咨询与建议

限定检索结果

文献类型

  • 271 篇 会议
  • 76 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 267 篇 工学
    • 145 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 83 篇 仪器科学与技术
    • 44 篇 电子科学与技术(可...
    • 40 篇 信息与通信工程
    • 35 篇 电气工程
    • 35 篇 航空宇航科学与技...
    • 31 篇 光学工程
    • 30 篇 控制科学与工程
    • 24 篇 生物医学工程(可授...
    • 18 篇 机械工程
    • 17 篇 动力工程及工程热...
    • 14 篇 生物工程
    • 12 篇 化学工程与技术
    • 11 篇 冶金工程
    • 11 篇 土木工程
  • 179 篇 理学
    • 78 篇 物理学
    • 66 篇 数学
    • 62 篇 地球物理学
    • 39 篇 化学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 14 篇 系统科学
  • 52 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 22 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 15 篇 药学(可授医学、理...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 7 篇 法学
  • 3 篇 教育学
  • 2 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 23 篇 neutrons
  • 11 篇 computer archite...
  • 9 篇 cosmology
  • 9 篇 photomultipliers
  • 6 篇 cosmic rays
  • 6 篇 hardware
  • 6 篇 computer aided d...
  • 5 篇 optimization
  • 5 篇 computational mo...
  • 5 篇 evolutionary alg...
  • 5 篇 topology
  • 5 篇 feature extracti...
  • 4 篇 simulation
  • 4 篇 databases
  • 4 篇 synchronization
  • 4 篇 field programmab...
  • 4 篇 shape
  • 3 篇 internet of thin...
  • 3 篇 urban areas
  • 3 篇 maintenance engi...

机构

  • 89 篇 infn sezione di ...
  • 87 篇 université de st...
  • 87 篇 nikhef national ...
  • 87 篇 infn sezione di ...
  • 86 篇 ncsr demokritos ...
  • 85 篇 institut univers...
  • 85 篇 tno technical sc...
  • 85 篇 infn sezione di ...
  • 84 篇 università la sa...
  • 84 篇 infn sezione di ...
  • 83 篇 north-west unive...
  • 83 篇 university würzb...
  • 83 篇 university of jo...
  • 82 篇 infn sezione di ...
  • 82 篇 national centre ...
  • 82 篇 western sydney u...
  • 81 篇 università di ge...
  • 80 篇 university moham...
  • 80 篇 cadi ayyad unive...
  • 80 篇 università di bo...

作者

  • 95 篇 ardid m.
  • 94 篇 díaz a.f.
  • 94 篇 coleiro a.
  • 94 篇 enzenhöfer a.
  • 94 篇 celli s.
  • 94 篇 brunner j.
  • 94 篇 coniglione r.
  • 94 篇 eberl t.
  • 93 篇 ferrara g.
  • 93 篇 boumaaza j.
  • 93 篇 di palma i.
  • 93 篇 van haren h.
  • 93 篇 donzaud c.
  • 92 篇 kalekin o.
  • 91 篇 dornic d.
  • 91 篇 chabab m.
  • 90 篇 bouta m.
  • 89 篇 calvo d.
  • 87 篇 bendahman m.
  • 87 篇 capone a.

