咨询与建议

限定检索结果

文献类型

  • 5,781 篇 会议
  • 113 册 图书
  • 32 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 5,927 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 2,997 篇 工学
    • 2,300 篇 计算机科学与技术...
    • 1,252 篇 信息与通信工程
    • 1,124 篇 软件工程
    • 791 篇 电气工程
    • 756 篇 控制科学与工程
    • 164 篇 机械工程
    • 158 篇 电子科学与技术(可...
    • 148 篇 动力工程及工程热...
    • 125 篇 网络空间安全
    • 121 篇 生物工程
    • 113 篇 仪器科学与技术
    • 108 篇 生物医学工程(可授...
    • 90 篇 交通运输工程
    • 79 篇 安全科学与工程
    • 61 篇 建筑学
  • 684 篇 理学
    • 378 篇 数学
    • 153 篇 物理学
    • 143 篇 系统科学
    • 136 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 71 篇 化学
  • 542 篇 管理学
    • 435 篇 管理科学与工程(可...
    • 179 篇 工商管理
    • 147 篇 图书情报与档案管...
    • 59 篇 公共管理
  • 171 篇 医学
    • 98 篇 临床医学
    • 98 篇 公共卫生与预防医...
    • 90 篇 基础医学(可授医学...
  • 121 篇 法学
    • 95 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 59 篇 农学
  • 58 篇 文学
  • 25 篇 教育学
  • 20 篇 军事学
  • 1 篇 艺术学

主题

  • 333 篇 control systems
  • 326 篇 social networkin...
  • 271 篇 communication sy...
  • 236 篇 wireless communi...
  • 229 篇 protocols
  • 212 篇 process control
  • 210 篇 traffic control
  • 210 篇 wireless sensor ...
  • 209 篇 computational mo...
  • 187 篇 access control
  • 183 篇 mobile communica...
  • 164 篇 software defined...
  • 158 篇 quality of servi...
  • 149 篇 routing
  • 147 篇 computer archite...
  • 146 篇 bandwidth
  • 139 篇 internet of thin...
  • 139 篇 throughput
  • 132 篇 monitoring
  • 129 篇 security

机构

  • 56 篇 state key labora...
  • 22 篇 chitkara univers...
  • 15 篇 beijing univ pos...
  • 14 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 the 54th researc...
  • 9 篇 beijing jiaotong...
  • 8 篇 department of au...
  • 8 篇 maharishi school...
  • 8 篇 amrita vishwa vi...
  • 7 篇 delhi technologi...
  • 7 篇 beijing fibrlink...
  • 7 篇 electric power d...
  • 7 篇 technical univer...
  • 7 篇 univ petr & ener...
  • 7 篇 beijing universi...
  • 7 篇 department of el...
  • 7 篇 daffodil interna...
  • 6 篇 amrita vishwa vi...
  • 6 篇 huazhong univers...

作者

  • 27 篇 soman k. p.
  • 17 篇 k.p. soman
  • 14 篇 yang yang
  • 12 篇 singh rajesh
  • 12 篇 soman k.p.
  • 10 篇 geyong min
  • 10 篇 tai-hoon kim
  • 10 篇 leonard barolli
  • 9 篇 vishnu sharma
  • 9 篇 fatos xhafa
  • 9 篇 li jun
  • 8 篇 chen junliang
  • 8 篇 r. ramanathan
  • 8 篇 gehlot anita
  • 7 篇 rashidov aldeniz
  • 7 篇 wang lei
  • 7 篇 huo yonghua
  • 7 篇 jun li
  • 7 篇 cheng bo
  • 7 篇 kumar adesh

