咨询与建议

限定检索结果

文献类型

  • 18,449 篇 会议
  • 161 篇 期刊文献
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 18,621 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 10,598 篇 工学
    • 8,380 篇 计算机科学与技术...
    • 4,899 篇 信息与通信工程
    • 4,598 篇 软件工程
    • 2,321 篇 电气工程
    • 1,047 篇 控制科学与工程
    • 680 篇 电子科学与技术(可...
    • 468 篇 机械工程
    • 462 篇 生物工程
    • 388 篇 光学工程
    • 347 篇 仪器科学与技术
    • 297 篇 动力工程及工程热...
    • 295 篇 生物医学工程(可授...
    • 221 篇 网络空间安全
    • 219 篇 交通运输工程
    • 201 篇 建筑学
    • 180 篇 土木工程
    • 175 篇 安全科学与工程
    • 135 篇 材料科学与工程(可...
  • 2,665 篇 理学
    • 1,605 篇 数学
    • 574 篇 物理学
    • 511 篇 统计学(可授理学、...
    • 484 篇 生物学
    • 299 篇 系统科学
    • 187 篇 化学
  • 1,834 篇 管理学
    • 1,403 篇 管理科学与工程(可...
    • 506 篇 图书情报与档案管...
    • 445 篇 工商管理
  • 468 篇 医学
    • 396 篇 临床医学
    • 176 篇 基础医学(可授医学...
  • 181 篇 法学
    • 144 篇 社会学
  • 133 篇 经济学
  • 98 篇 农学
  • 50 篇 教育学
  • 50 篇 文学
  • 47 篇 军事学
  • 15 篇 艺术学

主题

  • 2,398 篇 computer network...
  • 1,648 篇 local area netwo...
  • 1,178 篇 wireless sensor ...
  • 898 篇 neural networks
  • 868 篇 protocols
  • 843 篇 computer science
  • 840 篇 bandwidth
  • 800 篇 throughput
  • 753 篇 computer archite...
  • 679 篇 routing
  • 665 篇 delay
  • 641 篇 wireless lan
  • 610 篇 telecommunicatio...
  • 593 篇 wireless network...
  • 549 篇 network topology
  • 486 篇 computational mo...
  • 466 篇 ip networks
  • 454 篇 quality of servi...
  • 437 篇 ad hoc networks
  • 435 篇 feature extracti...

机构

  • 85 篇 chitkara univers...
  • 37 篇 school of comput...
  • 34 篇 school of comput...
  • 30 篇 graphic era deem...
  • 29 篇 computer science...
  • 28 篇 department of co...
  • 27 篇 ieee
  • 26 篇 department of co...
  • 23 篇 school of comput...
  • 22 篇 shandong provinc...
  • 22 篇 institute of com...
  • 22 篇 department of el...
  • 22 篇 department of el...
  • 19 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 computer science...
  • 18 篇 department of co...
  • 18 篇 university of ch...
  • 17 篇 school of electr...
  • 17 篇 department of co...

作者

  • 54 篇 kukreja vinay
  • 35 篇 jayasumana anura...
  • 31 篇 anon
  • 30 篇 shiva mehta
  • 30 篇 boukerche azzedi...
  • 27 篇 akkaya kemal
  • 26 篇 hossam s. hassan...
  • 22 篇 hollick matthias
  • 22 篇 matthias hollick
  • 20 篇 damla turgut
  • 19 篇 p. martini
  • 18 篇 hassanein hossam...
  • 18 篇 mohamed younis
  • 16 篇 vats satvik
  • 15 篇 turgut damla
  • 14 篇 m. gerla
  • 14 篇 younis mohamed
  • 14 篇 wu jie
  • 14 篇 aschenbruck nils
  • 14 篇 peter martini

