the in-house developed web-based application. The application can recommend an optimal size of t... 详细信息
来源: 评论
AutoCAD to G-code Converter
AutoCAD to G-code Converter
收藏 引用
IEEE Punecon
作者: Venkata Suresh Yarava Electrical and Electronics Engineering Vardhaman College of Engineering Hyderabad India
Numeric Controls are common today for the automated control of machining tools. High speed computer is used as an interface to implement such controls. This study aims to generate a G-code, directly from a drawing, Au... 详细信息
来源: 评论
Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures
Implementation of an extended FIDO2 authenticator using Attr...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Yuto Okawa Shuji Yamaguchi Hidehito Gomi Tetsutaro Uehara Graduate School of Information Science and Engineering Ritsumeikan University Shiga Japan Yahoo Japan Corporation TokyoJapan College of Information Science and Engineering Ritsumeikan University Shiga Japan
Passwords has been used as an authentication method for Web services, but it has some issues in terms of usability and security. FIDO solves these problems and is now being used as an authentication method. It consist... 详细信息
来源: 评论
An exploration of live e-commerce paths from an algorithmic research perspective
An exploration of live e-commerce paths from an algorithmic ...
收藏 引用
Big Data & Artificial Intelligence & software Engineering (ICBASE), International Conference on
作者: Wenxi Zeng Jingying Ding Zehao Jin School of College of Communication Science and Art Chengdu University of Technology Chengdu China School of Journalism and Communication Hong Kong Shue Yan University Hong Kong China School of International and Communication and Education Communication School of Zhejiang Hangzhou China
Live delivery as a new e-commerce marketing model is in a period of rapid development. It uses algorithms to review content and optimize resource allocation to increase traffic and transaction data. It has become an e... 详细信息
来源: 评论
Development of an Algorithm for Detecting Cyberattacks in Distributed Information Systems
Development of an Algorithm for Detecting Cyberattacks in Di...
收藏 引用
International Computer Sciences and Information Technologies (CSIT)
作者: Olexander Belej Nataliia Spas Iryna Artyshchuk Lviv Polytechnic National University Lviv Ukraine
The proposed study is devoted to the development of an algorithm for detecting network attacks. The considered approach to detection of attacks is based on monitoring and the description of states of the behavior of d... 详细信息
来源: 评论