咨询与建议

限定检索结果

文献类型

  • 3,753 篇 会议
  • 3,119 篇 期刊文献
  • 82 册 图书
  • 2 篇 专利

馆藏范围

  • 6,956 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 3,907 篇 工学
    • 2,028 篇 计算机科学与技术...
    • 1,645 篇 软件工程
    • 1,299 篇 控制科学与工程
    • 556 篇 信息与通信工程
    • 537 篇 电气工程
    • 468 篇 机械工程
    • 439 篇 电子科学与技术(可...
    • 302 篇 生物工程
    • 236 篇 生物医学工程(可授...
    • 223 篇 光学工程
    • 217 篇 化学工程与技术
    • 188 篇 交通运输工程
    • 186 篇 仪器科学与技术
    • 172 篇 动力工程及工程热...
    • 154 篇 安全科学与工程
    • 138 篇 土木工程
    • 121 篇 建筑学
  • 2,665 篇 理学
    • 1,477 篇 数学
    • 618 篇 系统科学
    • 617 篇 物理学
    • 518 篇 统计学(可授理学、...
    • 380 篇 生物学
    • 220 篇 化学
  • 897 篇 管理学
    • 630 篇 管理科学与工程(可...
    • 270 篇 图书情报与档案管...
    • 244 篇 工商管理
  • 290 篇 医学
    • 227 篇 临床医学
    • 181 篇 基础医学(可授医学...
    • 110 篇 药学(可授医学、理...
  • 127 篇 法学
    • 114 篇 社会学
  • 104 篇 经济学
  • 64 篇 农学
  • 35 篇 教育学
  • 12 篇 军事学
  • 9 篇 文学
  • 5 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 195 篇 control systems
  • 129 篇 computer science
  • 127 篇 computational mo...
  • 117 篇 feature extracti...
  • 114 篇 optimization
  • 98 篇 mathematical mod...
  • 93 篇 stability analys...
  • 88 篇 linear systems
  • 78 篇 machine learning
  • 76 篇 uncertainty
  • 74 篇 neural networks
  • 71 篇 process control
  • 71 篇 robustness
  • 70 篇 robots
  • 67 篇 trajectory
  • 66 篇 linear matrix in...
  • 64 篇 robust control
  • 64 篇 predictive model...
  • 64 篇 accuracy
  • 64 篇 training

机构

  • 62 篇 division of deci...
  • 61 篇 beijing institut...
  • 60 篇 department of co...
  • 49 篇 school of comput...
  • 44 篇 institute for co...
  • 44 篇 institute for co...
  • 37 篇 systems and cont...
  • 36 篇 school of electr...
  • 34 篇 ieee
  • 34 篇 school of contro...
  • 33 篇 university of ch...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 28 篇 institute for co...
  • 28 篇 moscow
  • 28 篇 school of contro...
  • 28 篇 state key labora...
  • 26 篇 department of el...
  • 26 篇 department of co...
  • 25 篇 moscow institute...

作者

  • 87 篇 johansson karl h...
  • 84 篇 eric rogers
  • 69 篇 péter gáspár
  • 60 篇 krzysztof galkow...
  • 58 篇 tóth roland
  • 49 篇 balázs németh
  • 34 篇 wojciech paszke
  • 33 篇 galkowski krzysz...
  • 32 篇 e. rogers
  • 29 篇 roland tóth
  • 28 篇 karl h. johansso...
  • 28 篇 johansson karl h...
  • 24 篇 el-sayed m.el-ke...
  • 23 篇 rojas cristian r...
  • 22 篇 dimarogonas dimo...
  • 21 篇 besselink bart
  • 21 篇 dániel fényes
  • 20 篇 d.h. owens
  • 19 篇 henrik sandberg
  • 19 篇 zidong wang

