咨询与建议

限定检索结果

文献类型

  • 5,783 篇 会议
  • 112 册 图书
  • 32 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,928 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,999 篇 工学
    • 2,303 篇 计算机科学与技术...
    • 1,255 篇 信息与通信工程
    • 1,126 篇 软件工程
    • 791 篇 电气工程
    • 760 篇 控制科学与工程
    • 165 篇 机械工程
    • 158 篇 电子科学与技术(可...
    • 148 篇 动力工程及工程热...
    • 129 篇 网络空间安全
    • 121 篇 生物工程
    • 113 篇 仪器科学与技术
    • 108 篇 生物医学工程(可授...
    • 90 篇 交通运输工程
    • 78 篇 安全科学与工程
    • 61 篇 建筑学
  • 687 篇 理学
    • 381 篇 数学
    • 153 篇 物理学
    • 143 篇 系统科学
    • 136 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 71 篇 化学
  • 545 篇 管理学
    • 435 篇 管理科学与工程(可...
    • 179 篇 工商管理
    • 150 篇 图书情报与档案管...
    • 62 篇 公共管理
  • 174 篇 医学
    • 101 篇 公共卫生与预防医...
    • 98 篇 临床医学
    • 90 篇 基础医学(可授医学...
  • 121 篇 法学
    • 95 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 59 篇 农学
  • 58 篇 文学
  • 24 篇 教育学
  • 20 篇 军事学
  • 1 篇 艺术学

主题

  • 333 篇 control systems
  • 326 篇 social networkin...
  • 271 篇 communication sy...
  • 236 篇 wireless communi...
  • 229 篇 protocols
  • 212 篇 process control
  • 210 篇 traffic control
  • 210 篇 wireless sensor ...
  • 209 篇 computational mo...
  • 187 篇 access control
  • 183 篇 mobile communica...
  • 166 篇 software defined...
  • 158 篇 quality of servi...
  • 149 篇 routing
  • 147 篇 computer archite...
  • 146 篇 bandwidth
  • 139 篇 internet of thin...
  • 139 篇 throughput
  • 132 篇 monitoring
  • 129 篇 security

机构

  • 56 篇 state key labora...
  • 22 篇 chitkara univers...
  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 the 54th researc...
  • 9 篇 beijing jiaotong...
  • 8 篇 department of au...
  • 8 篇 maharishi school...
  • 8 篇 amrita vishwa vi...
  • 7 篇 delhi technologi...
  • 7 篇 beijing fibrlink...
  • 7 篇 electric power d...
  • 7 篇 technical univer...
  • 7 篇 univ petr & ener...
  • 7 篇 beijing universi...
  • 7 篇 department of el...
  • 7 篇 daffodil interna...
  • 6 篇 amrita vishwa vi...
  • 6 篇 huazhong univers...

作者

  • 27 篇 soman k. p.
  • 17 篇 k.p. soman
  • 14 篇 yang yang
  • 12 篇 singh rajesh
  • 12 篇 soman k.p.
  • 10 篇 geyong min
  • 10 篇 tai-hoon kim
  • 10 篇 leonard barolli
  • 9 篇 vishnu sharma
  • 9 篇 fatos xhafa
  • 9 篇 li jun
  • 8 篇 chen junliang
  • 8 篇 r. ramanathan
  • 8 篇 gehlot anita
  • 7 篇 rashidov aldeniz
  • 7 篇 wang lei
  • 7 篇 huo yonghua
  • 7 篇 jun li
  • 7 篇 cheng bo
  • 7 篇 kumar adesh

