咨询与建议

限定检索结果

文献类型

  • 9,485 篇 会议
  • 1,076 册 图书

馆藏范围

  • 10,561 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 9,153 篇 工学
    • 8,699 篇 计算机科学与技术...
    • 4,037 篇 信息与通信工程
    • 1,156 篇 机械工程
    • 725 篇 软件工程
    • 531 篇 电气工程
    • 228 篇 农业工程
    • 147 篇 控制科学与工程
    • 116 篇 环境科学与工程(可...
    • 81 篇 城乡规划学
    • 44 篇 生物医学工程(可授...
    • 34 篇 安全科学与工程
    • 25 篇 测绘科学与技术
    • 25 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 17 篇 土木工程
  • 1,977 篇 管理学
    • 1,925 篇 管理科学与工程(可...
    • 116 篇 工商管理
    • 57 篇 图书情报与档案管...
  • 542 篇 农学
    • 538 篇 作物学
  • 364 篇 理学
    • 155 篇 科学技术史(分学科...
    • 143 篇 数学
    • 35 篇 生物学
    • 17 篇 大气科学
    • 16 篇 地理学
  • 174 篇 教育学
    • 174 篇 教育学
  • 165 篇 法学
    • 147 篇 社会学
    • 16 篇 政治学
  • 82 篇 文学
    • 81 篇 新闻传播学
  • 52 篇 经济学
    • 41 篇 理论经济学
  • 16 篇 医学
    • 16 篇 基础医学(可授医学...
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 282 篇 artificial intel...
  • 275 篇 computer communi...
  • 253 篇 industry 4.0
  • 233 篇 information syst...
  • 182 篇 machine learning
  • 130 篇 simulation
  • 125 篇 computer applica...
  • 113 篇 computers and so...
  • 108 篇 collaborative ne...
  • 98 篇 knowledge manage...
  • 95 篇 sustainability
  • 86 篇 theory of comput...
  • 84 篇 software enginee...
  • 83 篇 internet of thin...
  • 81 篇 deep learning
  • 79 篇 software enginee...
  • 77 篇 circular economy
  • 77 篇 optimization
  • 74 篇 management of co...
  • 71 篇 digitalization

机构

  • 62 篇 china agr univ c...
  • 45 篇 univ paulista sa...
  • 40 篇 norwegian univ s...
  • 38 篇 natl engn res ct...
  • 30 篇 tecnol monterrey...
  • 29 篇 university of am...
  • 27 篇 zf friedrichshaf...
  • 27 篇 beijing res ctr ...
  • 26 篇 univ hong kong c...
  • 26 篇 politecn milan d...
  • 24 篇 university of pi...
  • 24 篇 univ bergamo ber...
  • 23 篇 univ cape town c...
  • 23 篇 politecn milan d...
  • 23 篇 tecnol monterrey...
  • 23 篇 chalmers univ te...
  • 21 篇 democritus unive...
  • 20 篇 china agr univ c...
  • 20 篇 univ oslo oslo
  • 20 篇 nova university ...

作者

  • 63 篇 luis m. camarinh...
  • 55 篇 taisch marco
  • 47 篇 camarinha-matos ...
  • 41 篇 chow kam-pui
  • 41 篇 ilias maglogiann...
  • 39 篇 wuest thorsten
  • 38 篇 afsarmanesh hami...
  • 38 篇 powell daryl
  • 38 篇 stich volker
  • 36 篇 nielsen kjeld
  • 35 篇 gaiardelli paolo
  • 33 篇 tzovaras dimitri...
  • 32 篇 kiritsis dimitri...
  • 32 篇 chochliouros ioa...
  • 30 篇 hamideh afsarman...
  • 29 篇 strandhagen jan ...
  • 29 篇 schuh guenther
  • 27 篇 rabelo ricardo j...
  • 27 篇 alfnes erlend
  • 26 篇 dolgui alexandre

