咨询与建议

限定检索结果

文献类型

  • 1,050 篇 会议
  • 906 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 1,977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,219 篇 工学
    • 604 篇 计算机科学与技术...
    • 428 篇 软件工程
    • 192 篇 信息与通信工程
    • 187 篇 电子科学与技术(可...
    • 149 篇 控制科学与工程
    • 144 篇 电气工程
    • 114 篇 仪器科学与技术
    • 103 篇 土木工程
    • 101 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 89 篇 机械工程
    • 87 篇 生物工程
    • 81 篇 光学工程
    • 81 篇 核科学与技术
    • 73 篇 材料科学与工程(可...
    • 68 篇 建筑学
    • 59 篇 生物医学工程(可授...
    • 52 篇 船舶与海洋工程
  • 802 篇 理学
    • 382 篇 物理学
    • 234 篇 数学
    • 116 篇 化学
    • 112 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 77 篇 地球物理学
    • 62 篇 系统科学
    • 54 篇 海洋科学
  • 236 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 87 篇 工商管理
    • 59 篇 图书情报与档案管...
  • 54 篇 医学
    • 46 篇 临床医学
  • 39 篇 法学
  • 36 篇 经济学
  • 22 篇 农学
  • 18 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 106 篇 hadron colliders
  • 49 篇 computer archite...
  • 33 篇 computer network...
  • 32 篇 computational mo...
  • 31 篇 circuit faults
  • 31 篇 hardware
  • 28 篇 w & z bosons
  • 27 篇 delay
  • 25 篇 bandwidth
  • 24 篇 logic gates
  • 24 篇 higgs bosons
  • 24 篇 communication ne...
  • 23 篇 neutrons
  • 23 篇 protocols
  • 22 篇 fault tolerance
  • 21 篇 quality of servi...
  • 21 篇 machine learning
  • 20 篇 computer science
  • 20 篇 deep learning
  • 20 篇 throughput

机构

  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 150 篇 yerevan physics ...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 146 篇 brunel universit...
  • 145 篇 academy of scien...
  • 145 篇 university of de...
  • 143 篇 rwth aachen univ...
  • 143 篇 department of ph...
  • 141 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 indian institute...
  • 138 篇 zhejiang univers...
  • 136 篇 infn sezione di ...
  • 134 篇 institute for nu...
  • 132 篇 department of ph...

作者

  • 111 篇 g. tonelli
  • 111 篇 d. barney
  • 111 篇 l. valencia palo...
  • 111 篇 t. liu
  • 111 篇 c. hensel
  • 111 篇 a. garcia-bellid...
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 111 篇 n. colino
  • 111 篇 f. moortgat
  • 111 篇 b. clerbaux
  • 111 篇 g. sultanov
  • 111 篇 m. a. ciocci
  • 111 篇 k. lamichhane
  • 111 篇 s. maselli
  • 111 篇 e. migliore
  • 110 篇 a. babaev
  • 110 篇 v. karjavine
  • 110 篇 p. avery
  • 110 篇 l. silvestris

