咨询与建议

限定检索结果

文献类型

  • 11,708 篇 会议
  • 766 篇 期刊文献

馆藏范围

  • 12,474 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,064 篇 工学
    • 1,067 篇 计算机科学与技术...
    • 1,027 篇 电气工程
    • 455 篇 软件工程
    • 382 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 183 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 33 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,474 篇 software algorit...
  • 3,730 篇 software
  • 1,965 篇 algorithm design...
  • 1,777 篇 hardware
  • 825 篇 computer archite...
  • 803 篇 heuristic algori...
  • 761 篇 application soft...
  • 706 篇 software enginee...
  • 645 篇 computer science
  • 598 篇 software systems
  • 571 篇 computational mo...
  • 556 篇 prediction algor...
  • 543 篇 optimization
  • 520 篇 clustering algor...
  • 473 篇 testing
  • 428 篇 accuracy
  • 410 篇 signal processin...
  • 369 篇 costs
  • 346 篇 machine learning...
  • 320 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...
  • 8 篇 college of compu...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,397 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software Algorithms"
12474 条 记 录,以下是4641-4650 订阅
排序:
Preventing Frequency Instability Using Large-Scale Photovoltaic Resources
Preventing Frequency Instability Using Large-Scale Photovolt...
收藏 引用
Technology and Energy Management (ICTEM), International Conference on
作者: Siavash Yari Hamid Khoshkhoo Kumars Rouzbehi S. M. Ale Emran Faculty of Electrical Engineering Sahand University of Technology Sahand Iran Department of System Engineering and Automatic Control University of Seville Seville Spain Faculty of Engineering University of Quebec at Chicoutimi (UQAC)
Various control methods have been presented to prevent the occurrence of instability in power systems, among which, it seems that methods based on the special protection system (SPS) are more effective and efficient t... 详细信息
来源: 评论
Investigating Context Adaptation Bugs in Code Clones
Investigating Context Adaptation Bugs in Code Clones
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Manishankar Mondal Banani Roy Chanchal K. Roy Kevin A. Schneider University of Saskatchewan Saskatoon SK Canada
The identical or nearly similar code fragments in a code-base are called code clones. There is a common belief that code cloning (copy/pasting code fragments) can introduce bugs in a software system if the copied code... 详细信息
来源: 评论
A New Frame Size Adjusting Method for Framed Slotted Aloha Algorithm
A New Frame Size Adjusting Method for Framed Slotted Aloha A...
收藏 引用
IEEE International Conference on e-Business Engineering (ICEBE)
作者: Cuicui Yu Feng Zhou Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China
In this paper, a new frame size adjusting method is proposed for framed slotted ALOHA algorithm in RFID system. This method does not predict the number of tags. The reader just use the current frame size and the total... 详细信息
来源: 评论
ANFIS MPPT Assisted PV Fed DC-DC Switched Z Source Converter For Microgrid Applications
ANFIS MPPT Assisted PV Fed DC-DC Switched Z Source Converter...
收藏 引用
International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: V. P. Karthika Preethy R. Tharwin Kumar P. Radhika Ananthan Nagarajan A. A. Mohamed Faizal M. Sasikumar Department of Electrical and Electronics Engineering Amrita College of Engineering and Technology Nagercoil Tamil Nadu India Department of Electrical and Electronics Engineering Puducherry Technological University Puducherry India Department of Electrical and Electronics Engineering Mallareddy Engineering College for Women Hyderabad India Department of Electrical and Electronics Engineering Vel Tech Multi Tech Dr Rangarajan Dr Sakunthala Engineering College Chennai India Department of Electrical and Electronics Engineering Engineering Faculty V V College of Engineering Tamil Nadu India Department of Electrical and Electronics Engineering C. Abdul Hakeem College of Engineering & Technology India
Photovoltaic (PV) modules are crucial components of contemporary distribution networks, but they have historically been employed primarily to provide profitable, clean, and green energy. An Adaptive Neuro Fuzzy Infere... 详细信息
来源: 评论
Indoor localization using received signal strength
Indoor localization using received signal strength
收藏 引用
International Design and Test Workshop
作者: H A Obeidat R A Abd-Alhameed J M Noras S. Zhu T Ghazaany N. T. Ali E. Elkhazmi Design and Technology University of Bradford UK Khalifa University Sharjah UAE The higher institute of electronics bani walid Libya
A comparison between two indoor localization algorithms using received signal strength is carried out. The first algorithm is the vector algorithm; the second is the matrix algorithm. The comparison considered the eff... 详细信息
来源: 评论
Towards a universal client for grid monitoring systems: design and implementation of the Ovid browser  06
Towards a universal client for grid monitoring systems: desi...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: M.D. Dikaiakos A. Artemiou G. Tsouloupas Department of Computer Science University of Cyprus Nicosia Cyprus
In this paper, we present the design and implementation of Ovid, a browser for grid-related information. The key goal of Ovid is to support the seamless navigation of users in the grid information space. Key aspects o... 详细信息
来源: 评论
Tamper-proof Election Result Verification System in Resource Constrained Environments
Tamper-proof Election Result Verification System in Resource...
收藏 引用
International Conference on Computing and Network Communications (CoCoNet)
作者: Achmad Rully Hidenori Nakazato Graduate School of Global Information and Telecommunication Studies Waseda University Tokyo Japan Dept. of Communications and Computer Engineering Waseda University Tokyo Japan
As an indispensable tool in democracy, election need to be secure and verifiable even in a resource constrain environment, to overcome demography, multicultural and others social challenges. This paper proposes a new ... 详细信息
来源: 评论
Validation & Verification of Intelligent and Adaptive Control Systems
Validation & Verification of Intelligent and Adaptive Contro...
收藏 引用
IEEE Conference on Aerospace
作者: G.S. Tallant P. Bose J.M. Buffington V.W. Crum R.A. Hull T. Johnson B. Krogh R. Prasanth Lockheed Martin Aeronautics Company Fort Worth TX USA Lockheed Martin Missiles and Fire Control Orlando FL USA Lockheed Martin Missiles and Space Sunnyvale CA USA Carnegie Mellon University Pittsburgh PA USA Air Force Research Laboratory OH USA Scientific Systems Company Inc. Woburn MA USA
Emerging military aerospace system operational goals, such as autonomy, will require advanced safety-critical control systems consisting of unconventional requirements, system architectures, software algorithms, and h... 详细信息
来源: 评论
Security Authentication Scheme for Low Earth Orbit Satellites Based on Spatial Channel Characteristics
Security Authentication Scheme for Low Earth Orbit Satellite...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Li Rui Jun Liu Miaoxia Lu College of Information Science and Engineering Nanjing Audit University Jinshen College Nanjing China
Security authentication can effectively solve the problem of access to Low Earth Orbit (LEO) satellites. However, the existing solutions still harbor some problems in the computational complexity of satellite authenti... 详细信息
来源: 评论
Identifying the split personality of the malicious host in the mobile agent environment
Identifying the split personality of the malicious host in t...
收藏 引用
International IEEE Conference on Intelligent Systems, IS
作者: S. Venkatesan C. Chellappan Department of CSE Anna University Chennai India
Mobile agents are software programs capable of working autonomously and automatically. Mobile agents in the network will be the problem for the remote host if it is a malicious agent and also problem to the agent whil... 详细信息
来源: 评论