咨询与建议

限定检索结果

文献类型

  • 534 篇 会议
  • 106 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 645 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 402 篇 工学
    • 266 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 57 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物工程
    • 22 篇 光学工程
    • 21 篇 化学工程与技术
    • 20 篇 动力工程及工程热...
    • 19 篇 仪器科学与技术
    • 19 篇 材料科学与工程(可...
    • 16 篇 力学(可授工学、理...
    • 16 篇 生物医学工程(可授...
    • 13 篇 交通运输工程
    • 10 篇 农业工程
  • 205 篇 理学
    • 112 篇 数学
    • 61 篇 物理学
    • 31 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 16 篇 化学
  • 112 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 15 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 11 篇 法学
    • 10 篇 社会学
  • 8 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 19 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 training
  • 12 篇 computer archite...
  • 10 篇 data mining
  • 10 篇 computational mo...
  • 9 篇 wireless communi...
  • 9 篇 real-time system...
  • 9 篇 software
  • 9 篇 technological in...
  • 8 篇 wireless sensor ...
  • 8 篇 predictive model...
  • 8 篇 genetic algorith...
  • 8 篇 topology
  • 8 篇 mathematical mod...
  • 8 篇 data models
  • 7 篇 fuzzy logic
  • 7 篇 reliability
  • 7 篇 educational inst...

机构

  • 8 篇 dep. of mathemat...
  • 7 篇 dep. of electric...
  • 7 篇 institute of com...
  • 6 篇 department of co...
  • 5 篇 university of ag...
  • 5 篇 kristiania unive...
  • 5 篇 tu wien inst. of...
  • 5 篇 school of inform...
  • 5 篇 advanced researc...
  • 4 篇 dep. of computer...
  • 4 篇 institute of com...
  • 4 篇 king mongkut's u...
  • 3 篇 dep. of electric...
  • 3 篇 guangxi key labo...
  • 3 篇 department of ma...
  • 3 篇 dep. of computer...
  • 3 篇 applied computer...
  • 3 篇 sichuan institut...
  • 3 篇 fir-uf universit...
  • 3 篇 dep. of integrat...

作者

  • 8 篇 arani elahe
  • 8 篇 zonooz bahram
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 thilo sauter
  • 6 篇 cerdà-alabern ll...
  • 5 篇 grønli tor-morte...
  • 5 篇 mukund bhole
  • 5 篇 kaindl hermann
  • 5 篇 wolfgang kastner
  • 5 篇 majchrzak tim a.
  • 4 篇 ganokratanaa thi...
  • 4 篇 kastner wolfgang
  • 4 篇 gómez-pulido jua...
  • 4 篇 ignacio rojas
  • 4 篇 vega-rodríguez m...
  • 4 篇 rosa agostinho c...
  • 4 篇 fernandes carlos...
  • 4 篇 sauter thilo
  • 4 篇 mehdi ghatee

