咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12566 条 记 录,以下是4411-4420 订阅
排序:
Comparison of Ant Colony Optimization and Artificial Bee Colony algorithms for Solving Electronic Support Search Dwell Scheduling Problem
Comparison of Ant Colony Optimization and Artificial Bee Col...
收藏 引用
software Engineering Symposium (UYMS), Turkish National
作者: Okan Erkut Fırat Hardalaç The Facility of Radar And Electronic Warfare Systems ASELSAN A.S. Ankara Turkey Gazi University Ankara Turkey
Electronic support search dwell scheduling is a combinatorial optimization problem which appears when the dwells overlapping on frequency domain are assigned to different receivers and required to be executed simultan... 详细信息
来源: 评论
Intelligent algorithms for Dynamic Spectrum Access a Secondary User in Cognitive Radio Systems
Intelligent Algorithms for Dynamic Spectrum Access a Seconda...
收藏 引用
Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)
作者: E. O. Kandaurova D. S. Chirov Moscow Technical University of Communications and Informatics Moscow Russia
Recently, there have been problems in the development of new technologies and communication services in the field of telecommunications. The main problem is the deficit of a radio frequency spectrum. Research by measu... 详细信息
来源: 评论
E3: A HW/SW Co-design Neuroevolution Platform for Autonomous Learning in Edge Device
E3: A HW/SW Co-design Neuroevolution Platform for Autonomous...
收藏 引用
IEEE International Symposium on Performance Analysis of Systems and software
作者: Sheng-Chun Kao Tushar Krishna Electrical and Computer Engineering Georgia Institute of Technology Atlanta GA
The true potential of AI can be realized once we move beyond supervised training using labelled datasets on the cloud to autonomous learning on edge devices. While techniques like Reinforcement Learning are promising ... 详细信息
来源: 评论
Dynamic Key Generation Mechanism to Strengthen the Data Security
Dynamic Key Generation Mechanism to Strengthen the Data Secu...
收藏 引用
International Carnahan Conference on Security Technology
作者: J.S. Prasath Deepa Jose B. Rammyaa R. Pandian KCG College of Technology Chennai TamilNadu India Sathyabhama Institute of Science and Technology Chennai
Information Technology (IT) networks are susceptible to varieties of intrusions. Data communication through industrial networks needs to be protected from unauthorized access. The number of attacks increases rapidly d... 详细信息
来源: 评论
A Hypothesis Testing tool for the comparison of different Cyber-Security Mitigation Strategies in IoT
A Hypothesis Testing tool for the comparison of different Cy...
收藏 引用
IOT, Electronics and Mechatronics Conference (IEMTRONICS), IEEE International
作者: Asterios Mpatziakas Stavros Papadopoulos Anastasios Drosou Dimitrios Tzovaras Information Technologies Institute Centre for Research and Technology (CERTH) Thessaloniki Greece
Internet of Things (IoT) is a field with tremendous growth that already shows great impact in numerous domains. Simultaneous with this development is the need for better Cyber-security: IoT systems are attacked by var... 详细信息
来源: 评论
Release of Trajectory Data based on Space Segmentation using Differential Privacy
Release of Trajectory Data based on Space Segmentation using...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yongxin Zhao Wanqing Wu Chaofan Di School of cyber security and computer Hebei University Baoding China
The applications of location-based services(LBS) are increasingly important in people's daily life. However, these services may lead to privacy leakage, which causes more and more users to worry about privacy issu... 详细信息
来源: 评论
Custom TTA Operations for Accelerating Kyber Algorithm
Custom TTA Operations for Accelerating Kyber Algorithm
收藏 引用
International Conference on Electrical and Electronics Engineering, ELECO
作者: Latif Akcay Berna Ors Bayburt University Bayburt Turkey Electronics and Communication Engineering Istanbul Technical University Istanbul Turkey
In recent years, quantum computer development projects have progressed considerably in terms of quality and quantity. These studies also pose a serious risk for widely used security systems based on classical public-k... 详细信息
来源: 评论
A Systematic Review of Techniques, Tools and Applications of Machine Learning
A Systematic Review of Techniques, Tools and Applications of...
收藏 引用
Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), International Conference on
作者: Abhishek Abhishek Dhankar Neha Gupta Manav Rachna International Institute of Research and Studies Faridabad India
Machine Learning is a part of Artificial Intelligence. A branch of artificial Intelligence(AI), that offers the capability to the system by learning on their own and work better from experience without human intervent... 详细信息
来源: 评论
Inspection Code Generator for Hole Cylindrical Feature Evaluation in On-Machine Measurement Process for Computer-Aided Inspection Planning
Inspection Code Generator for Hole Cylindrical Feature Evalu...
收藏 引用
Computer Science and Engineering (IC2SE), International Conference on
作者: Yogi Muldani Hendrawan Andri Pratama Herman Budi Harja Muhammad Udin Harun Al Rasyid Idris Winarno Politeknik Manufaktur Bandung Bandung Indonesia Politeknik Elektronika Negeri Surabaya Surabaya Indonesia
In this paper, the development of inspection code generator for hole cylindrical feature evaluation is reported. The development process aims to enable on-machine measurement process through Computer Aided Inspection ... 详细信息
来源: 评论
Personalized Models in Human Activity Recognition using Deep Learning
Personalized Models in Human Activity Recognition using Deep...
收藏 引用
International Conference on Pattern Recognition
作者: Hamza Amrani Daniela Micucci Paolo Napoletano University of Milano - Bicocca Milan Italy
Current sensor-based human activity recognition techniques that rely on a user-independent model struggle to generalize to new users and on to changes that a person may make over time to his or her way of carrying out... 详细信息
来源: 评论