咨询与建议

限定检索结果

文献类型

  • 852 篇 会议
  • 791 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 1,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 969 篇 工学
    • 584 篇 计算机科学与技术...
    • 430 篇 软件工程
    • 248 篇 信息与通信工程
    • 227 篇 电气工程
    • 175 篇 电子科学与技术(可...
    • 144 篇 控制科学与工程
    • 92 篇 光学工程
    • 82 篇 生物工程
    • 64 篇 生物医学工程(可授...
    • 62 篇 材料科学与工程(可...
    • 59 篇 化学工程与技术
    • 58 篇 机械工程
    • 54 篇 仪器科学与技术
    • 52 篇 动力工程及工程热...
    • 32 篇 航空宇航科学与技...
    • 24 篇 安全科学与工程
    • 24 篇 网络空间安全
  • 648 篇 理学
    • 298 篇 数学
    • 277 篇 物理学
    • 100 篇 统计学(可授理学、...
    • 98 篇 生物学
    • 76 篇 化学
    • 53 篇 系统科学
    • 28 篇 地球物理学
  • 183 篇 管理学
    • 133 篇 管理科学与工程(可...
    • 73 篇 工商管理
    • 52 篇 图书情报与档案管...
  • 64 篇 医学
    • 55 篇 临床医学
    • 49 篇 基础医学(可授医学...
  • 25 篇 法学
  • 17 篇 经济学
  • 12 篇 农学
  • 9 篇 教育学
  • 4 篇 军事学

主题

  • 120 篇 real time system...
  • 109 篇 laboratories
  • 63 篇 control systems
  • 58 篇 application soft...
  • 53 篇 processor schedu...
  • 53 篇 delay
  • 48 篇 computer archite...
  • 47 篇 distributed comp...
  • 41 篇 hardware
  • 40 篇 power systems
  • 39 篇 computational mo...
  • 38 篇 computer science
  • 36 篇 fault tolerance
  • 34 篇 timing
  • 31 篇 neural networks
  • 29 篇 scheduling algor...
  • 29 篇 particle swarm o...
  • 26 篇 protocols
  • 25 篇 resource managem...
  • 25 篇 artificial intel...

机构

  • 94 篇 real-time comput...
  • 33 篇 department of ph...
  • 33 篇 faculty of scien...
  • 33 篇 departamento de ...
  • 33 篇 department for p...
  • 33 篇 department of ph...
  • 33 篇 dipartimento di ...
  • 33 篇 yerevan physics ...
  • 33 篇 institute of phy...
  • 33 篇 institute of phy...
  • 32 篇 lehrstuhl für ex...
  • 32 篇 west university ...
  • 32 篇 kirchhoff-instit...
  • 32 篇 graduate school ...
  • 32 篇 tomsk state univ...
  • 31 篇 department of mo...
  • 31 篇 research center ...
  • 31 篇 fakultät für phy...
  • 30 篇 faculté des scie...
  • 30 篇 department of ph...

作者

  • 106 篇 k.g. shin
  • 54 篇 ganesh k. venaya...
  • 37 篇 niyato dusit
  • 29 篇 venayagamoorthy ...
  • 29 篇 shin kang g.
  • 25 篇 f. buehrer
  • 25 篇 m. khader
  • 25 篇 a. t. law
  • 25 篇 c. alexa
  • 25 篇 j. d. mansour
  • 25 篇 j. m. izen
  • 25 篇 s. veneziano
  • 25 篇 d. di valentino
  • 25 篇 g. bella
  • 25 篇 j. strandberg
  • 25 篇 d. calvet
  • 25 篇 c. amelung
  • 25 篇 a. grummer
  • 25 篇 k. j. r. cormier
  • 25 篇 n. orlando

