咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12566 条 记 录,以下是4321-4330 订阅
排序:
ADMM-Based ML Decoding: from Theory to Practice
ADMM-Based ML Decoding: from Theory to Practice
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Kira Kraft Norbert Wehn Microelectronic Systems Design Research Group Technische Universität Kaiserslautern Kaiserslautern Germany
Integer Linear Programming (ILP) is a general method to solve the Maximum-Likelihood (ML) decoding problem for all kinds of binary linear codes. To this end, state-of-the-art techniques use a Branch-and-Bound (B&B... 详细信息
来源: 评论
Probabilistic Graph Matching with Multiplicative Updating Algorithm for Correspondence between Remote Sensing Images
Probabilistic Graph Matching with Multiplicative Updating Al...
收藏 引用
Information Communication and software Engineering (ICICSE), IEEE International Conference on
作者: Jing Yang Xu Yang Zhang-Bing Zhou Zhi-Yong Liu School of Information Engineering China University of Geosciences(Beijing) State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China School of Information Engineering China University of Geosciences(Beijing) TELECOM SudParis Beijing China State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Center for Excellence in Brain Science and Intelligence Technology Beijing China
Point correspondence is an important problem in remote sensing images matching task which lays the foundation for the image registration task. Due to the existence of the rotation transformation and the large scale, a... 详细信息
来源: 评论
Path Planning for Welding Robot based on Ant colony Optimization Algorithm
Path Planning for Welding Robot based on Ant colony Optimiza...
收藏 引用
International Conference on Artificial Intelligence and Advanced Manufacturing (AIAM)
作者: Chenxu Duan Pan Zhang School of Mechanical Engineering Sichuan University Jinjiang College Meishan China
Since welding robots have to traverse a large number of welding points during welding operations, the length of the welding path directly affects the working time and production efficiency of the automatic line. In re... 详细信息
来源: 评论
Efficient SMT-Based Model Checking for Signal Temporal Logic  21
Efficient SMT-Based Model Checking for Signal Temporal Logic
收藏 引用
IEEE International Conference on Automated software Engineering (ASE)
作者: Jia Lee Geunyeol Yu Kyungmin Bae POSTECH Pohang South Korea
Signal temporal logic (STL) is widely used to specify and analyze properties of cyber-physical systems with continuous behaviors. However, STL model checking is still quite limited, as existing STL model checking meth... 详细信息
来源: 评论
An on-line Monitoring Method for Vibration and Partical Discharge of Power Transformer
An on-line Monitoring Method for Vibration and Partical Disc...
收藏 引用
Electrical Engineering and Automation (IFEEA), International Forum on
作者: Qiao Guan Xingwei Liu Baofeng Xi State Key Lab.of Electrical Insulation and Power Equipment Xi’an Jiaotong University Xi’an Shaanxi China
A broadband Fabry Perot (F-P) fiber Bragg grating array sensor is used. The sensor can detect both vibration and partial discharge parameters at the same time. Based on this sensor, an on-line monitoring device for vi... 详细信息
来源: 评论
DEMO: top-k cardinality estimation with HyperLogLog sketches
DEMO: top-k cardinality estimation with HyperLogLog sketches
收藏 引用
International Conference on Intelligence in Next Generation Networks (ICIN)
作者: Valerio Bruschi Salvatore Pontarelli Jerome Tolle Dave Barach Giuseppe Bianchi CNIT/University of Rome Tor Vergata Cisco Systems
A recurring task in security monitoring consists in finding scan-type flows, namely flows which exhibit a large cardinality in terms of number of distinct source/destination addresses, or in most generality packet-lev... 详细信息
来源: 评论
Performance Metrics Calculation for Assembly Systems with Exponential Reliability Machines
Performance Metrics Calculation for Assembly Systems with Ex...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Yishu Bai Liang Zhang
Assembly systems are commonly seen in production practice, where multiple components are joined in a manufacturing process to make a final product. In this paper, a decomposition/aggregation-based method is presented ... 详细信息
来源: 评论
Real Time Cardiac Diagnosis for Arrhythmia Using Machine Learning and IOT
Real Time Cardiac Diagnosis for Arrhythmia Using Machine Lea...
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: E S Vani K S Swarnalatha B Chetan Arbind Mahato Sylvia Sauden Gautham S Kamath Jason Elroy Martis NMIT Bangalore India NMAMIT Mangalore India
Cardiac arrhythmia is a perilous infection that leads to extreme medical issues in people. An ideal analysis of arrhythmia can be valuable in preventing deaths due to cardiac conditions. Through persistent, automated,... 详细信息
来源: 评论
Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications
Modular Inverse for Integers using Fast Constant Time GCD Al...
收藏 引用
International Conference on Field Programmable Logic and Applications
作者: Sanjay Deshpande Santos Merino del Pozo Victor Mateu Marc Manzano Najwa Aaraj Jakub Szefer Computer Architecture and Security Laboratory Yale University New Haven CT USA Cryptography Research Centre Technology Innovation Institute Abu Dhabi UAE Digital Security Group Faculty of Science Radboud University Nijmegen Netherlands Faculty of Engineering Mondragon Unibertsitatea Mondragon Spain Okinawa Institute of Science and Technology Okinawa Japan
Modular inversion, the multiplicative inverse of an integer in the ring of integers modulo a prime number, is widely used in public-key cryptography. However, it is one of the most computationally intensive operations... 详细信息
来源: 评论
Data-driven Network Orchestrator for 5G Satellite-Terrestrial Integrated Networks: The ANChOR Project
Data-driven Network Orchestrator for 5G Satellite-Terrestria...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Fabio Patrone Giacomo Bacci Antonio Galli Pietro Giardina Giada Landi Michele Luglio Mario Marchese Mattia Quadrini Cesare Roseti Giancarlo Sperlì Attilio Vaccaro Francesco Zampognaro University of Genoa Genoa Italy MBI srl Pisa Italy Consorzio Interuniversitario Nazionale per l'Informatica (CINI) Naples Italy Nextworks Pisa Italy Consorzio Nazionale Interuniversitario per i Trasporti e la Logistica (NITEL) Rome Italy
Satellite communications (SatCom) have a role of advanced service enablers in the new virtual networks, following 3GPP specifications. Specifically, the satellite peculiar characteristics are of paramount importance t... 详细信息
来源: 评论