咨询与建议

限定检索结果

文献类型

  • 2,768 篇 会议
  • 1,394 篇 期刊文献
  • 55 册 图书

馆藏范围

  • 4,217 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,626 篇 工学
    • 1,663 篇 计算机科学与技术...
    • 1,207 篇 软件工程
    • 423 篇 信息与通信工程
    • 310 篇 控制科学与工程
    • 302 篇 电子科学与技术(可...
    • 251 篇 电气工程
    • 233 篇 生物工程
    • 204 篇 机械工程
    • 204 篇 仪器科学与技术
    • 191 篇 动力工程及工程热...
    • 172 篇 生物医学工程(可授...
    • 164 篇 土木工程
    • 151 篇 光学工程
    • 142 篇 建筑学
    • 124 篇 化学工程与技术
    • 87 篇 核科学与技术
    • 85 篇 材料科学与工程(可...
  • 1,469 篇 理学
    • 628 篇 数学
    • 464 篇 物理学
    • 263 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 158 篇 系统科学
    • 146 篇 化学
    • 131 篇 地球物理学
  • 605 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 209 篇 工商管理
  • 149 篇 医学
    • 142 篇 临床医学
    • 115 篇 基础医学(可授医学...
  • 90 篇 法学
  • 88 篇 经济学
    • 87 篇 应用经济学
  • 50 篇 农学
  • 46 篇 教育学
  • 12 篇 艺术学
  • 6 篇 文学
  • 6 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 300 篇 computer archite...
  • 139 篇 hardware
  • 106 篇 hadron colliders
  • 85 篇 computational mo...
  • 73 篇 laboratories
  • 70 篇 delay
  • 68 篇 application soft...
  • 64 篇 optimization
  • 55 篇 parallel process...
  • 54 篇 artificial intel...
  • 53 篇 computer science
  • 53 篇 neural networks
  • 52 篇 protocols
  • 51 篇 costs
  • 50 篇 deep learning
  • 50 篇 wireless sensor ...
  • 48 篇 monitoring
  • 48 篇 field programmab...
  • 44 篇 predictive model...
  • 44 篇 clocks

机构

  • 215 篇 state key labora...
  • 185 篇 university of ch...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 149 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 147 篇 university of sp...
  • 146 篇 indian institute...
  • 145 篇 brunel universit...
  • 145 篇 charles universi...
  • 144 篇 academy of scien...
  • 141 篇 university of de...
  • 140 篇 imperial college...
  • 140 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 135 篇 infn sezione di ...
  • 135 篇 zhejiang univers...
  • 133 篇 université de st...
  • 132 篇 department of ph...

作者

  • 147 篇 ardid m.
  • 132 篇 ferrara g.
  • 115 篇 díaz a.f.
  • 114 篇 coleiro a.
  • 113 篇 kalekin o.
  • 110 篇 g. tonelli
  • 110 篇 d. barney
  • 110 篇 l. valencia palo...
  • 110 篇 t. liu
  • 110 篇 c. hensel
  • 110 篇 a. garcia-bellid...
  • 110 篇 a. steen
  • 110 篇 n. cartiglia
  • 110 篇 n. colino
  • 110 篇 f. moortgat
  • 110 篇 b. clerbaux
  • 110 篇 g. sultanov
  • 109 篇 a. babaev
  • 109 篇 v. karjavine
  • 109 篇 m. a. ciocci