语言

  • 1,526 篇 英文
  • 114 篇 其他
  • 17 篇 中文
检索条件"机构=Real Time Computing Laboratory Department of Electrical Engineering and Computer Science"
1657 条 记 录,以下是181-190 订阅
排序:
DisCOV: Distributed COVID-19 Detection on X-Ray Images with Edge-Cloud Collaboration
DisCOV: Distributed COVID-19 Detection on X-Ray Images with ...
收藏 引用
2022 IEEE World Congress on Services, SERVICES 2022
作者: Xu, Xiaolong Tian, Hao Zhang, Xuyun Qi, Lianyong He, Qiang Dou, Wanchun Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Macquarie University Department of Computing Sydney Australia Qufu Normal University School of Information Science and Engineering Rizhao China Swinburne University of Technology School of Software and Electrical Engineering Melbourne Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
[J1C2 Presentation Abstract at IEEE SERVICES 2022 for IEEE Transactions on Services computing DOI 10.1109/TSC.2022.3142265]
来源: 评论
Provably Secure and Efficient One-to-Many Authentication and Key Agreement Protocol for Resource-Asymmetric Smart Environments
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Long Hsu, Chingfang Cui, Jianqun Au, Man Ho Harn, Lein Li, Quanrun Central China Normal University Computer School Wuhan430079 China Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Wuhan430079 China Department of Computing Hong Kong Polytechnic University 25809 Hong Kong University of Missouri-Kansas City Department of Computer Science Electrical Engineering MO64110 United States Zhejiang Sci-Tech University School of Cyber Science and Engineering Hangzhou310020 China
The smart environment is a crucial application of the Internet of Things(IoT). Due to its growing security and efficiency needs, recent years have seen the proposal of numerous authentication and key agreement (AKA) p... 详细信息
来源: 评论
Joint Design of Radar Receive Filter and Unimodular ISAC Waveform with Sidelobe Level Control
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Kecheng Liu, Ya-Feng Wang, Zhongbin Yuan, Weijie Keskin, Musa Furkan Wymeersch, Henk Xia, Shuqiang School of System Design and Intelligent Manufacturing The Shenzhen Key Laboratory of Robotics and Computer Vision Southern University of Science and Technology Shenzhen518055 China State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China Department of Electrical Engineering Chalmers University of Technology Gothenburg41296 Sweden ZTE Corporation The State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen518055 China
Integrated sensing and communication (ISAC) has been considered a key feature of next-generation wireless networks. This paper investigates the joint design of the radar receive filter and dual-functional transmit wav... 详细信息
来源: 评论
Use Coupled LSTM Networks to Solve Constrained Optimization Problems
Use Coupled LSTM Networks to Solve Constrained Optimization ...
收藏 引用
作者: Chen, Zheyu Leung, Kin K. Wang, Shiqiang Tassiulas, Leandros Chan, Kevin Towsley, Don Imperial College London Department of Computing LondonSW7 2AZ United Kingdom Ibm T.J. Watson Research Center Yorktown HeightsNY10598 United States Yale University Institute for Network Science Electrical Engineering Department New HavenCT06520 United States Devcom Army Research Laboratory Army Research Directorate AdelphiMD20783 United States University of Massachusetts Department of Computer Science AmherstMA01003 United States
Gradient-based iterative algorithms have been widely used to solve optimization problems, including resource sharing and network management. When system parameters change, it requires a new solution independent of the... 详细信息
来源: 评论
Evaluating the Performance to Detecting Topic Shift of Large Language Models: A Study
Evaluating the Performance to Detecting Topic Shift of Large...
收藏 引用
6th International Conference on Intelligent computing and Signal Processing (ICSP)
作者: Pingfang Tian Deting Liu Department of Computer Science and Technology Wuhan University of Science and Technology Wuhan China The Key Laboratory of the Rich Media Knowledge Organisation and Service of Digital Publishing Content Institute of Scientific and Technical Information of China Beijing China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China
Topic shift detection aims to identify whether there is a change in the current topic of conversation or if a change is needed. The study found previous work did not evaluate the performance of large language models l... 详细信息
