咨询与建议

限定检索结果

文献类型

  • 535 篇 会议
  • 176 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 738 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 420 篇 工学
    • 318 篇 计算机科学与技术...
    • 231 篇 软件工程
    • 116 篇 信息与通信工程
    • 59 篇 控制科学与工程
    • 52 篇 电子科学与技术(可...
    • 34 篇 电气工程
    • 29 篇 生物工程
    • 22 篇 动力工程及工程热...
    • 21 篇 机械工程
    • 18 篇 仪器科学与技术
    • 18 篇 建筑学
    • 12 篇 交通运输工程
    • 12 篇 安全科学与工程
    • 11 篇 土木工程
    • 11 篇 化学工程与技术
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
  • 154 篇 理学
    • 90 篇 数学
    • 30 篇 系统科学
    • 29 篇 生物学
    • 24 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 13 篇 化学
  • 122 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 17 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 5 篇 教育学
  • 5 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 computer science
  • 26 篇 routing
  • 26 篇 protocols
  • 24 篇 bandwidth
  • 24 篇 quality of servi...
  • 22 篇 monitoring
  • 20 篇 telecommunicatio...
  • 19 篇 application soft...
  • 19 篇 hardware
  • 18 篇 computer archite...
  • 18 篇 throughput
  • 18 篇 real time system...
  • 18 篇 computational mo...
  • 18 篇 distributed comp...
  • 17 篇 runtime
  • 17 篇 software enginee...
  • 15 篇 network topology
  • 15 篇 resource managem...
  • 15 篇 wireless sensor ...
  • 15 篇 vehicles

机构

  • 18 篇 department of di...
  • 15 篇 institute of par...
  • 8 篇 key laboratory o...
  • 8 篇 distributed syst...
  • 7 篇 chair for embedd...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 department of di...
  • 7 篇 school of comput...
  • 6 篇 microelectronics...
  • 6 篇 department of co...
  • 5 篇 school of electr...
  • 5 篇 institute of dis...
  • 5 篇 distributed and ...
  • 5 篇 embedded systems...
  • 5 篇 distributed embe...
  • 5 篇 swedish institut...
  • 5 篇 department of di...
  • 4 篇 institute of com...
  • 4 篇 center for appli...

作者

  • 16 篇 rajkumar buyya
  • 16 篇 dustdar schahram
  • 15 篇 chen haibo
  • 11 篇 m. menth
  • 11 篇 michael menth
  • 10 篇 jörg henkel
  • 10 篇 könig-ries birgi...
  • 10 篇 muhammad shafiqu...
  • 9 篇 babalou samira
  • 9 篇 menth michael
  • 9 篇 janakiram d.
  • 9 篇 bastian blywis
  • 9 篇 felix juraschek
  • 8 篇 jeon gwanggil
  • 8 篇 frank slomka
  • 8 篇 juraschek felix
  • 8 篇 özdenizci ozan
  • 7 篇 blywis bastian
  • 7 篇 sri parameswaran
  • 7 篇 zang binyu