语言

  • 3,775 篇 英文
  • 342 篇 其他
  • 105 篇 中文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Computer Architecture and Technology"
4217 条 记 录,以下是641-650 订阅
排序:
Gerber File Parsing and the Implementation Method of its Conversion to Bitmap Image
Gerber File Parsing and the Implementation Method of its Con...
收藏 引用
2021 International Conference on Mechanical Engineering, Intelligent Manufacturing and Automation technology, MEMAT 2021
作者: Fan, Yong Wu, Shuqin Wu, Xie Yang, Jianbo School of Mechanical and Electrical Engineering Guilin University of Electronic Technology Guilin Guangxi China School of Architecture and Transportation Engineering Guilin University of Electronic Technology Guilin Guangxi China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi China
In order to obtain the standard image based on the Gerber file in the AOI (Automatic Optical Inspection), an implementation method is proposed by analysing and converting the Gerber file into a bitmap image. According... 详细信息
来源: 评论
Run Time Memory Error Recovery Process in Networking System  7
Run Time Memory Error Recovery Process in Networking System
收藏 引用
7th International Conference on System Reliability and Safety, ICSRS 2023
作者: Vitucci, Carlo Sundmark, Daniel Danielsson, Jakob Jägemar, Marcus Larsson, Alf Nolte, Thomas Technology Management Ericsson Ab Stockholm Sweden Computer Science and Software Enigineering Mälardalen University Västerås Sweden Sys Architecture Ericsson Ab Stockholm Sweden Sys Compute Dimensioning Ericsson Ab Stockholm Sweden Senior Specialist Observability Ericsson Ab Stockholm Sweden Mälardalen University Division of Networked and Embedded System Västerås Sweden
System memory errors have always been problematic;today, they cause more than forty percent of confirmed hardware errors in repair centers for both data centers and telecommunications network nodes. Therefore, it is s... 详细信息
来源: 评论
Edge Computing in Smart Cities: Enhancing Real-Time Data Processing  2
Edge Computing in Smart Cities: Enhancing Real-Time Data Pro...
收藏 引用
2nd International Conference on Advances in Computation, Communication and Information technology, ICAICCIT 2024
作者: Rajakumari, S. Natarajan, C. Alone, Vinod N. Senthilkumar, P. Gayathri, R. John, Godwin J. Department of Mathematics R.M.D. Engineering College Chennai India Department of CSE P. S. R Engineering College Tamilnadu Sivakasi India Computer Engineering Department VPPCOE &VA Sion Maharashtra Mumbai India School of Architecture Koneru Lakshmaiah Education Foundation Vaddeswaram AP Guntur India Department of ECE Rajalakshmi Engineering College Tamilnadu Chennai India Department of Mechanical Engineering Rajalakshmi Institute of Technology Tamil Nadu India
One of the most crucial issues that smart cities have to keep addressing as they grow is urban mobility improvement. Maximizing the efficiency of transportation, so lowering congestion, and so optimizing traffic flow ... 详细信息
来源: 评论
Event Graphs: Syntax, Semantics, and Implementation
Event Graphs: Syntax, Semantics, and Implementation
收藏 引用
2023 Winter Simulation Conference, WSC 2023
作者: Gunal, Murat M. Ismail Osais, Yahya Wagner, Gerd Fenerbahce University Faculty of Engineering and Architecture Atatürk Mah. Ataşehir Bulvari Istanbul Ataşehir34758 Turkey Center for Intelligent Secure Systems King Fahd University of Petroleum and Minerals Computer Engineering Department P.O. Box 2244 Dhahran31261 Saudi Arabia Brandenburg University of Technology Konrad-Wachsmann-Allee 5 Cottbus03046 Germany
This tutorial aims to introduce Event Graphs (EGs), invented 40 years ago by Lee Schruben to allow eventbased modeling of discrete dynamic systems. Their simplicity and naturalness in causality modelling and simulatio...
来源: 评论
Machine Learning based Cybersecurity Technique for Detection of Upcoming Cyber Attacks
Machine Learning based Cybersecurity Technique for Detection...
收藏 引用
International Conference on Communication and Electronics Systems (ICCES)
作者: Kanchi Lohitha Lakshmi S.Shobana Bathula Prasanna Kumar K.B.Glory Bonda Kiran Kumar Sandya Rani Department of Computer Science and Engineering Vasireddy Venkatadri Institute Of Technology Guntur Department of IT R.M.K Engineering College Department of Computer Science and Engineering KKR & KSR Institute of Technology and Sciences Guntur AP Department of Engineering English Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh State India Department of Architecture KL School of Architecture KL Deemed to be University Vaddeswaram Dept. of IT St. Martin's Engineering College Secunderabad Telangana India