语言

  • 1,848 篇 英文
  • 95 篇 其他
  • 29 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Institute of Computer Architecture and Computer Engineering University of Stuttgart"
1977 条 记 录,以下是141-150 订阅
排序:
Using Eye-Tracking to Evaluate Novel Augmented Reality Applications for Maritime Operations  68th
Using Eye-Tracking to Evaluate Novel Augmented Reality Appli...
收藏 引用
68th International Annual Meeting of the Human Factors and Ergonomics Society, HFES 2024
作者: Mallam, Steven C. Attarzadeh, Amin Samanta, Akash Bhattacharjee, Ankan Nordby, Kjetil Fisheries and Marine Institute Memorial University of Newfoundland St. John’sNLA1C 5R3 Canada Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John’s Canada Institute of Design The Oslo School of Architecture and Design Akershus Norway
This paper presents the developments across a multi-year collaborative industry-academia R&D project designing and testing novel Augmented Reality (AR) solutions for differing maritime operations and work tasks. W... 详细信息
来源: 评论
Delay-Driven Layer Assignment Algorithm Based on Integrating Multi-Strategy for Advanced Technology Nodes
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of computer-Aided Design and computer Graphics 2024年 第4期36卷 625-635页
作者: Liu, Genggeng Jiang, Lieqiu Li, Zepeng Wu, Ruoxin Xu, Ning College of Computer and Data Science Fuzhou University Fuzhou350116 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China College of Maynooth International Engineering Fuzhou University Fuzhou350116 China School of Information Engineering Wuhan University of Technology Wuhan430070 China
By introducing layer assignment algorithm, it can effectively optimize multiple important indicators such as delay and via counts in physical design, and then improve the chip performance. Therefore, a delay optimizat... 详细信息
来源: 评论
City models: past, present and future prospects
收藏 引用
Frontiers of Urban and Rural Planning 2025年 第1期3卷 1-24页
作者: Ritter, Helge Herzog, Otthein Rothermel, Kurt Cohn, Anthony G. Wu, Zhiqiang Faculty of Technology Bielefeld University Bielefeld Germany College of Architecture and Urban Planning Tongji University Shanghai People’s Republic of China FB 03 University of Bremen Bremen Germany Institute of Parallel and Distributed Systems University of Stuttgart Stuttgart Germany School of Computer Science University of Leeds Leeds UK The Alan Turing Institute London UK
This paper attempts to take a comprehensive look at the challenges of representing the spatio-temporal structures and dynamic processes that define a city’s overall characteristics. For the task of urban planning and...
来源: 评论
SpamVis: A Visual Interactive System for Spam Review Detection  28th
SpamVis: A Visual Interactive System for Spam Review Detecti...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and engineering Systems, KES 2024
作者: Lam, Nguyen Thanh Thao Le, Nu Uyen Phuong Islam, Md Rafiqul Sakib, Md KowsarHossain Prome, Shanjita Akter Sanin, Cesar Szczerbicki, Edward Zhou, Jianlong College of Business & Management VinUniversity Hanoi12426 Viet Nam Faculty of Engineering Architecture and Information Technology University of Queensland BrisbaneQLD4072 Australia Business Information Systems Australian Institute of Higher Education SydneyNSW Australia School of Computer Science Taylor's University Malaysia Faculty of Management and Economics Gdansk University of Technology Gdansk Poland School of Computer Science University of Technology Sydney Australia
In recent times, the number of spam reviews through various online platforms has emerged as a prime challenge, profoundly impacting businesses and consumers. These fake reviews not only distort clients' perception... 详细信息
来源: 评论
A novel Cross-Layer Protocols for Resource Allocation in Mobile Networks  15
A novel Cross-Layer Protocols for Resource Allocation in Mob...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Giri, Rakesh Kumar Vittapu, Mani Sarma Dev, Anoop Shewale, Chaitali R. Majid, Mohd Aliff Abdul Kulkarni, Nandini Sunrise University Alwar Department of Computer Science and Engineering India Mallareddy Engineering College and Management Sciences Department of Computer Science and Engineering Kistapur Village Medchal Telangana Hyderabad India Chitkara University Centre of Research Impact and Outcome Punjab Rajpura India Vishwakarma Institute of Technology Department of Information Technology Pune India University Teknology MARA Faculty of Hotel and Tourism Management Department of Foodservice Management Malaysia Symbiosis International University Department of Symbiosis School of Planning Architecture and Design Nagpur Nagpur India
Cross-layer Protocols for proper resource Allocation in Mobile Networks are a singular technique to enhance the efficiency of wireless networks. The method utilizes multiple layers of the radio protocol stack better t... 详细信息
来源: 评论
Designing low-diameter interconnection networks with multi-ported host-switch graphs
