咨询与建议

限定检索结果

文献类型

  • 2,053 篇 会议
  • 876 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,985 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,735 篇 工学
    • 1,338 篇 计算机科学与技术...
    • 1,110 篇 软件工程
    • 332 篇 信息与通信工程
    • 300 篇 控制科学与工程
    • 165 篇 生物工程
    • 146 篇 电气工程
    • 119 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 84 篇 安全科学与工程
    • 83 篇 光学工程
    • 73 篇 动力工程及工程热...
    • 66 篇 土木工程
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 55 篇 网络空间安全
  • 777 篇 理学
    • 414 篇 数学
    • 190 篇 生物学
    • 147 篇 系统科学
    • 145 篇 物理学
    • 125 篇 统计学(可授理学、...
    • 67 篇 化学
  • 506 篇 管理学
    • 358 篇 管理科学与工程(可...
    • 200 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 128 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 80 篇 法学
    • 62 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 54 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 134 篇 computer science
  • 76 篇 computational mo...
  • 75 篇 application soft...
  • 72 篇 accuracy
  • 71 篇 deep learning
  • 70 篇 laboratories
  • 69 篇 machine learning
  • 68 篇 software systems
  • 67 篇 software
  • 61 篇 computer archite...
  • 60 篇 training
  • 59 篇 artificial intel...
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 48 篇 security
  • 47 篇 grid computing
  • 47 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 31 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,702 篇 英文
  • 266 篇 其他
  • 16 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Systems Department"
2985 条 记 录,以下是2091-2100 订阅
排序:
Column Formation Control of Multi-robot systems with Input Constraints
Column Formation Control of Multi-robot Systems with Input C...
收藏 引用
IEEE Conference on Decision and Control
作者: Xiaohan Chen Yingmin Jia Junping Du Fashan Yu Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper is concerned with the column formation control of multi-robot systems that are subject to input constraints. A new leader-follower setup is proposed, under which the Lyapunov method can provide a simple con... 详细信息
来源: 评论
Formation control of mobile robots with input constraints: An elliptic approximation approach
Formation control of mobile robots with input constraints: A...
收藏 引用
International Conference on Control, Automation and systems ( ICCAS)
作者: Xiaohan Chen Yingmin Jia Junping Du Fashan Yu The Seventh Research Division and Department of Systems and Control Beihang University BUAA Beijing China Beihang University Beijing CN Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan China
This paper considers the problem of formation control for mobile robots which are subject to input constraints. The control strategy based on virtual robot tracking is proposed, which leads to a compact controller for... 详细信息
来源: 评论
Coverage of wireless sensor networks in the presence of transparent obstacles
Coverage of wireless sensor networks in the presence of tran...
收藏 引用
18th International Conference on software, Telecommunications and computer Networks, SoftCOM 2010
作者: Razzazi, Mohammadreza Fotouhi, Azade Software Systems R and D Lab. Department of Computer Engineering and IT Amirkabir University of Technology Tehran Iran
One fundamental issue in the sensor networks is the coverage problem, which we would like to determine whether a region of interest is sufficiently covered by a given set of sensors. It can be considered as a measure ... 详细信息
来源: 评论
Active Collision Avoidance Maneuver Design Under Constant Thrust ⋆
收藏 引用
IFAC Proceedings Volumes 2011年 第1期44卷 9887-9892页
作者: Yongqiang Qi Yingmin Jia Junping Du Fashan Yu The Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Key Laboratory of Mathematics Informatics and Behavioral Semantics (LMIB) Ministry of Education SMSS Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
Abstract In this paper, the relative position parameters of the target spacecraft are obtained by using the vision measurement and the target maneuver positions are calculated through the isochronous interpolation met... 详细信息
来源: 评论
Risk-Sensitive Cubature Filtering for Jump Markov Nonlinear systems and Its Application to Land Vehicle Positioning ⋆
收藏 引用
IFAC Proceedings Volumes 2011年 第1期44卷 20-25页
作者: Wenling Li Yingmin Jia Junping Du Fashan Yu The Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Key Laboratory of Mathematics Informatics and Behavioral Semantics (LMIB) Ministry of Education SMSS Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
Abstract In this paper, a risk-sensitive filter for a class of jump Markov nonlinear systems is proposed. By using a set of weighted cubature points to approximate the intractable risk-sensitive recursions, the propos... 详细信息
来源: 评论
Decision support for evolving clustering
Decision support for evolving clustering
收藏 引用
作者: Georgieva, Olga Nedev, Sergey Department of Software Engineering Sofia University Bulgaria Department of Computer Systems Technical University Sofia Bulgaria
An evolving clustering algorithm applying the adaptive-distance measure is developed. An incorporated fuzzy decision support procedure classifies the current income. The decision support increases the algorithm robust... 详细信息
来源: 评论
Specification-based testing of intrusion detection engines using logical expression testing criteria
Specification-based testing of intrusion detection engines u...
收藏 引用
10th International Conference on Quality software, QSIC 2010
作者: Massicotte, Frédéric Labiche, Yvan Communications Research Centre Ottawa Canada Department of Systems and Computer Engineering Software Quality Engineering Laboratory Carleton University Ottawa Canada
An Intrusion Detection System (IDS) protects computer networks against attacks and intrusions. One class of IDS is called signature-based network IDSs as they monitor network traffic, looking for evidence of malicious... 详细信息
来源: 评论
A new pulsar instrumentation at the Allen Telescope Array and the Nancay Radio Telescope
收藏 引用
AIP Conference Proceedings 2011年 第1期1357卷 349-350页
作者: G. Desvignes W. C. Barott I. Cognard P. Lespagnol G. Theureau The ATA team aDepartment of Astronomy and Radio Astronomy Laboratory UC Berkeley CA 94720 USA bStation de radioastronomie de Nançay Observatoire de Paris CNRS/INSU 18330 Nançay cElectrical Computer Software and Systems Engineering Department Embry‐Riddle Aeronautical University Daytona Beach FL 32114 USA dLPC2E CNRS 3A Avenue de la Recherche Scientifique F45071 Orléans Cedex 2
In the prospect of the gravitational wave background detection with high precision pulsar timing, we recently installed a new coherent dedispersion backend at the Allen Telescope Array (ATA) and the Nançay Radio ...
来源: 评论
A simple password less authentication system for web sites
A simple password less authentication system for web sites
收藏 引用
7th International Conference on Information Technology - New Generations, ITNG 2010
作者: Sælensminde, Kirit Boonjing, Veera Software Systems Engineering Laboratory Department of Computer Science King Mongkut's Institute of Technology Ladkrabang Bangkok 10520 Thailand
Many web sites have features that are only accessible after registering a user account on them. These sites include forums, on-line games, corporate Intranets and many on-line shops. The sites are typically secured th... 详细信息
来源: 评论
Improving the efficiency of self-organizing emergent systems by an advisor
Improving the efficiency of self-organizing emergent systems...
收藏 引用
7th IEEE International Conference and Workshop on engineering of Autonomic and Autonomous systems, EASe 2010
作者: Steghöfer, Jan-Philipp Denzinger, Jörg Kasinger, Holger Bauer, Bernhard Institute for Software and Systems Engineering University of Augsburg Augsburg Germany Department of Computer Science University of Calgary Calgary AB Canada
Self-organizing emergent systems, also referred to as Decentralized Autonomic Computing systems, are commonly known for their scalability, robustness, flexibility, and adaptivity rather than their efficiency. However,... 详细信息
来源: 评论