咨询与建议

限定检索结果

文献类型

  • 4,168 篇 会议
  • 59 册 图书
  • 37 篇 期刊文献

馆藏范围

  • 4,264 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,041 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,591 篇 软件工程
    • 636 篇 信息与通信工程
    • 509 篇 电气工程
    • 428 篇 控制科学与工程
    • 207 篇 生物工程
    • 163 篇 机械工程
    • 148 篇 生物医学工程(可授...
    • 142 篇 交通运输工程
    • 133 篇 动力工程及工程热...
    • 116 篇 电子科学与技术(可...
    • 97 篇 仪器科学与技术
    • 85 篇 建筑学
    • 85 篇 安全科学与工程
    • 82 篇 化学工程与技术
    • 70 篇 光学工程
    • 61 篇 土木工程
  • 908 篇 理学
    • 538 篇 数学
    • 219 篇 生物学
    • 143 篇 物理学
    • 142 篇 统计学(可授理学、...
    • 110 篇 系统科学
    • 98 篇 化学
  • 714 篇 管理学
    • 488 篇 管理科学与工程(可...
    • 288 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 115 篇 法学
    • 68 篇 社会学
  • 111 篇 医学
    • 98 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 78 篇 经济学
    • 78 篇 应用经济学
  • 61 篇 教育学
  • 43 篇 农学
  • 9 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 207 篇 cloud computing
  • 149 篇 distributed comp...
  • 117 篇 blockchain
  • 108 篇 internet of thin...
  • 101 篇 intelligent netw...
  • 95 篇 computational mo...
  • 93 篇 edge computing
  • 91 篇 artificial intel...
  • 86 篇 computer archite...
  • 73 篇 distributed data...
  • 71 篇 big data
  • 69 篇 servers
  • 62 篇 monitoring
  • 59 篇 wireless sensor ...
  • 55 篇 data models
  • 53 篇 intelligent syst...
  • 52 篇 data mining
  • 52 篇 protocols
  • 50 篇 computer network...
  • 49 篇 security

机构

  • 18 篇 university of ch...
  • 15 篇 key laboratory o...
  • 11 篇 state key labora...
  • 11 篇 institute of com...
  • 10 篇 wuhan university...
  • 10 篇 college of compu...
  • 10 篇 school of inform...
  • 9 篇 huazhong univers...
  • 9 篇 college of compu...
  • 9 篇 wuhan univ sci &...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 institutes for r...
  • 8 篇 hubei province k...
  • 8 篇 national univers...
  • 8 篇 hubei prov key l...
  • 7 篇 shandong provinc...
  • 7 篇 school of automa...
  • 7 篇 chitkara univers...
  • 7 篇 school of comput...

作者

  • 14 篇 hu rong
  • 12 篇 qian bin
  • 12 篇 shi zhongzhi
  • 9 篇 zhang tao
  • 9 篇 li peng
  • 9 篇 wang wei
  • 8 篇 liu yang
  • 8 篇 yang yang
  • 8 篇 pan linqiang
  • 8 篇 wu hongjie
  • 8 篇 wang chen
  • 8 篇 hu wei
  • 7 篇 yao wenbin
  • 7 篇 barolli leonard
  • 7 篇 xu xiaolong
  • 7 篇 chen yuehui
  • 7 篇 wang lihui
  • 7 篇 li wei
  • 7 篇 bao wenzheng
  • 6 篇 corchado juan m.

