咨询与建议

限定检索结果

文献类型

  • 9,485 篇 会议
  • 1,076 册 图书

馆藏范围

  • 10,561 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 9,153 篇 工学
    • 8,699 篇 计算机科学与技术...
    • 4,037 篇 信息与通信工程
    • 1,156 篇 机械工程
    • 725 篇 软件工程
    • 531 篇 电气工程
    • 228 篇 农业工程
    • 147 篇 控制科学与工程
    • 116 篇 环境科学与工程(可...
    • 81 篇 城乡规划学
    • 44 篇 生物医学工程(可授...
    • 34 篇 安全科学与工程
    • 25 篇 测绘科学与技术
    • 25 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 17 篇 土木工程
  • 1,977 篇 管理学
    • 1,925 篇 管理科学与工程(可...
    • 116 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 542 篇 农学
    • 538 篇 作物学
  • 364 篇 理学
    • 155 篇 科学技术史(分学科...
    • 143 篇 数学
    • 35 篇 生物学
    • 17 篇 大气科学
    • 16 篇 地理学
  • 174 篇 教育学
    • 174 篇 教育学
  • 165 篇 法学
    • 147 篇 社会学
    • 16 篇 政治学
  • 82 篇 文学
    • 81 篇 新闻传播学
  • 52 篇 经济学
    • 41 篇 理论经济学
  • 16 篇 医学
    • 16 篇 基础医学(可授医学...
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 282 篇 artificial intel...
  • 275 篇 computer communi...
  • 253 篇 industry 4.0
  • 233 篇 information syst...
  • 182 篇 machine learning
  • 130 篇 simulation
  • 125 篇 computer applica...
  • 113 篇 computers and so...
  • 108 篇 collaborative ne...
  • 98 篇 knowledge manage...
  • 95 篇 sustainability
  • 86 篇 theory of comput...
  • 84 篇 software enginee...
  • 83 篇 internet of thin...
  • 81 篇 deep learning
  • 79 篇 software enginee...
  • 77 篇 circular economy
  • 77 篇 optimization
  • 74 篇 management of co...
  • 71 篇 digitalization

机构

  • 62 篇 china agr univ c...
  • 45 篇 univ paulista sa...
  • 40 篇 norwegian univ s...
  • 38 篇 natl engn res ct...
  • 30 篇 tecnol monterrey...
  • 29 篇 university of am...
  • 27 篇 zf friedrichshaf...
  • 27 篇 beijing res ctr ...
  • 26 篇 univ hong kong c...
  • 26 篇 politecn milan d...
  • 24 篇 university of pi...
  • 24 篇 univ bergamo ber...
  • 23 篇 univ cape town c...
  • 23 篇 politecn milan d...
  • 23 篇 tecnol monterrey...
  • 23 篇 chalmers univ te...
  • 21 篇 democritus unive...
  • 20 篇 china agr univ c...
  • 20 篇 univ oslo oslo
  • 20 篇 nova university ...

作者

  • 63 篇 luis m. camarinh...
  • 55 篇 taisch marco
  • 47 篇 camarinha-matos ...
  • 41 篇 chow kam-pui
  • 41 篇 ilias maglogiann...
  • 39 篇 wuest thorsten
  • 38 篇 afsarmanesh hami...
  • 38 篇 powell daryl
  • 38 篇 stich volker
  • 36 篇 nielsen kjeld
  • 35 篇 gaiardelli paolo
  • 33 篇 tzovaras dimitri...
  • 32 篇 kiritsis dimitri...
  • 32 篇 chochliouros ioa...
  • 30 篇 hamideh afsarman...
  • 29 篇 strandhagen jan ...
  • 29 篇 schuh guenther
  • 27 篇 rabelo ricardo j...
  • 27 篇 alfnes erlend
  • 26 篇 dolgui alexandre