语言

  • 711 篇 英文
  • 13 篇 中文
  • 11 篇 其他
  • 3 篇 德文
  • 1 篇 葡萄牙文
检索条件"机构=Institute of Computer Science-Distributed Embedded Systems"
738 条 记 录,以下是161-170 订阅
排序:
Tinman: Eliminating confidential mobile data exposure with security oriented offloading  15
Tinman: Eliminating confidential mobile data exposure with s...
收藏 引用
10th European Conference on computer systems, EuroSys 2015
作者: Xia, Yubin Liu, Yutao Tan, Cheng Ma, Mingyang Guan, Haibing Zang, Binyu Chen, Haibo Shanghai Key Laboratory of Scalable Computing and Systems China Institute of Parallel and Distributed Systems Shanghai Jiao Tong University China Department of Computer Science Shanghai Jiao Tong University China
The wide adoption of smart devices has stimulated a fast shift of security-critical data from desktop to mobile devices. However, recurrent device theft and loss expose mobile devices to various security threats and e... 详细信息
来源: 评论
Detecting process transitions from wearable sensors: An unsupervised labeling approach  17
Detecting process transitions from wearable sensors: An unsu...
收藏 引用
4th international Workshop on Sensor-Based Activity Recognition and Interaction, iWOAR 2017
作者: Böttcher, Sebastian Scholl, Philipp M. Van Laerhoven, Kristof Medical Center University of Freiburg Department of Neurosurgery Freiburg Germany Embedded Systems University of Freiburg Computer Science Institute Freiburg Germany Ubiquitous Computing University of Siegen Electrical Engineering and Computer Science Siegen Germany
Authoring protocols for manual tasks such as following recipes, manufacturing processes, or laboratory experiments requires a significant effort. This paper presents a system that estimates individual procedure transi... 详细信息
来源: 评论
Automatic loop transformation selection with the Aid of kohonen's self-organizing maps for parallelizing compilers
Automatic loop transformation selection with the Aid of koho...
收藏 引用
2008 International Conference on Parallel and distributed Processing Techniques and Applications, PDPTA 2008
作者: Mead, Mohamed Ahamed Eldeeb, Hesham Nassar, Salwa Computer Science Mathematics Department Faculty of Science Cairo University Cairo Egypt Computers and Systems Department Electronics Research Institute Dokki Giza Egypt Head of Parallel and Distributed Systems Team Computers and Systems Department Electronics Research Institute Dokki Giza Egypt
Determine the appropriate loop transformations is an essential process in the automatic parallelization field. The sequence of loop transformation to be applied also must be considered. Selection of loop transformatio... 详细信息
来源: 评论
Application of computational intelligence techniques in active networks  01
Application of computational intelligence techniques in acti...
收藏 引用
2001 ACM Symposium on Applied Computing, SAC 2001
作者: Vasilakos, Athanasios V. Anagnostakis, Kostas G. Pedrycz, Witold Institute of Computer Science Foundation of Research and Technology Hellas Greece Distributed Systems Lab CIS Department Universityof Pennsylvania United States Department of Electrical and Computer Engineering University of Alberta Canada
Computational intelligence techniques have been successfully used for solving control problems in p ache t-switching network architectures. The introduction of active networking adds a high degree of flexibility in cu... 详细信息
来源: 评论
Static analysis of worst-case stack cache behavior  13
Static analysis of worst-case stack cache behavior
收藏 引用
21st International Conference on Real-Time Networks and systems, RTNS 2013
作者: Jordan, Alexander Brandner, Florian Schoeberl, Martin Compilers and Languages Group Institute of Computer Languages Vienna University of Technology Austria Embedded Systems Engineering Section Dep. of Applied Mathematics and Computer Science Technical University of Denmark Denmark
Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar... 详细信息
来源: 评论
Organic and Pervasive Computing – ARCS 2004  1
收藏 引用
丛书名: Lecture Notes in computer science
1000年
作者: Christian Müller-Schloer Theo Ungerer Bernhard Bauer
Where is system architecture heading? The special interest group on computer and systems Architecture (Fachausschuss Rechner- und Systemarchitektur) of the German computer and information technology associations GI an... 详细信息
来源: 评论
Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling  38
Training Adversarially Robust Sparse Networks via Bayesian C...
收藏 引用
38th International Conference on Machine Learning, ICML 2021
作者: Özdenizci, Ozan Legenstein, Robert Graz University of Technology Institute of Theoretical Computer Science Graz Austria Silicon Austria Labs TU Graz - SAL Dependable Embedded Systems Lab Graz Austria
Deep neural networks have been shown to be susceptible to adversarial attacks. This lack of adversarial robustness is even more pronounced when models are compressed in order to meet hardware limitations. Hence, if ad... 详细信息
来源: 评论
New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
New speed records for Salsa20 stream cipher using an autotun...
收藏 引用
6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013
作者: Khalid, Ayesha Paul, Goutam Chattopadhyay, Anupam Institute for Communication Technologies and Embedded Systems RWTH Aachen University Aachen 52074 Germany Department of Computer Science and Engineering Jadavpur University Kolkata 700 032 India
Since the introduction of the CUDA programming model, GPUs are considered a viable platform for accelerating non-graphical applications. Many cryptographic algorithms have been reported to achieve remarkable performan... 详细信息
来源: 评论
Optimized GPU implementation and performance analysis of HC series of stream ciphers
Optimized GPU implementation and performance analysis of HC ...
收藏 引用
15th International Conference on Information Security and Cryptology, ICISC 2012
作者: Khalid, Ayesha Bagchi, Deblin Paul, Goutam Chattopadhyay, Anupam Institute for Communication Technologies and Embedded Systems RWTH Aachen University Aachen 52074 Germany Department of Computer Science and Engineering Jadavpur University Kolkata 700 032 India
The ease of programming offered by the CUDA programming model attracted a lot of programmers to try the platform for acceleration of many non-graphics applications. Cryptography, being no exception, also found its sha... 详细信息
来源: 评论
Distilled Neural Network for Clothes Type Identification  20
Distilled Neural Network for Clothes Type Identification
收藏 引用
20th International Conference on Electrical Engineering/Electronics, computer, Telecommunications and Information Technology, ECTI-CON 2023
作者: Chongpiphattanasiri, Teerapon Wickramatilake, Pramod Moonrinta, Jednipat Ekpanyapong, Mongkol Dailey, Matthew N. Asian Institute of Technology Microelectronics and Embedded Systems Pathumthani Thailand Asian Institute of Technology Artificial Intelligence Center Pathumthani Thailand Asian Institute of Technology Computer Science and Information Management Pathumthani Thailand
Diverse applications such as criminal forensics and retail customer market segmentation would benefit from the ability to track individuals across multiple cameras. Clothing information is one of the keys to this capa... 详细信息
来源: 评论