咨询与建议

限定检索结果

文献类型

  • 2,823 篇 会议
  • 50 篇 期刊文献
  • 46 册 图书

馆藏范围

  • 2,919 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,579 篇 工学
    • 1,302 篇 计算机科学与技术...
    • 692 篇 信息与通信工程
    • 641 篇 软件工程
    • 424 篇 电气工程
    • 79 篇 控制科学与工程
    • 74 篇 电子科学与技术(可...
    • 46 篇 仪器科学与技术
    • 43 篇 生物工程
    • 31 篇 动力工程及工程热...
    • 24 篇 生物医学工程(可授...
    • 23 篇 机械工程
    • 21 篇 网络空间安全
    • 20 篇 建筑学
    • 19 篇 光学工程
    • 17 篇 交通运输工程
    • 16 篇 安全科学与工程
  • 246 篇 理学
    • 102 篇 物理学
    • 94 篇 数学
    • 48 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 16 篇 系统科学
  • 244 篇 管理学
    • 188 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 82 篇 医学
    • 71 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
  • 36 篇 法学
    • 32 篇 社会学
  • 14 篇 教育学
    • 14 篇 教育学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 8 篇 文学
  • 4 篇 军事学
  • 1 篇 农学

主题

  • 314 篇 multimedia commu...
  • 257 篇 quality of servi...
  • 251 篇 streaming media
  • 238 篇 mobile computing
  • 232 篇 multimedia syste...
  • 183 篇 social networkin...
  • 170 篇 peer to peer com...
  • 167 篇 bandwidth
  • 165 篇 mobile communica...
  • 159 篇 protocols
  • 157 篇 cloud computing
  • 140 篇 computer network...
  • 129 篇 multimedia compu...
  • 126 篇 multimedia
  • 118 篇 next generation ...
  • 115 篇 computer archite...
  • 109 篇 internet
  • 106 篇 wireless network...
  • 105 篇 delay
  • 101 篇 computer science

机构

  • 53 篇 graduate institu...
  • 44 篇 department of co...
  • 31 篇 state key labora...
  • 31 篇 department of co...
  • 31 篇 natl taiwan univ...
  • 27 篇 natl taiwan univ...
  • 18 篇 institute of inf...
  • 17 篇 beijing univ pos...
  • 13 篇 faculty of compu...
  • 11 篇 wuhan univ natl ...
  • 11 篇 graduate institu...
  • 8 篇 beijing key labo...
  • 8 篇 acad sinica inst...
  • 8 篇 natl taiwan univ...
  • 8 篇 natl taiwan univ...
  • 8 篇 faculty of engin...
  • 8 篇 institute of inf...
  • 8 篇 wuhan univ sch c...
  • 8 篇 faculty of elect...
  • 8 篇 laboratory of mu...

作者

  • 26 篇 wu jan-jan
  • 26 篇 liu pangfeng
  • 20 篇 shih chi-sheng
  • 20 篇 pangfeng liu
  • 19 篇 ruimin hu
  • 19 篇 jan-jan wu
  • 18 篇 hu ruimin
  • 17 篇 kuo tei-wei
  • 13 篇 chu hao-hua
  • 13 篇 tei-wei kuo
  • 12 篇 tai-hoon kim
  • 11 篇 xu changqiao
  • 10 篇 chung-ming huang
  • 10 篇 hung yi-ping
  • 10 篇 zhang xi
  • 10 篇 hsu jane yung-je...
  • 9 篇 chan li-wei
  • 9 篇 shojiro nishio
  • 9 篇 pang ai-chun
  • 9 篇 lin ching-chi