语言

  • 18,216 篇 英文
  • 347 篇 其他
  • 52 篇 中文
  • 4 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=IEEE Conference on Local Computer Networks"
18622 条 记 录,以下是341-350 订阅
排序:
APT Attack Detection Method Based on Long-Term Feature Extraction from Provenance Graphs  16
APT Attack Detection Method Based on Long-Term Feature Extra...
收藏 引用
16th ieee International conference on Computational Intelligence and Communication networks, CICN 2024
作者: Jiacheng, Li Northeast Electric Power University School of Computer Science Jilin China
As the frequency of Advanced Persistent Threat attacks rises, cybersecurity threats are becoming increasingly severe. Detecting APTs, a critical method for addressing complex attack behaviors, requires more resilient ... 详细信息
来源: 评论
Bearing Fault Diagnosis Based on the Combination of Attention Entropy and Bayesian Network  5
Bearing Fault Diagnosis Based on the Combination of Attentio...
收藏 引用
5th ieee International conference on Power, Electronics and computer Applications, ICPECA 2025
作者: Tong, Zhaojing Fan, Yongkui Tang, Lina School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo China School of Training Office Zhengzhou Industry Technicians College Zhengzhou China
In order to improve the accuracy of bearing fault identification, this paper proposes a bearing fault diagnosis method that combines the Improved Refined Composite Multiscale Attention Entropy (IRCMATE) with Bayesian ... 详细信息
来源: 评论
Secure Remote Access to local Network with Distributed Tunnel Management
Secure Remote Access to Local Network with Distributed Tunne...
收藏 引用
2024 International conference on Advances in Data Engineering and Intelligent Computing Systems, ADICS 2024
作者: Priyan Kishore, M.S. Chandana Sathwika, U. Malarvel, Muthukumaran Hindustan Institute Of Technology And Science Department Of Computer Science And Engineering Chennai India
The proliferation of distributed networks and the increasing demand for remote collaboration and maintenance have highlighted the need for secure and controlled remote access solutions. This paper presents a novel app... 详细信息
来源: 评论
Chinese Named Entity Recognition with Integrated Channel Attention  5
Chinese Named Entity Recognition with Integrated Channel Att...
收藏 引用
5th International conference on Artificial Intelligence and computer Engineering, ICAICE 2024
作者: Song, Wei Zheng, He Guo, Wei Ning, Keqing School of Information Science and Technology North China University of Technology Beijing China School of Electrical and Control Engineering North China University of Technology Beijing China
Using an Iterated Dilated Convolutional Neural Network (IDCNN) in Chinese Named Entity Recognition (NER) helps capture local information. However, the contribution of information from different positions in a sentence... 详细信息
来源: 评论
Small Object Detector Using Contextual local Features and Global Representations for Autonomous Driving  26
Small Object Detector Using Contextual Local Features and Gl...
收藏 引用
ieee 26th International conference on Intelligent Transportation Systems (ITSC)
作者: Wu, Xuke Bin Tian Xiong, Gang Song, Bing Ye, Peijun Zhu, Fenghua Univ Chinese Acad Sci Sch Artificial Intelligence Beijing 100049 Peoples R China Chinese Acad Sci Inst Automat State Key Lab Multimodal Artificial Intelligence Beijing 100190 Peoples R China Chinese Acad Sci Inst Automat State Key Lab Multimodal Artificial Intelligence Beijing Peoples R China Chinese Acad Sci Beijing Engn Res Ctr Intelligent Syst & Technol Inst Automat Beijing Peoples R China
We present a hybrid architecture called Contextual-Enhanced Transformer Network (CEFormer) that leverages both Convolutional Neural networks (CNN) and transformer-style networks for computer vision tasks. CNNs are goo... 详细信息
来源: 评论
Exploring emerging spreaders through GCN-based link prediction and a novel centrality method  17
Exploring emerging spreaders through GCN-based link predicti...
收藏 引用
17th International conference on COMmunication Systems and networks, COMSNETS 2025
作者: Nandi, Suman Maji, Giridhar Dutta, Animesh National Institute of Technology Dept. of Computer Science and Engineering West Bengal Durgapur India Asansol Polytechnic Dept. of Electrical Engineering West Bengal India
Exploring influential spreaders and predicting missing links in complex networks is essential for understanding and effectively controlling network dynamics. This paper presents a Graph Convolutional Network (GCN)-bas... 详细信息
来源: 评论
Indoor localization with GravNetConv and Dynamic Graphs  9
Indoor Localization with GravNetConv and Dynamic Graphs
收藏 引用
9th International conference on computer Science and Engineering, UBMK 2024
作者: Bayraktar, Mert Özcan, Alper Ulusar, Umit Deniz Akdeniz University Computer Engineering Department Antalya Turkey
Traditional indoor localization methods often rely on Received Signal Strength Indicator (RSSI) measurements from Wi-Fi access points (APs) and utilize techniques like fingerprinting. However, these methods face chall... 详细信息
来源: 评论
Dynamic Controller Assignment in LEO Satellite based SDN using Multi-Agent Deep Reinforcement Learning
Dynamic Controller Assignment in LEO Satellite based SDN usi...
收藏 引用
2024 ieee conference on Standards for Communications and Networking, CSCN 2024
作者: Mokhtar, Hamza Di, Xiaoqiang Jiang, Zhengang Hamdan, Mosab Changchun University of Science and Technology School of Computer Science and Technology Changchun China Zhongshan Institute Changchun University of Science and Technology Zhongshan China Walton Institute for Information and Communication Systems Science South East Technological University Waterford Ireland
With the rapid growth of Low Earth Orbit (LEO) satellite network applications and the accelerated expansion of the network size, software-defined networking (SDN)-based LEO satellite networks are introduced to manage ... 详细信息
来源: 评论
Phase-field Models for Lightweight Graph Convolutional networks
Phase-field Models for Lightweight Graph Convolutional Netwo...
收藏 引用
2023 ieee/CVF conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Sahbi, Hichem Sorbonne University CNRS LIP6 ParisF-75005 France
In this paper, we design lightweight graph convolutional networks (GCNs) using a particular class of regularizers, dubbed as phase-field models (PFMs). PFMs exhibit a bi-phase behavior using a particular ultra-local t... 详细信息
来源: 评论
A Propagation Model Based on Benign Worm Confrontation and Monitoring in Peer-to-Peer networks  6
A Propagation Model Based on Benign Worm Confrontation and M...
收藏 引用
6th International conference on Communications, Information System and computer Engineering, CISCE 2024
作者: Xue, Jiali Ren, Jianguo Xu, Yonghong Wang, Lei Jiangsu Normal University School of Computer Science and Technology Xuzhou China Jiangsu Normal University School of Life Sciences Xuzhou China The Yi-Shu-SI River Basin Administration Information Center Inner Mongolia China
In peer-to-peer (P2P) resource-sharing networks, worms spread rapidly. Currently, the technique of using benign worms against malicious worms is prone to problems such as resource burden and network congestion. Theref... 详细信息
来源: 评论