咨询与建议

限定检索结果

文献类型

  • 11,563 篇 会议
  • 759 篇 期刊文献

馆藏范围

  • 12,322 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,058 篇 工学
    • 1,066 篇 计算机科学与技术...
    • 1,021 篇 电气工程
    • 454 篇 软件工程
    • 380 篇 信息与通信工程
    • 290 篇 控制科学与工程
    • 134 篇 电子科学与技术(可...
    • 100 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 185 篇 理学
    • 63 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 149 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 23 篇 教育学
    • 23 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,322 篇 software algorit...
  • 3,683 篇 software
  • 1,964 篇 algorithm design...
  • 1,765 篇 hardware
  • 817 篇 computer archite...
  • 785 篇 heuristic algori...
  • 760 篇 application soft...
  • 643 篇 computer science
  • 634 篇 software enginee...
  • 590 篇 software systems
  • 560 篇 computational mo...
  • 544 篇 prediction algor...
  • 534 篇 optimization
  • 514 篇 clustering algor...
  • 462 篇 testing
  • 407 篇 signal processin...
  • 401 篇 accuracy
  • 362 篇 costs
  • 329 篇 machine learning...
  • 316 篇 software testing

机构

  • 17 篇 moscow technical...
  • 14 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 college of compu...
  • 8 篇 department of el...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 10 篇 hui li
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,244 篇 英文
  • 49 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12322 条 记 录,以下是231-240 订阅
排序:
Optimal Methods of Primary Information Processing of the CCD-based Emission Spectrometer Registration System
Optimal Methods of Primary Information Processing of the CCD...
收藏 引用
International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)
作者: Vladimir S. Sukhomlinov Rimma S. Zaripova Anna N. Popova Saint-Petersburg State University St. Petersburg Russia Kazan State Power Engineering University Kazan Russia Empress Catherine II Saint-Petersburg Mining University St. Petersburg Russia
The paper presents a nonlinear theory solving the problem of accounting for the influence of «third» elements on the results of determining the concentration of a particular element, developed with respect t... 详细信息
来源: 评论
The Concept of Iterative Functional algorithms in classical Sanskrit texts on Mathematics
The Concept of Iterative Functional Algorithms in classical ...
收藏 引用
AIML-Applications for Engineering & Technology (ICAET), International Conference on
作者: Namrata Karandikar Chandragupta Warnekar Cummins College of Engineering for Women Pune India
The development of digital computers, coupled with the communication technology has created the modern Digital India, or in a wider sense, the Cyber world, speeding up the information exchange as well as commerce. As ... 详细信息
来源: 评论
Evaluating Code Emulating Upsets on Microcontroller Devices
Evaluating Code Emulating Upsets on Microcontroller Devices
收藏 引用
IEEE Southeastcon
作者: Cebron Williams Daniel B. Limbrick John Kelly Christopher Doss Department of Electrical and Computer Engineering North Carolina Agricultural and Technical State University Greensboro NC United States
Fault attacks pose a significant threat to the functionality and reliability of embedded systems, particularly microcontrollers that are widely used in critical applications such as consumer electronics, medical devic... 详细信息
来源: 评论
Proactive Platform for Active Health Services (AHS) Considering Data Securities
Proactive Platform for Active Health Services (AHS) Consider...
收藏 引用
Sentiment Analysis and Deep Learning (ICSADL), International Conference on
作者: Peiping Wu Wangni Xu Xin Yu China Fine Art Academy Hangzhou China New York University New York USA
In order to meet the high requirements of active health service (AHS) platform for data security and privacy protection, this study innovates from many aspects and proposes a new design scheme of active health service... 详细信息
来源: 评论
The Concept of Genetic Reverse-Engineering to Restore the Program’s Source Code from a Binary Code: Theory and Applying Practice
The Concept of Genetic Reverse-Engineering to Restore the Pr...
收藏 引用
International Communication Systems and Networks and Workshops, COMSNETS
作者: Konstantin Izrailov Igor Kotenko Computer Security Problems Laboratory St. Petersburg Federal Research Center of the Russian Academy of Sciences Saint-Petersburg Russia
The work is devoted to solving the problem of restoring the representation of the source code of a program (and in the future, algorithms, architecture, etc.) in the form of a binary code, which will allow searching f... 详细信息
来源: 评论
Detecting Cross-Domain Ambiguity In Requirements Through Natural Language Processing, A Systematic Literature Review
Detecting Cross-Domain Ambiguity In Requirements Through Nat...
收藏 引用
International Conference on Advancements in Computational Sciences (ICACS)
作者: Ibrahim Khalil Israr Ahmad Uzair Rasheed Wasi Haider Butt Zaeem Anwaar Department of Computer and Software Engineering CEME NUST Islamabad Pakistan
A strong foundation for a project is the first step to measuring or estimating the success parameters of a project. Requirement engineers gather and elicit the requirements of the project in detail after the feasibili... 详细信息
来源: 评论
Accurate Estimation of Fiducial Marker Positions Using Motion Capture System
Accurate Estimation of Fiducial Marker Positions Using Motio...
收藏 引用
IEEE/SICE International Symposium on System Integration
作者: Matus Tanonwong Naoya Chiba Koichi Hashimoto Department of System Information Sciences Graduate School of Information Sciences Tohoku University Sendai Japan
In this paper, we present a method for aligning the coordinates of multiple cameras and sensors into a unified coordinate system using a motion capture system. Our simulated convenience store environment includes came... 详细信息
来源: 评论
Low-Power High-Speed CNN Accelerator with Matrix Reodering Techniques for Small Footprint Memory Access
Low-Power High-Speed CNN Accelerator with Matrix Reodering T...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Hoseong Kim Daejin Park School of Electronics Engineering Kyungpook National University Daegu Korea
In the evolution of artificial intelligence (AI), large - scale data volumes are needed to best represent the information. This dataset is expressed by a matrix or tensor. When data volumes increase, the operational t... 详细信息
来源: 评论
The Impact of Technological Progress on the Competencies of Electronics, Radio Engineering, Communications and ICT Specialists
The Impact of Technological Progress on the Competencies of ...
收藏 引用
Systems of Signals Generating and Processing in the Field of on Board Communications
作者: Tatyana A. Kuzovkova Alexander D. Kuzovkov Olga I. Sharavova Ivan M. Sharavov Moscow Technical University of Communications and Informatics Moscow Russia
The development strategy of the electronics industry and the high rates of scientific and technological progress in electronics, radio engineering, communications and ICT require the formation of new competencies of t... 详细信息
来源: 评论
Comparative Analysis of Conventional and Post-Quantum Cryptographic algorithms
Comparative Analysis of Conventional and Post-Quantum Crypto...
收藏 引用
IEEE Southeastcon
作者: Jordan Shropshire Lindsay Nadobny Campbell Hodge Micah Israel Department of Computer Science University of South Alabama Alabama USA
Although quantum computers are still in their infancy, their operational costs are already beginning to decline. Within the next decade, quantum computing systems are expected to become commonplace in large businesses... 详细信息
来源: 评论