咨询与建议

限定检索结果

文献类型

  • 40,726 篇 会议
  • 2,944 册 图书

馆藏范围

  • 43,669 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 39,908 篇 工学
    • 38,450 篇 计算机科学与技术...
    • 7,386 篇 软件工程
    • 4,031 篇 信息与通信工程
    • 3,157 篇 电气工程
    • 2,324 篇 控制科学与工程
    • 792 篇 生物医学工程(可授...
    • 499 篇 生物工程
    • 333 篇 机械工程
    • 285 篇 交通运输工程
    • 179 篇 电子科学与技术(可...
    • 165 篇 土木工程
    • 164 篇 光学工程
    • 163 篇 化学工程与技术
  • 3,496 篇 管理学
    • 1,942 篇 管理科学与工程(可...
    • 1,236 篇 图书情报与档案管...
    • 925 篇 工商管理
  • 3,217 篇 理学
    • 1,946 篇 数学
    • 886 篇 生物学
    • 519 篇 统计学(可授理学、...
    • 368 篇 物理学
    • 220 篇 系统科学
    • 158 篇 化学
  • 1,498 篇 医学
    • 967 篇 临床医学
    • 693 篇 基础医学(可授医学...
    • 235 篇 特种医学
  • 1,484 篇 教育学
    • 1,402 篇 教育学
  • 531 篇 文学
    • 352 篇 外国语言文学
    • 178 篇 新闻传播学
  • 437 篇 经济学
    • 317 篇 理论经济学
  • 402 篇 法学
    • 366 篇 社会学
  • 177 篇 艺术学
  • 95 篇 历史学
  • 79 篇 农学
  • 11 篇 军事学

主题

  • 1,854 篇 artificial intel...
  • 1,169 篇 machine learning
  • 872 篇 deep learning
  • 777 篇 computer communi...
  • 668 篇 information syst...
  • 558 篇 computer applica...
  • 328 篇 computer systems...
  • 309 篇 cloud computing
  • 297 篇 clustering
  • 295 篇 security
  • 289 篇 internet of thin...
  • 270 篇 software enginee...
  • 269 篇 classification
  • 235 篇 information syst...
  • 229 篇 computer imaging...
  • 224 篇 data mining
  • 218 篇 software enginee...
  • 207 篇 data mining and ...
  • 207 篇 ontology
  • 180 篇 computers and ed...

机构

  • 80 篇 univ chinese aca...
  • 76 篇 univ dist franci...
  • 69 篇 chinese acad sci...
  • 67 篇 shanghai univ sc...
  • 48 篇 tsinghua univers...
  • 43 篇 natl res univ hi...
  • 39 篇 huazhong univers...
  • 35 篇 harbin inst tech...
  • 33 篇 tsinghua univ de...
  • 30 篇 shanghai jiao to...
  • 29 篇 pontificia univ ...
  • 29 篇 harbin universit...
  • 27 篇 polytechnic inst...
  • 27 篇 chinese acad sci...
  • 26 篇 lomonosov moscow...
  • 25 篇 chongqing univ s...
  • 25 篇 beijing univ pos...
  • 24 篇 university of cr...
  • 24 篇 hunan univ coll ...
  • 23 篇 univ nacl colomb...

作者

  • 58 篇 kim tai-hoon
  • 53 篇 lima jose
  • 43 篇 o'connor rory v.
  • 37 篇 wang lei
  • 34 篇 liu yang
  • 33 篇 zhang lin
  • 31 篇 kim seoksoo
  • 30 篇 wang jing
  • 28 篇 sabu m. thampi
  • 28 篇 crawford broderi...
  • 26 篇 zhang lei
  • 25 篇 li yang
  • 25 篇 li li
  • 24 篇 wang jian
  • 21 篇 zhang min
  • 20 篇 hassanien aboul ...
  • 19 篇 li peng
  • 19 篇 serra roberto
  • 18 篇 li xin
  • 18 篇 wang hui

