咨询与建议

限定检索结果

文献类型

  • 11,735 篇 会议
  • 774 篇 期刊文献

馆藏范围

  • 12,509 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,072 篇 计算机科学与技术...
    • 1,032 篇 电气工程
    • 455 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 29 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 185 篇 理学
    • 63 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,509 篇 software algorit...
  • 3,747 篇 software
  • 1,965 篇 algorithm design...
  • 1,781 篇 hardware
  • 828 篇 computer archite...
  • 812 篇 heuristic algori...
  • 762 篇 application soft...
  • 708 篇 software enginee...
  • 645 篇 computer science
  • 599 篇 software systems
  • 574 篇 computational mo...
  • 560 篇 prediction algor...
  • 552 篇 optimization
  • 523 篇 clustering algor...
  • 475 篇 testing
  • 430 篇 accuracy
  • 413 篇 signal processin...
  • 372 篇 costs
  • 350 篇 machine learning...
  • 322 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,431 篇 英文
  • 49 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12509 条 记 录,以下是4491-4500 订阅
排序:
The Horizontal INR Conflict-Detection Algorithm: Revealing INR Reallocation and Reauthorization in RPKI*
The Horizontal INR Conflict-Detection Algorithm: Revealing I...
收藏 引用
IFIP/IEEE International Symposium on Integrated Network Management
作者: Hui Zou Di Ma Qing Shao Wei Mao Chinese Academy of Sciences University of Chinese Academy of Sciences ZDNS Corporation Beijing China Chinese Academy of Sciences ZDNS Corporation Beijing China
Resource Public Key Infrastructure (RPKI) is a promising security enhancement to the Border Gateway Protocol, but it only requires the relying party (RP) to validate Internet Number Resource (INR) allocation or author... 详细信息
来源: 评论
Improving satellite ranging equipment engineering algorithm by utilizing an expert system
Improving satellite ranging equipment engineering algorithm ...
收藏 引用
International Seminar on Electron Devices Design and Production (SED)
作者: Andrey N. Zotov HSE Tikhonov Moscow Institute of Electronics and Mathematics Moscow Russia
This paper discusses shortcomings of the modern equipment design algorithm and proposes usage of an expert system as one of the tools for improving the algorithm. Problems of creating such a system are discussed. An e... 详细信息
来源: 评论
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
Computer Communication and Network Security (CCNS), International Conference on
作者: Shao Yuwen Zhang Zheng Li Bingzheng Ji Xinsheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China R&D Center National Digital Switching System Engineering & Technological Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论
Communication SoC based on 1oo2D architecture for industrial human-robot-collaboration
Communication SoC based on 1oo2D architecture for industrial...
收藏 引用
IEEE SSD International Multi-Conference on Systems, Signals and Devices
作者: Mohamed Abdelawwad Malte Drabesch Michael Schwarz Muhammad Ikram Hafiz Josef Börcsök ICAS Institute for Computer Architecture and System Programming University of Kassel Kassel Germany
The mechanical force imparted by industrial robots is enormous and can lead to dangerous situations for human workers and property if they malfunction. System designs based on the redundancy concept are essential to a... 详细信息
来源: 评论
Transformer Through Fault protection - challenges and improvements in asset monitoring for precise predictive maintenance
Transformer Through Fault protection - challenges and improv...
收藏 引用
IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia)
作者: Venkatesh Rokkam Chakravarthy M Emmoji Vundekari Senior customer application engineer GE Grid Solutions HyderabadINDIA
Transformers are one of the critical assets in the substation. In general, transformers are protected with differential or unit protection and the protection zone is defined by the location of CTs. Through faults or e... 详细信息
来源: 评论
Method for Transmitting Information under Conditions of Excess of Interference Level over Useful Narrowband Signal
Method for Transmitting Information under Conditions of Exce...
收藏 引用
International Seminar on Electron Devices Design and Production (SED)
作者: Dmitrii Artamonov Nikolay Grachev National Research University Higher School of Economics Moscow Russia
There are various methods for suppressing radio interference in communications. In particular, interference exceeding the useful signal level. However, these methods in most cases are based on the parameters of the in... 详细信息
来源: 评论
Optimization of WinRAR Password Cracking Algorithm Based on Heterogeneous Computing
Optimization of WinRAR Password Cracking Algorithm Based on ...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Hao Yin Lulin Ni Science and Technology on Communication Security Laboratory ChengduChina
Different versions of WinRAR compression software use SHA-1, SHA-256 as the core and use AES-128, AES-256, and CRC32 as verification encryption. WinRAR passwords are difficult to crack, and high-efficiency hardware ac... 详细信息
来源: 评论
Integrated models for electrical distribution network planning and district-scale building energy use
Integrated models for electrical distribution network planni...
收藏 引用
Power Tech Conference
作者: Luca De Rosa Carlos Mateo Domingo Tomás Gómez San Roman Rawad El Kontar Ben Polly Katherine Fleming Tarek Elgindy Institute for Research in Technology ICAI Universidad Pontificia Comillas Madrid Spain National Renewable Energy Laboratory Golden Colorado USA
The increase of greenhouse emissions caused by a rise in global energy consumption is pushing the scientific community to develop tools that address key environmental, techno-economic and social issues. One specific a... 详细信息
来源: 评论
MPPT Techniques Investigation in Photovoltaic System
MPPT Techniques Investigation in Photovoltaic System
收藏 引用
International Renewable and Sustainable Energy Conference (IRSEC)
作者: Hicham Oufettoul Ghassane Aniba Saad Motahhir Mohammadia School of Engineers Mohammed V University in Rabat Rabat Morocco Ecole Nationale des Sciences Appliquées Université sidi Mohamed Ben Abdellah Fès Morocco
Pollution, depletion of fossil fuel sources, increasing energy demands.... various circumstances encourage the integration of renewable energies, including solar systems, which require a smart and cost-effective solut... 详细信息
来源: 评论
Study of ReRAM Neuromorphic Circuit Inference Accuracy Robustness using DTCO Simulation Framework
Study of ReRAM Neuromorphic Circuit Inference Accuracy Robus...
收藏 引用
IEEE Workshop on Microelectronics and Electron Devices, WMED
作者: Hoang Cao Thanh Lam Hoi Nguyen Ayyaswamy Venkattraman David Parent Hiu Yung Wong San Jose State University San Jose California USA University of California Merced Merced California USA
A Design-Technology Co-Optimization (DTCO) framework is constructed to study the algorithm-circuit-device interaction for optimizing emerging memory-based neuromorphic computing circuits. The framework consists of 3 p... 详细信息
来源: 评论