咨询与建议

限定检索结果

文献类型

  • 21,713 篇 会议
  • 14,320 篇 期刊文献
  • 493 册 图书

馆藏范围

  • 36,526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,312 篇 工学
    • 12,264 篇 计算机科学与技术...
    • 9,957 篇 软件工程
    • 5,461 篇 控制科学与工程
    • 4,073 篇 信息与通信工程
    • 3,100 篇 电气工程
    • 2,539 篇 电子科学与技术(可...
    • 2,136 篇 生物工程
    • 2,131 篇 机械工程
    • 1,679 篇 生物医学工程(可授...
    • 1,327 篇 光学工程
    • 1,175 篇 动力工程及工程热...
    • 1,169 篇 仪器科学与技术
    • 1,057 篇 化学工程与技术
    • 798 篇 交通运输工程
    • 793 篇 材料科学与工程(可...
    • 723 篇 安全科学与工程
  • 12,614 篇 理学
    • 6,538 篇 数学
    • 3,196 篇 物理学
    • 2,634 篇 系统科学
    • 2,550 篇 生物学
    • 2,170 篇 统计学(可授理学、...
    • 1,140 篇 化学
  • 5,003 篇 管理学
    • 3,404 篇 管理科学与工程(可...
    • 1,737 篇 图书情报与档案管...
    • 1,628 篇 工商管理
  • 1,765 篇 医学
    • 1,459 篇 临床医学
    • 1,220 篇 基础医学(可授医学...
    • 722 篇 药学(可授医学、理...
  • 871 篇 法学
    • 730 篇 社会学
  • 630 篇 经济学
    • 622 篇 应用经济学
  • 372 篇 农学
  • 362 篇 教育学
  • 87 篇 文学
  • 69 篇 军事学
  • 57 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,257 篇 computer science
  • 1,041 篇 control systems
  • 529 篇 deep learning
  • 501 篇 computational mo...
  • 443 篇 machine learning
  • 415 篇 artificial intel...
  • 364 篇 robustness
  • 354 篇 optimization
  • 348 篇 feature extracti...
  • 331 篇 systems engineer...
  • 324 篇 accuracy
  • 305 篇 neural networks
  • 299 篇 application soft...
  • 295 篇 training
  • 291 篇 internet of thin...
  • 279 篇 support vector m...
  • 277 篇 mathematical mod...
  • 265 篇 laboratories
  • 258 篇 computer archite...
  • 231 篇 testing

机构

  • 61 篇 department of el...
  • 58 篇 hubei key labora...
  • 54 篇 department of sy...
  • 46 篇 college of contr...
  • 44 篇 department of co...
  • 43 篇 shanghai key lab...
  • 43 篇 department of co...
  • 42 篇 department of co...
  • 42 篇 department of el...
  • 42 篇 department of la...
  • 37 篇 school of automa...
  • 37 篇 department of co...
  • 37 篇 department of el...
  • 36 篇 department of ad...
  • 35 篇 academy of mathe...
  • 35 篇 department of co...
  • 35 篇 department of el...
  • 35 篇 department of in...
  • 34 篇 department of co...
  • 34 篇 ieee

作者

  • 99 篇 niyato dusit
  • 59 篇 li li
  • 52 篇 hisao ishibuchi
  • 38 篇 bernhard schölko...
  • 38 篇 m. zahn
  • 34 篇 e. rogers
  • 32 篇 sofotasios pasch...
  • 32 篇 long wang
  • 27 篇 abdelwahed motwa...
  • 26 篇 hong choong seon
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 tao yang
  • 24 篇 liu jiaming
  • 23 篇 wang lei
  • 22 篇 zhang lei
  • 22 篇 henrik sandberg
  • 22 篇 lindemann lars
  • 22 篇 jiang liu
  • 22 篇 rojas cristian r...
  • 22 篇 shen xuemin

