咨询与建议

限定检索结果

文献类型

  • 11,708 篇 会议
  • 771 篇 期刊文献

馆藏范围

  • 12,479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,072 篇 计算机科学与技术...
    • 1,032 篇 电气工程
    • 455 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 29 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 185 篇 理学
    • 63 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,479 篇 software algorit...
  • 3,731 篇 software
  • 1,965 篇 algorithm design...
  • 1,777 篇 hardware
  • 826 篇 computer archite...
  • 805 篇 heuristic algori...
  • 761 篇 application soft...
  • 706 篇 software enginee...
  • 645 篇 computer science
  • 598 篇 software systems
  • 571 篇 computational mo...
  • 559 篇 prediction algor...
  • 545 篇 optimization
  • 521 篇 clustering algor...
  • 473 篇 testing
  • 428 篇 accuracy
  • 412 篇 signal processin...
  • 371 篇 costs
  • 348 篇 machine learning...
  • 320 篇 software testing

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...
  • 8 篇 college of compu...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,401 篇 英文
  • 49 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Software algorithms"
12479 条 记 录,以下是221-230 订阅
Three Eyed Raven: An On-Chip Side Channel Analysis Framework for Run-Time Evaluation
Three Eyed Raven: An On-Chip Side Channel Analysis Framework...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: M Dhilipkumar Priyanka Bagade Debapriya Basu Roy Department of Computer Science & Engineering Indian Institute of Technology Kanpur India
Side-channel attacks exploit the physical leakages from hardware components, such as power consumption, to break secure cryptographic algorithms and retrieve their secret key. Evaluating implementations of cryptograph... 详细信息
来源: 评论
Intelligent Cybersecurity Defense Strategies Based on Large Language Model Agents
Intelligent Cybersecurity Defense Strategies Based on Large ...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Deyang Ye Zihao Wang Yuyan Song Jingtian Liang School of Cyber Science and Engineering Xi'an Jiaotong University Xi’an China School of Computer Science China West Normal University Nanchong China School of Software Engineering Xi'an Jiaotong University Xi’an China School of Computer and Information Engineering Shanghai Second Polytechnic University China
As the complexity of cyberattacks continues to increase, traditional static defense strategies have shown significant limitations. This study proposes an intelligent cybersecurity defense framework based on large lang... 详细信息
来源: 评论
CPT Manager: An Open Environment for Constrained Path-Based Testing
CPT Manager: An Open Environment for Constrained Path-Based ...
收藏 引用
IEEE International Conference on software Testing Verification and Validation Workshop, ICSTW
作者: Matej Klima Miroslav Bures Daniel Holotik Maximilian Herczeg Marek Miltner Chad Zanocco Dept. of Computer Science FEE Czech Technical University in Prague Prague Czechia Civil and Environmental Engineering Stanford University Stanford California Dept. of Economics Management and Humanities Czech Technical University in Prague FEE Prague Czechia
Path-based Testing is a common technique to test System Under Test (SUT) processes. Generally, a directed graph that models a system’s workflow is input to the test path generation process, as well as the selected te... 详细信息
来源: 评论
Performance Evaluation of Grey Wolf Optimizer and P&O MPPT for PV Systems under Shading
Performance Evaluation of Grey Wolf Optimizer and P&O MPPT f...
收藏 引用
Innovative Research in Applied Science, Engineering and Technology (IRASET),Conference on
作者: Rachid Zriouile Lahoussine Bouhouch Ismail Isknan Abdeslam Elfanaoui Physics Department Materials and Renewable Energy Laboratory Faculty of Sciences University of Ibn Zohr Agadir Morocco
MPPT techniques are fundamental for boosting the efficiency of photovoltaic arrays under varying climatic situations. This work evaluates the performance of the Grey Wolf Optimizer (GWO) strategy, and the classic Pert... 详细信息
来源: 评论
Advancements in Drug Discovery Through Machine and Deep Learning Concepts in Early-Stage of Drug Discovery for Apoptosis
Advancements in Drug Discovery Through Machine and Deep Lear...
收藏 引用
Disruptive Technologies (ICDT), International Conference on
作者: Kushagra Saxena Ankita Srivastava Hemant Kumar Department of Computer Science and Engineering Indian Institute of Information Technology Ranchi Ranchi Jharkhand India Department of Computer Science Babasaheb Bhimrao Ambedkar University Lucknow India
Within the rapidly shifting field of drug discovery, ML and DL techniques have opened new directions for identifying potential therapeutic compounds with higher efficiency and accuracy. The present work explores the i... 详细信息
来源: 评论
Harnessing the Power of the LUMI Supercomputer for Advanced Trading Simulations
Harnessing the Power of the LUMI Supercomputer for Advanced ...
收藏 引用
International Scientific-Professional Conference on Information Technology (IT)
作者: Ognjen Iković Nebojša Janović Milan Jovović Nikola Perović Dejan Radulović Nikola Žarić INVT Novi Sad Serbia PAID MNE Podgorica Montenegro Faculty of Electrical Engineering University of Montenegro Podgorica Montenegro
Supercomputers have significantly transformed capabilities in data processing and analysis across various sectors, including finance, where they facilitate complex trading simulations and predictive modeling. This pap... 详细信息
来源: 评论
Super Twisting Control Strategy Implemented on a Bidirectional DISO DC-DC Converter
Super Twisting Control Strategy Implemented on a Bidirection...
收藏 引用
Iranian Conference on Renewable Energy and Distributed Generation (ICREDG)
作者: Amirhossein Hosseini Saeed Hosseinnataj Majid Mehrasa Jafar Adabi Dept. of Electrical Engineering Noshirvani University of Technology Babol IRAN Univ. Lille Arts et Metiers Institute of Technology Centrale Lille Junia ULR France Dept. of Electrical Engineering University of New Orleans New Orleans USA
In this paper, a fast dynamic and chattering-free control strategy called super-twisting controller (STC) is introduced. The STC controller generates a proper input signal to the bidirectional dual input single output... 详细信息
来源: 评论
Formal Verification of Error Bounds for Resistive-Switching-Based Multilevel Matrix-Vector Multipliers
Formal Verification of Error Bounds for Resistive-Switching-...
收藏 引用
IEEE International Symposium on Quality Electronic Design
作者: Kemal Çağlar Coşkun Chandan Kumar Jha Muhammad Hassan Rolf Drechsler Institute of Computer Science University of Bremen Bremen Germany Cyber-Physical Systems DFKI GmbH Bremen Germany
The need for performance and energy efficiency by expanding technologies such as internet-of-things devices and artificial neural networks (ANNs) has led to the exploration of in-memory computing paradigms, specifical... 详细信息
来源: 评论
A Framework for PCB Design File Reconstruction from X-Ray CT Annotations
A Framework for PCB Design File Reconstruction from X-Ray CT...
收藏 引用
IEEE International Symposium on Quality Electronic Design
作者: Carson Sobolewski David S. Koblah Domenic Forte Florida Institute for National Security University of Florida Gainesville FL USA
Reverse engineering (RE) is often used in security-critical applications to determine the structure and functionality of various systems, including printed circuit boards (PCBs). Although it has both beneficial and ma... 详细信息
来源: 评论
Research on modifiable digital watermarking scheme based on QRcode and blockchain
Research on modifiable digital watermarking scheme based on ...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Yukun Hui School of Cyberspace Security Xi'an University of Posts& Telecommunications Xi'an China
Existing digital watermarking techniques for vector geographic data based on spatio-temporal domains face problems such as high computational complexity, low embedding capacity of effective watermark information, and ... 详细信息
来源: 评论