咨询与建议

限定检索结果

文献类型

  • 4,156 篇 会议
  • 63 册 图书
  • 37 篇 期刊文献

馆藏范围

  • 4,256 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,032 篇 工学
    • 2,562 篇 计算机科学与技术...
    • 1,590 篇 软件工程
    • 632 篇 信息与通信工程
    • 505 篇 电气工程
    • 427 篇 控制科学与工程
    • 207 篇 生物工程
    • 162 篇 机械工程
    • 148 篇 生物医学工程(可授...
    • 142 篇 交通运输工程
    • 133 篇 动力工程及工程热...
    • 115 篇 电子科学与技术(可...
    • 97 篇 仪器科学与技术
    • 85 篇 建筑学
    • 85 篇 安全科学与工程
    • 82 篇 化学工程与技术
    • 69 篇 光学工程
    • 61 篇 土木工程
  • 904 篇 理学
    • 534 篇 数学
    • 219 篇 生物学
    • 142 篇 统计学(可授理学、...
    • 141 篇 物理学
    • 110 篇 系统科学
    • 98 篇 化学
  • 713 篇 管理学
    • 487 篇 管理科学与工程(可...
    • 288 篇 图书情报与档案管...
    • 244 篇 工商管理
  • 115 篇 法学
    • 68 篇 社会学
  • 111 篇 医学
    • 98 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 78 篇 经济学
    • 78 篇 应用经济学
  • 61 篇 教育学
  • 43 篇 农学
  • 9 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 205 篇 cloud computing
  • 149 篇 distributed comp...
  • 117 篇 blockchain
  • 108 篇 internet of thin...
  • 101 篇 intelligent netw...
  • 95 篇 computational mo...
  • 94 篇 artificial intel...
  • 90 篇 edge computing
  • 86 篇 computer archite...
  • 73 篇 distributed data...
  • 71 篇 big data
  • 69 篇 servers
  • 62 篇 monitoring
  • 59 篇 wireless sensor ...
  • 54 篇 data models
  • 53 篇 intelligent syst...
  • 52 篇 data mining
  • 51 篇 protocols
  • 50 篇 computer network...
  • 48 篇 security

机构

  • 18 篇 university of ch...
  • 15 篇 key laboratory o...
  • 11 篇 state key labora...
  • 11 篇 institute of com...
  • 10 篇 wuhan university...
  • 10 篇 college of compu...
  • 10 篇 school of inform...
  • 9 篇 huazhong univers...
  • 9 篇 college of compu...
  • 9 篇 wuhan univ sci &...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 institutes for r...
  • 8 篇 hubei province k...
  • 8 篇 national univers...
  • 8 篇 hubei prov key l...
  • 7 篇 shandong provinc...
  • 7 篇 school of automa...
  • 7 篇 chitkara univers...
  • 7 篇 school of comput...

作者

  • 14 篇 hu rong
  • 12 篇 qian bin
  • 12 篇 shi zhongzhi
  • 9 篇 zhang tao
  • 9 篇 li peng
  • 9 篇 wang wei
  • 8 篇 liu yang
  • 8 篇 yang yang
  • 8 篇 pan linqiang
  • 8 篇 wu hongjie
  • 8 篇 wang chen
  • 8 篇 hu wei
  • 7 篇 yao wenbin
  • 7 篇 barolli leonard
  • 7 篇 xu xiaolong
  • 7 篇 chen yuehui
  • 7 篇 wang lihui
  • 7 篇 xin wang
  • 7 篇 li wei
  • 7 篇 bao wenzheng