语言

  • 10,514 篇 英文
  • 47 篇 中文
检索条件"丛书名=IFIP Advances in Information and Communication Technology 461"
10561 条 记 录,以下是161-170 订阅
排序:
Leveraging Task-Specific VAEs for Efficient Exemplar Generation in HAR  7th
Leveraging Task-Specific VAEs for Efficient Exemplar Generat...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: Kann, Bonpagna Castellanos-Paez, Sandra Rombourg, Romain Lalanda, Philippe Univ Grenoble Alpes CNRS Grenoble INP LIG F-38000 Grenoble France Cambodia Acad Digital Technol Inst Digital Res & Innovat Phnom Penh 121002 Cambodia Univ Grenoble Alpes CNRS Grenoble INP G2Elab F-38000 Grenoble France
The emerging technologies of smartphones and wearable devices have transformed Human Activity Recognition (HAR), offering a rich source of sensor data for building an automated system to recognize people's daily a... 详细信息
来源: 评论
Dynamic Truth: Immutable Humans, AI and Innovation  24th
Dynamic Truth: Immutable Humans, AI and Innovation
收藏 引用
24th International TRIZ Future Conference
作者: Mann, Darrell Systemat Innovat Network Plymouth Devon England
The continuing survival of Society depends on the existence of Truth. Innovation depends on Truth. The mismatch between AI technology, our Stone-Age brains and our Dark-Age institutions jeopardises the ability to iden... 详细信息
来源: 评论
Efficient Implementation of Authenticated Encryption on 16-bit MSP430 Microcontrollers  7th
Efficient Implementation of Authenticated Encryption on 16-b...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: Franck, Christian Grossschaedl, Johann Univ Luxembourg DCS & SnT 6 Ave FonteAve Fonte L-4364 Luxembourg Luxembourg
Algorithms for Authenticated Encryption with Associated Data (AEAD) extend the normal functionality of authenticated encryption schemes by the ability to process data that is only authenticated but not encrypted. Such... 详细信息
来源: 评论
Employing Clustering Techniques and Association Rules for Client Segmentation and Attribute Dependency Mining in the Domain of Car Insurance  24th
Employing Clustering Techniques and Association Rules for Cl...
收藏 引用
24th International TRIZ Future Conference
作者: Mitrea, Delia Mitrea, Paulina Barna, Erik Tech Univ Cluj Napoca Dept Comp Sci Cluj Napoca Romania Life Hard SRL Cluj Napoca Romania
Segmenting clients according to common characteristics and determining the needs for each group is an important objective in the domain of car insurance. We perform segmentation through specific methods, comparing mul... 详细信息
来源: 评论
Hardware Trojan Key-Corruption Detection with Automated Neural Architecture Search  7th
Hardware Trojan Key-Corruption Detection with Automated Neur...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: Mezzarapa, Franco Goodrich, Jenna Robins, Andey Borowczak, Mike Univ Cent Florida Orlando FL 32816 USA
This work presents a model hardware trojan which intermittently is capable of corrupting an encryption operation occurring on a device. It asks whether this trojan can be detected via power-based, side-channel attacks... 详细信息
来源: 评论
Honeypot-Based Data Collection for Dark Web Investigations Using the Tor Network  20th
Honeypot-Based Data Collection for Dark Web Investigations U...
收藏 引用
20th ifip WG 11.9 International Conference on Digital Forensics
作者: Singh, Krishan Pal Pilli, Emmanuel Laxmi, Vijay Malaviya Natl Inst Technol Jaipur Rajasthan India
The Dark Web presents a challenging and complex environment where cyber criminals conduct illicit activities with high degrees of anonymity and privacy. This chapter describes a honeypot-based data collection approach... 详细信息
来源: 评论
Challenges in Inventive Design Problem Solving with Generative AI: Interactive Problem Definition, Multi-directional Prompting, and Concept Development  24th
Challenges in Inventive Design Problem Solving with Generati...
收藏 引用
24th International TRIZ Future Conference
作者: Livotov, Pavel Mas'udah Offenburg Univ Appl Sci Badstr 24 D-77652 Offenburg Germany
This paper explores the application of generative AI for systematic and inventive problem-solving in engineering design. Utilizing a multi-directional prompting approach, the study investigates the ability of AI chatb... 详细信息
来源: 评论
Using Microposture Features and Optical Flows for Deepfake Detection  20th
Using Microposture Features and Optical Flows for Deepfake D...
收藏 引用
20th ifip WG 11.9 International Conference on Digital Forensics
作者: Chen, Kai Ma, Duohe Zhang, Zhenchao Tang, Zhimin Wang, Liming Jiang, Junye Chinese Acad Sci Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China
The proliferation of deepfake videos underscores the need to develop reliable detection methods to mitigate their negative consequences. Several deepfake video detection methods achieve satisfactory performance. Howev... 详细信息
来源: 评论
Graph-Based Classification of IoT Malware Families Enhanced by Fuzzy Hashing  7th
Graph-Based Classification of IoT Malware Families Enhanced ...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: Mahmoudyar, Nastaran Ghorbani, Ali A. Lashkari, Arash Habibi Univ New Brunswick Fredericton NB Canada
The proliferation of Internet of Things (IoT) devices has led to an increase in IoT malware, posing a significant cybersecurity threat. Detecting and mitigating this threat is challenging due to the diverse CPU archit... 详细信息
来源: 评论
Programmable and Scalable Bit-Sliced VLSI Architecture for Decision Tree-Based Machine Learning Edge Inference  7th
Programmable and Scalable Bit-Sliced VLSI Architecture for D...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: Somesula, Raaga Sai Sivakumar, Sibi Rajagopal Katkoori, Srinivas Univ S Florida Tampa FL 33620 USA
As the volume and diversity of Internet of Things (IoT) data continues to grow, traditional cloud-based processing methods face significant challenges, including latency, bandwidth constraints, and privacy concerns. O... 详细信息
来源: 评论