语言

  • 634 篇 英文
  • 7 篇 中文
  • 4 篇 其他
检索条件"机构=Dep. Computer Architecture & Computer Technology"
645 条 记 录,以下是401-410 订阅
排序:
Static analysis of worst-case stack cache behavior  13
Static analysis of worst-case stack cache behavior
收藏 引用
21st International Conference on Real-Time Networks and Systems, RTNS 2013
作者: Jordan, Alexander Brandner, Florian Schoeberl, Martin Compilers and Languages Group Institute of Computer Languages Vienna University of Technology Austria Embedded Systems Engineering Section Dep. of Applied Mathematics and Computer Science Technical University of Denmark Denmark
Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar... 详细信息
来源: 评论
Directing exploratory search: Reinforcement learning from user interactions with keywords  13
Directing exploratory search: Reinforcement learning from us...
收藏 引用
18th International Conference on Intelligent User Interfaces, IUI 2013
作者: Glowacka, Dorota Ruotsalo, Tuukka Konyushkova, Ksenia Athukorala, Kumaripaba Kaski, Samuel Jacucci, Giulio Helsinki Institute for Information Technology HIIT Dep. of Computer Science University of Helsinki Finland Helsinki Institute for Information Technology HIIT Aalto University Finland
Techniques for both exploratory and known item search tend to direct only to more specific subtopics or individual documents, as opposed to allowing directing the exploration of the information space. We present an in... 详细信息
来源: 评论
Expressing Best Practices in (Risk) Analysis and Testing of Safety-Critical Systems Using Patterns
Expressing Best Practices in (Risk) Analysis and Testing of ...
收藏 引用
IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp)
作者: Wolfgang Herzner Sven Sieverding Omar Kacimi Eckard Böde Thomas Bauer Brian Nielsen Safety & Security Department AIT Austrian Institute of Technology Vienna Austria Transp. Dept. OFFIS - Inst. for Inf. Technol. Oldenburg Germany Transportation Department OFFIS - Institute for Information Technology Oldenburg Germany Dep. of Embedded Systems Quality Assurance Fraunhofer IESE Kaiserslautern Germany Department of Computer Science Aalborg University Denmark
The continuing pervasion of our society with safety-critical cyber-physical systems not only demands for adequate (risk) analysis, testing and verification techniques, it also generates growing experience on their use... 详细信息
来源: 评论
CMOS photodiode model and HDL implementation
CMOS photodiode model and HDL implementation
收藏 引用
2013 European Conference on Circuit Theory and Design, ECCTD 2013
作者: Blanco-Filgueira, B. López, P. Suárez, M. Roldán, J.B. CITIUS University of Santiago de Compostela 15782 Santiago-de Compostela Spain Dep. of Electronics and Computer Technology University of Granada 18071 Granade Spain
With CMOS image sensors scaling down due to the resolution and miniaturization demands, compact models for these devices become essential. A physically based model can be used to optimize the device performance and al... 详细信息
来源: 评论
Improvement of Leach Protocol for Wireless Sensor Networks
Improvement of Leach Protocol for Wireless Sensor Networks
收藏 引用
International Conference on Instrumentation, Measurement, computer, Communication and Control (IMCCC)
作者: Yong-Zhen Li Ai-Li Zhang Yu-Zhu Liang Dep. of Computer Science & Technology Yanbian University Yanji China
LEACH is a hierarchical routing protocol special for WSN. Many researchers have proposed many improved algorithms based on LEACH, such as LEACH-C, LEACH-M and so on, and these algorithms have much improvements on effi... 详细信息
来源: 评论
A temporal logic for planning under uncertainty
A temporal logic for planning under uncertainty
收藏 引用
26th International Florida Artificial Intelligence Research Society Conference, FLAIRS 2013
作者: Biscaia, Manuel Baltazar, Pedro Mateus, Paulo Nagarajan, Rajagopal Instituto de Telecomunicações Dep. Mathematics Universidade Técnica de Lisboa Portugal Department of Computer Science School of Science and Technology Middlesex University London United Kingdom
Dealing with uncertainty in the context of planning has been an active research subject in AI. Addressing the case when uncertainty evolves over time can be difficult. In this work, we provide a solution to this probl... 详细信息
来源: 评论
Feature selection methods in persian sentiment analysis
收藏 引用
18th International Conference on Application of Natural Language to Information Systems, NLDB 2013
作者: Saraee, Mohamad Bagheri, Ayoub School of Computing Science and Engineering University of Salford Manchester United Kingdom Intelligent Database Data Mining and Bioinformatics Lab Electrical and Computer Engineering Dep. Isfahan University of Technology Isfahan Iran
With the enormous growth of digital content in internet, various types of online reviews such as product and movie reviews present a wealth of subjective information that can be very helpful for potential users. Senti... 详细信息
来源: 评论
Improving performance of all-to-all communication through loop scheduling in PGAS environments  13
Improving performance of all-to-all communication through lo...
收藏 引用
27th ACM International Conference on Supercomputing, ICS 2013
作者: Alvanos, Michail Tanase, Gabriel Farreras, Montse Tiotto, Ettore Amaral, José Nelson Martorell, Xavier Programming Models Barcelona Supercomputer Center Barcelona Spain IBM TJ Watson Research Center Yorktown Heights NY United States Dep. of Computer Architecture Universitat Politècnica de Catalunya Barcelona Spain Static Compilation Technology IBM Toronto Laboratory Toronto ON Canada Dep. of Computing Science University of Alberta Edmonton AB Canada IBM Canada CAS Research Markham ON Canada
No abstract available.
来源: 评论
Application of evolutionary algorithms to maximum lifetime coverage problem in wireless sensor networks
Application of evolutionary algorithms to maximum lifetime c...
收藏 引用
2013 IEEE 37th Annual computer Software and Applications Conference, COMPSAC 2013
作者: Tretyakova, Antonina Seredynski, Franciszek Polish-Japanese Institute of Information Technology Warsaw Poland Dep. of Mathematics and Natural Sciences Cardinal Stefan Wyszynski University Warsaw Poland Computer Science Department Siedlce University of Natural Sciences and Humanities Siedlce Poland
The paper analyzes three recently proposed algorithms, which differ not only in the method of finding solution to the Maximum Lifetime Coverage problem in Wireless Sensor Networks (WSN), but also approaches to a state... 详细信息
来源: 评论
Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?
Physical layer security vs. network layer secrecy: Who wins ...
收藏 引用
IEEE International Workshop on computer-Aided Modeling, Analysis, and Design of Communication Links and Networks, CAMAD
作者: Johannes Richter Elke Franz Sabrina Engelmann Stefan Pfennig Eduard A. Jorswieck Dep. of Electrical Engineering and Information Technology/Communications Laboratory Dep. of Computer Science/Privacy and Data Security Technische Universität Dresden Dresden Germany
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ... 详细信息
来源: 评论