咨询与建议

限定检索结果

文献类型

  • 56,029 篇 会议
  • 808 篇 期刊文献
  • 62 册 图书
  • 1 篇 学位论文

馆藏范围

  • 56,900 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,786 篇 工学
    • 28,276 篇 计算机科学与技术...
    • 12,371 篇 电气工程
    • 11,713 篇 软件工程
    • 10,886 篇 信息与通信工程
    • 3,017 篇 控制科学与工程
    • 2,961 篇 电子科学与技术(可...
    • 1,624 篇 仪器科学与技术
    • 1,256 篇 生物工程
    • 1,115 篇 动力工程及工程热...
    • 910 篇 生物医学工程(可授...
    • 876 篇 机械工程
    • 696 篇 网络空间安全
    • 602 篇 安全科学与工程
    • 601 篇 测绘科学与技术
    • 554 篇 交通运输工程
    • 519 篇 光学工程
    • 500 篇 环境科学与工程(可...
  • 6,806 篇 理学
    • 3,292 篇 数学
    • 1,586 篇 物理学
    • 1,420 篇 生物学
    • 782 篇 统计学(可授理学、...
    • 646 篇 系统科学
    • 534 篇 化学
    • 469 篇 地球物理学
  • 5,007 篇 管理学
    • 4,010 篇 管理科学与工程(可...
    • 1,383 篇 图书情报与档案管...
    • 1,316 篇 工商管理
  • 1,364 篇 医学
    • 1,085 篇 临床医学
    • 522 篇 基础医学(可授医学...
  • 547 篇 法学
  • 442 篇 经济学
    • 429 篇 应用经济学
  • 285 篇 农学
  • 182 篇 文学
  • 168 篇 教育学
  • 144 篇 军事学
  • 33 篇 艺术学
  • 2 篇 历史学

主题

  • 3,784 篇 cloud computing
  • 2,382 篇 computer archite...
  • 2,301 篇 computer network...
  • 2,235 篇 application soft...
  • 2,142 篇 computational mo...
  • 1,965 篇 bandwidth
  • 1,861 篇 distributed comp...
  • 1,784 篇 protocols
  • 1,625 篇 mobile computing
  • 1,589 篇 network topology
  • 1,556 篇 peer to peer com...
  • 1,541 篇 wireless sensor ...
  • 1,450 篇 hardware
  • 1,428 篇 neural networks
  • 1,399 篇 resource managem...
  • 1,396 篇 routing
  • 1,392 篇 quality of servi...
  • 1,308 篇 computer science
  • 1,250 篇 servers
  • 1,151 篇 delay

机构

  • 92 篇 univ chinese aca...
  • 63 篇 university of ch...
  • 51 篇 tsinghua univers...
  • 51 篇 tsinghua univ de...
  • 51 篇 department of co...
  • 50 篇 chinese acad sci...
  • 44 篇 georgia inst tec...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 computer network...
  • 37 篇 ibm thomas j. wa...
  • 37 篇 institute of com...
  • 29 篇 shanghai jiao to...
  • 29 篇 department of co...
  • 29 篇 georgia inst tec...
  • 28 篇 penn state univ ...
  • 28 篇 univ michigan an...
  • 28 篇 hong kong polyte...
  • 26 篇 shandong univ sc...
  • 26 篇 ibm thomas j. wa...

作者

  • 31 篇 zhang lei
  • 26 篇 muntean gabriel-...
  • 26 篇 yang bo
  • 25 篇 dhabaleswar k. p...
  • 25 篇 wang lei
  • 25 篇 hoefler torsten
  • 23 篇 liu yang
  • 21 篇 yu wang
  • 21 篇 wang yanzhi
  • 20 篇 li xi
  • 20 篇 wang jing
  • 20 篇 li li
  • 18 篇 li yang
  • 18 篇 liu bo
  • 18 篇 yang jun
  • 17 篇 abhinav bhatele
  • 16 篇 celesti antonio
  • 16 篇 lei wang
  • 16 篇 li xin
  • 16 篇 li peng