语言

  • 43,504 篇 英文
  • 965 篇 中文
  • 1 篇 丹麦文
检索条件"丛书名=Communications in Computer and Information Science"
43670 条 记 录,以下是941-950 订阅
排序:
Massive-Parallel Game of Politicians  7th
Massive-Parallel Game of Politicians
收藏 引用
8th Asia Pacific Web and Web-Age information Management Joint International Conference on Web and Big Data
作者: Schumann, Andrew Pancerz, Krzysztof Univ Informat Technol & Management Rzeszow Dept Cognit Sci & Math Modelling Sucharskiego 2 PL-35225 Rzeszow Poland John Paul II Catholic Univ Lublin Al Raclawickie 14 PL-20950 Lublin Poland
Mould or fungal propagation can serve as a universal model for a massive-parallel game of many players, moving concurrently. Based on this model, a game of politicians is introduced to occupy as many political keyword... 详细信息
来源: 评论
A Machine Learning (ML)-Inspired Method for Intrusion Detection in IoT Devices Networks  5th
A Machine Learning (ML)-Inspired Method for Intrusion Detect...
收藏 引用
5th International Conference on Computing science, Communication and Security
作者: Venkatesh, Veeramuthu Raj, Pethuru Nedium, Roshitha Edara, Jahnavi Reddy, Kalluru Amarnath Anushiadevi, R. SASTRA Deemed Univ Sch Comp Thanjavur 613401 Tamilnadu India Reliance Jio Cloud Serv JCS Bangalore 560025 Karnataka India
The Internet of Things (IoT) and Machine Learning (ML) represent dynamic research fields with significant growth. IoT applications have gained popularity among technology researchers and developers, and the increasing... 详细信息
来源: 评论
Current Design Practices in Applied Augmented Reality Research: A Methodological Review  1
收藏 引用
8th International Conference on computer-Human Interaction Research and Applications-CHIRA-Annual
作者: Teutenberg, Lukas D. Fitz, Lukas R. G. Scheeg, Jochen Brandenburg Univ Appl Sci Dept Business & Management Magdeburger Str 50 D-14770 Brandenburg Germany
Successful Augmented Reality (AR) solutions require high technology acceptance and desire among users. Applying appropriate design methodologies can enhance the development of desirable AR systems and help to streamli... 详细信息
来源: 评论
Handcrafted and Deep Features for Synthetic Data Generation in Offline Handwritten Signature Verification  4th
Handcrafted and Deep Features for Synthetic Data Generation ...
收藏 引用
4th International Conference on Intelligent Systems and Pattern Recognition-ISPR
作者: Arab, Naouel Nemmour, Hassiba Bouibed, Mohamed Lamine Chibani, Youcef Univ Sci & Technol Houari Boumediene USTHB Lab Ingn Syst Intelligents & Commun LISIC Fac Elect Engn Algiers Algeria
One of the major limitations which obstruct the development of an efficient offline signature verification system is the lack of genuine signatures required to perform a reliable training stage. To deal with this issu... 详细信息
来源: 评论
From Theory to Practice: Digital Innovations in Humanitarian Logistics for Real-World Disaster Management  5th
From Theory to Practice: Digital Innovations in Humanitarian...
收藏 引用
5th 5th Olympus - International Conference on Supply Chain
作者: Aretoulaki, Eleni Ponis, Stavros T. Plakas, George Tzanetou, Dimitra Kitsantas, Antonios Natl Tech Univ Athens Sch Mech Engn Heroon Polytech 9 Athens 15780 Greece
The rapid advancement of digital technologies has significantly impacted the field of humanitarian logistics and disaster management, prompting a paradigm shift in addressing emergencies. In this paper, a literature r... 详细信息
来源: 评论
Decentralized Education and Incentivization: A Study of Decentralized Autonomous Universities  4th
Decentralized Education and Incentivization: A Study of Dece...
收藏 引用
4th International Conference on Advanced Research in Technologies information Innovation and Sustainability-ARTIIS-Annual
作者: van Bijlevelt, Danny Rafiee, Amin Bittopia Fdn Cheyenne WY 82001 USA
As a result of blockchain technology and other decentralized systems, Decentralized Autonomous Universities (DAUs) have emerged as a foundational element in decentralized education. DAUs offer efficiency, transparency... 详细信息
来源: 评论
Cross-Domain Adversarial Attacks and Robust Defense Mechanisms for Multimodal Neural Networks  4th
Cross-Domain Adversarial Attacks and Robust Defense Mechanis...
收藏 引用
4th International Conference on Advanced Network Technologies and Intelligent Computing-ANTIC-Annual
作者: Barach, Jay Syst Staffing Grp Inc IT Operat & Recruitment King Of Prussia PA 19401 USA
This paper addresses the challenge of defending neural networks against adversarial attacks and environmental noise by proposing a cross-modal architecture that combines image and audio data streams. With the MNIST an... 详细信息
来源: 评论
Eyecare for All, a Service Design Approach  1
收藏 引用
15th Indian Conference on Human-computer Interaction Design and Research
作者: Chinnaswamy, Kumaresh Nair, Manjusha Neelakanthan, Manoj Infosys Ltd Plot 44Hosur Rd Bengaluru 560100 Karnataka India
This paper investigates the critical issue of limited eyecare accessibility in India, a significant concern where 80% of blindness and vision impairments are preventable with early detection and treatment. It presents... 详细信息
来源: 评论
Text Mining in Supply Chain Risk Management: A Bibliometric Analysis  5th
Text Mining in Supply Chain Risk Management: A Bibliometric ...
收藏 引用
5th 5th Olympus - International Conference on Supply Chain
作者: Gelastopoulos, Georgios Keramydas, Christos Tsolakis, Naoum Int Hellen Univ Sch Econ & Business Adm Dept Supply Chain Management Thermi 57001 Greece
In Supply Chain Risk Management (SCRM), the use of text mining is gaining increasing attention as the application of modern algorithms enable rapid, real-time interpretation of huge volume of unstructured data. Online... 详细信息
来源: 评论
Botnet-Based DDoS Attack: Automatic Detection, Mitigation, and Real-Time Traffic Filtering in Cloud Environments  4th
Botnet-Based DDoS Attack: Automatic Detection, Mitigation, a...
收藏 引用
4th International Conference on Advanced Network Technologies and Intelligent Computing-ANTIC-Annual
作者: Basuli, Suman Padhya, Mukti Natl Forens Sci Univ Sch Cyber Secur & Digital Forens Gandhinagar 382007 Gujarat India
Distributed Denial of Service (DDoS) attacks pose a persistent threat to cloud infrastructure, often disrupting services and affecting legitimate user traffic. Traditional DDoS mitigation techniques, including network... 详细信息
来源: 评论