咨询与建议

限定检索结果

文献类型

  • 18,434 篇 会议
  • 161 篇 期刊文献
  • 2 册 图书
  • 2 篇 学位论文

馆藏范围

  • 18,598 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 10,588 篇 工学
    • 8,371 篇 计算机科学与技术...
    • 4,891 篇 信息与通信工程
    • 4,594 篇 软件工程
    • 2,324 篇 电气工程
    • 1,042 篇 控制科学与工程
    • 680 篇 电子科学与技术(可...
    • 468 篇 机械工程
    • 461 篇 生物工程
    • 386 篇 光学工程
    • 346 篇 仪器科学与技术
    • 296 篇 动力工程及工程热...
    • 294 篇 生物医学工程(可授...
    • 218 篇 交通运输工程
    • 217 篇 网络空间安全
    • 200 篇 建筑学
    • 179 篇 土木工程
    • 174 篇 安全科学与工程
    • 134 篇 材料科学与工程(可...
  • 2,662 篇 理学
    • 1,602 篇 数学
    • 575 篇 物理学
    • 510 篇 统计学(可授理学、...
    • 484 篇 生物学
    • 299 篇 系统科学
    • 186 篇 化学
  • 1,826 篇 管理学
    • 1,398 篇 管理科学与工程(可...
    • 503 篇 图书情报与档案管...
    • 441 篇 工商管理
  • 467 篇 医学
    • 396 篇 临床医学
    • 176 篇 基础医学(可授医学...
  • 180 篇 法学
    • 143 篇 社会学
  • 133 篇 经济学
  • 98 篇 农学
  • 50 篇 教育学
  • 50 篇 文学
  • 47 篇 军事学
  • 15 篇 艺术学

主题

  • 2,398 篇 computer network...
  • 1,647 篇 local area netwo...
  • 1,178 篇 wireless sensor ...
  • 897 篇 neural networks
  • 868 篇 protocols
  • 843 篇 computer science
  • 840 篇 bandwidth
  • 800 篇 throughput
  • 753 篇 computer archite...
  • 679 篇 routing
  • 665 篇 delay
  • 641 篇 wireless lan
  • 609 篇 telecommunicatio...
  • 593 篇 wireless network...
  • 549 篇 network topology
  • 486 篇 computational mo...
  • 466 篇 ip networks
  • 454 篇 quality of servi...
  • 437 篇 ad hoc networks
  • 433 篇 feature extracti...

机构

  • 85 篇 chitkara univers...
  • 36 篇 school of comput...
  • 34 篇 school of comput...
  • 30 篇 graphic era deem...
  • 29 篇 computer science...
  • 28 篇 department of co...
  • 27 篇 ieee
  • 26 篇 department of co...
  • 23 篇 school of comput...
  • 22 篇 shandong provinc...
  • 22 篇 institute of com...
  • 22 篇 department of el...
  • 22 篇 department of el...
  • 19 篇 school of comput...
  • 19 篇 department of co...
  • 19 篇 computer science...
  • 18 篇 department of co...
  • 18 篇 university of ch...
  • 17 篇 school of electr...
  • 17 篇 department of co...

作者

  • 54 篇 kukreja vinay
  • 35 篇 jayasumana anura...
  • 31 篇 anon
  • 30 篇 shiva mehta
  • 30 篇 boukerche azzedi...
  • 27 篇 akkaya kemal
  • 26 篇 hossam s. hassan...
  • 22 篇 hollick matthias
  • 22 篇 matthias hollick
  • 20 篇 damla turgut
  • 19 篇 p. martini
  • 18 篇 hassanein hossam...
  • 18 篇 mohamed younis
  • 16 篇 vats satvik
  • 15 篇 turgut damla
  • 14 篇 m. gerla
  • 14 篇 younis mohamed
  • 14 篇 wu jie
  • 14 篇 aschenbruck nils
  • 14 篇 peter martini