Designing low-diameter interconnection networks with multi-p...
收藏 引用
作者: Yasudo, Ryota Nakano, Koji Koibuchi, Michihiro Matsutani, Hiroki Amano, Hideharu Graduate School of Advanced Science and Engineering Hiroshima University Hiroshima Japan Information Systems Architecture Science Research Division National Institute of Informatics Tokyo Japan Department of Information and Computer Science Keio University Yokohama Japan
A host-switch graph was originally proposed as a graph that represents a network topology of a computer systems with 1-port host computers and (Formula presented.) -port switches. It has been studied from both theoret... 详细信息
来源: 评论
Integrating environmental sustainability in construction Time-Cost trade-off for decision-making using hybrid NSGA-III and MOPSO approach
收藏 引用
Asian Journal of Civil engineering 2025年 第4期26卷 1527-1542页
作者: Nagayo, Analene Montesines Singh, Rekha Dhawan, Amit Manjunath, T.C. Qasem, Altayeb Sethi, Krushna Chandra Sharma, Kamal Department of Engineering and Technology University of Technology and Applied Sciences-Al Musanna Al Muladdah Oman Department of Civil Engineering Raj Kumar Goel Institute of Technology Ghaziabad India Department of Civil Engineering Dr. Bhim Rao Ambedkar Polytechnic College Gwalior India Computer Science Engineering Department Rajarajeswari College of Engineering Bangalore India Department of Building Engineering College of Architecture and Planning Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia Department of Civil Engineering Centurion University of Technology and Management Gajapati India Department of Civil Engineering Madhav Institute of Technology and Science Gwalior India
Construction project management often involves optimizing time and cost while ensuring minimal environmental impact. This study presents an innovative hybrid approach combining non-dominated sorting genetic algorithm ... 详细信息
来源: 评论
Algorithmic Diversity and Tiny Models: Comparing Binary Networks and the Fruit Fly Algorithm on Document Representation Tasks  3
Algorithmic Diversity and Tiny Models: Comparing Binary Netw...
收藏 引用
3rd Workshop on Simple and Efficient Natural Language Processing, SustaiNLP 2022
作者: Ceron, Tanise Truong, Nhut Herbelot, Aurelie Institute for Natural Language Processing University of Stuttgart Germany Center for Mind/Brain Sciences University of Trento Italy Department of Information Engineering and Computer Science University of Trento Italy
Neural language models have seen a dramatic increase in size in the last years. While many still advocate that 'bigger is better', work in model distillation has shown that the number of parameters used by ver... 详细信息
来源: 评论
VHF Band III Spectrum Availability and Utilization for Cognitive Radio Implementation in Malaysia  22
VHF Band III Spectrum Availability and Utilization for Cogni...
收藏 引用
22nd International Learning and Technology Conference, L and T 2025
作者: Elshafie, Hashim Mohamad, Hafizal Saeed, Rashid A. Hamdan, Mosab Khattab, Mahmoud M. Ahmed, Abdelmoty M. King Khalid University College of Computer Science 61421 Saudi Arabia Universiti Sains Islam Malaysia Faculty of Engineering and Built Environment Negeri Sembilan Nilai71800 Malaysia Taif21974 Saudi Arabia South East Technological University Walton Institute for Information and Communication Systems Science WaterfordX91 HE36 Ireland Al Yamamah University College of Engineering and Architecture Riyadh13541 Saudi Arabia Nahda University Faculty of Computer Science Beni Suef Egypt
The VHF Band III spectrum (174-230 MHz), recognized for its low utilization, was opened by the FCC in 2002 for opportunistic use by communication technologies. This paper presents a quantitative analysis of the availa... 详细信息
来源: 评论
Machine Learning based Cybersecurity Technique for Detection of Upcoming Cyber Attacks  8
Machine Learning based Cybersecurity Technique for Detection...
收藏 引用
8th International Conference on Communication and Electronics Systems, ICCES 2023
作者: Lakshmi, Kanchi Lohitha Shobana, S. Kumar, Bathula Prasanna Glory, K.B. Kumar, Bonda Kiran Rani, Sandya Vasireddy Venkatadri Institute of Technology Department of Computer Science and Engineering Guntur India R.M.K Engineering College Department of It India Kkr & Ksr Institute of Technology and Sciences Department of Computer Science and Engineering AP Guntur India Koneru Lakshmaiah Education Foundation Department of Engineering English Andhra Pradesh State Vaddeswaram522302 India Kl Deemed to Be University Kl School of Architecture Department of Architecture Guntur District Vaddeswaram522302 India St. Martin's Engineering College Dept. of It Telangana Secunderabad India
Cyberattacks are prevalent in the age of the Internet. Each year, both the quantity and severity of cybercrimes increase. Protection against cyber-attacks has become a primary responsibility, Significant in the intern... 详细信息
来源: 评论