语言

  • 5,812 篇 英文
  • 71 篇 其他
  • 46 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advances in Computing, Communication Control and Networking"
5928 条 记 录,以下是4891-4900 订阅
排序:
An Efficient control Method of Multi-copy Routing in DTN
An Efficient Control Method of Multi-copy Routing in DTN
收藏 引用
international conference on Networks Security, Wireless communications and Trusted computing, NSWCTC
作者: Hong Bian Haizheng Yu School of Maths-physics and Information Sciences Xinjiang Normal University Urumqi P.R.China Key Laboratory of Computer Network and Information Security Xidian University Xi'an P.R.China
Delay/Disruption Tolerant Networks (DTN) often use multi-copy routing protocols to improve the efficiency that the messages are delivered successfully, but the network load is increased by vast message copies. A new s... 详细信息
来源: 评论
A novel methodology to filter out unwanted messages from OSN user’s wall using trust value calculation
收藏 引用
advances in Intelligent Systems and computing 2016年 380卷 755-764页
作者: Bodkhe, Renushree Ghorpade, Tushar Jethani, Vimla Department of Computer Engineering Ramrao Adik Institute of Technology Nerul Navi Mumbai India
Basic challenge in current Online Social Networks (OSNs) is to grant total control and access to its millions of customers (users) over the data and/or messages shared or highlighted on their personal accounts or priv... 详细信息
来源: 评论
An Improved Designated-Verifier Proxy Signature Scheme
An Improved Designated-Verifier Proxy Signature Scheme
收藏 引用
international conference on networking, Architecture, and Storage (NAS)
作者: Jianhong Zhang College of Science North-China University of Technology Beijing China Institute of Software of Chinese Academy of Sciences State Key Laboratory of Information Security Beijing China
As a special signature, proxy signature allows a entity called original signer to delegate his signing capability to another entity to produce signature on behalf of him. By combining the ideas of proxy signatures and... 详细信息
来源: 评论
An Efficient Visual Cryptography Approach for Intermodal Biometric Verification
An Efficient Visual Cryptography Approach for Intermodal Bio...
收藏 引用
Smart Generation computing, communication and networking (SMART GENCON), international conference on
作者: Abhishek Das Nabanita Ganguly Dept. of Computer Science & Engineering MIT Art Design & Technology University Pune India Dept. of Information Technology Maulana Abul Kalam Azad University of Technology Haringhata India
Biometric authentication is one of the important ways of acknowledging an individual using their behavioral and physical characteristics. It can range from fingerprint to an iris or retina image, hand geometry, gait o... 详细信息
来源: 评论
Optimization to multicasting protocol in unidirectional ad-hoc networks
Optimization to multicasting protocol in unidirectional ad-h...
收藏 引用
IEEE international conference on Wireless and Mobile computing, networking And communications (WiMob)
作者: N. Vanitchanant J. Silvester V. Vipanunt Department of Computer Engineering University of Southern California Los Angeles CA USA IEEE Computer Society
This paper proposes an optimization as an extension to a swarm-like styled, collaborative multicast routing protocol designed for unidirectional ad-hoc networks - called MUNet. MUNet is inspired by swarm intelligence ... 详细信息
来源: 评论
Design and implementation of mobile networking testbeds with personality profiles
Design and implementation of mobile networking testbeds with...
收藏 引用
international Wireless communications and Mobile computing conference, IWCMC
作者: Sungwook Moon Ahmed Helmy Department of Computer and Information Science and Engineering University of Florida USA
Significant advances in mobile networks have taken place recently, specifically with regard to multi-hop wireless networks, including DTNs and sensor networks. A testing environment that is conducive to realistic eval... 详细信息
来源: 评论
Camera based face tracking for enhancing surgical teamwork training with non-verbal communication
Camera based face tracking for enhancing surgical teamwork t...
收藏 引用
international conference on Image and Vision computing New Zealand, IVCNZ
作者: S. Marks J. Windsor B. Wunsche Department of Computer Science University of Auckland New Zealand Department of Surgery University of Auckland New Zealand
In recent years, the increased use of simulation for the training of surgical skills has improved the medical curriculum and the overall patient outcome. advances in hardware and simulation techniques have resulted in... 详细信息
来源: 评论
Moving Objects Databases In Space Applications
Moving Objects Databases In Space Applications
收藏 引用
international conference on Recent advances in Space Technologies (RAST)
作者: Perihan Kilimci Oya Kalipsiz Computer Engineering Department Yesilyurt Turkish Air Force Academy Istanbul Turkey Head of Computer Engineering Department Yildiz Technical University Istanbul Turkey
Determining moving objects for example spacecraft and visualizing them in defense simulation rapidly and correctly are important research issues in national defense. In US military C4ISR systems -command, control, com... 详细信息
来源: 评论
Towards Digital Twin in the Context of Power Wheelchairs Provision and Support  13th
Towards Digital Twin in the Context of Power Wheelchairs Pro...
收藏 引用
13th Advanced Doctoral conference on computing, Electrical, and Industrial Systems, DoCEIS 2022
作者: Lagartinho-Oliveira, Carolina Moutinho, Filipe Gomes, Luís NOVA School of Science and Technology NOVA University Lisbon Caparica Portugal Center for Technology and Systems UNINOVA Caparica Portugal
Recent advances in digital technologies have been triggered by Industry 4.0, deeply focused on connectivity, real-time data and digitization, with Digital Twin (DT) at the forefront of this. A DT is a virtual counterp... 详细信息
来源: 评论
Online Hate Classifier For Social Media Platform
Online Hate Classifier For Social Media Platform
收藏 引用
international conference on computing communication control and Automation (ICCUBEA)
作者: Harsh Kulkarni Prathamesh Kulkarni Vishal Khandate Chetan Lohkare Manikrao Dhore Dept of Computer Engineering Vishwakarma Institute of Technology SPPU Pune India
The surge in social media platforms accredits users to reveal their opinions widely. With this boost in social media usage, the impartation between users becomes divergent because of diversity in educational backgroun... 详细信息
来源: 评论