语言

  • 299 篇 英文
  • 44 篇 其他
  • 4 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Architecture and Computer Technology"
350 条 记 录,以下是51-60 订阅
排序:
KM3NeT acquisition electronics: status and upgrade  38
KM3NeT acquisition electronics: status and upgrade
收藏 引用
38th International Cosmic Ray Conference, ICRC 2023
作者: Calvo, D. Real, D. Jansweijer, P. van Beveren, V. Schmelling, J.W. Pellegrini, G. Diaz, A. Colonges, S. Champion, C. Benfenati, F. Filippini, F. Chiarusi, T. Musico, P. Litrico, P. Zornoza, J.D. Gozzini, R. c/ Catedrático José Beltrán 2 Paterna Valencia46980 Spain Nikhef National Institute for Subatomic Physics PO Box 41882 Amsterdam1009 DB Netherlands University of Granada Dept. of Computer Architecture and Technology/CITIC Granada18071 Spain APC Université Paris Diderot CNRS IN2P3 CEA/IRFU Observatoire de Paris Sorbonne Paris Cité Paris75205 France INFN Sezione di Bologna v.le C. Berti-Pichat 6/2 Bologna40127 Italy INFN Sezione di Genova Via Dodecaneso 33 Genova16146 Italy INFN Laboratori Nazionali del Sud Via Santa Sofia62 CataniaCT - 95123 Italy
The KM3NeT Collaboration is building and operating two deep-sea neutrino telescopes at the bottom of the Mediterranean Sea. The telescopes consist of lattices of light detectors housed in pressure-resistant glass sphe... 详细信息
来源: 评论
Auditory models comparison for horizontal localization of concurrent speakers in adverse acoustic scenarios  23
Auditory models comparison for horizontal localization of co...
收藏 引用
23rd International Congress on Acoustics: Integrating 4th EAA Euroregio, ICA 2019
作者: Barumerli, Roberto Almenari, Andrea Geronazzo, Michele Di Nunzio, Giorgio Maria Avanzini, Federico Dept. of Information Engineering University of Padova Italy Dept. of Architecture Design and Media Technology Aalborg University Denmark Dept. of Computer Science University of Milano Italy
This paper aims at comparing and reproducing the predictions of two public available computational auditory models for speaker localization in different simulated environments. The direction-of-arrival (DOA) of sound ... 详细信息
来源: 评论
On the evaluation of head-related transfer functions with probabilistic auditory models of human sound localization  23
On the evaluation of head-related transfer functions with pr...
收藏 引用
23rd International Congress on Acoustics: Integrating 4th EAA Euroregio, ICA 2019
作者: Geronazzo, Michele Barumerli, Roberto Avanzini, Federico Dept. of Architecture Design and Media Technology Aalborg University Denmark Dept. of Information Engineering University of Padova Italy Dept. of Computer Science University of Milano Italy
Understanding spatial hearing leads to implement efficient and effective auralization rendering algorithms with headphones. Two important aspects contribute to sound localization: (i) acoustic filtering of listener bo... 详细信息
来源: 评论
Reliability assurance in early-life-failure test through improved nearest neighbor regression
收藏 引用
IEICE Electronics Express 2020年 第2期17卷
作者: Song, Tai Liang, Huaguo Huang, Zhengfeng Hou, Jie Dept. of Electronic Science and Applied Physics Hefei University of Technology Hefei230009 China Institute of Computer Architecture and Computer Stuttgart University StuttgartD-70569 Germany
During manufacturing test, researchers usually overlook the importance of process variation defects and marginal defects, which can seriously affect test results of Early-Life-Failure (ELF). Theoretically, machine lea... 详细信息
来源: 评论
JKinect: A new Java Software for Designing and Assessing Gross Motor Activities in children with autism based on JFML
JKinect: A new Java Software for Designing and Assessing Gro...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
作者: Juan Carlos Gámez-Granados Francisco Javier Rodriguez-Lozano Giovanni Acampora Chang-Shing Lee Jose Manuel Soto-Hidalgo Dept. Electr. & Computer Engineering University of Córdoba Spain Dept. Physics Ettore Pancini University of Naples Federico II Italy Dept. Computer Science & Information Engineering National University of Tainan Taiwan Dept. Computer Architecture and Computer Technology University of Granada Spain
Motor therapies can be considered as one of the social challenges that have a great impact in children with autism. Traditionally, exercises and activities as therapies have been used to mitigate and to rehabilitate p... 详细信息
来源: 评论
A Machine Vision-Based Person Detection Under Low-Illuminance Conditions Using High Dynamic Range Imagery for Visual Surveillance System
A Machine Vision-Based Person Detection Under Low-Illuminanc...
收藏 引用
Smart Technologies in Computing, Electrical and Electronics (ICSTCEE), International Conference on
作者: Julie Ann B. Susa Sammy V. Militante Aimee G. Acoba Ryan Soriente Evangelista Luisito Lolong Lacatan Charlemagne G. Laviňa Bartolome T. Tanguilig Dept. of Computer Engineering Southern Luzon State University Lucban Quezon Philippines College of Engineering and Architecture University of Antique Antique Philippines Electronics Eng'g Technology Department Technological University of the Philippines Manila Philippines School of Graduate Studies Sulu State College Sulu Philippines College of Computing and Engineering Pamantasan ng Cabuyao Laguna Philippines
The most difficult component of any computer vision application objects recognition and tracking. Video surveillance is a major study subject in computer vision in a dynamic environment, especially for security purpos... 详细信息
来源: 评论
On robot compliance. A cerebellar control approach
arXiv
收藏 引用
arXiv 2020年
作者: Abadía, Ignacio Naveros, Francisco Garrido, Jesús A. Ros, Eduardo Luque, Niceto R. Research Centre for Information and Communication Technologies Dept. Computer Architecture and Technology U. Granada Granada18014 Spain
The work presented here is a novel biological approach for the compliant control of a robotic arm in real time (RT). We integrate a spiking cerebellar network at the core of a feedback control loop performing torque d... 详细信息
来源: 评论
Dynamic Resilient Graph Games for State-Dependent Jamming Attacks Analysis on Multi-Agent Systems
收藏 引用
IFAC-PapersOnLine 2020年 第2期53卷 3421-3426页
作者: Yurid Nugraha Ahmet Cetinkaya Tomohisa Hayakawa Hideaki Ishii Quanyan Zhu Dept. of Systems and Control Engineering Tokyo Institute of Technology Tokyo 152-8552 Japan Information Systems Architecture Science Research Division National Institute of Informatics Tokyo 101-8430 Japan Dept. of Computer Science Tokyo Insitute of Technology Yokohama 226-8502 Japan Dept. of Electrical and Computer Engineering New York University Brooklyn NY 11201 USA
A cybersecurity problem for a multi-agent consensus problem is investigated through a dynamic game formulation. Specifically, we consider a game repeatedly played between a jamming attacker and a defender. The attacke... 详细信息
来源: 评论
A Preliminary Approach to Allocate Categories of Buildings into Lands based on Generative Design
A Preliminary Approach to Allocate Categories of Buildings i...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
作者: Ignacio Pérez-Martínez María Martínez-Rojas J. M. Soto-Hidalgo Dept. of Electr. and Computer Engineering University of Córdoba Spain Dept. of Economics University of Málaga Spain Dept. Comput. Architecture & Comput. Technology University of Granada Spain
In comparison to some other economic sectors, the productivity of workers in the construction has not increased much over the last 20 years. There are many approaches to tackle this problem, and one of them is to reth... 详细信息
来源: 评论
Improving evolution of service configurations for moving target defense
Improving evolution of service configurations for moving tar...
收藏 引用
Congress on Evolutionary Computation
作者: Ernesto Serrano-Collado Mario García-Valdez Juan J. Merelo-Guervós University of Granada Granada Spain Instituto Tecnológico de Tijuana Dept. of Computer Architecture and Technology University of Granada Granada Spain
The term moving target defense or MTD describes a series of techniques that change the configuration of an Internet-facing system; in general, the technique consists of changing the visible configuration to avoid offe... 详细信息
来源: 评论