咨询与建议

限定检索结果

文献类型

  • 15,970 篇 会议
  • 458 册 图书
  • 252 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 16,677 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 10,251 篇 工学
    • 8,139 篇 计算机科学与技术...
    • 6,096 篇 软件工程
    • 2,887 篇 信息与通信工程
    • 1,297 篇 电气工程
    • 1,169 篇 控制科学与工程
    • 870 篇 电子科学与技术(可...
    • 739 篇 生物工程
    • 565 篇 生物医学工程(可授...
    • 563 篇 光学工程
    • 561 篇 机械工程
    • 349 篇 动力工程及工程热...
    • 345 篇 仪器科学与技术
    • 298 篇 化学工程与技术
    • 244 篇 建筑学
    • 211 篇 土木工程
    • 211 篇 安全科学与工程
  • 4,006 篇 理学
    • 2,393 篇 数学
    • 997 篇 物理学
    • 828 篇 生物学
    • 712 篇 统计学(可授理学、...
    • 381 篇 系统科学
    • 323 篇 化学
  • 2,147 篇 管理学
    • 1,247 篇 管理科学与工程(可...
    • 1,045 篇 图书情报与档案管...
    • 653 篇 工商管理
  • 497 篇 医学
    • 436 篇 临床医学
    • 318 篇 基础医学(可授医学...
  • 396 篇 法学
    • 335 篇 社会学
  • 373 篇 教育学
    • 362 篇 教育学
  • 221 篇 经济学
    • 219 篇 应用经济学
  • 142 篇 农学
  • 34 篇 军事学
  • 29 篇 文学
  • 16 篇 艺术学

主题

  • 829 篇 computer network...
  • 656 篇 computer science
  • 557 篇 local area netwo...
  • 419 篇 computer archite...
  • 346 篇 bandwidth
  • 279 篇 neural networks
  • 271 篇 application soft...
  • 250 篇 computer vision
  • 237 篇 protocols
  • 217 篇 wireless sensor ...
  • 214 篇 computational mo...
  • 211 篇 routing
  • 210 篇 throughput
  • 205 篇 quality of servi...
  • 199 篇 intelligent netw...
  • 190 篇 computer communi...
  • 179 篇 network topology
  • 177 篇 costs
  • 176 篇 delay
  • 175 篇 artificial intel...

机构

  • 40 篇 ieee
  • 27 篇 department of co...
  • 22 篇 lovely professio...
  • 22 篇 school of electr...
  • 20 篇 school of comput...
  • 20 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 17 篇 school of comput...
  • 16 篇 department of el...
  • 16 篇 chitkara univers...
  • 16 篇 school of comput...
  • 15 篇 department of co...
  • 15 篇 school of comput...
  • 14 篇 department of co...
  • 14 篇 college of compu...
  • 13 篇 institute of inf...
  • 13 篇 school of comput...
  • 13 篇 institute of com...
  • 13 篇 the islamic univ...

作者

  • 30 篇 anon
  • 18 篇 luo xiaonan
  • 16 篇 p. martini
  • 13 篇 wang wei
  • 13 篇 m. frank
  • 12 篇 li peng
  • 11 篇 meng fanqi
  • 11 篇 weaver alfred c.
  • 10 篇 jayasumana anura...
  • 10 篇 kwon sunghoon
  • 10 篇 kukreja vinay
  • 9 篇 bernady o. apduh...
  • 9 篇 osvaldo gervasi
  • 8 篇 longbing cao
  • 8 篇 wang dong
  • 8 篇 a.k. jain
  • 7 篇 wang lei
  • 7 篇 jun wang
  • 7 篇 liu yang
  • 7 篇 wu jie