语言

  • 4,194 篇 英文
  • 55 篇 其他
  • 30 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=17th International Conference on Distributed Computing and Intelligent Technology"
4264 条 记 录,以下是3991-4000 订阅
排序:
the effect of a two-dimensional optical illusion pattern on the three-dimensional interpretation of objects using café wall "Illusion Blocks"  18th
The effect of a two-dimensional optical illusion pattern on ...
收藏 引用
18th international conference on Geometry and Graphics, ICGG 2018
作者: Ohtani, Tomoko Amanai, Daiki Maruya, Kazushi Art Media Center Tokyo University of the Arts 12-8 Ueno Park Taito-kuTokyo110-8714 Japan Shizuoka University of Art and Culture 2-1-1 Chuo Naka-ku Hamamatsu CityShizuoka430-8533 Japan Science and Core Technology Laboratory Group Nippon Telegraph and Telephone Corporation 3-1 Morinosato Wakamiya Atsugi-shiKanagawa243-0198 Japan
In this paper, we present a new method to utilize the workshops (WS) interpreting café wall illusions. As an example in which our proposed method worked effectively, we show that in a 3-dimensional (3D) scene, wh... 详细信息
来源: 评论
Exoskeleton Knee Extension Assist Suspension Brace for Reducing Joint Pain in Elderly Aged Population
Exoskeleton Knee Extension Assist Suspension Brace for Reduc...
收藏 引用
international conference on ent computing and Control Systems (ICICCS)
作者: K Nandhini V Nivetha R Sabari M.G. Sumithra S. Velmurugan Department of Biomedical Engineering Dr.N.G.P.Institute of Technology Coimbatore India
Knee joint is a complex joint which plays an important role in day-to-day life activities. A person with a healthy knee can able to walk freely without any pain in the knee joint but factors like ageing, osteoarthriti...
来源: 评论
A selective and biased choice of techniques for building a distributed data store  23
A selective and biased choice of techniques for building a d...
收藏 引用
Proceedings of the 17th ACM international conference on distributed and Event-based Systems
作者: Paweł Tomasz Wojciechowski Faculty of Computing and Telecommunications Institute of Computing Science Poznan University of Technology Poznań Poland
Single-machine data stores cannot support the scale and ubiquity of data today. the Internet applications and services must process a huge number of concurrent requests and events per second. So, they use distributed ... 详细信息
来源: 评论
New Hybrid Algorithm Implementation on spread Wireless Sensor to determine the point of fire in the building
New Hybrid Algorithm Implementation on spread Wireless Senso...
收藏 引用
international conference on Information technology, Computer and Electrical Engineering (ICITACEE)
作者: Irawan Dwi Wahyono Khoirudin Asfani Mohd Murtadha Mohamad HA Rosyid AN Afandi Aripriharta Universitas Negeri Malang Malang Indonesia
this research focused on developing accuracy to determine the fire point of a building using Wireless Sensor Network (WSN) which had been spread unevenly and in motion. At present, the constraints faced by WSN that ar... 详细信息
来源: 评论
A Healthcare Data Sharing Scheme Based on Homomorphic Encryption and Federated Metric Learning
A Healthcare Data Sharing Scheme Based on Homomorphic Encryp...
收藏 引用
intelligent computing and Human-Computer Interaction (ICHCI), international conference on
作者: Haoming Zhang Zhentao Liu Lang Wu Han Li School of Applied Science Beijing Information Science & Technology University Beijing China
Medical data is highly sensitive, often leading to “data silos” in sharing processes. To address this issue, this paper combines blockchain and federated metric learning technologies, and innovatively integrates the... 详细信息
来源: 评论
Researching of HLA-based Collaborative Simulation intelligent Evaluation System
Researching of HLA-based Collaborative Simulation Intelligen...
收藏 引用
Asian Simulation conference/the 6th international conference on system Simulation and Scientific computing
作者: GUO Bin, FAN Wenhui, XIONG Guangleng, SHI Hongen, CHANG Xiaomeng (CIMS/ERC, Tsinghua University, Beijing, China, 100084)
distributed simulation technology is evolving continually from early 1980 to the present day, and a series of specifications and protocols have been made. there are a number of research issues which are raised by HLA-... 详细信息
来源: 评论
Malware Classification by Using Deep Learning Framework  5th
Malware Classification by Using Deep Learning Framework
收藏 引用
5th international conference on Green technology and Sustainable Development, GTSD 2020
作者: Toai, Tran Kim Senkerik, Roman Hanh, Vo thi Xuan Zelinka, Ivan VSB-Technical University of Ostrava 17 Listopadu 15/2172 Ostrava-Poruba708 33 Czech Republic Faculty of Applied Informatics Tomas Bata University in Zlin T. G. Masaryka 5555 Zlin760 01 Czech Republic Faculty of Economics HCMC University of Technology and Education No. 1 Vo van Ngan Street Linh Chieu Ward Ho Chi Minh Viet Nam
In this paper, we propose an original deep learning framework for malware classifying based on the malware behavior data. Currently, machine learning techniques are becoming popular for classifying malware. However, m... 详细信息
来源: 评论
New service discovery algorithm based on DHT for mobile application
New service discovery algorithm based on DHT for mobile appl...
收藏 引用
IEEE Communications Society conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: De-gan Zhang Wen-bin Li Zhen Ma Key Laboratory of Computer Vision and System Ministry of Education China Tianiin Key Lab of Intelligent Computing & Novel software Technology Tianjin University of Technology China
In order to solve how to enhance the discovery efficiency and coverage, based on DHT (distributed Hash Table), we put forward a new algorithm of service discovery for mobile application. In traditional DHT discovery a... 详细信息
来源: 评论
the Ranking Peer for Hybrid Peer-to-Peer Real Time Video Streaming
The Ranking Peer for Hybrid Peer-to-Peer Real Time Video Str...
收藏 引用
international conference on Advanced Communication technology (ICACT)
作者: Ahmad Tajuddin Samsudin Nanna Suryana Herman Mat Kamil Awang Security Intelligent Application and Multimedia Program Research Division Telekom Research and Development Serdang Selangor Malaysia Faculty of Information Technology and Communication National Technical University College of Malaysia Ayer Keroh Malacca Japan
We present the design of a hybrid P2P system called BisinLUMS. In previous P2P systems, they are commonly recognized as a file sharing system that utilizes a download/upload mechanism to distribute content. In our P2P... 详细信息
来源: 评论
A Medical Pre-diagnosis Scheme Based on Neural Network and Inner Product Function Encryption
A Medical Pre-diagnosis Scheme Based on Neural Network and I...
收藏 引用
Electronic Communication and Artificial Intelligence (IWECAI), international Workshop on
作者: Xu Cui Hao Liu Min Tang Yihong Ma School of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and Computation Guilin University of Electronic Technology Guilin China Center for Applied Mathematics of Guangxi (GUET) Guilin China
Artificial neural networks are widely used in various fields, such as intelligent road networks, Internet of things, and smart medical systems due to their ability to process large amounts of data in parallel, store i...
来源: 评论