语言

  • 10,514 篇 英文
  • 47 篇 中文
检索条件"丛书名=IFIP Advances in Information and Communication Technology 461"
10561 条 记 录,以下是191-200 订阅
排序:
Detecting Control Injection Attacks Using Energy Data Anomalies in Computer Numerical Control Machining  18th
Detecting Control Injection Attacks Using Energy Data Anomal...
收藏 引用
18th International Conference on Critical Infrastructure Protection
作者: Kimmell, Jeffrey Orlyanchik, Vladimir Sturm, Logan Dawson, Joel Taylor, Curtis Oak Ridge Natl Lab Oak Ridge TN 37831 USA Cybersecur Mfg Innovat Inst San Antonio TX 78249 USA
The widespread adoption of networked devices, sophisticated automation and data-driven processes in industry - also known as Industry 4.0 - has boosted the quantity and quality of manufacturing products. However, the ... 详细信息
来源: 评论
Actuation Conflict Management in Internet of Things Systems DevOps: A Discrete Event Modeling and Simulation Approach  7th
Actuation Conflict Management in Internet of Things Systems ...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: Capocchi, Laurent Santucci, Jean-Francois Tigli, Jean-Yves Gomnin, Thibault Lavirotte, Stephane Rocher, Gerald Univ Cors SPE UMR CNRS 6134 Campus Mariani F-20250 Corte France Campus SophiaTech I3S UMR CNRS 7271 Campus SophiaTech F-06903 Sophia Antipolis France
In IoT DevOps, simulating actuation conflict management is crucial for enhancing conflict detection and resolution in concurrent IoT applications. This paper introduces a new discrete event modeling and simulation app... 详细信息
来源: 评论
Fingerprinting Malware Families Under Uncertainty  20th
Fingerprinting Malware Families Under Uncertainty
收藏 引用
20th ifip WG 11.9 International Conference on Digital Forensics
作者: Dunn, Cayden Ghosh, Krishnendu Coll Charleston Charleston SC 29424 USA
The majority of attacks on the information technology infrastructure are executed by sets of malware that are variants of each another. Therefore, it is critical to identify malware and their variants based on their b... 详细信息
来源: 评论
Harnessing Generative AI for Sustainable Innovation: A Comparative Study of Prompting Techniques and Integration with Nature-Inspired Principles  24th
Harnessing Generative AI for Sustainable Innovation: A Compa...
收藏 引用
24th International TRIZ Future Conference
作者: Mas'udah Livotov, Pavel Kokoschko, Bjoern Offenburg Univ Appl Sci Badstr 24 D-77652 Offenburg Germany Otto von Guericke Univ Univ Pl 2 D-39106 Magdeburg Germany
Amidst growing environmental challenges and the imperative for sustainable solutions, this study explores how generative artificial intelligence (AI) can drive innovation in process engineering. It investigates the ef... 详细信息
来源: 评论
Prompting and Learning to Detect Major Life Events from Tweets  24th
Prompting and Learning to Detect Major Life Events from Twee...
收藏 引用
24th International TRIZ Future Conference
作者: Marginean, Anca Barcau, Emanuel Tech Univ Cluj Napoca Cluj Napoca Romania Life Hard Software Co Floresti Italy
Recently, LLM spervaded the world of text understanding. Their ability to generate text based on instructions comes with the price of having an extremely large number of parameters and, consequently extremely large ha... 详细信息
来源: 评论
Error Resiliency and Adversarial Robustness in Convolutional Neural Networks: An Empirical Analysis  7th
Error Resiliency and Adversarial Robustness in Convolutional...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: Barbareschi, Mario Barone, Salvatore Casola, Valentina Della Torca, Salvatore Univ Naples Federico II I-80125 Naples Italy Univ Bergamo I-24044 Dalmine Italy
The increasing pervasiveness of Artificial Intelligence (AI), and Convolutional Neural Networks (CNNs) in edge-computing and Internet of Things applications pose several challenges, including the hunger for computatio... 详细信息
来源: 评论
An information-Theoretic Approach for Anomaly Detection in RPL-Based Internet of Things  7th
An Information-Theoretic Approach for Anomaly Detection in R...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: La, Vinh Hoa de Oca, Edgardo Montes Cavalli, Ana Montimage 39 Rue Bobillot F-75013 Paris France
In recent years, cyber-attacks have increased significantly in both volume and sophistication, making the detection of security violations a crucial feature in computer systems. This is particularly true in the Intern... 详细信息
来源: 评论
Neuro-Symbolic AI-Driven Inventive Design of a Benzoic Acid Extraction Installation from Styrax Resin  24th
Neuro-Symbolic AI-Driven Inventive Design of a Benzoic Acid ...
收藏 引用
24th International TRIZ Future Conference
作者: Brad, Stelian Bartos, Vasile-Dragos Brad, Emilia Trifan, Costan-Vladut Tech Univ Cluj Napoca Cluj Napoca 400114 Romania
The extraction of benzoic acid from natural resins such as Styrax holds considerable industrial significance, given its widespread use in pharmaceuticals, food, and cosmetics. This study introduces an approach to enha... 详细信息
来源: 评论
Relocation of Container-Based Services in a MEC-NFV Orchestrated Environment  7th
Relocation of Container-Based Services in a MEC-NFV Orchestr...
收藏 引用
7th ifip WG 5.5 International Cross-Domain Conference on Internet of Things
作者: Bernad, Cristina Kjorveziroski, Vojdan Roig, Pedro Alcaraz, Salvador Gilly, Katja Filiposka, Sonja Miguel Hernandez Univ Dept Comp Engn Elche Spain Ss Cyril & Methodius Univ Fac Comp Sci & Engn Skopje North Macedonia
With the rapid growth of real-time next-generation mobile services, it has become necessary to work towards holistic orchestration of the benefits promised with edge computing based on bringing the computing infrastru... 详细信息
来源: 评论
Text File Recovery Using an N-Gram Model  20th
Text File Recovery Using an N-Gram Model
收藏 引用
20th ifip WG 11.9 International Conference on Digital Forensics
作者: Srinivas, Kaparthi Gireesh, Chalicheemala Chunduru, Eswara Sai Prasad Temberveni, Venugopal Vasavi Coll Engn Hyderabad India Cent Forens Sci Lab Hyderabad India JNTUH Univ Coll Engn Jagtial India
This chapter describes a file carving method for recovering deleted text files without relying on file table information. Specifically, text files are reconstructed by analyzing file fragments and utilizing three n-gr... 详细信息
来源: 评论