语言

  • 15,550 篇 英文
  • 1,021 篇 其他
  • 115 篇 中文
  • 19 篇 德文
  • 7 篇 葡萄牙文
  • 5 篇 土耳其文
  • 2 篇 西班牙文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 法文
检索条件"任意字段=13th Computer Conference on Local Computer Networks, Proceedings"
16681 条 记 录,以下是41-50 订阅
排序:
Leveraging Swin Transformer for local-to-Global Weakly Supervised Semantic Segmentation  13
Leveraging Swin Transformer for Local-to-Global Weakly Super...
收藏 引用
13th Iranian/3rd International Machine Vision and Image Processing conference (MVIP)
作者: Ahmadi, Rozhan Kasaei, Shohreh Sharif Univ Technol Dept Comp Engn Tehran Iran
In recent years, weakly supervised semantic segmentation using image-level labels as supervision has received significant attention in the field of computer vision. Most existing methods have addressed the challenges ... 详细信息
来源: 评论
Federated Road Surface Anomaly Detection Using Smartphone Accelerometer Data  13
Federated Road Surface Anomaly Detection Using Smartphone Ac...
收藏 引用
13th International conference on Data Science, Technology and Applications, DATA 2024
作者: Abdessameud, Oussama Mazari Cherifi, Walid Dept. Computer Science Ecole Militaire Polytechnique Algiers Algeria
Road surface conditions significantly impact traffic flow, vehicle integrity, and driver safety. this importance is magnified in the context of service vehicles, where speed is often the only recourse for saving lives... 详细信息
来源: 评论
Additional Heatmap Constraint for Depth-Based 3D Hand Pose Estimation  13
Additional Heatmap Constraint for Depth-Based 3D Hand Pose E...
收藏 引用
13th IEEE International conference on CYBER Technology in Automation, Control, and Intelligent Systems, CYBER 2023
作者: Jin, Weihua Wang, Qizhi School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China
In this paper, we propose two additional heatmap constraint methods that can be integrated into existing detection-based 3D Hand Pose Estimation backbone networks. Our methods effectively reduce the gap between the tr... 详细信息
来源: 评论
Cyberbullying Tweets Detection Within Twitter Using CNN  13
Cyberbullying Tweets Detection Within Twitter Using CNN
收藏 引用
13th IEEE International conference on Communication Systems and Network Technologies, CSNT 2024
作者: Manasa, Y. Dedeepya, P. Sai, Chinta Meghana Navya, Damerla Timmasarti, Hari Priya Gangavarapu, Meghana Computer Science and Engineering Vijayawada India
Social media has transformed into a prominent hub for cyberbullying, particularly impacting the younger demographic. the surge in social networking platforms has led to a corresponding increase in instances of online ... 详细信息
来源: 评论
Comparative Analysis of Multilingual and Cross-Lingual Models for Aspect-Based Sentiment Analysis  13
Comparative Analysis of Multilingual and Cross-Lingual Model...
收藏 引用
13th International conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Hussain, Sajithunisa Khan, Rubina Liyakat Quraishi, Suhail Javed Singh, Anupam George, Remya P. Ahmad, Nazia Applied College Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia Computer Applications Mriirs Haryana Faridabad India Graphic Era Hill University Department of Computer Science and Engineering Uttarakhand Dehradun India
Aspect-Based Sentiment Analysis (ABSA) is a finegrained sub-task of Natural Language Processing concerned with opinion bearing on certain aspects contained in text. the shift towards multicultural content on the digit... 详细信息
来源: 评论
local Black-box Adversarial Attack based on Random Segmentation Channel  27
Local Black-box Adversarial Attack based on Random Segmentat...
收藏 引用
27th International conference on computer Supported Cooperative Work in Design (CSCWD)
作者: Xu, Li Yang, Zejin Guo, Huiting Wan, Xu Fan, Chunlong Shenyang Aerosp Univ Sch Comp Sci Shenyang Peoples R China Shenyang Aircraft Design & Res Inst Shenyang Peoples R China
With the wide application of deep neural networks, the security problem of the model is becoming more prominent, adversarial attack is an important tool for evaluating the robustness and security of the model, adversa... 详细信息
来源: 评论
the Software Complex for computer Simulation of the Motion Control System  13th
The Software Complex for Computer Simulation of the Motion C...
收藏 引用
13th computer Science Online conference
作者: Smirnov, Mikhail N. Smirnova, Maria A. St Petersburg State Univ 7-9 Univ Kaya Nab St St Petersburg 199034 Russia
the paper is devoted to construction the special the software complex for analysis, synthesis and modeling of the control system for marine vessels. the complex is designed in MATLAB-Simulink package. It contains math... 详细信息
来源: 评论
Security Enhancement through Flow-based Centralized control in SDN  13
Security Enhancement through Flow-based Centralized control ...
收藏 引用
13th International conference on Cloud Computing, Data Science and Engineering, Confluence 2023
作者: Sharma, Pradeep Kumar Kumar, Brijesh Tyagi, S.S. Manav Rachna International Institute of Research and Studies Dept of Computer Sc. and Engg. Faridabad India Iimt Dept. of Computer Sc. and Engg. Greater Noida India
Software Defined Networking is a new technology that redefines the architecture of computer networks and overcomes the several limitations of Traditional networks by decoupling the control and data plane. SDN has draw... 详细信息
来源: 评论
14th International conference on Emerging Ubiquitous Systems and Pervasive networks / 13th International conference on Current and Future Trends of Information and Communication Technologies in Healthcare, EUSPN/ICth 2023
14th International Conference on Emerging Ubiquitous Systems...
收藏 引用
14th International conference on Emerging Ubiquitous Systems and Pervasive networks / 13th International conference on Current and Future Trends of Information and Communication Technologies in Healthcare, EUSPN/ICth 2023
the proceedings contain 119 papers. the topics discussed include: automatic accident detection system using IoT compared to the systems that a traffic center uses for accident detection;usability evaluation of handhel...
来源: 评论
Comparative Analysis of Machine Learning Application on Routing Protocols in FANET  13
Comparative Analysis of Machine Learning Application on Rout...
收藏 引用
13th International conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Jaiswal, Khushbu Kumar, Sudesh Rathore, Neeraj Kumar Indira Gandhi National Tribal University Department of Computer Science Madhya Pradesh Amarkantak484887 India
Flying ad hoc networks (FANET) are defined by their energetic topology and the absence of fixed infrastructure, which makes efficient routing an important challenge. Traditional routing protocols faced an indeed impos... 详细信息
来源: 评论