咨询与建议

限定检索结果

文献类型

  • 666 篇 会议
  • 287 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 576 篇 工学
    • 365 篇 计算机科学与技术...
    • 294 篇 软件工程
    • 133 篇 信息与通信工程
    • 113 篇 控制科学与工程
    • 76 篇 电气工程
    • 63 篇 电子科学与技术(可...
    • 53 篇 机械工程
    • 52 篇 生物工程
    • 43 篇 生物医学工程(可授...
    • 35 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 33 篇 光学工程
    • 30 篇 动力工程及工程热...
    • 29 篇 土木工程
    • 21 篇 航空宇航科学与技...
    • 20 篇 建筑学
    • 18 篇 化学工程与技术
  • 263 篇 理学
    • 127 篇 数学
    • 62 篇 物理学
    • 62 篇 系统科学
    • 56 篇 生物学
    • 41 篇 统计学(可授理学、...
  • 137 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 44 篇 工商管理
  • 38 篇 医学
    • 38 篇 临床医学
    • 29 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 22 篇 法学
  • 20 篇 经济学
    • 20 篇 应用经济学
  • 18 篇 教育学
    • 18 篇 教育学
  • 5 篇 农学
  • 4 篇 军事学
  • 2 篇 文学

主题

  • 27 篇 software systems
  • 25 篇 wireless sensor ...
  • 23 篇 application soft...
  • 23 篇 computational mo...
  • 20 篇 software enginee...
  • 18 篇 laboratories
  • 16 篇 resource managem...
  • 16 篇 distributed comp...
  • 15 篇 computer science
  • 15 篇 mathematical mod...
  • 15 篇 computer network...
  • 14 篇 control systems
  • 14 篇 topology
  • 14 篇 software
  • 14 篇 artificial intel...
  • 13 篇 computer archite...
  • 13 篇 quality of servi...
  • 13 篇 training
  • 12 篇 sensor systems
  • 12 篇 educational inst...

机构

  • 22 篇 beijing key labo...
  • 22 篇 school of electr...
  • 16 篇 seventh research...
  • 14 篇 college of compu...
  • 12 篇 institute for so...
  • 12 篇 department of el...
  • 10 篇 department of so...
  • 10 篇 department of el...
  • 9 篇 department of el...
  • 9 篇 department of co...
  • 9 篇 institute for so...
  • 8 篇 electrical compu...
  • 8 篇 the applied soft...
  • 6 篇 the college of c...
  • 6 篇 state key labora...
  • 6 篇 department of ap...
  • 6 篇 gamf faculty of ...
  • 5 篇 software systems...
  • 5 篇 department of el...
  • 5 篇 electrical and s...

作者

  • 24 篇 junping du
  • 24 篇 fashan yu
  • 24 篇 yingmin jia
  • 20 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 biswas gautam
  • 13 篇 gautam biswas
  • 13 篇 william c. barot...
  • 11 篇 parashar manish
  • 11 篇 leung victor c.m...
  • 11 篇 thanapong suwana...
  • 10 篇 cattareeya suwan...
  • 9 篇 abhishek dubey
  • 9 篇 ahmed bestoun s.
  • 9 篇 zamli kamal z.
  • 8 篇 ashraf tantawy
  • 7 篇 babiceanu radu f...
  • 7 篇 ilteris demirkir...

