咨询与建议

限定检索结果

文献类型

  • 11,790 篇 会议
  • 776 篇 期刊文献

馆藏范围

  • 12,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,073 篇 工学
    • 1,074 篇 计算机科学与技术...
    • 1,034 篇 电气工程
    • 458 篇 软件工程
    • 384 篇 信息与通信工程
    • 292 篇 控制科学与工程
    • 133 篇 电子科学与技术(可...
    • 102 篇 仪器科学与技术
    • 87 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 39 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 28 篇 材料科学与工程(可...
    • 20 篇 测绘科学与技术
    • 18 篇 核科学与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 石油与天然气工程
    • 14 篇 生物工程
    • 13 篇 土木工程
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 62 篇 物理学
    • 57 篇 系统科学
    • 34 篇 数学
    • 18 篇 生物学
    • 12 篇 化学
  • 148 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
  • 51 篇 医学
    • 35 篇 临床医学
  • 33 篇 文学
    • 32 篇 新闻传播学
  • 22 篇 教育学
    • 22 篇 教育学
  • 16 篇 农学
  • 11 篇 军事学
  • 7 篇 艺术学
  • 5 篇 经济学
  • 1 篇 法学

主题

  • 12,566 篇 software algorit...
  • 3,775 篇 software
  • 1,965 篇 algorithm design...
  • 1,782 篇 hardware
  • 829 篇 computer archite...
  • 816 篇 heuristic algori...
  • 763 篇 application soft...
  • 718 篇 software enginee...
  • 646 篇 computer science
  • 609 篇 software systems
  • 577 篇 computational mo...
  • 566 篇 prediction algor...
  • 561 篇 optimization
  • 523 篇 clustering algor...
  • 480 篇 testing
  • 438 篇 accuracy
  • 413 篇 signal processin...
  • 373 篇 costs
  • 352 篇 machine learning...
  • 324 篇 real-time system...

机构

  • 18 篇 moscow technical...
  • 15 篇 tsinghua univers...
  • 14 篇 school of softwa...
  • 14 篇 lviv polytechnic...
  • 13 篇 state key labora...
  • 12 篇 university of ch...
  • 12 篇 state key labora...
  • 11 篇 york university ...
  • 11 篇 jet propulsion l...
  • 9 篇 software school ...
  • 9 篇 department of co...
  • 9 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 nanjing univ sta...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 novosibirsk stat...
  • 8 篇 software college...
  • 8 篇 national univers...
  • 8 篇 school of cyber ...

作者

  • 12 篇 ling chen
  • 11 篇 david lo
  • 11 篇 hui li
  • 10 篇 wei liu
  • 10 篇 kun wang
  • 9 篇 li li
  • 9 篇 gang wang
  • 9 篇 yang yang
  • 9 篇 jack dongarra
  • 8 篇 rui wang
  • 8 篇 jian wang
  • 8 篇 jun wang
  • 8 篇 yue liu
  • 8 篇 w. wolf
  • 8 篇 qingshan jiang
  • 8 篇 thambipillai sri...
  • 8 篇 m.n.s. swamy
  • 7 篇 giuseppe scannie...
  • 7 篇 t. dohi
  • 7 篇 jinfu chen