语言

  • 2,879 篇 英文
  • 20 篇 中文
  • 18 篇 其他
  • 2 篇 葡萄牙文
检索条件"任意字段=Conference on Multimedia Computing and Networking"
2919 条 记 录,以下是191-200 订阅
排序:
Execution of Reconfiguration System on Chip Design for Internet of Things
Execution of Reconfiguration System on Chip Design for Inter...
收藏 引用
Advances in computing, Communication Control and networking (ICAC3N), International conference on
作者: Ipseeta Nanda J. Midhunchakkaravarthy Faculty of Computer Science and Multimedia Lincoln University College Kota Bharu Malaysia
To address the demand for additional resources on the DPR stands for dynamic partial reconfiguration and field programmable gate array. was introduced. PDR can alter the system’s efficiency and functioning to make ro... 详细信息
来源: 评论
A Non-normal Warning System for Dam Operation Using Machine Learning  24
A Non-normal Warning System for Dam Operation Using Machine ...
收藏 引用
24th IEEE/ACIS International Winter conference on Software Engineering, Artificial Intelligence, networking and Parallel/Distributed computing, SNPD 2022
作者: Chang, Meng-Wei Liu, I-Hsien Liu, Chuan-Kang Lin, Wei-Min Su, Zhi-Yuan Li, Jung-Shian Inst. Computer and Communication Engineering National Cheng Kung University Dept. of Electrical Engineering Tainan Taiwan National Chin-Yi University of Technology Dept. of Artificial Intelligence and Computer Engineering Taichung Taiwan Chia Nan University of Pharmacy and Science Dept. of Multimedia and Game Development Tainan71710 Taiwan
A country's critical infrastructures are heavily related to the quality of life and safety of the people. As a result, the security protection aspect of critical infrastructure has gained more and more attention n... 详细信息
来源: 评论
Comprehensive Examination of Depression Detection Through multimedia Content on Social Media Platforms
Comprehensive Examination of Depression Detection Through Mu...
收藏 引用
Cognitive computing in Engineering, Communications, Sciences and Biomedical Health Informatics (IC3ECSBHI), International conference on
作者: Chayan Preet Walia Priti Maheshwary Rabindranath Tagore University Bhopal India Department of Computer Science and Engineering Rabindranath Tagore University Bhopal India
Depression is a mental health disorder that causes persistent feelings of sadness, hopelessness, and a loss of interest or pleasure in activities that one used to enjoy. It can be caused by a combination of genetic, b... 详细信息
来源: 评论
The Impact of Social Media Exposure on Consumer Banking Decisions in Sri Lanka
The Impact of Social Media Exposure on Consumer Banking Deci...
收藏 引用
Advanced Research in computing (ICARC), International conference on
作者: Muditha L. Samarasinghe Amila S. Withanaarachchi Department of Industrial Management University of Kelaniya Kelaniya Sri Lanka
Social media (SM) has been a crucial medium for influencing Sri Lankan individuals, where financial institutions have increasingly felt the need to adopt SM marketing practices coupled with customer engagement. This s... 详细信息
来源: 评论
QoE Assessment of Cloud-Based Social Extended Reality Applications Over Heterogeneous Access Networks
QoE Assessment of Cloud-Based Social Extended Reality Applic...
收藏 引用
Consumer Communications and networking conference, CCNC IEEE
作者: Karan Mitra Henrique Souza Rossi Justin Gavrell Christer Åhlund Department of Computer Science Electrical and Space Engineering Pervasive and Mobile Computing Luleå University of Technology Skellefteå Sweden
The next generation of immersive applications, such as eXtended reality (XR), will likely be cloud-based and streamed over mobile networks using myriad technologies such as WiFi and 6th-generation mobile networks. Mob... 详细信息
来源: 评论
A BP -based Key Management Protocol for Data Sharing on Cloud Storage with Access Control  45
A BP -based Key Management Protocol for Data Sharing on Clou...
收藏 引用
45th International conference on Telecommunications and Signal Processing (TSP)
作者: Abi-Char, Pierre E. Amer Univ Middle East Coll Engn & Technol Egaila Kuwait
Cloud computing is an emerging technology, which provides a variety of services including computational platform, computational power, storage and applications. Many enterprises are gaining great benefits from cloud s... 详细信息
来源: 评论
Exploring Permission Control Flaws in Mini-apps
Exploring Permission Control Flaws in Mini-apps
收藏 引用
IEEE International conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Jun Li Yuting Zhang Wu Zhou Shengzhi Zhang Department of Computer Science Metropolitan College Boston University Boston MA USA Meta Platforms Menlo Park CA USA
Mini-apps, running within super apps like WeChat, Snapchat, Telegram, etc., have become quite popular these years, expanding the capability of super apps to offer almost any functionality users might desire in their d... 详细信息
来源: 评论
A Study of Fake News Detection Using Machine Learning Techniques
A Study of Fake News Detection Using Machine Learning Techni...
收藏 引用
computing, Sciences and Communications (ICCSC), International conference on
作者: Shailja Bhardwaj Akash Sanghi Y.D.S. Arya Gaurav Agarwal Anshika Agarwal Department of CSE Invertis University Bareilly India Department of Information Technology ABES Engineering College Ghaziabad India
The number of people using the Internet has significantly expanded due to the advancement of information and communication technology. It converts people's conventional news and information consumption habits into... 详细信息
来源: 评论
Image Cryptography using AES-256 Algorithm
Image Cryptography using AES-256 Algorithm
收藏 引用
Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC), International conference on
作者: Taniska Chandel Ninad Gangodkar Abhiraj Gautam Yogesh Lohumi Mohd Rehan Ghazi Ashtha Goyal Department of Computer Science and Engineering Graphic Era (Deemed to be) University Dehradun India School of Computing Graphic Era Hill University Dehradun India
Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing use of social networking, ... 详细信息
来源: 评论
Beyond Search: A Network-Based Exploration of Buyer Behavior in the OLX Car Market
Beyond Search: A Network-Based Exploration of Buyer Behavior...
收藏 引用
multimedia Processing, Communication & Information Technology (MPCIT), International conference on
作者: Y. Moin Ashvath Ramya G R Department of Computer Science and Engineering Amrita School of Computing Coimbatore India
The information on used cars offers a thorough analysis of the second-hand car industry. This dataset may be utilized to construct predictive models that can estimate the price of a used car based on its characteristi... 详细信息
来源: 评论