语言

  • 18,325 篇 英文
  • 215 篇 其他
  • 52 篇 中文
  • 4 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=IEEE Conference on Local Computer Networks"
18599 条 记 录,以下是4991-5000 订阅
排序:
PERCEPTUAL LOSS FOR SUPERPIXEL-LEVEL MULTISPECTRAL AND PANCHROMATIC IMAGE CLASSIFICATION
PERCEPTUAL LOSS FOR SUPERPIXEL-LEVEL MULTISPECTRAL AND PANCH...
收藏 引用
ieee International conference on Acoustics, Speech and Signal Processing
作者: Cheng Shi Chi-Man Pun Department of Computer and Information Sciences University of Macau Macau China
Convolutional neural networks (CNNs) have proven to be an effective way for deep feature extraction. However, multi-spectral and panchromatic images are susceptible to illumination unevenness and noise, and the defaul... 详细信息
来源: 评论
A Time Sharing Based Approach to Accommodate Similar Gain Users in NOMA for 5G networks  42
A Time Sharing Based Approach to Accommodate Similar Gain Us...
收藏 引用
ieee 42nd conference on local computer networks (ieee LCN)
作者: Shahab, Muhammad Basit Shin, Soo Young Kumoh Natl Inst Technol KIT Dept IT Convergence Engn WENS Lab Gumi South Korea
This paper investigates a time sharing (TS) based user pairing strategy to accommodate similar gain users in non-orthogonal multiple access (NOMA) systems, termed as TS-NOMA. A scenario is considered in which the dist... 详细信息
来源: 评论
Discriminative Dictionary Learning with local Constraints for Face Recognition with Occlusion  4th
Discriminative Dictionary Learning with Local Constraints fo...
收藏 引用
4th International conference on Cloud Computing and Security (ICCCS)
作者: Zhang, Tao Yang, Zhuoqun Xu, Yaqi Yang, Bin Jia, Wenjing Jiangnan Univ Jiangsu Prov Engn Lab Pattern Recognit & Computat Wuxi Jiangsu Peoples R China Jiangnan Univ Dept Design Wuxi Jiangsu Peoples R China Univ Technol Sydney Fac Engn & Informat Technol Ultimo Australia
Facial occlusion, such as sunglasses, mask etc., is one important factor that affects the accuracy of face recognition. Unfortunately, faces with occlusion are quite common in the real world. In recent years, sparse c... 详细信息
来源: 评论
Micro Operators for Ultra-Dense Network Deployment with Network Slicing and Spectrum Micro Licensing
Micro Operators for Ultra-Dense Network Deployment with Netw...
收藏 引用
ieee conference on Vehicular Technology (VTC)
作者: Marja Matinmikko-Blue Seppo Yrjoelae Matti Latva-aho Centre for Wireless Communications University of Oulu Oulu Finland Nokia Oulu Finland
5G emerges with ultra-dense deployments of small cell networks to address the location specific service demand of various vertical sectors. While the development of technical solutions for network densification is pro... 详细信息
来源: 评论
Selection of Energy Efficient Routing Protocol for Irrigation Enabled by Wireless Sensor networks  42
Selection of Energy Efficient Routing Protocol for Irrigatio...
收藏 引用
ieee 42nd conference on local computer networks (ieee LCN)
作者: Abedin, Zainal Paul, Sukanta Akhter, Sharmin Siddiquee, Kazy Noor-e-Alam Hossain, Mohammad Shahadat Andersson, Karl Univ Sci & Technol Chittagong Fac Sci Engn & Technol Chittagong 1079 Bangladesh Univ Chittagong Dept Comp Sci & Engn Chittagong 4331 Bangladesh Lulea Univ Technol Pervas & Mobile Comp Lab SE-93187 Skelleftea Sweden
Wireless Sensor networks (WSNs) are playing remarkable contribution in real time decision making by actuating the surroundings of environment. As a consequence, the contemporary agriculture is now using WSNs technolog... 详细信息
来源: 评论
Simple Black-Box Adversarial Attacks on Deep Neural networks  30
Simple Black-Box Adversarial Attacks on Deep Neural Networks
收藏 引用
30th ieee/CVF conference on computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Narodytska, Nina Kasiviswanathan, Shiva VMware Res Palo Alto CA 94304 USA Samsung Res Amer Mountain View CA USA
Deep neural networks are powerful and popular learning models that achieve state-of-the-art pattern recognition performance on many computer vision, speech, and language processing tasks. However, these networks have ... 详细信息
来源: 评论
Combating Bufferbloat in Multi-Bottleneck networks: Equilibrium, Stability, and Algorithms
Combating Bufferbloat in Multi-Bottleneck Networks: Equilibr...
收藏 引用
ieee Annual Joint conference: INFOCOM, ieee computer and Communications Societies
作者: Jiancheng Ye Ka-Cheong Leung Victor O.K. Li Steven H. Low Department of EEE The University of Hong Kong Hong Kong Departments of CMS & EE California Institute of Technology Pasadena CA USA
Bufferbloat is a phenomenon where router buffers are constantly being filled, resulting in high queueing delay and delay variation. Larger buffer size and more delay-sensitive applications on the Internet have made th... 详细信息
来源: 评论
DeepLink: A Deep Learning Approach for User Identity Linkage
DeepLink: A Deep Learning Approach for User Identity Linkage
收藏 引用
ieee Annual Joint conference: INFOCOM, ieee computer and Communications Societies
作者: Fan Zhou Lei Liu Kunpeng Zhang Goce Trajcevski Jin Wu Ting Zhong School of Information and Software Engneering University of Electronic Science and Technology of China Robert H. Smith School of Business University of Maryland Department of Electrical and Computer Engineering Iowa State University Ames IA
The typical aim of User Identity Linkage (UIL) is to detect when users from across different social platforms are actually one and the same individual. Existing efforts to address this problem of practical relevance s... 详细信息
来源: 评论
Parameter selection for modeling of epidemic networks
Parameter selection for modeling of epidemic networks
收藏 引用
ieee Symposium on Computational Intelligence and Bioinformatics and Computational Biology (CIBCB)
作者: Michael Dube Sheridan Houghten Daniel Ashlock Dept. of Computer Science Brock University St. Catharines ON Canada Dept. of Mathematics and Statistics University of Guelph Guelph ON Canada
The accurate modeling of epidemics on social contact networks is difficult due to the variation between different epidemics and the large number of parameters inherent to the problem. To reduce complexity, evolutionar... 详细信息
来源: 评论
Enhancing Security and Scalability in Software Defined LTE Core networks
Enhancing Security and Scalability in Software Defined LTE C...
收藏 引用
ieee International conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Ruichun Gu Xiaolong Zhang Lei Yu Junxing Zhang College of Computer Science Inner Mongolia University of Science and Technology Baotou China College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia A.R. Key Laboratory of Wireless Networking and Mobile Computing Hohhot China
The rapid development of mobile networks has revolutionized the way of accessing the Internet. The exponential growth of mobile subscribers, devices and various applications frequently brings about excessive traffic i... 详细信息
来源: 评论