咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12566 条 记 录,以下是4801-4810 订阅
排序:
Wavelet Frequency Transformation for Specific Weeds Recognition
Wavelet Frequency Transformation for Specific Weeds Recognit...
收藏 引用
Artificial Intelligence and Data Analytics (CAIDA), International Conference on
作者: Shaban Habib Ishrat Khan Muhammad Islam Waleed Albattah Saleh Mohammed Alyahya Sheroz Khan Mohammad Kamrul Hassan College of Computer Qassim University Buraydah Saudi Arabia College of Computer and Inofrmation Science Prince Sultan University Riyadh Saudi Arabia College of Engineering and Information Technology Onaizah Colleges Saudi Arabia Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia
Saudi Arabia is experiencing depleting water level which ultimately leading to having reduced level of weed and crops farms. The ongoing practice of watering for all kind of weeds at farms is manual which is laborious... 详细信息
来源: 评论
A Novel Model Driven Approach for Trajectory-Based Technique of Autonomous Vehicle Route Prediction
A Novel Model Driven Approach for Trajectory-Based Technique...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Ali Nawaz Attique Ur Rehman Tahir Mohammad Ali Farooque Azam Yawar Rasheed Muhammad Waseem Anwar College of Art and Science Gulf University of Science and Technology Mubarak Al_Abdullah Kuwait College of E&ME National University of Sciences and Technology Islamabad Pakistan
The autonomous vehicle is one of the significant efforts toward the luxurious life. The process involves several technical difficulties like synchronized communication between different sensors, efficient response tim... 详细信息
来源: 评论
VLSI Hardware Architecture of Stochastic Low-rank Tensor Decomposition
VLSI Hardware Architecture of Stochastic Low-rank Tensor Dec...
收藏 引用
Asilomar Conference on Signals, Systems & Computers
作者: Lingyi Huang Chunhua Deng Shahana Ibrahim Xiao Fu Bo Yuan Rutgers University School of Electrical Engineering and Computer Science Oregon State University
Canonical polyadic decomposition (CPD) is one of the most popular tensor decomposition approaches used in various practical applications. Recently, AdaCPD, a doubly randomization-based reduced-complexity CPD, is propo... 详细信息
来源: 评论
Platform for Digital Voice Communication with Channel-Based Key Generation
Platform for Digital Voice Communication with Channel-Based ...
收藏 引用
European Conference on Antennas and Propagation, EuCAP
作者: Jelle Jocqué Patrick Van Torre Jo Verhaevert Hendrik Rogier Ghent University - imec IDLab Zwijnaarde Belgium
This paper proposes a novel method for the integration of channel-based key generation in a real-time digital voice communication system. For this purpose, a specific hardware platform was developed. To obtain the key... 详细信息
来源: 评论
From ERL to RAMI: Expanding Marine Robotics Competitions Through Virtual Events
From ERL to RAMI: Expanding Marine Robotics Competitions Thr...
收藏 引用
OCEANS
作者: Gabriele Ferri Fausto Ferreira Alessandro Faggiani Tommaso Fabbri NATO STO Centre for Maritime Research and Experimentation (CMRE) Viale San Bartolomeo 400 La Spezia SP Italy LABUST Faculty of Electrical Engineering and Computing University of Zagreb Unska 3 Zagreb Croatia
Robotics competitions have the potential of engaging the future engineers and improving their technical and soft skills. In competitions, students are faced with unique challenges, usually not present in theoretical l... 详细信息
来源: 评论
Attack-based Automation of Security Testing for IoT Applications with Genetic algorithms and Fuzzing
Attack-based Automation of Security Testing for IoT Applicat...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Steffen Lüdtke Roman Kraus Ramon Barakat Martin A. Schneider Business Unit Quality Engineering (SQC) Fraunhofer Institute for Open Communication Systems Berlin Germany
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization. However, IoT systems are prone to various security vulnerabilities that may lead to serious incidents that can caus... 详细信息
来源: 评论
Gasser
Gasser
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Carmen Coviello Simone Romano Giuseppe Scanniello Giuliano Antoniol University of Basilicata Potenza Italy University of Bari Bari Italy Polytechnique Montreal Montreal Canada
Regression testing is an important activity that ensures a System Under Test (SUT) still works as expected after changes. Regression testing can be expensive in case of large Test Suites (TSs). Test Suite Reduction (T... 详细信息
来源: 评论
Design and development of computational algorithm for real time synchronisation of diesel generator with solar power plant
Design and development of computational algorithm for real t...
收藏 引用
International Conference on Computer and Communications Technologies (ICCCT)
作者: S. Subha T. R. Sree Sahithya S. Smriti Aswathy S Kumar Sri Sairam Engineering College Chennai India
Diesel Generator (DG) sets are used in industries as backup power sources which will automatically start up when grid supply is lost. In order to reduce fuel consumption, DG sets are synchronized with solar power plan... 详细信息
来源: 评论
Decision Support System for the Application of Lean Healthcare in Stock Management in Health Facilities
Decision Support System for the Application of Lean Healthca...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Ana Agostinho Henrique Guilherme Sara Marcelino Tânia M. Lima Pedro D. Gaspar University of Beira Interior Covilhã Portugal C-MAST - Centre for Mechanical and Aerospace Science and Technologies University of Beira Interior Covilhã Portugal
The scarcity of consumables in health facilities has important implications for the quality of healthcare services, the user's well-being, and costs. The negative impacts associated with the lack of necessary prod... 详细信息
来源: 评论
TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM
TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adj...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Boru Liu Dan Tang Yudong Yan Zhiqing Zheng Shihan Zhang Jiangmeng Zhou College of Computer Science and Electronic Engineering (CSEE) Hunan University Hunan China School of Physics and Electronics Central South University Hunan China
The Low-Rate Denial of Service (LDoS) attack is a new type of Denial of Service attack. Because of its adequate concealment, it is not easy to detect by conventional detection methods. The detection method using a Sup... 详细信息
来源: 评论