语言

  • 4,194 篇 英文
  • 47 篇 其他
  • 30 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=17th International Conference on Distributed Computing and Intelligent Technology"
4256 条 记 录,以下是4181-4190 订阅
排序:
A Spark-based distributed Dragonfly Algorithm for Feature Selection
A Spark-based Distributed Dragonfly Algorithm for Feature Se...
收藏 引用
international conference on Computer Science & Education (ICCSE)
作者: Hongwei Chen Dongqiang Liu Lin Han Shuyu Yao Congyuan Jin Xiang Hu School of Computer Science Hubei University of Technology Wuhan China Wuhan Fiberhome Technical ServicesCo. Ltd Wuhan China Fiberhome Telecommunication Technologies Co. Ltd Wuhan China
Dragonfly algorithm is an intelligent group optimization algorithm. In this paper, dragonfly algorithm is well used in the field of feature selection. However, dragonfly algorithm has the problem of falling into local... 详细信息
来源: 评论
Adaptive Gateway Traffic Scheduling Algorithm Based on Multidimensional Information
Adaptive Gateway Traffic Scheduling Algorithm Based on Multi...
收藏 引用
international conference on Computer and Communications (ICCC)
作者: Jinlong Li Junming Liu Jiaxin Lu Zhiyang Lu Shenyang Institute of Computing Technology Chinese Academy of Science University of Chinese Academy of Science Shenyang China
In this paper, an adaptive gateway traffic scheduling algorithm based on multi-dimensional information is proposed to solve the load balancing problem in high concurrency scenarios. the algorithm considers the three d... 详细信息
来源: 评论
A DISCRIMINATIVE NULL SPACE BASED DEEP LEARNING APPROACH FOR PERSON RE-IDENTIFICATION
A DISCRIMINATIVE NULL SPACE BASED DEEP LEARNING APPROACH FOR...
收藏 引用
2016 4th IEEE international conference on Cloud computing and Intelligence Systems(IEEE CCIS2016)
作者: Shuangqun Li Xinchen Liu Wu Liu Huadong Ma Haitao Zhang Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications
Person re-identification across multiple camera views is a rather challenging task due to various view points, illuminations, backgrounds and poses. How to extract discriminative features is the most critical way to o... 详细信息
来源: 评论
Convergent radio and fibre access architectures using low-energy systems
Convergent radio and fibre access architectures using low-en...
收藏 引用
international conference on Transparent Optical Networks
作者: Carlos Bock Sergi Figuerola Michael C. Parker Terence Quinlan Stuart D. Walker Distributed Applications and Networks Area Fundació i2CAT Barcelona Spain School of Computer Science and Electronic Engineering University of Essex Colchester UK
this paper presents an innovative high-bandwidth access network architecture that offers transparent transport services for fixed and mobile applications. Key to this is the development of a high-functionality, low-en... 详细信息
来源: 评论
A New-generation Nuclear Power Industrial Internet Platform Based on Cloud-Edge-Terminal Network Architecture
A New-generation Nuclear Power Industrial Internet Platform ...
收藏 引用
Digital Twins and Parallel Intelligence (DTPI), IEEE international conference on
作者: Ying Gang Jing Hao Liu Min Min Cheng Huajian Fang Kui Xu Yang Lan CNNC Key Laboratory on Nuclear Industry Simulation China Nuclear Power Operation Technology Corporation Ltd. Wuhan China School of Electrical Engineering and Automation Wuhan University Wuhan China CNNC Key Laboratory on Nuclear Industry Simulation China Nuclear Power Operation Technology Corporation Wuhan China
To address the major challenges in the development of the nuclear power industrial internet—prominent industry barriers, inconsistent data standards, and high security and control risks, this paper proposes a solutio... 详细信息
来源: 评论
An Empirical Evaluation of Deep Neural Networks in Federated Learning
An Empirical Evaluation of Deep Neural Networks in Federated...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Xiaotong Wu Zilong Xue Lingling Shen School of Computer and Electronic Information Nanjing Normal University Nanjing China State Key Laboratory of Novel Software Technology Nanjing University China
With the fast development of artificial intelligence (e.g., deep learning), it brings the new opportunities and challenges for business management and service optimization of the business process management. However, ... 详细信息
来源: 评论
High performance cache block replication using re-reference probability in CMPs
High performance cache block replication using re-reference ...
收藏 引用
international conference on High Performance computing
作者: Jinglei Wang Dongsheng Wang Haixia Wang Yibo Xue Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China
In a Chip Multiprocessor(CMP) with shared caches, the last level cache (LLC) is distributed across all the cores. this increases the on-chip communication delay and thus influence the pr ocessor's performance. the... 详细信息
来源: 评论
Research on Security Assessment Model of Water Supply System Based on Leakage Control
Research on Security Assessment Model of Water Supply System...
收藏 引用
2011 2nd international conference on Challenges in Environmental Science and Computer Engineering(CESCE 2011)
作者: Li Hong wei Li Yan jing Wenyan Wu Lu Mou Department of Environmental and Municipal Engineering Qingdao Technological University Utility Department CPECC East-China Design Branch Faculty of Computing Engineering and Technology Staffordshire University
Based on the characteristics of urban water supply system, the urban pipe network security assessment system was established, and then AHP method combined with fuzzy evaluation was used to carry out a comprehensive se... 详细信息
来源: 评论
Research on Security Assessment Model of Water Supply System Based on Leakage Control
Research on Security Assessment Model of Water Supply System...
收藏 引用
2011 international conference on Energy and Environment(ICEE 2011)
作者: Li Hong wei Li Yan jing Wenyan Wu Lu Mou Department of Environmental and Municipal Engineering Qingdao Technological University Utility Department CPECC East-China Design Branch Faculty of Computing Engineering and Technology Staffordshire University
Based on the characteristics of urban water supply system, the urban pipe network security assessment system was established, and then AHP method combined with fuzzy evaluation was used to carry out a comprehensive se... 详细信息
来源: 评论
Welcome to NRSC 2023 at Arab Academy for Science and technology (AASTMT), Smart Village Branch, Giza, Egypt
National Radio Science Conference, NRSC, Proceedings
收藏 引用
National Radio Science conference, NRSC, Proceedings 2023年 2023-May卷 X页
来源: 评论