咨询与建议

限定检索结果

文献类型

  • 1,189 篇 会议
  • 36 篇 期刊文献

馆藏范围

  • 1,225 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 769 篇 工学
    • 689 篇 计算机科学与技术...
    • 347 篇 软件工程
    • 234 篇 电气工程
    • 94 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 28 篇 生物工程
    • 26 篇 网络空间安全
    • 24 篇 机械工程
    • 22 篇 光学工程
    • 20 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 12 篇 生物医学工程(可授...
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 6 篇 电子科学与技术(可...
  • 142 篇 管理学
    • 100 篇 管理科学与工程(可...
    • 54 篇 工商管理
    • 35 篇 图书情报与档案管...
  • 116 篇 理学
    • 66 篇 数学
    • 32 篇 生物学
    • 27 篇 物理学
    • 16 篇 系统科学
    • 13 篇 统计学(可授理学、...
    • 10 篇 化学
  • 12 篇 医学
    • 11 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 10 篇 法学
    • 6 篇 社会学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 7 篇 文学
    • 7 篇 新闻传播学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 军事学
  • 1 篇 农学

主题

  • 119 篇 computer archite...
  • 105 篇 cloud computing
  • 90 篇 enterprise archi...
  • 84 篇 distributed comp...
  • 71 篇 business
  • 69 篇 unified modeling...
  • 63 篇 object detection
  • 59 篇 web services
  • 49 篇 computational mo...
  • 46 篇 analytical model...
  • 41 篇 information syst...
  • 40 篇 object oriented ...
  • 40 篇 service oriented...
  • 40 篇 organizations
  • 38 篇 context
  • 34 篇 ontologies
  • 31 篇 companies
  • 30 篇 software
  • 30 篇 collaboration
  • 29 篇 computer science

机构

  • 11 篇 university of tw...
  • 7 篇 federal universi...
  • 5 篇 institute of arc...
  • 5 篇 univ st gallen i...
  • 5 篇 rhein westfal th...
  • 5 篇 reutlingen univ ...
  • 5 篇 inesc id informa...
  • 5 篇 bizzdesign ensch...
  • 5 篇 digital enterpri...
  • 4 篇 novay enschede
  • 4 篇 department of co...
  • 4 篇 secure business ...
  • 4 篇 department of in...
  • 4 篇 department of in...
  • 4 篇 department of au...
  • 4 篇 royal inst techn...
  • 4 篇 tata consultancy...
  • 3 篇 htw aalen busine...
  • 3 篇 chinese academy ...
  • 3 篇 chair of softwar...

作者

  • 16 篇 johnson pontus
  • 14 篇 schmidt rainer
  • 13 篇 van sinderen mar...
  • 13 篇 almeida joao pau...
  • 11 篇 matthes florian
  • 10 篇 ekstedt mathias
  • 10 篇 lagerstrom rober...
  • 9 篇 florian matthes
  • 8 篇 christian m. sch...
  • 8 篇 rainer schmidt
  • 8 篇 atkinson colin
  • 8 篇 schweda christia...
  • 8 篇 kutvonen lea
  • 8 篇 guizzardi gianca...
  • 7 篇 nurcan selmin
  • 7 篇 colin atkinson
  • 7 篇 franke ulrik
  • 7 篇 zimmermann alfre...
  • 6 篇 quartel dick
  • 6 篇 sandkuhl kurt

