咨询与建议

限定检索结果

文献类型

  • 546 篇 期刊文献
  • 528 篇 会议
  • 12 册 图书

馆藏范围

  • 1,086 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 669 篇 工学
    • 315 篇 计算机科学与技术...
    • 235 篇 软件工程
    • 111 篇 信息与通信工程
    • 108 篇 控制科学与工程
    • 103 篇 土木工程
    • 102 篇 电气工程
    • 94 篇 船舶与海洋工程
    • 89 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 46 篇 动力工程及工程热...
    • 41 篇 生物工程
    • 40 篇 光学工程
    • 36 篇 仪器科学与技术
    • 35 篇 化学工程与技术
    • 34 篇 交通运输工程
    • 29 篇 生物医学工程(可授...
    • 27 篇 材料科学与工程(可...
    • 27 篇 安全科学与工程
  • 409 篇 理学
    • 164 篇 数学
    • 86 篇 海洋科学
    • 81 篇 物理学
    • 64 篇 生物学
    • 53 篇 系统科学
    • 52 篇 统计学(可授理学、...
    • 34 篇 化学
  • 139 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 53 篇 工商管理
    • 27 篇 图书情报与档案管...
  • 64 篇 医学
    • 50 篇 临床医学
    • 35 篇 基础医学(可授医学...
  • 28 篇 法学
  • 16 篇 经济学
  • 16 篇 农学
  • 10 篇 教育学
  • 5 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 28 篇 computer archite...
  • 20 篇 deep learning
  • 20 篇 optimization
  • 16 篇 laboratories
  • 15 篇 computational mo...
  • 14 篇 computer science
  • 13 篇 control systems
  • 13 篇 feature extracti...
  • 13 篇 machine learning
  • 12 篇 systems engineer...
  • 12 篇 wireless sensor ...
  • 12 篇 delay
  • 11 篇 monitoring
  • 11 篇 protocols
  • 11 篇 accuracy
  • 10 篇 application soft...
  • 10 篇 linear programmi...
  • 10 篇 switches
  • 10 篇 decision making
  • 10 篇 humans

机构

  • 14 篇 university of ch...
  • 13 篇 key laboratory o...
  • 12 篇 information syst...
  • 11 篇 department of el...
  • 10 篇 department of sy...
  • 9 篇 usn
  • 8 篇 health managemen...
  • 8 篇 key laboratory o...
  • 8 篇 department of co...
  • 7 篇 institute of sys...
  • 7 篇 shanghai researc...
  • 7 篇 ieee
  • 7 篇 department of el...
  • 7 篇 graduate school ...
  • 7 篇 information syst...
  • 6 篇 department of co...
  • 6 篇 karachi pakistan
  • 6 篇 access – ai chip...
  • 6 篇 department of co...
  • 6 篇 julius centre fo...

作者

  • 15 篇 yang yang
  • 11 篇 yusheng ji
  • 10 篇 ji yusheng
  • 10 篇 chen mingzhe
  • 9 篇 mostafa abotaleb
  • 9 篇 parisini thomas
  • 8 篇 wang zhongrui
  • 8 篇 shang dashan
  • 8 篇 liu ming
  • 8 篇 johansson karl h...
  • 8 篇 liu qi
  • 8 篇 zhang xumeng
  • 8 篇 abdelhameed ibra...
  • 7 篇 wu celimuge
  • 7 篇 guo caili
  • 7 篇 qi xiaojuan
  • 7 篇 zhou mengchu
  • 7 篇 chen guanpu
  • 7 篇 wang shaocong
  • 6 篇 zhang woyu