语言

  • 12,489 篇 英文
  • 48 篇 其他
  • 28 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=software algorithms"
12566 条 记 录,以下是901-910 订阅
排序:
Redactable blockchain based on double-trapdoor chameleon hash family in private chain environment
Redactable blockchain based on double-trapdoor chameleon has...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Boyang Zuo School of Cyberspace Security Xi'an University of Posts & Telecommunications Xi'an China
The article proposes a redactable blockchain scheme based on the double-trapdoor chameleon hash family in a private chain environment to solve the key exposure problem that exists in the original chameleon hash as wel... 详细信息
来源: 评论
Model for Endometriosis Detection Using Machine Learning algorithms
Model for Endometriosis Detection Using Machine Learning Alg...
收藏 引用
software Engineering and Computer Science (CSECS), International Conference on
作者: Alexis Bautista Jahir Tardillo José Luis Castillo-Sequera Lenis Wong Information Systems Engineering Program Universidad Peruana de Ciencias Aplicadas Lima Peru Department of Computer Science Universidad de Alcalá Alcalá de Henares Spain
Endometriosis is a chronic disease that affects a considerable percentage of women of reproductive age and is characterized by the presence of endometrial tissue outside the uterine cavity, leading to symptoms such as... 详细信息
来源: 评论
LMSR: A Low-Jitter Multiple Slots Routing Algorithm in LEO Satellite Networks
LMSR: A Low-Jitter Multiple Slots Routing Algorithm in LEO S...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Shiran Sun Ran Zhang Kai Liu Zekun Sun Qinqin Tang Tao Huang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Purple Mountain Laboratories Nanjing China State Key Laboratory of Space Network and Communications Tsinghua University Beijing China Beijing National Research Center for Information Science and Technology (BNRist) Tsinghua University Beijing China
In recent years, Low Earth Orbit (LEO) constellation based networks have attracted wide attention from both the academia and the industry. Broadband access and backhaul becomes a typical application for LEO satellite ... 详细信息
来源: 评论
Evaluation of Combined Availability Prediction Methods for Multicarrier Microwave Links
Evaluation of Combined Availability Prediction Methods for M...
收藏 引用
European Conference on Antennas and Propagation, EuCAP
作者: Antons Bezdels Emmanuel Alejandro Merchan-Cruz (Telecommunications): SAF Tehnika Riga Latvia (Robotics and Heuristic Optimization): Transport and Telecommunication Institute Riga Latvia
Nowadays, microwave backhaul can reliably provide several gigabits of capacity, in many cases due to the aggregation of multiple parallel links working at different frequencies. The combination of the E-band (80 GHz) ... 详细信息
来源: 评论
Development of a Method for Consolidating Orders in Large Logistics Centers
Development of a Method for Consolidating Orders in Large Lo...
收藏 引用
International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)
作者: Si Thu Thant Sin E. M. Portnov A. V. Potapov Institute of System and Software Engineering and Information Technologies National Research University MIET Zelenograd Moscow Russia
This paper is devoted to the study and development of a method for consolidating orders in warehouses and fulfillment centers in which orders are stored and picked in the field of e-commerce. Fulfillment is the proces... 详细信息
来源: 评论
Image Compression Based on Direction-Invariant Block Discrete Transform
Image Compression Based on Direction-Invariant Block Discret...
收藏 引用
Digital Signal Processing and its Applications (DSPA), International Conference on
作者: A. Shoberg Graduate School of Cybernetics and Digital Technologies Pacific National University PNU Khabarovsk Russia
Based on the original developed models for performing block transforms described in previous own works, the dependences of the results of image comparison in the frequency domain using a two-dimensional cosine basis w... 详细信息
来源: 评论
SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted Smart Slide Supervision
SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted...
收藏 引用
International Communication Systems and Networks and Workshops, COMSNETS
作者: Susmita Mondal Sameeran Ravishankar Zingre Suchetana Chakraborty Department of Computer Science and Engineering Indian Institute of Technology Jodhpur
In corporate settings, conferences, or classrooms, an orator relies on manual slide transitions, which can disrupt their presentation flow. Presentation devices can be inaccessible due to the physical limitations of i... 详细信息
来源: 评论
Voltage Control of Standalone Inverter-Interfaced Renewable Energy Resources Using an Adaptive Sliding Mode Control with Optimized PID Sliding Surface
Voltage Control of Standalone Inverter-Interfaced Renewable ...
收藏 引用
Power Electronic and Drive Systems and Technologies Conference (PEDSTC)
作者: Moslem Dehghani Mokhtar Aly Jose Rodriguez Ebrahim Shojaeipor Seyyed Mohammad Bornapour Mohammad Mehdi Ghanbarian Facultad de Ingeniería Arquitectura y Diseño Universidad San Sebastián Bellavista 7 Santiago Chile Department of Electrical Engineering Islamic Azad University Kazeroon Branch Kazeroon Iran Electrical Engineering Department Faculty of Engineering Yasouj University Yasouj Iran
In this paper, a robust adaptive Sliding Mode Controller (SMC) with an optimized Proportional-IntegralDerivative (PID) sliding surface has been proposed to control the voltage and frequency of standalone inverter-inte... 详细信息
来源: 评论
Research on a lightweight identity authentication scheme for drones based on blockchain technology
Research on a lightweight identity authentication scheme for...
收藏 引用
2025 2nd International Conference on algorithms, software Engineering and Network Security (ASENS)
作者: Yang Wu Information and Communication Department Officers College of PAP Chengdu China
With the widespread application of drones in military, logistics, agriculture and other fields, their security issues have become increasingly prominent, especially the reliability and efficiency of identity authentic... 详细信息
来源: 评论
Efficient SAT-Based Bounded Model Checking of Evolving Systems
Efficient SAT-Based Bounded Model Checking of Evolving Syste...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Sophie Andrews Matthew Sotoudeh Clark Barrett Stanford University
SAT-based verification is a common technique used by industry practitioners to find bugs in computer systems. However, these systems are rarely designed in a single step: instead, designers repeatedly make small modif... 详细信息
来源: 评论