语言

  • 1,215 篇 英文
  • 9 篇 其他
  • 1 篇 丹麦文
检索条件"任意字段=9th IEEE International Enterprise Distributed Object Computing Conference"
1225 条 记 录,以下是111-120 订阅
排序:
Vehicle-mounted Early Warning System Based on Edge Intelligence  9
Vehicle-mounted Early Warning System Based on Edge Intellige...
收藏 引用
9th international conference on Advanced Cloud and Big Data, CBD 2021
作者: Gu, Yifeng Zhang, Zhenghua Hong, Qingqing Yangzhou University Information Engineering College Yangzhou City China
With the steady development of the social economy, the number of motor vehicles has increased rapidly. the number of traffic accidents continues to rise, and fatigue driving is one of the key factors leading to freque... 详细信息
来源: 评论
CoCV: Heterogeneous Processors Collaboration Mechanism for End-to-End Execution of Intelligent Computer Vision Tasks on Mobile Devices  29
CoCV: Heterogeneous Processors Collaboration Mechanism for E...
收藏 引用
29th ieee international conference on Parallel and distributed Systems, ICPADS 2023
作者: Wan, Ye Liu, Mengyang Li, Guangtong Dong, Fang Southeast University School of Computer Science and Engineering Nanjing China
object detection, image classification, and various other computer vision tasks have become prevalent on mobile devices. these computer vision tasks are typically executed with three stages: pre-processing, inference,... 详细信息
来源: 评论
Social Distance Monitoring Using object Detection and Tracking Techniques in the Era of COVID-19  9
Social Distance Monitoring Using Object Detection and Tracki...
收藏 引用
9th international conference on Information, Cybernetics, and Computational Social Systems, ICCSS 2023
作者: Wang, Bingshu Chang, Ruofan Wang, Ze Feng, Shuang Zhang, Chuanbin School of Software Northwestern Polytechnical University Xi'an710129 China School of Applied Mathematics Beijing Normal University Zhuhai519087 China University of Macau Faculty of Science and Technology 999078 China
the COVID-19 has been posing threats to peoples health around the world due to its simple transmission route, strong mutation ability, and high infection. Currently, the superb vaccine breakthrough ability of mutant s... 详细信息
来源: 评论
object Oriented Fuzzy Decision Model for Insurance Claim
Object Oriented Fuzzy Decision Model for Insurance Claim
收藏 引用
international conference on computing, Engineering, and Design (ICCED)
作者: Sumiatie Susanto Ditdit Nugeraha Utama Computer Science Department BINUS Graduate Program Master of Computer Science Bina Nusantara University Jakarta Indonesia
the insurance industry faces a significant challenge concerning insurance claims, particularly due to the prevalence of fraudulent insurance claims. To address this issue, one potential solution is the implementation ...
来源: 评论
Quarks: A Secure and Decentralized Blockchain-Based Messaging Network
Quarks: A Secure and Decentralized Blockchain-Based Messagin...
收藏 引用
ieee international conference on Cyber Security and Cloud computing (CSCloud)
作者: Mirza K. B. Shuhan Tariqul Islam Enam A. Shuvo Faisal H. Bappy Kamrul Hasan Carlos Caicedo Software Research & Engineering bKash Limited Dhaka Bangladesh School of Information Studies (iSchool) Syracuse University Syracuse NY USA School of Computing Asia Pacific University of Technology and Innovation Kuala Lumpur Malaysia Tennessee State University Nashville TN USA
Over the past two decades, the popularity of messaging systems has increased both in enterprise and consumer level. Many of these systems used secure protocols like end-to-end encryption to ensure strong security feat...
来源: 评论
A Prediction Method for the Industry of an enterprise Based on Knowledge Graph Completion Technology
A Prediction Method for the Industry of an Enterprise Based ...
收藏 引用
ieee international conference on Cloud computing and Big Data Analysis (ICCCBDA)
作者: Dezhi Kong Min Tan Yang Cao Dingding Li CETC Big Data Research Institute Co. Ltd. Guiyang city China
this article proposes a method based on knowledge graph completion technology, aiming to achieve accurate prediction of the industry to which the enterprise belongs. this method first constructs an enterprise knowledg... 详细信息
来源: 评论
Empowering the Blind: AI-Assisted Solutions for Visually Impaired People  9
Empowering the Blind: AI-Assisted Solutions for Visually Imp...
收藏 引用
9th ieee international Smart Cities conference, ISC2 2023
作者: Oureshi, Muhammad Shuaib Khan, Inam Ullah Qureshi, SMuhammad Bilal Khan, Fida Muhammad Aleshaiker, Sama Chungnam National University Department of Computer Engineering Daejeon Korea Republic of University of Lakki Marwat Department of Computer Science & It KPK Pakistan University of Science & Technology Department of Computer Science Bannu Pakistan School of Computing and Engineering University of West London United Kingdom
Physical disability has an influence on individuals everywhere. One of these disabilities that significantly affect a large number of individuals is visual loss. Basic mobility problems, including as crossing the stre... 详细信息
来源: 评论
A Compilation-and Remote-Programming-as-a-Service Platform for IoT Devices  12
A Compilation-and Remote-Programming-as-a-Service Platform f...
收藏 引用
12th ieee international conference on Joint Cloud computing (ieee JCC) / 9th ieee international conference on Mobile Cloud computing, Services, and Engineering (ieee MobileCloud)
作者: Charalampidis, Pavlos Fragkiadakis, Alexandros Fdn Res & Technol Hellas FORTH ICS Inst Comp Sci Iraklion Greece Hellen Open Univ Sch Sci & Technol Patras Greece
the Internet-of-things (IoT) presents itself as an emerging technology, which is able to interconnect a massive number of heterogeneous smart objects. these ubiquitous object-enabled networks, which may operate for se... 详细信息
来源: 评论
A formal approach for secured risk analysis in information security management  9
A formal approach for secured risk analysis in information s...
收藏 引用
9th ieee international conference on Behavioural and Social computing, BESC 2022
作者: Zenitani, Kengo Tokyo Institute of Technology School of Computing Department of Mathematical and Computing Science Tokyo Japan
Information security management is a managerial activity that tries to keep the level of the information security risk of an enterprise under some acceptable level. the process requires the iteration of information se... 详细信息
来源: 评论
Research on Fast Adaptive Transmission Models for international Inland Port Based on Edge Intelligence
Research on Fast Adaptive Transmission Models for Internatio...
收藏 引用
ieee international conference on Cyber Security and Cloud computing (CSCloud)
作者: Liu Yiwen Zhu Zhirong Tangyan Wen Wenkan Peng Xiaoning Shi Yuanquan School of Computer and Artificial Intelligence Huaihua University Huaihua Hunan P. R. China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing Application in Hunan Province Universities Huaihua Hunan P. R. China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua Hunan P. R. China
In this paper, we propose a logistics international Inland Port resource allocation method based on intelligent edge scheduling, and we do a reasonable pre-allocation of logistics resources by building an edge network...
来源: 评论