咨询与建议

限定检索结果

文献类型

  • 160 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 162 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 100 篇 工学
    • 79 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 33 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 15 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 6 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 5 篇 生物工程
    • 4 篇 机械工程
    • 4 篇 材料科学与工程(可...
    • 3 篇 光学工程
    • 3 篇 石油与天然气工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 安全科学与工程
  • 55 篇 理学
    • 39 篇 数学
    • 10 篇 物理学
    • 10 篇 系统科学
    • 7 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 5 篇 化学
  • 32 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 9 篇 工商管理
    • 4 篇 公共管理
  • 5 篇 医学
    • 4 篇 公共卫生与预防医...
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 文学

主题

  • 10 篇 feature extracti...
  • 6 篇 accuracy
  • 5 篇 global positioni...
  • 5 篇 optimization
  • 5 篇 computational mo...
  • 5 篇 genetic algorith...
  • 5 篇 data models
  • 4 篇 deep learning
  • 4 篇 noise
  • 4 篇 artificial neura...
  • 4 篇 computer vision
  • 4 篇 training
  • 3 篇 conferences
  • 3 篇 decision support...
  • 3 篇 information mana...
  • 3 篇 data mining
  • 3 篇 handheld compute...
  • 3 篇 semantics
  • 3 篇 correlation
  • 3 篇 federated learni...

机构

  • 6 篇 maharishi school...
  • 4 篇 centre of interd...
  • 3 篇 school of electr...
  • 2 篇 huazhong univers...
  • 2 篇 publ univ navarr...
  • 2 篇 school of mechan...
  • 2 篇 department of ma...
  • 2 篇 school of comput...
  • 2 篇 department of in...
  • 2 篇 vishwakarma inst...
  • 2 篇 univ zaragoza ar...
  • 2 篇 graduate school ...
  • 2 篇 school of inform...
  • 2 篇 electronic infor...
  • 2 篇 department of in...
  • 2 篇 vivekananda glob...
  • 2 篇 tianjin universi...
  • 2 篇 college of infor...
  • 2 篇 college of compu...
  • 2 篇 institute of app...

作者

  • 2 篇 min hu
  • 2 篇 serrano l.
  • 2 篇 sonia
  • 2 篇 leibnitz kenji
  • 2 篇 wakamiya naoki
  • 2 篇 martinez-espronc...
  • 2 篇 trigo j.
  • 2 篇 bo chen
  • 2 篇 martinez i.
  • 2 篇 yanqiu li
  • 2 篇 jie chen
  • 2 篇 antonopoulos nic...
  • 2 篇 fuji ren
  • 2 篇 garcia j.
  • 2 篇 xiaohua wang
  • 2 篇 escayola j.
  • 2 篇 chen jie
  • 2 篇 murata masayuki
  • 2 篇 liangfeng xu
  • 1 篇 tripathi manish ...

