咨询与建议

限定检索结果

文献类型

  • 18,449 篇 会议
  • 161 篇 期刊文献
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 18,621 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 10,598 篇 工学
    • 8,380 篇 计算机科学与技术...
    • 4,899 篇 信息与通信工程
    • 4,598 篇 软件工程
    • 2,321 篇 电气工程
    • 1,047 篇 控制科学与工程
    • 680 篇 电子科学与技术(可...
    • 468 篇 机械工程
    • 462 篇 生物工程
    • 388 篇 光学工程
    • 347 篇 仪器科学与技术
    • 297 篇 动力工程及工程热...
    • 295 篇 生物医学工程(可授...
    • 221 篇 网络空间安全
    • 219 篇 交通运输工程
    • 201 篇 建筑学
    • 180 篇 土木工程
    • 175 篇 安全科学与工程
    • 135 篇 材料科学与工程(可...
  • 2,665 篇 理学
    • 1,605 篇 数学
    • 574 篇 物理学
    • 511 篇 统计学(可授理学、...
    • 484 篇 生物学
    • 299 篇 系统科学
    • 187 篇 化学
  • 1,834 篇 管理学
    • 1,403 篇 管理科学与工程(可...
    • 506 篇 图书情报与档案管...
    • 445 篇 工商管理
  • 468 篇 医学
    • 396 篇 临床医学
    • 176 篇 基础医学(可授医学...
  • 181 篇 法学
    • 144 篇 社会学
  • 133 篇 经济学
  • 98 篇 农学
  • 50 篇 教育学
  • 50 篇 文学
  • 47 篇 军事学
  • 15 篇 艺术学

主题

  • 2,398 篇 computer network...
  • 1,648 篇 local area netwo...
  • 1,178 篇 wireless sensor ...
  • 898 篇 neural networks
  • 868 篇 protocols
  • 843 篇 computer science
  • 840 篇 bandwidth
  • 800 篇 throughput
  • 753 篇 computer archite...
  • 679 篇 routing
  • 665 篇 delay
  • 641 篇 wireless lan
  • 610 篇 telecommunicatio...
  • 593 篇 wireless network...
  • 549 篇 network topology
  • 486 篇 computational mo...
  • 466 篇 ip networks
  • 454 篇 quality of servi...
  • 437 篇 ad hoc networks
  • 435 篇 feature extracti...

机构

  • 85 篇 chitkara univers...
  • 37 篇 school of comput...
  • 34 篇 school of comput...
  • 30 篇 graphic era deem...
  • 29 篇 computer science...
  • 28 篇 department of co...
  • 27 篇 ieee
  • 26 篇 department of co...
  • 23 篇 school of comput...
  • 22 篇 shandong provinc...
  • 22 篇 institute of com...
  • 22 篇 department of el...
  • 22 篇 department of el...
  • 19 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 computer science...
  • 18 篇 department of co...
  • 18 篇 university of ch...
  • 17 篇 school of electr...
  • 17 篇 department of co...

作者

  • 54 篇 kukreja vinay
  • 35 篇 jayasumana anura...
  • 31 篇 anon
  • 30 篇 shiva mehta
  • 30 篇 boukerche azzedi...
  • 27 篇 akkaya kemal
  • 26 篇 hossam s. hassan...
  • 22 篇 hollick matthias
  • 22 篇 matthias hollick
  • 20 篇 damla turgut
  • 19 篇 p. martini
  • 18 篇 hassanein hossam...
  • 18 篇 mohamed younis
  • 16 篇 vats satvik
  • 15 篇 turgut damla
  • 14 篇 m. gerla
  • 14 篇 younis mohamed
  • 14 篇 wu jie
  • 14 篇 aschenbruck nils
  • 14 篇 peter martini