语言

  • 34,917 篇 英文
  • 1,187 篇 其他
  • 357 篇 中文
  • 60 篇 日文
  • 9 篇 德文
  • 5 篇 法文
  • 3 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
检索条件"机构=Computer Science and Control Systems Engineering Department"
36526 条 记 录,以下是4971-4980 订阅
排序:
Hybrid-powered internet-of-things for infrastructure-to-vehicle communication  61
Hybrid-powered internet-of-things for infrastructure-to-vehi...
收藏 引用
61st IEEE International Midwest Symposium on Circuits and systems, MWSCAS 2018
作者: Kondapalli, Sri Harsha Pochettino, Owen Aono, Kenji Chakrabartty, Shantanu Department of Electrical and Systems Engineering Japan Department of Computer Science and Engineering Washington University in St. Louis St. LouisMO63130 United States
While autonomous and networked vehicles are being designed to navigate under different driving conditions, there is an emerging need for the infrastructure (roadways) to communicate with the vehicles so as to reliably... 详细信息
来源: 评论
Sliding mode observers for vision-based fault detection, isolation and identification in robot manipulators
Sliding mode observers for vision-based fault detection, iso...
收藏 引用
作者: Capisani, Luca Massimiliano Ferrara, Antonella Pisu, Pierluigi Department of Computer Engineering and Systems Science University of Pavia 27100 Pavia Italy Department of Mechanical Engineering Clemson University Clemson SC 29607-5257 United States
This paper proposes a possible scheme to detect, isolate and identify actuator and sensor faults which can occur in a robot manipulator. The scheme relies on the estimation of the robot configuration obtained by analy... 详细信息
来源: 评论
Co-clustering bipartite with pattern preservation for topic extraction
Co-clustering bipartite with pattern preservation for topic ...
收藏 引用
作者: Hu, Tianming Tan, Chew Lim Tang, Yong Sung, Sam Yuan Xiong, Hui Qu, Chao School of Software Engineering East China Normal University China Department of Computer Science Dongguan University of Technology China Department of Computer Science National University of Singapore Singapore Department of Computer Science Sun Yat-Sen University China Department of Computer Science South Texas College United States Management Science and Information Systems Department Rutgers University United States
The duality between document and word clustering naturally leads to the consideration of storing the document dataset in a bipartite. With documents and words modeled as vertices on two sides respectively, partitionin... 详细信息
来源: 评论
Introduction of first passage time (FPT) analysis for software reliability and network security  09
Introduction of first passage time (FPT) analysis for softwa...
收藏 引用
CSIIRW 2009: 5th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies
作者: Ma, Zhanshan Krings, Axel W. Millar, Richard C. Computer Science Department University of Idaho Moscow ID 83844 United States Department of Systems Engineering Naval Postgraduate School United States
The study of the First Passage Time (FPT) problem (also known as first passage problem, FPP) started more than a century ago, but its diverse applications in science and engineering mostly emerged in the last two to t... 详细信息
来源: 评论
On the time complexity of information dissemination via linear iterative strategies
On the time complexity of information dissemination via line...
收藏 引用
作者: Sundaram, Shreyas Hadjicostis, Christoforos N. GRASP Laboratory Department of Electrical and Systems Engineering University of Pennsylvania United States Department of Electrical and Computer Engineering University of Cyprus Cyprus Coordinated Science Laboratory Department of Electrical and Computer Engineering University of Illinois Urbana-Champaign United States
Given an arbitrary network of interconnected nodes, each with an initial value, we study the number of time-steps required for some (or all) of the nodes to gather all of the initial values via a linear iterative stra... 详细信息
来源: 评论
Revisit on view maintenance in data warehouses  2nd
Revisit on view maintenance in data warehouses
收藏 引用
2nd International Conference on Web-Age Information Management, WAIM 2001
作者: Liang, Weifa Yu, Jeffrey X. Department of Computer Science The Australian National University CanberraACT0200 Australia Department Systems Engineering and Engineering Management Chinese University of Hong Kong Hong Kong
The complete consistence maintenance of SPJ-type materialized views in a distributed source environment has been studied extensively in the past several years due to its fundamental importance to data warehouses. Much... 详细信息
来源: 评论
Integrated risk analysis for a commercial computing service
Integrated risk analysis for a commercial computing service
收藏 引用
21st International Parallel and Distributed Processing Symposium, IPDPS 2007
作者: Yeo, Chee Shin Buyya, Rajkumar Grid Computing and Distributed Systems Laboratory Department of Computer Science and Software Engineering University of Melbourne Vic. 3010 Australia
Utility computing has been anticipated to be the next generation of computing usage. Users have the freedom to easily switch to any commercial computing service to complete jobs whenever the need arises and simply pay... 详细信息
来源: 评论
A Study on the Impact of Network Vulnerability Scanners on Network Security  3
A Study on the Impact of Network Vulnerability Scanners on N...
收藏 引用
3rd International Multidisciplinary Information Technology and engineering Conference, IMITEC 2021
作者: Chikohora, Edmore Mogomeli, Lerako Namibia University of Science and Technology Informatics Department Windhoek Namibia Botswana Accountancy College Computer Systems Engineering Francistown Botswana
Every computer network is bound to be a victim of network intruders which is why many security measures are put in place to protect computer networks from attackers and quickly recover from a network intrusion or atta... 详细信息
来源: 评论
Heuristic algorithm utilizing Mixed-Integer Linear Programming to schedule mobile workforce  23
Heuristic algorithm utilizing Mixed-Integer Linear Programmi...
收藏 引用
23rd International Congress of Chemical and Process engineering, CHISA 2018 and 21st Conference on Process Integration, Modelling and Optimisation for Energy Saving and Pollution Reduction, PRES 2018
作者: Eles, Andrfo Cabezas, Heriberto Heckl, Istvan Department of Computer Science and Systems Technology University of Pannonia Hungary Center for Process Systems Engineering Ajid Sustainability P and Zminy Pcer Catholic University Hungary
来源: 评论
Dialogue with robots to support symbiotic autonomy  7th
收藏 引用
7th International Workshop on Spoken Dialogue systems, IWSDS 2016
作者: Vanzo, Andrea Croce, Danilo Bastianelli, Emanuele Gemignani, Guglielmo Basili, Roberto Nardi, Daniele Department of Computer Control and Management Engineering ‘Antonio Ruberti’ Sapienza University of Rome Rome Italy Department of Enterprise Engineering University of Roma Tor Vergata Rome Italy Department of Civil Engineering and Computer Science Engineering University of Roma Tor Vergata Rome Italy
Service Robotics is finding solutions to enable effective interaction with users. Among the several issues, the need of adapting robots to the way humans usually communicate is becoming a key and challenging task. In ... 详细信息
来源: 评论