语言

  • 56,057 篇 英文
  • 461 篇 其他
  • 372 篇 中文
  • 6 篇 土耳其文
  • 3 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"任意字段=IEEE International Symposium on Network Computing and Applications"
56900 条 记 录,以下是91-100 订阅
排序:
Enhancement in Reliability of ieee 802.15.4 WBAN Using Greedy Spider Monkey Algorithm
收藏 引用
international JOURNAL OF networkED AND DISTRIBUTED computing 2025年 第1期13卷 1-12页
作者: Pandey, Umashankar Chandra, Saroj Kumar Dewangan, Narendra Kumar OP Jindal Univ Raigarh Dept Comp Sci & Engn Raigarh 496005 Chhattisgarh India UPES Dehradun Sch Comp Sci Dehra Dun 248007 Uttaranchal India
Wireless Body Area networks (WBANs) hold immense potential in healthcare monitoring, but ensuring reliable data transmission is crucial. While the ieee 802.15.4 standard offers low-power operation and basic security, ... 详细信息
来源: 评论
A Priori Loop Nest Normalization: Automatic Loop Scheduling in Complex applications  25
A Priori Loop Nest Normalization: Automatic Loop Scheduling ...
收藏 引用
23rd ACM/ieee international symposium on Code Generation and Optimization, CGO 2025
作者: Trümper, Lukas Schaad, Philipp Ates, Berke Calotoiu, Alexandru Copik, Marcin Hoefler, Torsten Daisytuner Darmstadt Germany ETH Zurich Zurich Switzerland
The same computations are often expressed differently across software projects and programming languages. In particular, how computations involving loops are expressed varies due to the many possibilities to permute a... 详细信息
来源: 评论
Security Considerations for 5G network Slicing  21st
Security Considerations for 5G Network Slicing
收藏 引用
21st international symposium on Distributed computing and Artificial Intelligence, DCAI 2024
作者: Aguilar-Mora, Carlos D. Merino-Vivanco, Rodolfo P. Universidad Nacional de Loja Av. Pío Jaramillo Alvarado Loja Ecuador Centro de Investigación Innovación Desarrollo de Prototipos Tecnológicos y Pruebas Electroenergéticas I2TEC Universidad Nacional de Loja Av. Pío Jaramillo Alvarado Loja Ecuador
5G network slicing is an emerging technology that enables the sharing of physical resources for various purposes, used in multiple sectors, such as robotics, medicine, agriculture, mining, media, as well as applicatio... 详细信息
来源: 评论
Analysis of optimization Techniques for Dynamic Neural networks  3
Analysis of optimization Techniques for Dynamic Neural Netwo...
收藏 引用
3rd international Conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Mallegowda, M. Nair, Saanvi Khirwal, Sahil Animesh, Manik Mishra, Vasuman Kanavalli, Anita Ms Ramaiah Institute of Technology Department of Computer Science and Engineering Bengaluru India Ramaiah Institute of Technology Dept. of Cse Bengaluru India
Models based on dynamic neural networks such as DeBERTa and Vision Transformers ViT have disrupted the two fields. However, there is one complication - their performance requires so much computation which limits its r... 详细信息
来源: 评论
Comparison of an Equivalent Circuit and Data Driven Battery Model for EV applications
Comparison of an Equivalent Circuit and Data Driven Battery ...
收藏 引用
2025 international Conference on Intelligent Control, computing and Communications, IC3 2025
作者: Bedwal, Kavita Moulik, Bedatri Amity Institute of technology Amity University Uttar Pradesh Uttar Pradesh Noida India
Both electric and hybrid vehicles (HEVs and EVs) employ high-voltage battery packs, so a robust and dependable battery management system (BMS) is necessary to ensure a vehicle's safe and dependable operation. For ... 详细信息
来源: 评论
Implementation of RFID System for Industrial applications  24
Implementation of RFID System for Industrial Applications
收藏 引用
24th international symposium INFOTEH-JAHORINA, INFOTEH 2025
作者: Todorov, Todor Tonkov, Valentin St. Cyril and St. Methodius University of Veliko Tarnovo Bulgaria Bulgarian Academy of Sciences Institute of Mathematics and Informatics Sofia Bulgaria St. Cyril and St. Methodius University of Veliko Tarnovo Veliko Tarnovo Bulgaria
The industrial sector increasingly relies on innovative technologies to optimize workflows and improve traceability. The paper presents the development of an Ultra-High Frequency (UHF) RFID-based system designed for s... 详细信息
来源: 评论
Case study of performance degradation on the Xen hypervisor-based virtualization related to the native host  24
Case study of performance degradation on the Xen hypervisor-...
收藏 引用
24th international symposium INFOTEH-JAHORINA, INFOTEH 2025
作者: Dordević, Borislav Janjić, Kristina Kraljević, Nenad Davidović, Nikola Institute Mihailo Pupin Belgrade Serbia Academy of Technical and Art Applied Studies School of Electrical and Computing Engineering of Applied Studies Belgrade Serbia University of East Sarajevo Faculty of Electrical Engineering East Sarajevo Bosnia and Herzegovina School of Electrical and Computing Engineering of Applied Studies Belgrade Serbia
This paper conducts a comparative analysis of file system performance between a native operating system and Xen hypervisor-based virtualization. The study uses CentOS Stream 9 as both the native and guest operating sy... 详细信息
来源: 评论
Multi-Modal Incomplete Brain Tumor Segmentation with Mamba  24
Multi-Modal Incomplete Brain Tumor Segmentation with Mamba
收藏 引用
5th international symposium on Artificial Intelligence for Medicine Science, ISAIMS 2024
作者: Li, Yudan Zhang, Xiaozhi Xiong, Dongping Ouyang, Lijun School of Electrical Engineering University of South China Hunan Hengyang China School of Computing/Software University of South China Hunan Hengyang China
Accurately segmenting brain tumors from multimodal MRI sequences is a key prerequisite for brain tumor diagnosis, prognosis assessment, and surgical treatment. However, in practical applications, one or more modal dat... 详细信息
来源: 评论
Security Challenges and Mitigation Strategies for CAN-Based Protocols: A Comprehensive Survey  24
Security Challenges and Mitigation Strategies for CAN-Based ...
收藏 引用
24th international symposium INFOTEH-JAHORINA, INFOTEH 2025
作者: Popic, Srdjan Ramic, Bojan Bojanic, Sasa RT-RK Institute for Computer Based Systems Novi Sad Serbia
The Controller Area network (CAN) protocol is the backbone of many critical communication systems in automotive, industrial, and embedded applications. Despite its widespread adoption, CAN-based protocols, such as J19... 详细信息
来源: 评论
Intelligent Energy Management Strategies for Renewable Energy Sources  1
Intelligent Energy Management Strategies for Renewable Energ...
收藏 引用
1st international Conference on AIML-applications for Engineering and Technology, ICAET 2025
作者: Patil, Sangita Deotale, Disha Mali, Ramesh MIT School of Computing MIT ADT University Department of Electrical & Electronics Engineering Pune412201 India MIT School of Computing MIT ADT University Department of Computer Science & Engineering Pune412201 India
There have been several developments in renewable resources, standby sources of energy, and storage technologies. Because renewable sources are inconsistent, the best method to ensure supply continuity is to combine t... 详细信息
来源: 评论