咨询与建议

限定检索结果

文献类型

  • 2,762 篇 会议
  • 1,423 篇 期刊文献
  • 55 册 图书

馆藏范围

  • 4,240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,646 篇 工学
    • 1,678 篇 计算机科学与技术...
    • 1,219 篇 软件工程
    • 420 篇 信息与通信工程
    • 311 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 249 篇 电气工程
    • 231 篇 生物工程
    • 204 篇 仪器科学与技术
    • 198 篇 机械工程
    • 192 篇 动力工程及工程热...
    • 170 篇 生物医学工程(可授...
    • 168 篇 土木工程
    • 150 篇 光学工程
    • 143 篇 建筑学
    • 121 篇 化学工程与技术
    • 88 篇 核科学与技术
    • 87 篇 材料科学与工程(可...
  • 1,480 篇 理学
    • 633 篇 数学
    • 465 篇 物理学
    • 263 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 158 篇 系统科学
    • 146 篇 化学
    • 133 篇 地球物理学
  • 602 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 209 篇 工商管理
  • 151 篇 医学
    • 143 篇 临床医学
    • 115 篇 基础医学(可授医学...
  • 88 篇 法学
  • 87 篇 经济学
    • 86 篇 应用经济学
  • 49 篇 农学
  • 45 篇 教育学
  • 13 篇 艺术学
  • 6 篇 文学
  • 6 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 300 篇 computer archite...
  • 139 篇 hardware
  • 106 篇 hadron colliders
  • 84 篇 computational mo...
  • 73 篇 laboratories
  • 70 篇 delay
  • 68 篇 application soft...
  • 63 篇 optimization
  • 55 篇 parallel process...
  • 53 篇 computer science
  • 53 篇 neural networks
  • 53 篇 artificial intel...
  • 52 篇 protocols
  • 51 篇 wireless sensor ...
  • 50 篇 costs
  • 49 篇 deep learning
  • 48 篇 monitoring
  • 48 篇 field programmab...
  • 44 篇 predictive model...
  • 44 篇 clocks

机构

  • 217 篇 state key labora...
  • 185 篇 university of ch...
  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 yerevan physics ...
  • 148 篇 universidad iber...
  • 148 篇 university of sp...
  • 147 篇 indian institute...
  • 146 篇 brunel universit...
  • 146 篇 charles universi...
  • 144 篇 academy of scien...
  • 142 篇 university of de...
  • 141 篇 imperial college...
  • 141 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 136 篇 infn sezione di ...
  • 136 篇 zhejiang univers...
  • 134 篇 université de st...
  • 134 篇 department of ph...

作者

  • 148 篇 ardid m.
  • 133 篇 ferrara g.
  • 117 篇 díaz a.f.
  • 116 篇 coleiro a.
  • 115 篇 kalekin o.
  • 111 篇 enzenhöfer a.
  • 110 篇 brunner j.
  • 109 篇 g. tonelli
  • 109 篇 d. barney
  • 109 篇 l. valencia palo...
  • 109 篇 t. liu
  • 109 篇 c. hensel
  • 109 篇 a. garcia-bellid...
  • 109 篇 a. steen
  • 109 篇 n. cartiglia
  • 109 篇 n. colino
  • 109 篇 f. moortgat
  • 109 篇 b. clerbaux
  • 109 篇 celli s.
  • 108 篇 a. babaev