Cyberattacks are prevalent in the age of the Internet. Each year, both the quantity and severity of cybercrimes increase. Protection against cyber-attacks has become a primary responsibility, Significant in the intern...
来源: 评论
Modified ARQ-based cooperative relaying scheme for a delay tolerant network
Modified ARQ-based cooperative relaying scheme for a delay t...
收藏 引用
2021 IEEE International Conference on Electrical, computer, Communications and Mechatronics Engineering, ICECCME 2021
作者: Otaru, Musa Adinoyi, Abdulkareem Ajiya, Mohammed Aljlayl, Mohammed Yanikomeroglu, Halim Bayero University Kano Department of Electrical Engineering Nigeria Technology Strategy Architecture Saudi Telecommunications Company Saudi Arabia Carleton University Dept. of Systems and Computer Engineering Ottawa Canada
We use fixed relays deployed by network operators to reduce re-transmission (thereby reducing network power requirements) in addition to providing excellent end-to-end error performance in a revisit to automatic repea... 详细信息
来源: 评论
Keyword extraction based on semantic similarity metric and multi-feature computing  7
Keyword extraction based on semantic similarity metric and m...
收藏 引用
7th International Conference on Big Data Computing and Communications, BigCom 2021
作者: Kang, Hui Sun, Xin Feng, Tie Lin, Shuhang Jilin University College of Computer Science and Technology Changchun China Jilin University College of Software Changchun China Beijing ByteDance Technology Co. Ltd. Department of Product R&D and Engineering Architecture Beijing China
Keyword extraction is an effective method to extract keywords from a text which can express the main content of the text. However, it is difficult to extract useful information quickly from a large number of documents... 详细信息
来源: 评论
Investigating Different Approaches on Online Laboratory Practices
Investigating Different Approaches on Online Laboratory Prac...
收藏 引用
IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE)
作者: Inmaculada Tomeo-Reyes Zhuoyu Chen Chamith Wijenayake Arash Khatamianfar School of Electrical Engineering and Telecommunications Faculty of Engineering University of New South Wales Sydney Australia School of Electrical Engineering and Computer Science Faculty of Engineering Architecture and Information Technology University of Queensland Brisbane Australia
Laboratories are an integral part of Engineering education. In this post-pandemic era, there is an increased emphasis on distance learning and hybrid approaches, which demands novel teaching and learning approaches to...
来源: 评论
Using Convolutional Neural Networks for Muon detection in WCD tank  4
Using Convolutional Neural Networks for Muon detection in WC...
收藏 引用
4th International Conference on Applied Physics, Simulation and Computing, APSAC 2020
作者: González, B.S. Conceio, R. Tomé, B. Pimenta, M. Herrera, L.J. Guillen, A. Computer Architecture and Technology Department University of Granada Granada Spain LIP/IST Lisbon Portugal
The aim of this paper is to study the possibility of improving the gamma/hadron discrimination in extensive air showers. For this purpose, the identification of hadronic extensive air showers is carried out by means o... 详细信息
来源: 评论
Disentanglement of Human Facial Features and the Inspection of Feature Extractor's Quality Based on TL-GAN
Disentanglement of Human Facial Features and the Inspection ...
收藏 引用
2021 International Conference on Applied Mathematics, Modelling and Intelligent Computing, CAMMIC 2021
作者: Gao, Yutong He, Shiwei Wang, Guanghan Xu, Peiyu Information and Computer Science Beijing University of Civil Engineering and Architecture Beijing102612 China Safety Engineering China University of Mining and Technology-Beijing Beijing100089 China Computer Science and Technology Tsinghua University Beijing100084 China Telecommunications Engineering and Management Beijing University of Posts and Telecommunications Hebei065000 China
Recent research on the Generated Adversarial Network models has made great progress in the task of generating images on human demand. Among them, Transparent Latent-space GAN tries to solve the problem by analyzing th...
来源: 评论