咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12566 条 记 录,以下是1061-1070 订阅
排序:
Post-Quantum Cryptography Integration to O-RAN
Post-Quantum Cryptography Integration to O-RAN
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Abdullah Aydeger Engin Zeydan Josep Mangues Dept. of Electrical Engineering and Computer Science Florida Institute of Technology Melbourne FL USA Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) Barcelona Spain
With its disaggregated and open interfaces, the Open Radio Access Network (O-RAN) architecture promises flexibility, innovation, and cost-effectiveness for future wireless networks. However, the increased reliance on ... 详细信息
来源: 评论
FrEDDY: Modular and Efficient Framework to Engineer Decision Diagrams Yourself
FrEDDY: Modular and Efficient Framework to Engineer Decision...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Rune Krauss Jan Zielasko Rolf Drechsler DFKI Bremen Germany University of Bremen / DFKI Bremen Germany
The hardware complexity in electronic devices used by today's society has increased significantly in recent decades due to technological progress. In order to cope with this complexity, data structures and algorit... 详细信息
来源: 评论
Automatic Generation of Optimal Standard-Size Series of Engineering Products Using Modified Method For Calculating Total Cost of Ownership
Automatic Generation of Optimal Standard-Size Series of Engi...
收藏 引用
International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)
作者: Vitaly S. Antipenko Nataliya S. Nikolaeva Moscow Automobile and Road Construction State Technical University (MADI) Moscow Russian Federation Bauman Moscow State Technical University Moscow Russian Federation
In order to create and re-equip modern production facilities, it is necessary, based on long-term technical and economic forecasting, to form an appropriate mathematical model that takes into account, among other thin... 详细信息
来源: 评论
Clustering Technique Based on ARSH-FATI for Data Transmission in WSN-IoT Healthcare System
Clustering Technique Based on ARSH-FATI for Data Transmissio...
收藏 引用
Multi-Agent Systems for Collaborative Intelligence (ICMSCI), International Conference on
作者: P. Vinoth Kumar R. Jayanthi S. Sivaranjani S. Pradeep Department of Electronics and Communication Engineering Nandha College of Technology Erode Tamilnadu India Department of Electronics and Communication Engineering M.Kumarasamy College of Engineering Karur Tamilnadu India Department of Electronics Engineering K.S.Rangasamy College of Technology Tiruchengode Namakkal India
This research study investigates the use of the Internet of Things in the health sector in terms of minimizing hospital visit costs, optimizing human resources, and enhancing the quality of healthcare. It tackles a cr... 详细信息
来源: 评论
Research on Heterogeneous Edge Server Deployment Strategy Based on Traffic Prediction
Research on Heterogeneous Edge Server Deployment Strategy Ba...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Xinyu Sun Bo Wang Yaoli Xu Software College Zhengzhou University of Light Industry Zhengzhou China
Mobile edge computing (MEC), as an emerging computing paradigm, significantly enhances computational efficiency and reduces latency. In this paper, we address the heterogeneous server deployment problem in MEC. Levera... 详细信息
来源: 评论
Uncovering the Challenges: A Study of Corner Cases in Bug-Inducing Commits
Uncovering the Challenges: A Study of Corner Cases in Bug-In...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Atakan Şerifoğlu Eray Tüzün Computer Science Bilkent University Ankara Turkey
In software development, accurately identifying bug-inducing commits (BICs) is crucial for maintaining code integrity and ensuring the reliability of software systems. The complexities involved in pinpointing the exac... 详细信息
来源: 评论
Coverage Metrics for T-Wise Feature Interactions
Coverage Metrics for T-Wise Feature Interactions
收藏 引用
International Conference on software Testing, Verification, and Validation, ICST
作者: Sabrina Böhm Tim Jannik Schmidt Sebastian Krieter Tobias Pett Thomas Thum Malte Lochau University of Ulm Germany University of Ulm Paderborn University Germany TU Braunschweig Germany Karlsruhe Institute for Technology Germany University of Siegen Germany
software is typically configurable by means of compile-time or runtime variability. As testing every valid configuration is infeasible, T-Wise sampling has been proposed to systematically derive a relevant subset of t... 详细信息
来源: 评论
Research on Key Technologies of Cooperative Spectrum Sensing Based on Game Theory
Research on Key Technologies of Cooperative Spectrum Sensing...
收藏 引用
Consumer Electronics and Computer Engineering (ICCECE), 2021 IEEE International Conference on
作者: Rong Wang Dongtao Wang Hunan Automotive Engineering Vocational University Zhuzhou China
In response to the spectrum scarcity issue caused by industrial development, a two-layer game approach is proposed to improve spectrum utilization. Due to the selfishness of secondary users (SUs), each SU needs to con... 详细信息
来源: 评论
Lightweight Convolutional YOLOv5 for Real-Time Object Detection in Infrared Stereo Images
Lightweight Convolutional YOLOv5 for Real-Time Object Detect...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Weishen Li Yuqing Lao Xiao Zhong Jianya Wang Wenxu Zhao Hao Tang School of Transportation and Economic Management Guangdong Communication Polytechnic Guangzhou China School of International Education Yellow River Conservancy Technical Institute Kaifeng China
Since under low-illumination and high-interference environments, infrared binocular images still have more accurate depth and target information, how to effectively achieve real-time and accurate object detection on t... 详细信息
来源: 评论
Exploration of Image Privacy Protection Technology Using Generative Adversarial Networks
Exploration of Image Privacy Protection Technology Using Gen...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Yue Shang Shihezi University China
As digital images spread widely, privacy protection has become a critical issue. This study focuses on exploring the application of Generative Adversarial Networks (GANs) in image privacy protection. By deeply analyzi... 详细信息
来源: 评论