语言

  • 18,216 篇 英文
  • 347 篇 其他
  • 52 篇 中文
  • 4 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=IEEE Conference on Local Computer Networks"
18622 条 记 录,以下是141-150 订阅
排序:
GLAD: A Global-to-local Anomaly Detector  23
GLAD: A Global-to-Local Anomaly Detector
收藏 引用
23rd ieee/CVF Winter conference on Applications of computer Vision (WACV)
作者: Artola, Aitor Kolodziej, Yannis Morel, Jean-Michel Ehret, Thibaud Univ Paris Saclay CNRS ENS Paris Saclay Ctr Borelli Paris France Visionairy Orsay France
Learning to detect automatic anomalies in production plants remains a machine learning challenge. Since anomalies by definition cannot be learned, their detection must rely on a very accurate "normality model&quo... 详细信息
来源: 评论
Global-to-local Modeling for Video-based 3D Human Pose and Shape Estimation
Global-to-Local Modeling for Video-based 3D Human Pose and S...
收藏 引用
ieee/CVF conference on computer Vision and Pattern Recognition (CVPR)
作者: Shen, Xiaolong Yang, Zongxin Wang, Xiaohan Ma, Jianxin Zhou, Chang Yang, Yi Zhejiang Univ CCAI ReLER Hangzhou Zhejiang Peoples R China Alibaba Grp DAMO Acad Hangzhou Peoples R China
Video-based 3D human pose and shape estimations are evaluated by intra-frame accuracy and inter-frame smoothness. Although these two metrics are responsible for different ranges of temporal consistency, existing state... 详细信息
来源: 评论
Sampling-Based Density Peaks Clustering for Energy-Aware Industrial IoT networks
Sampling-Based Density Peaks Clustering for Energy-Aware Ind...
收藏 引用
2025 ieee International Students' conference on Electrical, Electronics and computer Science, SCEECS 2025
作者: Rajkumar, S. Gopalakrishnan, R. Shreeraksha, T.S. Dhanaraj, S. Kabiyashwanth, V. K. S. Rangasamy College of Technology Computer Science and Engineering 637 215 India K. S. Rangasamy College of Technology Electrical and Electronics Engineering 637 215 India
In Industrial Internet of Things (IIoT) settings, effective data processing and energy management are essential due to the resource-limited characteristics of the linked equipment. This research introduces a unique Sa... 详细信息
来源: 评论
AmGNN: A Framework for Adaptive Processing of Inter-layer Information in Multi-layer Graph  16th
AmGNN: A Framework for Adaptive Processing of Inter-layer In...
收藏 引用
16th International conference on Social networks Analysis and Mining
作者: Zhu, Huaisheng Wu, Zongyu Zhao, Tianxiang Wang, Suhang Penn State Univ University Pk PA 16802 USA
Graphs play a vital role in various applications. Graph Neural networks (GNNs) excel at capturing topology information by using a message-passing mechanism to enrich node representations with local neighborhood inform... 详细信息
来源: 评论
Mobility-Focused Joining in TSCH networks  47
Mobility-Focused Joining in TSCH Networks
收藏 引用
47th ieee conference on local computer networks (LCN)
作者: Nielsen, Oliver Schnugger, Lucas Koefoed Orfanidis, Charalampos Fafoutis, Xenofon Tech Univ Denmark DTU DTU Compute Lyngby Denmark
TSCH is a MAC protocol able to provide reliable wireless communication to IoT networks. For applications where mobility is necessary research has shown that TSCH presents a suboptimal performance. One of the main issu... 详细信息
来源: 评论
Deep Transfer Model Based local Climate Zone Classification Using SAR/Multispectral Images  4
Deep Transfer Model Based Local Climate Zone Classification ...
收藏 引用
4th International conference on computer Communication and Artificial Intelligence (CCAI)
作者: Nawaz, Amjad Chen, Jingyi Yang, Wei Beihang Univ Sch Elect & Informat Engn Beijing Peoples R China Beijing 101 Middle Sch Beijing Peoples R China
The deep transfer model described in this research is made up of several sub-networks that are individually optimized by an unsupervised consistency loss and a supervised task-oriented loss. Annotations are used by th... 详细信息
来源: 评论
Reputation-Based Data Carrying for Web3 networks  47
Reputation-Based Data Carrying for Web3 Networks
收藏 引用
47th ieee conference on local computer networks (LCN)
作者: Stokkink, Quinten Ileri, Can Umut Pouwelse, Johan Delft Univ Technol Delft Netherlands
Web3 networks are emerging to replace centrally-governed networking infrastructure. The integrity of the shared public infrastructure of Web3 networks is guaranteed through data sharing between nodes. However, due to ... 详细信息
来源: 评论
STAR-RIS based Resource Scheduling and Mode Selection for Drone assisted 5G communications
STAR-RIS based Resource Scheduling and Mode Selection for Dr...
收藏 引用
ieee conference on computer Communications (ieee INFOCOM)
作者: Chaudhary, Shivam Nehra, Anushka Budhiraja, Ishan Chaudhary, Rajat Bansal, Abhay Bennett Univ Sch Comp Sci Engn & Technol Greater Noida India Thapar Inst Engn & Technol Comp Sci & Engn Patiala Punjab India
For a range of future vehicle usage in 5G, communication between vehicle road cooperative systems (VRCS) is crucial. With the advent of 5G deployments, vehicle-to-everything (V2X) communications is enabled to boost ne... 详细信息
来源: 评论
Multi-Scale Non-local Sparse Attention for Single Image Super-Resolution
Multi-Scale Non-Local Sparse Attention for Single Image Supe...
收藏 引用
International Joint conference on Neural networks (IJCNN)
作者: Xiao, Xianwei Zhong, Baojiang Soochow Univ Sch Comp Sci & Technol Suzhou Peoples R China
The non-local attention (NLA) has demonstrated its success in deep learning to solve various image processing and computer vision tasks. However, the NLA over the entire input image requires extremely high computation... 详细信息
来源: 评论
PatchZero: Defending against Adversarial Patch Attacks by Detecting and Zeroing the Patch  23
PatchZero: Defending against Adversarial Patch Attacks by De...
收藏 引用
23rd ieee/CVF Winter conference on Applications of computer Vision (WACV)
作者: Xu, Ke Xiao, Yao Zheng, Zhaoheng Cai, Kaijie Nevatia, Ram
Adversarial patch attacks mislead neural networks by injecting adversarial pixels within a local region. Patch attacks can be highly effective in a variety of tasks and physically realizable via attachment (e.g. a sti... 详细信息
来源: 评论