咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12566 条 记 录,以下是1221-1230 订阅
排序:
Preserving Privacy in Data Mining: A Comparative Study
Preserving Privacy in Data Mining: A Comparative Study
收藏 引用
Healthcare Innovations, software and Engineering Technologies (HISET), International Conference on
作者: Bineet Kumar Joshi Bansidhar Joshi Swami Rama Himalayan University Dehradun India Jaypee Institute of Information Technology Noida India
Preserving the privacy of data has emerged as a prominent topic of concern in the present context, given that users are increasingly entrusting a greater volume of data to the internet. Institutions such as hospitals ... 详细信息
来源: 评论
Image steganography using F5 algorithm
Image steganography using F5 algorithm
收藏 引用
IoT, Communication and Automation Technology (ICICAT), International Conference on
作者: Vaibhavi Sushil Shashank Srivastav Department of Computer Science and Engineering GIDA Buddha Institute of Technology Gorakhpur U.P. India
One approach used to protect confidential data from unauthorised usage is steganography. The process of extracting the concealed text from a stego picture is called steganalysis. This research proposes a steganalysis ... 详细信息
来源: 评论
A Predictable SIMD Library for GEMM Routines
A Predictable SIMD Library for GEMM Routines
收藏 引用
IEEE Symposium on Real-Time and Embedded Technology and Applications
作者: Iryna De Albuquerque Silva Thomas Carle Adrien Gauffriau Victor Jegu Claire Pagetti ONERA France IRIT - Univ. Toulouse 3 France Airbus France
The resource-constrained environment and the certification requirements underlying embedded safety-critical real-time systems impose an adapted development process for software applications. In this work, we propose a... 详细信息
来源: 评论
Inference for Ever-Changing Policy of Taint Analysis
Inference for Ever-Changing Policy of Taint Analysis
收藏 引用
IEEE/ACM International Conference on software Engineering: software Engineering in Practice Track (ICSE-SEIP)
作者: Wen-Hao Chiang Peixuan Li Qiang Zhou Subarno Banerjee Martin Schaef Yingjun Lyu Hoan Nguyen Omer Tripp Amazon Web Services USA
Identifying correct and complete taint specifications is critical for detecting vulnerabilities in the ever-changing landscape of software security, and an automated scalable and practical solution remains elusive in ... 详细信息
来源: 评论
Algorithm for Enterprise Greenhouse Gas Emissions Control and Management System
Algorithm for Enterprise Greenhouse Gas Emissions Control an...
收藏 引用
International Conference on Advanced Computer Information Technologies (ACIT)
作者: Mykola Striletskyi Faculty of Computer Information Technologies West Ukrainian National University Ternopil Ukraine
Greenhouse gas emissions control and minimization has been one of the central world policies during the past decades, shaping the goals and plans for future global sustainable development. Broad variety and lack of un... 详细信息
来源: 评论
Touchless Gesture Recognition for Smart Mirrors
Touchless Gesture Recognition for Smart Mirrors
收藏 引用
International Russian Automation Conference (RusAutoCon)
作者: Ksenia Zhernova Laboratory of computer security problem St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS) Saint-Petersburg Russia
Internet of Things devices are used almost everywhere. “Smart mirror” devices are also gaining popularity. However, in most cases, operating the device requires contact with the surface of the mirror, which leads to... 详细信息
来源: 评论
Malware Detection Based on Machine Learning Methods, Analysis, and Tools
Malware Detection Based on Machine Learning Methods, Analysi...
收藏 引用
International Conference on Communications and Networking, ComNet
作者: Almaha Almuqren Mounir Frikha Abdullah Albuali Mohammed Amin Almaiah dept. Department of Computer Networks and Communications King Faisal University Al Hofuf Saudi Arabia dept. Department of Computer Science King Abdullah the II IT School The University of Jordan Amman Jordan
Malware identification is essential for safeguarding digital systems from cyber attacks, and machine learning techniques are proving to be efficient in this field. This systematic literature re-view thoroughly analyze... 详细信息
来源: 评论
Static Coordinateometry of Nearby Signal Sources Using the Super-Resolution Algorithm MUSIC
Static Coordinateometry of Nearby Signal Sources Using the S...
收藏 引用
Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO)
作者: Dmitry Syrovetnik Yevgeniy Glushankov Zahar Kondrashov Dmitry Kirik Dept. of Research and Development Amungo LLC Saint-Petersburg Russia Dept. of Radiosystems and Signal Processing Bonch-Bruevich State University of Telecommunications Saint-Petersburg Russia JSC Progress MRI Moscow Russia Dept. of Research and Development JSC Progress MRI Moscow Russia
This paper describes a software model for solving the static problem of coordinateometry of nearby signal sources using the MUSIC super-resolution algorithm. The mathematical model permits to simulate the reception of... 详细信息
来源: 评论
IoT system for AQI monitoring and control
IoT system for AQI monitoring and control
收藏 引用
Automatics and Informatics (ICAI), International Conference
作者: Ivan Ganchev Zhanlin Ji University of Plovdiv "Paisii Hilendarski" Plovdiv Bulgaria Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia Bulgaria Telecommunications Research Centre (TRC) University of Limerick Limerick Ireland College of Mathematics and Computer Science Zhejiang A&F University Hangzhou P. R. China
A horizontal-type IoT platform, named EMULSION, is presented * , which was developed for fast IoT system prototyping and speedy roll-out of respective IoT services. The successful use of the platform as a basis of var... 详细信息
来源: 评论
A Hardware-Friendly Alternative to Softmax Function and Its Efficient VLSI Implementation for Deep Learning Applications
A Hardware-Friendly Alternative to Softmax Function and Its ...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Meng-Hsun Hsieh Xuan-Hong Li Yu-Hsiang Huang Pei-Hsuan Kuo Juinn-Dar Huang Department of Electronics and Electrical Engineering & Institute of Electronics National Yang Ming Chiao Tung University Hsinchu Taiwan
The Softmax function holds an essential role in most machine learning algorithms. Conventional realization of Softmax necessitates computationally intensive exponential operations and divisions, thereby posing formida... 详细信息
来源: 评论