来源: 评论
A transactional-behavior-based hierarchical gated network for credit card fraud detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年
作者: Xie, Yu Zhou, MengChu Liu, Guanjun Wei, Lifei Zhu, Honghao De Meo, Pasquale College of Information Engineering Shanghai Maritime University Shanghai201306 China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China Helen and John C. Hartmann Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States Key Laboratory of Embedded System and Service Computing Ministry of Education Department of Computer Science Tongji University Shanghai201804 China College of Computer Science and Information Engineering Bengbu University Bengbu233030 China Department of Ancient and Modern Civilizations University of Messina Messina98166 Italy
The task of detecting fraud in credit card transactions is crucial to ensure the security and stability of a financial system, as well as to enforce customer confidence in digital payment systems. Historically, credit... 详细信息
来源: 评论
Trajectory Design for 3D UAV Localization in UAV Based Networks
Trajectory Design for 3D UAV Localization in UAV Based Netwo...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yujiao Zhu Mingzhe Chen Sihua Wang Yuchen Liu Changchuan Yin Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA Department of Computer Science North Carolina State University Raleigh NC USA
In this paper, the problem of using several controlled unmanned aerial vehicles (UAVs) to localize a target UAV in real time is investigated. In the considered model, the controlled UAV consists of one active UAV and ...
来源: 评论
Efficient Error-Bounded Lossy Compression for CPU Architectures
Efficient Error-Bounded Lossy Compression for CPU Architectu...
收藏 引用
International Symposium on Modeling, Analysis and Simulation of computer and Telecommunication Systems (MASCOTS)
作者: Griffin Dube Jiannan Tian Sheng Di Dingwen Tao Jon C. Calhoun Franck Cappello Department of Computer Science Northwestern University Evanston IL Luddy School of Informatics Computing and Engineering Indiana University Bloomington IN Holcombe Department of Electrical and Computing Engineering Clemson University Clemson SC Mathematics and Computer Science Division Argonne National Laboratory Lemont IL
Modern HPC applications produce increasingly large amounts of data, which limits the performance of current extreme-scale systems. Lossy compression, helps to mitigate this issue by decreasing the size of data generat... 详细信息
来源: 评论
A 3D Implementation of Convolutional Neural Network for Fast Inference
A 3D Implementation of Convolutional Neural Network for Fast...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Narasinga Rao Miniskar Pruek Vanna-Iampikul Aaron Young Sung Kyu Lim Frank Liu Jieun Yoo Corrinne Mills Nhan Tran Farah Fahim Jeffrey S Vetter Computer Science and Mathematic Division Oak Ridge National Laboratory Oak Ridge USA Department of Electrical and Computer Engineering Georgia Institute of Technology Atlanta USA Department of Physics University of Illinois Chicago Chicago USA Scientific Computing Division Fermi National Accelerator Laboratory Chicago USA
Low latency inference has many applications in edge machine learning. In this paper, we present a run-time configurable convolutional neural network (CNN) inference ASIC design for low-latency edge machine learning. B...
来源: 评论
Enhancing real-World Active Speaker Detection with Multi-Modal Extraction Pre-Training
arXiv
收藏 引用
arXiv 2024年
作者: Tao, Ruijie Qian, Xinyuan Das, Rohan Kumar Gao, Xiaoxue Wang, Jiadong Li, Haizhou The Department of Electrical and Computer Engineering National University of Singapore Singapore The Department of Computer Science and Technology University of Science and Technology Beijing Beijing100083 China Fortemedia Singapore138637 Singapore Institute for Infocomm Research A*STAR Singapore The Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big data Shenzhen518172 China The Department of Electrical and Computer Engineering National University of Singapore 119077 Singapore The University of Bremen 28359 Germany
Audio-visual active speaker detection (AV-ASD) aims to identify which visible face is speaking in a scene with one or more persons. Most existing AV-ASD methods prioritize capturing speech-lip correspondence. However,... 详细信息
来源: 评论