咨询与建议

限定检索结果

文献类型

  • 11,708 篇 会议
  • 766 篇 期刊文献

馆藏范围

  • 12,474 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,064 篇 工学
    • 1,067 篇 计算机科学与技术...
    • 1,027 篇 电气工程
    • 455 篇 软件工程
    • 382 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 183 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 33 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,474 篇 software algorit...
  • 3,730 篇 software
  • 1,965 篇 algorithm design...
  • 1,777 篇 hardware
  • 825 篇 computer archite...
  • 803 篇 heuristic algori...
  • 761 篇 application soft...
  • 706 篇 software enginee...
  • 645 篇 computer science
  • 598 篇 software systems
  • 571 篇 computational mo...
  • 556 篇 prediction algor...
  • 543 篇 optimization
  • 520 篇 clustering algor...
  • 473 篇 testing
  • 428 篇 accuracy
  • 410 篇 signal processin...
  • 369 篇 costs
  • 346 篇 machine learning...
  • 320 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 state key labora...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...
  • 8 篇 college of compu...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen
  • 7 篇 ning wang

语言

  • 12,397 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12474 条 记 录,以下是411-420 订阅
排序:
Search speed and power driven integrated software and hardware optimizations for motion estimation algorithms
Search speed and power driven integrated software and hardwa...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Shengqi Yang W. Wolf N. Vijaykrishnan EE Department Princeton University USA Microsystems Design Lab The Penn State University
The motion estimation (ME) is the most time consuming and power demanding module in a video encoder. In this paper, we provide the first detailed instruction-level simulation results on motion estimation. Firstly, we ... 详细信息
来源: 评论
Complex polynomials in communications: motivation, algorithms, software
Complex polynomials in communications: motivation, algorithm...
收藏 引用
IEEE International Symposium on Computer Aided Control System Design (CACSD)
作者: M. Hromcik M. Sebek J. Jezek Centre for Applied Cybernetics Czech Technical University Prague Czech Republic Institute of Information Theory and Automation AS CR Prague Czech Republic
Quite recently the polynomial design methods found a new great field of application outside the control area: the algebraic approach has been used successfully in signal processing and mobile communications. In contra... 详细信息
来源: 评论
Statistical non-parametric algorithms to estimate the optimal software rejuvenation schedule
Statistical non-parametric algorithms to estimate the optima...
收藏 引用
Pacific Rim International Symposium on Dependable Computing
作者: T. Dohi K. Goseva-Popstojanova K.S. Trivedi Department of Industrial and Systems Engineering Hiroshima University Higashi Hiroshima Japan Department of Electrical and Computer Engineering Duke University Durham NC USA
In this paper, we extend the classical result by Huang, Kintala, Kolettis and Fulton (1995), and in addition propose a modified stochastic model to determine the software rejuvenation schedule. More precisely, the sof... 详细信息
来源: 评论
Estimating Parameters of Van Genuchten Equation Based on Intelligent algorithms and RETC software
Estimating Parameters of Van Genuchten Equation Based on Int...
收藏 引用
International Symposium on Computer Science and Society (ISCCS)
作者: Xu Yang Xueyi You Min Ji Liuming Pan Xiuduo Wang Lejun Zhao School of Environmental Science and Engineering Tianjin University TJU Tianjin China Tianjin Municipal Engineering Design and Research Institute Tianjin China
In order to explore optimization effects of RETC software and intelligent algorithms, including genetic algorithm, simulated annealing algorithm and particle swarm optimization, on parameters of Van Genuchten (VG)Equa... 详细信息
来源: 评论
algorithms to isolation of logical and physical objects from malicious software
Algorithms to isolation of logical and physical objects from...
收藏 引用
International Conference on Application of Information and Communication Technologies (AICT)
作者: S. S. Kasimov D. N. Rahmatov Tashkent Uzbekistan
Given article describes algorithms to isolation of malicious software logical and physical objects of the system. As example logical object are used files. As example physical object are used sectors of the hard disk.
来源: 评论
MMX-based DCT and MC algorithms for real-time pure software MPEG decoding
MMX-based DCT and MC algorithms for real-time pure software ...
收藏 引用
IEEE International Conference on Multimedia Computing and Systems (ICMCS)
作者: Yi-Shin Tung Chia-Chiang Ho Ja-Ling Wu Communication and Multimedia Laboratory Department of Computer Science and Information Engineering National Taiwan University Taipei Taiwan
To overcome the difficulties of computation-intensive multimedia applications, the development groups of major CPU manufacturers, such as Intel/sup TM/ and Digital/sup TM/, have decided to include new instruction sets... 详细信息
来源: 评论
Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic algorithms in Closed-Source software
Hydamc: A Hybrid Detection Approach for Misuse of Cryptograp...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Haoling Fan Fangyu Zheng Jingqiang Lin Lingjia Meng Mingyu Wang Qiang Wang Shijie Jia Yuan Ma State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Cryptography University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Science and Technology of China Hefei China
Cryptographic algorithms are fundamental to secure software development, but security vulnerabilities can arise during implementation, usage, and when calling third-party libraries. As security standards continue to e... 详细信息
来源: 评论
Models and algorithms for business value-driven adaptation of business processes and software infrastructure
Models and algorithms for business value-driven adaptation o...
收藏 引用
International Conference on software Engineering - Companion, ICSE, Companion
作者: Basem Suleiman Vladimir Tosic Ross Jeffery Jenny Liu Managing Complexity Theme NICTA Sydney Australia School of Computer Science and Engineering University of New South Wales Sydney Australia
This research investigates how to provide automated analysis and decision-making support for adaptation of business processes and underlying software infrastructure, in the way that both maximizes business value metri... 详细信息
来源: 评论
Evaluation of Classification algorithms for software Defect Prediction
Evaluation of Classification Algorithms for Software Defect ...
收藏 引用
International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE)
作者: Ma. José Hernández-Molinos Ángel J. Sánchez-García R. Erandi Barrientos-Martínez Juan Carlos Pérez-Arriaga Facultad de Estadística e Informátic Universidad Veracruzana Universidad Veracruzana Institute de Investigaciones en Inteligencia Artificial Xalapa México
For software Engineering industry is essential to build software with high quality, but this has become difficult these days with the fact that size and complexity of developed software is high. For this reason, it is... 详细信息
来源: 评论
An Empirical Evaluation of Machine Learning algorithms for Identifying software Requirements on Stack Overflow: Initial Results
An Empirical Evaluation of Machine Learning Algorithms for I...
收藏 引用
IEEE International Conference on software Engineering and Service Sciences (ICSESS)
作者: Arshad Ahmad Chong Feng Adnan Tahir Asif Khan Muhammad Waqas Sadique Ahmad Ayaz Ullah School of Computer Science & Technology Beijing Institute of Technology Beijing China College of Computer Science & Software Engineering Shenzen University Shenzen China Department of Computer Science FAST-NUCES Peshawar Pakistan Faculty of Engineering Sciences & Technology Iqra University Karachi Pakistan Department of Computer Science University of Swabi Anbar Pakistan
Context: The recent developments made during the last decade or two in requirements engineering (RE) methods have seen a rise in using different machine-learning (ML) algorithms to solve some complex RE problems. One ... 详细信息
来源: 评论