语言

  • 6,652 篇 英文
  • 185 篇 其他
  • 98 篇 中文
  • 18 篇 俄文
  • 4 篇 德文
  • 4 篇 日文
  • 3 篇 法文
  • 2 篇 朝鲜文
检索条件"机构=Institute for Computer Science and Control"
6956 条 记 录,以下是21-30 订阅
排序:
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 114-125页
作者: Yu-Ang Wang Zidong Wang Lei Zou Bo Shen Hongli Dong the College of Information Science and Technology Donghua University the Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of Education IEEE the College of Electrical Engineering and Automation Shandong University of Science and Technology the Department of Computer Science Brunel University London Uxbridge the Sanya Offshore Oil and Gas Research Institute Northeast Petroleum University the Artificial Intelligence Energy Research Institute Northeast Petroleum University Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Northeast Petroleum University
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... 详细信息
来源: 评论
Robust control and data reconstruction for nonlinear epidemiological models using feedback linearization and state estimation
收藏 引用
Mathematical Biosciences and Engineering 2025年 第1期22卷 109-137页
作者: Csutak, Balázs Szederkényi, Gábor Faculty of Information Technology and Bionics Pázmány Péter Catholic University Práter u. 50/A BudapestH-1083 Hungary Systems and Control Laboratory HUN-REN Institute for Computer Science and Control Kende u. 13-17 BudapestH-1111 Hungary
It has been clearly demonstrated over the past years that control theory can provide an efficient framework for the solution of several complex tasks in epidemiology. In this paper, we present a computational approach... 详细信息
来源: 评论
State Estimation of a Spatial 2-D Linear Diffusion Process With Mobile Sensors
收藏 引用
IEEE Transactions on Automation science and Engineering 2025年 22卷 12024-12032页
作者: Zhang, Xiao-Wei Chen, Kui Wu, Huai-Ning Wang, Jin-Liang Wang, Zi-Peng Beijing University of Technology School of Information Science and Technology Beijing100124 China Tiangong University School of Control Science and Engineering Tianjin300387 China Beihang University Science and Technology on Aircraft Control Laboratory School of Automation Science and Electrical Engineering Beijing100191 China Beihang University Hangzhou International Innovation Institute Hangzhou311115 China Tiangong University Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems School of Computer Science and Technology Tianjin300387 China Beijing University of Technology School of Information Science and Technology Beijing Institute of Artificial Intelligence Beijing100124 China
This paper studies the state observer design of a spatial two-dimensional (2-D) linear diffusion process described by a linear parabolic partial differential equation (PDE) under mobile sensors. Firstly, we analyze th... 详细信息
来源: 评论
Immoral post detection using a one-dimensional convolutional neural network-based LSTM network
收藏 引用
Multimedia Tools and Applications 2025年 1-20页
作者: Saqia, Bibi Khan, Khairullah Rahman, Atta Ur Khan, Aurangzeb Jain, Deepak Kumar Department of Computer Science University of Science and Technology Bannu28100 Pakistan Riphah Institute of Systems Engineering Riphah International University Islamabad46000 Pakistan Key Laboratory of Intelligent Control and Optimization for Industrial Equipment of Ministry of Education Dalian University of Technology Dalian116024 China Symbiosis Institute of Technology Symbiosis International University Pune India
In text mining and Natural Language Processing (NLP), extracting emotions from textual data is gaining rapid attraction. The proliferation of online content and the freedom of expression on social media platforms has ... 详细信息
来源: 评论
Trust-Based Identity Privacy for Edge Computing  24
Trust-Based Identity Privacy for Edge Computing
收藏 引用
14th International Conference on Communication and Network Security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
College of computer science Beijing University of Technology, Beijing 100124, China, 1374622525@*** This paper proposes a trust collaboration technology for edge computing, addressing trust isolation and security issu... 详细信息
来源: 评论
Inter-Stream Dependencies in Time-Sensitive Networking  28
Inter-Stream Dependencies in Time-Sensitive Networking
收藏 引用
28th Conference on Innovation in Clouds, Internet and Networks, ICIN 2025
作者: Chahed, Hamza Yarvis, Mark Frick, Florian Kassler, Andreas Intel Deutschland GmbH Germany Intel Corporation United States Department of Mathematics and Computer Science Karlstad University Karlstad Sweden Institute for Control Technology of Machine Tools and Manufacturing Equipment University of Stuttgart Germany Faculty of Applied Computer Science Deggendorf Institute of Technology Deggendorf Germany
Effective configuration of Time-Sensitive Networks is crucial for providing timeliness and reliability guarantees for real-time industrial applications, where many inter-dependent streams may co-exist. However, existi... 详细信息
来源: 评论
Trust Collaboration for Edge Computing  24
Trust Collaboration for Edge Computing
收藏 引用
14th International Conference on Communication and Network Security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur... 详细信息
来源: 评论
A New Benchmark and Algorithm for Clothes-Changing Video Person Re-Identification
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 1993-2005页
作者: Wang, Likai Zhang, Xiangqun Han, Ruize Wei, Yanjie Wang, Song Feng, Wei Tianjin University College of Intelligence and Computing Tianjin300350 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518107 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
Person re-identification (Re-ID) is a classical computer vision task and has significant applications for public security and information forensics. Recently, long-term Re-ID with clothes-changing has attracted increa... 详细信息
来源: 评论
Cubature Kalman Fusion Filtering Under Amplify-and-Forward Relays With Randomly Varying Channel Parameters
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第2期12卷 356-368页
作者: Jiaxing Li Zidong Wang Jun Hu Hongli Dong Hongjian Liu the Department of Applied Mathematics Harbin University of Science and Technology IEEE the Department of Computer Science Brunel University London the School of Automation Harbin University of Science and Technology the Artificial Intelligence Energy Research Institute Northeast Petroleum University the Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Northeast Petroleum University the National Key Laboratory of Continental Shale Oil of China Northeast Petroleum University the Key Laboratory of Advanced Perception and Intelligent Control of High-End Equipment Ministry of Education Anhui Polytechnic University the School of Mathematics and Physics Anhui Polytechnic University
In this paper, the problem of cubature Kalman fusion filtering(CKFF) is addressed for multi-sensor systems under amplify-and-forward(AaF) relays. For the purpose of facilitating data transmission, AaF relays are utili... 详细信息
来源: 评论
The Use of Both Temperature Field and Heat Fluxes to Identify the Thermal Conductivity and Volumetric Heat Capacity  15th
The Use of Both Temperature Field and Heat Fluxes to Iden...
收藏 引用
15th International Conference on Optimization and Applications, OPTIMA 2024
作者: Zubov, Vladimir Gorchakov, Andrei Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences Moscow Russia Moscow Institute of Physics and Technology Institutskii per. 9 Dolgoprudny141701 Russia
The study of nonlinear problems associated with the process of heat transfer in material is very important for practice. Previously, the authors proposed an effective algorithm for determining the volumetric heat capa... 详细信息
来源: 评论