语言

  • 155 篇 英文
  • 7 篇 其他
检索条件"任意字段=3rd International Multi-Conference on Computing in the Global Information Technology, ICCGI 2008"
162 条 记 录,以下是1-10 订阅
排序:
Proceedings - The 3rd international multi-conference on computing in the global information technology, iccgi 2008 in Conjunction with ComP2P 2008: The 1st international Workshop on Computational P2P Networks: Theory and Practice
Proceedings - The 3rd International Multi-Conference on Comp...
收藏 引用
3rd international multi-conference on computing in the global information technology, iccgi 2008
The proceedings contain 48 papers. The topics discussed include: intelligent store - an innovative technological solution for retail activities with mobile access;on designing an asynchronous and dynamic platform for ...
来源: 评论
Low Resolution Deepfake Face Detection using multi-Scale Discrete Cosine Transform and Vision Transformer  3
Low Resolution Deepfake Face Detection using Multi-Scale Dis...
收藏 引用
3rd international conference on Intelligent Systems, Advanced computing, and Communication, ISACC 2025
作者: Uddin, Main Fu, Zhangjie Zhang, Xiang Arnob, Abu Bakor Hayat Nanjing University of Information Science and Technology School of Computer Science Nanjing China Nanjing University of Information Science and Technology School of Artificial Intelligence Nanjing China
Deepfake technology uses generative adversarial networks to produce highly authentic counterfeit images and videos, which raises a significant global security concern by disseminating fake information through online p... 详细信息
来源: 评论
An iterated greedy algorithm based on NSGA-II for distributed hybrid flow shop scheduling problem  3
An iterated greedy algorithm based on NSGA-II for distribute...
收藏 引用
3rd international conference on Communications, information System, and Data Science, CISDS 2024
作者: Liu, Dandan Liang, Xu Zou, Zhiyuan School of Computing Beijing Information Science and Technology University Beijing China
The distributed hybrid flow shop scheduling problems (DHFSP) widely exist in various industrial production processes, and thus have received widespread attention. However, studies on HFSP considering green objective i... 详细信息
来源: 评论
Hybrid Quantum Approximate Optimization Algorithm (HQAOA) for Efficient Blockchain Transaction Scheduling  3
Hybrid Quantum Approximate Optimization Algorithm (HQAOA) fo...
收藏 引用
3rd international conference on Intelligent Systems, Advanced computing, and Communication, ISACC 2025
作者: Paul, Soumyadip Chakraborty, Sarit Government College of Engg. & Ceramic Technology Dept. Of Information Technology WB Kolkata 700010 India Government College of Engineering and Leather Technology Dept. of Computer Science and Engineering WB Kolkata 700106 India
Quantum technology offers a transformative approach to solving complex computational challenges in decentralized systems, particularly in blockchain transaction scheduling. Efficient transaction scheduling is critical... 详细信息
来源: 评论
multi-scale Feature Fusion for Enhanced Person Re-identification  3rd
Multi-scale Feature Fusion for Enhanced Person Re-identific...
收藏 引用
3rd international conference on Machine Learning, Cloud computing and Intelligent Mining, MLCCIM 2024
作者: Wang, XiaoHui Sun, Yulin Zou, Zhipeng Liang, Xiaoyang Sun, Zhenyu Liu, Wei Shandong Business Institute Yantai China Shandong Xuewen Information Technology Co. Ltd. Jining China Technology of Computer Application Yantai Engineering and Technology College Yantai China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou China
In the realm of surveillance and security, person re-identification (Re-ID) stands as a critical challenge, particularly across non-overlapping camera networks. The essence of this challenge lies in the accurate and e... 详细信息
来源: 评论
Proc. - The 3rd Int. multi-Conf. computing in the global information technology, iccgi 2008 in Conjunction with ComP2P 2008: The 1st Int. Workshop on Computational P2P Networks: Theory and Practice: Preface
Proc. - The 3rd Int. Multi-Conf. Computing in the Global Inf...
收藏 引用
Proc. - The 3rd Int. multi-Conf. computing in the global information technology, iccgi 2008 in Conjunction with ComP2P 2008: The 1st Int. Workshop on Computational P2P Networks: Theory and Practice 2008年 x-xi页
作者: Paleologu, Constantin El-Bawab, Tarek S. Noll, Josef Antonopoulos, Nick Bi, Jun Jiang, Guorui Delic, Kemal A. Roman, Dumitru Dantas, Simone Serrelis, Emmanouil Karwaczynski, Piotr Badica, Costin Wei, Hoo Chong Shah, Rahul Pentikousis, Kostas Alachaher, Leila Nemmiche Boyle, David Liotta, Antonio Dini, Oana
No abstract available
来源: 评论
U-SwinTrans: Automated Skin Lesion Segmentation Using Swin Transformer  3
U-SwinTrans: Automated Skin Lesion Segmentation Using Swin T...
收藏 引用
3rd international conference on Intelligent Systems, Advanced computing, and Communication, ISACC 2025
作者: Sharma, Aaditya Lochan Sharma, Kalpana Srivastava, Utkarsh Prakash Ghosal, Palash Sikkim Manipal University Sikkim Manipal Institute of Technology Department of Computer Science and Engineering Sikkim India New York University Dept of Electrical and Computer Engineering New York United States Sikkim Manipal University Sikkim Manipal Institute of Technology Department of Information Technology Sikkim India
Skin lesions are difficult to segment because of their different shapes, sizes, colors, and textures. While Convolutional Neural Networks (CNNs) have proven effective at medical image segmentation, typical U-shaped ne... 详细信息
来源: 评论
Low Resolution Deepfake Face Detection using multi-Scale Discrete Cosine Transform and Vision Transformer
Low Resolution Deepfake Face Detection using Multi-Scale Dis...
收藏 引用
international Symposium on Advanced computing and Communication (ISACC)
作者: Main Uddin Zhangjie Fu Xiang Zhang Abu Bakor Hayat Arnob School of Computer Science Nanjing University of Information Science and Technology Nanjing China School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing China
Deepfake technology uses generative adversarial networks to produce highly authentic counterfeit images and videos, which raises a significant global security concern by disseminating fake information through online p... 详细信息
来源: 评论
Leveraging Cloud-Based Deep Learning for Cardiovascular Diseases Prediction: Challenges and Solutions
Leveraging Cloud-Based Deep Learning for Cardiovascular Dise...
收藏 引用
Advancements in Electrical, Electronics, Communication, computing and Automation (ICAECA), international conference on
作者: S. Kanagaraj Department of Information Technology Kumaraguru College of Technology Coimbatore India
Cardiovascular diseases CVDs are a growing threat to global mortality therefore the need for accurate early prediction of diseases is imperative to improve patient outcome. The cloud-based deep learning model provides... 详细信息
来源: 评论
Hybrid Quantum Approximate Optimization Algorithm (HQAOA) for Efficient Blockchain Transaction Scheduling
Hybrid Quantum Approximate Optimization Algorithm (HQAOA) fo...
收藏 引用
international Symposium on Advanced computing and Communication (ISACC)
作者: Soumyadip Paul Sarit Chakraborty Dept. Of Information Technology Government College of Engg. & Ceramic Technology Kolkata WB India Dept. of Computer Science and Engineering Government College of Engineering and Leather Technology Kolkata WB India
Quantum technology offers a transformative approach to solving complex computational challenges in decentralized systems, particularly in blockchain transaction scheduling. Efficient transaction scheduling is critical... 详细信息
来源: 评论