语言

  • 917 篇 英文
  • 31 篇 其他
  • 12 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Electrical Computer Software and Systems Engineering"
961 条 记 录,以下是571-580 订阅
排序:
Blind source separation-based multi-user detection for multi-antenna QAM receivers with I/Q imbalances
Blind source separation-based multi-user detection for multi...
收藏 引用
IEEE International Conference on Electro-Information Technology
作者: Thomas Yang Yassir Salama John Matyjas Richard Michalak Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona Beach Florida Air Force Research Lab Information Directorate (AFRL/RI) Rome NY
This paper presents a blind multi-user detection technique for multi-antenna quadrature amplitude modulation (QAM) receivers with Inphase/Quadrature phase (I/Q) imbalances. The estimation of multiple users in the pres... 详细信息
来源: 评论
Two-tier data-driven intrusion detection for automatic generation control in smart grid
Two-tier data-driven intrusion detection for automatic gener...
收藏 引用
IEEE Conference on Communications and Network Security (CNS)
作者: Muhammad Qasim Ali Reza Yousefian Ehab Al-Shaer Sukumar Kamalasadan Quanyan Zhu Department of Software and Information Systems Symantec Corporation Mountain View CA Department of Electrical and Computer Engineering University of North Carolina Charlotte Charlotte NC Princeton University Princeton NJ
Legacy energy infrastructures are being replaced by modern smart grids. Smart grids provide bi-directional communications for the purpose of efficient energy and load management. In addition, energy generation is adju... 详细信息
来源: 评论
Understanding the tradeoffs between software-managed vs. hardware-managed caches in GPUs
Understanding the tradeoffs between software-managed vs. har...
收藏 引用
IEEE International Symposium on Performance Analysis of systems and software
作者: Chao Li Yi Yang Hongwen Dai Shengen Yan Frank Mueller Huiyang Zhou Department of Electrical and Computer Engineering North Carolina State University Department of Computing Systems Architecture NEC Laboratories America Institute of Software North Carolina State University Department of Computer Science North Carolina State University
On-chip caches are commonly used in computer systems to hide long off-chip memory access latencies. To manage on-chip caches, either software-managed or hardware-managed schemes can be employed. State-of-art accelerat... 详细信息
来源: 评论
Small-scale payload operations simulator for proximity operations
Small-scale payload operations simulator for proximity opera...
收藏 引用
AIAA SPACE 2014 Conference and Exposition
作者: Harris, Kristia K. Cokley, Jared M. Holden, Sean R. Udrea, Bogdan Stebler, Shane T. Williams, Blake E. McGarvey, Michael R. Nayak, Michael V. Department of Mechanical Engineering Embry-Riddle Aeronautical University Daytona Beach FL 32114 United States Department of Aerospace Engineering Embry-Riddle Aeronautical University Daytona Beach FL 32114 United States Department of Electrical Computer Software and Systems Engineering Embry-Riddle Aeronautical University Daytona Beach FL 32114 United States VisSidus Technologies Inc Daytona Beach FL 32114 United States Red Sky Research LLC Albuquerque NM 87108 United States
The process and studies that make-up the design, construction, and testing of a desktop size spacecraft simulator are detailed. The spacecraft simulator is of the essence to validate and verify the requirements and sc... 详细信息
来源: 评论
Improving Cyber Resiliency of Cloud Application Services by Applying software Behavior Encryption (SBE)
收藏 引用
Procedia computer Science 2014年 28卷 62-70页
作者: Danny Thebeau II Benjamin Reidy Ricardo Valerdi Avinash Gudagi Hemayamini Kurra Youssif Al-Nashif Salim Hariri Frederick Sheldon University of Arizona Department of Systems and Industrial Engineering 1127 E. James E. Rogers Way Tucson AZ 85721-0012 USA University of Arizona Electrical and Computer Engineering 1230 E. Speedway Blvd PO Box 210104 Tucson AZ 85721-0104 USA Oak Ridge National Laboratory Applied Software Engineering Research PO Box 2008 Oak Ridge TN 37831 USA
The objective of this work is to define and measure cyber resiliency of the “cloud” in a Moving Target Defense (MTD) environment that applies the software Behavior Encryption (SBE) method. Implementation of SBE has ... 详细信息
来源: 评论
Coevolutionary modeling in network formation
Coevolutionary modeling in network formation
收藏 引用
IEEE Global Conference on Signal and Information Processing (GlobalSIP)
作者: Ibrahim Al-Shyoukh Georgios Chasparis Jeff S. Shamma Georgia Institute of Technology Atlanta GA US Department of Data Analysis Systems Software Competence Center Hagenberg GmbH Hagenberg Austria CEMSE Division King Abdullah University of Science and Technology (KAUST) Thuwal Saudi Arabia School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta GA
Network coevolution, the process of network topology evolution in feedback with dynamical processes over the network nodes, is a common feature of many engineered and natural networks. In such settings, the change in ... 详细信息
来源: 评论
Safety analysis of Autonomous Ground Vehicle optical systems: Bayesian belief networks approach
Safety analysis of Autonomous Ground Vehicle optical systems...
收藏 引用
2013 Federated Conference on computer Science and Information systems, FedCSIS 2013
作者: Reyes Duran, Daniel Robinson, Elliot Kornecki, Andrew J. Zalewski, Janusz Embry Riddle Aeronautical University Electrical Computer Systems and Software Engineering Dept Daytona Beach FL United States Florida Gulf Coast University College of Engineering Dept. of Software Engineering Ft.Myers United States
Autonomous Ground Vehicles (AGV) require diverse sensor systems to support the navigation and sense-and-avoid tasks. Two of these systems are discussed in the paper: dual camera-based computer vision (CV) and laser-ba... 详细信息
来源: 评论
Computational models of surprise in evaluating creative design  4
Computational models of surprise in evaluating creative desi...
收藏 引用
4th International Conference on Computational Creativity, ICCC 2013
作者: Maher, Mary Lou Brady, Katherine Fisher, Douglas H. Software Information Systems University of North Carolina CharlotteNC United States Electrical Engineering and Computer Science Vanderbilt University NashvilleTN United States
In this paper we consider how to evaluate whether a design or other artifact is creative. Creativity and its evaluation have been studied as a social process, a creative arts practice, and as a design process with gui... 详细信息
来源: 评论
Advanced verification techniques for airborne safety critical hardware
Advanced verification techniques for airborne safety critica...
收藏 引用
AIAA Infotech at Aerospace (I at A) Conference
作者: Butka, B. Electrical Computer Software and Systems Engineering Department Embry-Riddle Aeronautical University 600 Clyde Morris Blvd Daytona Beach FL 32114 United States
RTCA/DO-254 defines the verification process used to assure that the designed hardware meets the requirements and identifies additional verification processes that should be performed for DAL A hardware where failure ... 详细信息
来源: 评论
Percolation theory-based exposure-path prevention for wireless sensor networks coverage in internet of things
收藏 引用
IEEE Sensors Journal 2013年 第10期13卷 3625-3636页
作者: Liu, Liang Zhang, Xi Ma, Huadong Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas AandM University College Station TX 77843 United States
Deriving the critical density to achieve region coverage for random sensor deployment is a fundamentally important problem in the area of Internet of Things (IoT). Most of the existing works on sensor coverage mainly ... 详细信息
来源: 评论