咨询与建议

限定检索结果

文献类型

  • 18,436 篇 会议
  • 161 篇 期刊文献
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 18,608 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 10,589 篇 工学
    • 8,372 篇 计算机科学与技术...
    • 4,891 篇 信息与通信工程
    • 4,594 篇 软件工程
    • 2,324 篇 电气工程
    • 1,042 篇 控制科学与工程
    • 680 篇 电子科学与技术(可...
    • 468 篇 机械工程
    • 461 篇 生物工程
    • 386 篇 光学工程
    • 346 篇 仪器科学与技术
    • 296 篇 动力工程及工程热...
    • 294 篇 生物医学工程(可授...
    • 218 篇 交通运输工程
    • 217 篇 网络空间安全
    • 200 篇 建筑学
    • 179 篇 土木工程
    • 174 篇 安全科学与工程
    • 134 篇 材料科学与工程(可...
  • 2,663 篇 理学
    • 1,603 篇 数学
    • 575 篇 物理学
    • 511 篇 统计学(可授理学、...
    • 484 篇 生物学
    • 299 篇 系统科学
    • 186 篇 化学
  • 1,826 篇 管理学
    • 1,398 篇 管理科学与工程(可...
    • 503 篇 图书情报与档案管...
    • 441 篇 工商管理
  • 467 篇 医学
    • 396 篇 临床医学
    • 176 篇 基础医学(可授医学...
  • 180 篇 法学
    • 143 篇 社会学
  • 133 篇 经济学
  • 98 篇 农学
  • 50 篇 教育学
  • 50 篇 文学
  • 47 篇 军事学
  • 15 篇 艺术学

主题

  • 2,398 篇 computer network...
  • 1,648 篇 local area netwo...
  • 1,178 篇 wireless sensor ...
  • 898 篇 neural networks
  • 868 篇 protocols
  • 843 篇 computer science
  • 840 篇 bandwidth
  • 800 篇 throughput
  • 753 篇 computer archite...
  • 679 篇 routing
  • 665 篇 delay
  • 641 篇 wireless lan
  • 610 篇 telecommunicatio...
  • 593 篇 wireless network...
  • 549 篇 network topology
  • 486 篇 computational mo...
  • 466 篇 ip networks
  • 454 篇 quality of servi...
  • 437 篇 ad hoc networks
  • 433 篇 feature extracti...

机构

  • 85 篇 chitkara univers...
  • 37 篇 school of comput...
  • 34 篇 school of comput...
  • 30 篇 graphic era deem...
  • 29 篇 computer science...
  • 28 篇 department of co...
  • 27 篇 ieee
  • 26 篇 department of co...
  • 23 篇 school of comput...
  • 22 篇 shandong provinc...
  • 22 篇 institute of com...
  • 22 篇 department of el...
  • 22 篇 department of el...
  • 19 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 computer science...
  • 18 篇 department of co...
  • 18 篇 university of ch...
  • 17 篇 school of electr...
  • 17 篇 department of co...

作者

  • 54 篇 kukreja vinay
  • 35 篇 jayasumana anura...
  • 31 篇 anon
  • 30 篇 shiva mehta
  • 30 篇 boukerche azzedi...
  • 27 篇 akkaya kemal
  • 26 篇 hossam s. hassan...
  • 22 篇 hollick matthias
  • 22 篇 matthias hollick
  • 20 篇 damla turgut
  • 19 篇 p. martini
  • 18 篇 hassanein hossam...
  • 18 篇 mohamed younis
  • 16 篇 vats satvik
  • 15 篇 turgut damla
  • 14 篇 m. gerla
  • 14 篇 younis mohamed
  • 14 篇 wu jie
  • 14 篇 aschenbruck nils
  • 14 篇 peter martini