语言

  • 1,023 篇 英文
  • 43 篇 其他
  • 14 篇 中文
  • 6 篇 日文
检索条件"机构=Institute of Systems Engineering System and Computer Architecture"
1086 条 记 录,以下是191-200 订阅
排序:
Automated Equivalence Checking Method for Majority based In-Memory Computing on ReRAM Crossbars
Automated Equivalence Checking Method for Majority based In-...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Arighna Deb Kamalika Datta Muhammad Hassan Saeideh Shirinzadeh Rolf Drechsler KIIT DU School of Electronics Engineering Bhubaneswar India German Research Centre for Artificial Intelligence (DPKI) Bremen Germany Fraunhofer Institute for Systems and Innovation-Research (ISI) Karlsruhe Germany Group of Computer Architecture University of Bremen Bremen Germany
Recent progress in the fabrication of Resistive Random Access Mem-ory (ReRAM) devices has paved the way for large scale crossbar structures. In particular, in-memory computing on ReRAM cross-bars helps in bridging the... 详细信息
来源: 评论
Performance Optimization for Multicast Mm Wave MIMO Networks with Mobile Users
Performance Optimization for Multicast Mm Wave MIMO Networks...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Songling Zhang Mingzhe Chen Wenjing Zhang Zhaohui Yang Danpu Liu Zhilong Zhang Kai-Kit Wong Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA Zhejiang Lab Hangzhou China Zhejiang University Hangzhou China Department of Electronic and Electrical Engineering University College London London UK
In this paper, the problem of maximizing the sum rate of mobile users in a multi-base station (BS) cooperative millimeter-wave (mmWave) multicast communication system is studied. In the considered model, due to the re... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
RETRACTED ARTICLE: Industrial-IoT-hardware security-improvement using plan load optimization method in cloud
收藏 引用
International Journal of system Assurance engineering and Management 2023年 第1-Sup期14卷 578-578页
作者: Basheer, Shakila Gopu, Magesh Mathew, Rincy Merlin Bivi, Maryam Aysha Prabu, M. Department of Information System College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh Saudi Arabia Department of Software and Systems Engineering Vellore Institute of Technology Tamilnadu Vellore India Computer Science Department College of Science and Arts King Khalid University Khamis Mushayt Abha Saudi Arabia Department of Computer Science College of Computer Science King Khalid University Abha Saudi Arabia Department of Computer Science Christ University Karnataka Bangalore India
来源: 评论
A differential public PUF design for lightweight authentication  16
A differential public PUF design for lightweight authenticat...
收藏 引用
2021 International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design, SMACD 2021 and 16th Conference on PhD Research in Microelectronics and Electronics, PRIME 2021
作者: Duan, Shengyu Sai, Gaole School of Computer Engineering and Science Shanghai University Shanghai200444 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology China
Physical Unclonable Functions (PUFs) have emerged as a promising primitive to provide a hardware keyless security mechanism for integrated circuit applications. Public PUFs (PPUFs) address the crucial PUF vulnerabilit... 详细信息
来源: 评论
Low-power emerging memristive designs towards secure hardware systems for applications in internet of things
收藏 引用
Nano Materials Science 2021年 第2期3卷 186-204页
作者: Nan Du Heidemarie Schmidt Ilia Polian Department Nano Device Technology Fraunhofer Institute for Electronic Nano SystemsTechnologie-Campus 309126ChemnitzGermany Faculty of Electrical Engineering and Information Technology Chemnitz University of Technology(TU Chemnitz)Straße der Nationen 6209126ChemnitzGermany Department of Quantum Detection Leibniz Institute of Photonic Technology(IPHT)Albert-Einstein-Str.907745JenaGermany Institute for Solid State Physics Friedrich Schiller University JenaFürstengraben 107743JenaGermany Institute of Computer Engineering and Computer Architecture(ITI) University of StuttgartPfaffenwaldring 4770569StuttgartGermany
Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and inmemory computing(IMC),but there is a rising interest in using memristive technologies for security application... 详细信息
来源: 评论
Stability Analysis and Performance Evaluation of Delayed Bilateral Telerobotic systems over a Lossy Communication Channel
收藏 引用
Journal of systems Science & Complexity 2021年 第1期34卷 157-179页
作者: BAKHSHI Ali ALFI Alireza TALEBI Heidar Ali SOURATGAR Amir Aboulfazl YOUSEFI Mahdi Faculty of Electrical and Robotic Engineering Shahrood University of TechnologyShahrood 36199-95161Iran Power Plants Control Systems Technology Development Plan Department of monitoring and ControlNiroo Research InstituteTehran 14665-517Iran Real-Time and Robotics system Laboratory Faculty of Electrical EngineeringAmirkabir University of TechnologyHafez AvenueTehran 15914Iran Electrical and Computer Engineering Department The University of British Columbia2385East MallVan couverBC V6T 1Z4Canada
The focus of this paper is to address a novel control technique for stability and transparency analysis of bilateral telerobotic systems in the presence of data loss and time delay in the communication channel. Differ... 详细信息
来源: 评论
Modeling Supports the Implementation of Urban Greening as a Response to the Challenges of Sustainable Spatial Planning
SSRN
收藏 引用
SSRN 2024年
作者: Kim, Eun Sub Lee, Dong Kun Hyun, Jung Hee Kim, Na Yeon Heo, Su Jeong Kim, Da Sle Interdisciplinary Program in Landscape Architecture Seoul National University Seoul08826 Korea Republic of Integrated Major in Smart City Global Convergence Program Seoul National University Seoul08826 Korea Republic of Specialized Graduate School of Intelligent Eco-Science 4 Dept. of Landscape Architecture Seoul National University Seoul08826 Korea Republic of Systemic Risk and Resilience Research Group Advancing Systems Analysis International Institute for Applied Systems Analysis Austria Department of Landscape Architecture and Rural System Engineering Seoul National University Seoul08826 Korea Republic of
Urban greening is a critical strategy for sustainable urban development, climate change mitigation, and biodiversity conservation. However, the effectiveness of urban greening varies depending on the specific goals (e... 详细信息
来源: 评论
Seastar: A Cache-Efficient and Load-Balanced Key-Value Store on Disaggregated Memory
Seastar: A Cache-Efficient and Load-Balanced Key-Value Store...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Jingwen Du Fang Wang Dan Feng Dexin Zeng Sheng Yi Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China China School of Computer Science and Technology Huazhong University of Science and Technology China Shenzhen Huazhong University of Science and Technology Research Institute China
In modern datacenters, memory disaggregation un-packs monolithic servers to build independent network-connected compute and memory pools, greatly improving resource uti-lization. Existing memory-disaggregated key-valu... 详细信息
来源: 评论
Data poisoning: issues, challenges, and needs
Data poisoning: issues, challenges, and needs
收藏 引用
7th IET Smart Cities Symposium (SCS 2023)
作者: Mohammad Aljanabi Alaa Hamza Omran Maad M Mijwil Mostafa Abotaleb El-Sayed M. El-kenawy Sahar Yousif Mohammed Abdelhameed Ibrahim Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science & Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
来源: 评论