语言

  • 4,005 篇 英文
  • 121 篇 其他
  • 112 篇 中文
  • 3 篇 日文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Architecture and Technology"
4240 条 记 录,以下是121-130 订阅
排序:
Path Optimization Method Under UAV Charging Scheduling Network  24th
Path Optimization Method Under UAV Charging Scheduling Netwo...
收藏 引用
24th International Conference on Algorithms and architectures for Parallel Processing, ICA3PP 2024
作者: Yang, Tingting Wang, Yiqian Zhu, Jie Chang, Shuyu Huang, Haiping Nanjing University of Posts and Telecommunications Nanjing210003 China State Key Laboratory Chinese of Computer Architecture Institute of Computing Technology Academy of Sciences Beijing100864 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210003 China
Unmanned Aerial Vehicles (UAVs) have emerged as integral components in logistics systems, where their potential for efficient delivery services is being explored. However, the limited battery capacity of UAVs poses a ... 详细信息
来源: 评论
Design and implementation of power socket soldering robot arm system  4
Design and implementation of power socket soldering robot ar...
收藏 引用
2024 4th International Conference on Artificial Intelligence and Industrial technology Applications, AIITA 2024
作者: Liu, Jingqiao Wu, Shuqin Lin, Zicheng Zhang, Huimin Fan, Yong Xie, Wu School of Mechanical and Electrical Engineering Guilin University of Electronic Technology Guilin541004 China School of Architecture and Transportation Engineering Guilin University of Electronic Technology Guangxi Guilin541004 China School of Computer Science and Information Engineering Guangxi Normal University Guilin541004 China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China
In order to solve the problem of high cost and low efficiency in manual welding of power socket welding components, a soldering robot arm system was developed. The gripper, 5-DOF manipulator, clamp, support, and contr... 详细信息
来源: 评论
HTDet:A Clustering Method Using Information Entropy for Hardware Trojan Detection
收藏 引用
Tsinghua Science and technology 2021年 第1期26卷 48-61页
作者: Renjie Lu Haihua Shen Zhihua Feng Huawei Li Wei Zhao Xiaowei Li the University of Chinese Academy of Sciences Beijing 101408China Beijing Institute of Computer Technology and Application Beijing 100854China the State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China
Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential *** this paper,we propose HTDet,a novel HT detection method using information entropybased *** ... 详细信息
来源: 评论
Implementation of Cloud Computing and Internet of Things (IoT) by Performance Evaluation  12
Implementation of Cloud Computing and Internet of Things (Io...
收藏 引用
12th International Electrical Engineering Congress, iEECON 2024
作者: Sithiyopasakul, Jiran Archevapanich, Tuanjai Sithiyopasakul, Saran Lasakul, Attasit Purahong, Boonchana Benjangkaprasert, Chawalit School Of Engineering King Mongkut's Institute Of Technology Ladkrabang Bangkok Thailand Rajamangala University Of Technology Suvarnabhumi Faculty Of Engineering And Architecture Department Of Electronics And Communication Engineering Nonthaburi Thailand School Of Engineering King Mongkut's Institute Of Technology Ladkrabang Department Of Computer Engineering Bangkok Thailand
The integration of cloud computing and the Internet of Things (IoT) holds transformative potential across diverse industries. Performance assessment is essential to gauge the quality and efficiency of cloud computing ... 详细信息
来源: 评论
Performance Evaluation of Infrastructure as a Service across Cloud Service Providers
Performance Evaluation of Infrastructure as a Service across...
收藏 引用
2023 International Electrical Engineering Congress, iEECON 2023
作者: Sithiyopasakul, Saran Archevapanich, Tuanjai Purahong, Boonchana Sithiyopasakul, Paisan Lasakul, Attasit Benjangkaprasert, Chawalit School of Engineering King Mongkut's Institute of Technology Ladkrabang Department of Computer Engineering Bangkok Thailand Rajamangala University of Technology Suvarnabhumi Faculty of Engineering and Architecture Department of Electronics and Communication Engineering Nonthaburi Thailand
The purpose of this research aims to monitor, analyze, and compare the performance of infrastructure as a service (IaaS) between the selective cloud providers. To assure which cloud provider has more stability, reliab... 详细信息
来源: 评论
Cybersecurity in local governments: A systematic review and framework of key challenges
Urban Governance
收藏 引用
Urban Governance 2025年 第1期5卷 1-19页
作者: Hossain, Sk Tahsin Yigitcanlar, Tan Nguyen, Kien Xu, Yue City 4.0 Lab School of Architecture and Built Environment Queensland University of Technology 2 George Street Brisbane 4000 QLD Australia School of Electrical Engineering and Robotics Queensland University of Technology 2 George Street Brisbane 4000 QLD Australia School of Computer Science Queensland University of Technology 2 George Street Brisbane 4000 QLD Australia
Cybersecurity has emerged as a critical concern in modern urban governance, as local governments now extend their responsibilities beyond traditional infrastructure management to safeguard digital systems and citizen ... 详细信息
来源: 评论
Detection of COVID-19 Using SIS-CODE Algorithm
Detection of COVID-19 Using SIS-CODE Algorithm
收藏 引用
International Conference on Business Intelligence and Information technology, BIIT 2022
作者: Kim, Daegeon Govathoti, Sudeepthi Department of Architecture Engineering Dongseo University Busan Korea Republic of Department of Computer Science and Engineering GITAM School of Technology GITAM Deemed-to-be-University Telangana Hyderabad India
The COVID-19 pathological test can be carried out with a sample taken from the nose, the back of the throat, or both, using a special swab. Currently, laboratories are checking through a process called Polymerase Chai... 详细信息
来源: 评论
Assessing life-cycle seismic fragility of corroding reinforced concrete bridges through dynamic Bayesian networks  8th
Assessing life-cycle seismic fragility of corroding reinforc...
收藏 引用
8th International Symposium on Life-Cycle Civil Engineering, IALCCE 2023
作者: Molaioni, F. Rinaldi, Z. Andriotis, C.P. Department of Civil Engineering and Computer Science Engineering University of Rome Tor Vergata Rome Italy Faculty of Architecture and the Built Environment Delft University of Technology Delft Netherlands
Bridge structures are exposed to several chronic and abrupt stressors, among which the combined effects of corrosion and earthquakes pose a major threat to their long-term safety. Probabilistic risk assessment framewo...
来源: 评论
Stochastic Task Offloading Problems for Edge Computing  17th
Stochastic Task Offloading Problems for Edge Computing
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Ding, Kexin Zhong, Zhi Zhu, Jie Nanjing University of Posts and Telecommunications Nanjing210003 China Institute of Computing Technology Academy of Sciences State Key Laboratory Chinese of Computer Architecture Beijing100864 China
The edge-cloud computing is extensively deployed to provide convenient computing. A stochastic task offloading problem in edge-cloud environment is considered. For the problem under study, a greedy simulated annealing... 详细信息
来源: 评论
Accelerate Bit Manipulation in XiangShan Processer Using RISC-V B Extension and Instruction Fusion
Accelerate Bit Manipulation in XiangShan Processer Using RIS...
收藏 引用
2022 International Conference on Cloud Computing, Internet of Things, and computer Applications, CICA 2022
作者: Zhang, Fawang Tang, Dan Cai, Ye College of Computer Science and Software Engineering Shenzhen University Shenzhen China State Key Laboratory of Computer Architecture Institute of Computing Technology Beijing China
In the field of high-performance computing, some application scenarios make extensive use of bit manipulation. RISC-V foundation issues B extension to reduce the number of instructions during the static compilation. B... 详细信息
来源: 评论