语言

  • 18,335 篇 英文
  • 215 篇 其他
  • 52 篇 中文
  • 4 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=IEEE Conference on Local Computer Networks"
18609 条 记 录,以下是4851-4860 订阅
排序:
DCIGAN: A Distributed Class-Incremental Learning Method Based on Generative Adversarial networks
DCIGAN: A Distributed Class-Incremental Learning Method Base...
收藏 引用
ieee International conference on Big Data and Cloud Computing (BdCloud)
作者: Hongtao Guan Yijie Wang Xingkong Ma Yongmou Li Science and Technology on Parallel and Distributed Laboratory College of Computer National University of Defense Technology Changsha Hunan P.R.China
Class incremental learning has received wide attention due to its better adaptability to the changing characteristics of online learning. However, data cannot be shared between organizations in the data isolated islan... 详细信息
来源: 评论
Optimal Design of Wireless-Powered Hierarchical Fog-Cloud Computing networks
Optimal Design of Wireless-Powered Hierarchical Fog-Cloud Co...
收藏 引用
ieee Global Communications conference
作者: Jingxian Liu Ke Xiong Derrick Wing Kwan Ng Pingyi Fan Zhangdui Zhong School of Computer and Information Technology Beijing Jiaotong University Beijing China State Key Lab of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China School of Electrical Engineering and Telecommunications University of New South Wales NSW Australia Department of Electronic Engineering Tsinghua University Beijing China
This paper investigates the optimal design of wireless-powered hierarchical fog-cloud computing networks, where energy-constrained users first harvest energy from a hybrid access point (HAP) and then offload their com... 详细信息
来源: 评论
Exploiting CSI-MIMO for Accurate and Efficient Device Identification
Exploiting CSI-MIMO for Accurate and Efficient Device Identi...
收藏 引用
ieee Global Communications conference
作者: Laxima Niure Kandel Zhuosheng Zhang Shucheng Yu Department of Electrical and Computer Engineering Stevens Institute of Technology
Due to the inherent broadcast nature of the wireless medium, Wireless local Area networks (WLANs) are targets of a variety of malicious attacks, for example, MAC identity spoofing, rogue AP attack, and network freeloa... 详细信息
来源: 评论
Investigation on the performance of the iee802.11n based wireless networks for multimedia services  2
Investigation on the performance of the iee802.11n based wir...
收藏 引用
2nd International conference for Engineering, Technology and Sciences of Al-Kitab, ICETS 2018
作者: Farej, Ziyad Khalaf Jasim, Mustafa Mohammad Computer Eng. Dept. Technical Eng. College Northern Technical University Mosul Iraq
The high data rate of the ieee 802.11n standard is due to its Physical layer Multiple Input Multiple Output (MIMO) system and MAC layer enhancement features. This rate enables the standard to support multimedia with Q... 详细信息
来源: 评论
Human Motion Classification with Micro-Doppler Radar and Bayesian-Optimized Convolutional Neural networks
Human Motion Classification with Micro-Doppler Radar and Bay...
收藏 引用
2018 ieee International conference on Acoustics, Speech, and Signal Processing, ICASSP 2018
作者: Le, Hoang Thanh Phung, Son Lam Bouzerdoum, Abdesselam Tivive, Fok Hing Chi Computer and Telecommunications Engineering University of Wollongong School of Electrical NSW Australia College of Science and Engineering Hamad Bin Khalifa University Doha Qatar
In recent years, Doppler radar has emerged as an alternative sensing modality for human gait classification since it measures not only the target speed, but also the local dynamics of the moving body parts, thereby cr... 详细信息
来源: 评论
A new feature set for masking-based monaural speech separation  52
A new feature set for masking-based monaural speech separati...
收藏 引用
52nd Asilomar conference on Signals, Systems and computers, ACSSC 2018
作者: Pirhosseinloo, Shadi Brumberg, Jonathan S. Electrical Engineering Computer Science University of Kansas LawrenceKS United States Speech-Language-Hearing University of Kansas LawrenceKS United States
We propose a new feature based on a gammatone filter bank for improving monaural speech separation using neural networks. This new feature encodes not only the local information of cochleagram, and spectrotemporal con... 详细信息
来源: 评论
How local Information Improves Rendezvous in Cognitive Radio networks  15
How Local Information Improves Rendezvous in Cognitive Radio...
收藏 引用
15th ieee Annual International conference on Sensing, Communication, and Networking (SECON)
作者: Fu, Yongqin Wang, Yuexuan Gu, Zhaoquan Zheng, Xiaolin Wei, Tianhao Cao, Zhen Cui, Heming Lau, Francis C. M. Zhejiang Univ Coll Comp Sci & Technol Hangzhou 310027 Zhejiang Peoples R China Univ Hong Kong Dept Comp Sci Hong Kong Peoples R China Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510006 Guangdong Peoples R China Beijing Univ Posts & Telecommun Sch Comp Sci Beijing 100876 Peoples R China
Cognitive Radio Network (CRN) is a promising technique for solving the wireless spectrum scarcity problem. Rendezvous is the fundamental process of CRNs. We aim at designing faster rendezvous algorithms for CRNs. We f... 详细信息
来源: 评论
A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match
A Structure-Based De-Anonymization Attack on Graph Data Usin...
收藏 引用
ieee International conference on Data Science in Cyberspace (DSC)
作者: Junbin Fang Aiping Li Qianyue Jiang Shudong Li Weihong Han College of Computer National University of Defense Technology Changsha China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Cyberspace Institute of Advanced Technology Institute of Electronic and Information Engineering of UESTC in Guangdong Guangzhou China
Nowadays, many large-scale graph datasets, such as social networks data, are often published for scientific research, information sharing and data mining. Privacy protection issues in publishing datasets have also rec... 详细信息
来源: 评论
CALC2.0: Combining Appearance, Semantic and Geometric Information for Robust and Efficient Visual Loop Closure
CALC2.0: Combining Appearance, Semantic and Geometric Inform...
收藏 引用
2019 ieee/RSJ International conference on Intelligent Robots and Systems (IROS)
作者: Nathaniel Merrill Guoquan Huang Dept. of Computer and Information Sciences and Dept. of Mechanical Engineering University of Delaware Newark DE
Traditional attempts for loop closure detection typically use hand-crafted features, relying on geometric and visual information only, whereas more modern approaches tend to use semantic, appearance or geometric featu...
来源: 评论
Fast and Incremental Loop Closure Detection Using Proximity Graphs
Fast and Incremental Loop Closure Detection Using Proximity ...
收藏 引用
2019 ieee/RSJ International conference on Intelligent Robots and Systems (IROS)
作者: Shan An Guangfu Che Fangru Zhou Xianglong Liu Xin Ma Yu Chen AR/VR department *** Beijing China School of Computer Science and Engineering Beihang University Beijing China School of Control Science and Engineering Shandong University Jinan China
Visual loop closure detection, which can be considered as an image retrieval task, is an important problem in SLAM (Simultaneous localization and Mapping) systems. The frequently used bag-of-words (BoW) models can ach...
来源: 评论