语言

  • 5,813 篇 英文
  • 69 篇 其他
  • 46 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advances in Computing, Communication Control and Networking"
5927 条 记 录,以下是4981-4990 订阅
排序:
Grid Security Interoperation between CGSP and VEGA
Grid Security Interoperation between CGSP and VEGA
收藏 引用
international conference on Future Generation communication and networking (FGCN)
作者: Deqing Zou Hai Jin Xueguang Chen Zongfen Han Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan China
Grid computing emerges as an effective technology to couple geographically distributed resources and solve large-scale computational problems in wide area networks. There are several popular grid platforms, such as UN... 详细信息
来源: 评论
Optimization of Clustering, and QOS Routing in Wireless Multicast Ad-Hoc Networks with Topology control
Optimization of Clustering, and QOS Routing in Wireless Mult...
收藏 引用
Smart Generation computing, communication and networking (SMART GENCON), international conference on
作者: Sukhman Ghumman Centre for Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
In this study, we provide a novel approach to multicast wireless ad hoc network routing with cluster QoS optimization. The notion of topology compression is used to quantify the effect of multicast heterogeneity on sc...
来源: 评论
An Efficient control Method of Multi-copy Routing in DTN
An Efficient Control Method of Multi-copy Routing in DTN
收藏 引用
international conference on Networks Security, Wireless communications and Trusted computing, NSWCTC
作者: Hong Bian Haizheng Yu School of Maths-physics and Information Sciences Xinjiang Normal University Urumqi P.R.China Key Laboratory of Computer Network and Information Security Xidian University Xi'an P.R.China
Delay/Disruption Tolerant Networks (DTN) often use multi-copy routing protocols to improve the efficiency that the messages are delivered successfully, but the network load is increased by vast message copies. A new s... 详细信息
来源: 评论
Camera based face tracking for enhancing surgical teamwork training with non-verbal communication
Camera based face tracking for enhancing surgical teamwork t...
收藏 引用
international conference on Image and Vision computing New Zealand, IVCNZ
作者: S. Marks J. Windsor B. Wunsche Department of Computer Science University of Auckland New Zealand Department of Surgery University of Auckland New Zealand
In recent years, the increased use of simulation for the training of surgical skills has improved the medical curriculum and the overall patient outcome. advances in hardware and simulation techniques have resulted in... 详细信息
来源: 评论
An Improved Designated-Verifier Proxy Signature Scheme
An Improved Designated-Verifier Proxy Signature Scheme
收藏 引用
international conference on networking, Architecture, and Storage (NAS)
作者: Jianhong Zhang College of Science North-China University of Technology Beijing China Institute of Software of Chinese Academy of Sciences State Key Laboratory of Information Security Beijing China
As a special signature, proxy signature allows a entity called original signer to delegate his signing capability to another entity to produce signature on behalf of him. By combining the ideas of proxy signatures and... 详细信息
来源: 评论
Time-Sensitive Semantic communication Using Dynamic Spiking Neural Networks
Time-Sensitive Semantic Communication Using Dynamic Spiking ...
收藏 引用
Memristive computing and Applications (ICMCA), IEEE international conference on
作者: Daojun Liang Bingzheng Zhang Dongfeng Yuan Shenzhen Research Institute of Shandong University Shenzhen China School of Information Science and Engineering Shandong University Qingdao China Shandong Key Laboratory of Wireless Mobile Communication Technologies Jinan China School of Control Science and Engineering Shandong University Jinan China School of Qilu Transportation Shandong University Jinan China
Semantic communication aims to extract and trans-mit the semantic information of objects to greatly reduce the transmission of redundant information. This means that termi-nals need to deploy large and deep models to ...
来源: 评论
Moving Objects Databases In Space Applications
Moving Objects Databases In Space Applications
收藏 引用
international conference on Recent advances in Space Technologies (RAST)
作者: Perihan Kilimci Oya Kalipsiz Computer Engineering Department Yesilyurt Turkish Air Force Academy Istanbul Turkey Head of Computer Engineering Department Yildiz Technical University Istanbul Turkey
Determining moving objects for example spacecraft and visualizing them in defense simulation rapidly and correctly are important research issues in national defense. In US military C4ISR systems -command, control, com... 详细信息
来源: 评论
NLP-Based Microblogging Post Filtering for Disaster-Related Content
NLP-Based Microblogging Post Filtering for Disaster-Related ...
收藏 引用
advances in Data Engineering and Intelligent computing Systems (ADICS), international conference on
作者: Ajay Singh B N P Anila Krishna Lalithya ThangaKumar J Department of CSE Hindustan Institute of Technology and Science Chennai India
During times of tragedy, when the usual channels for emergency communication are overwhelmed, people are forced to utilize any means at their disposal in order to reach out and seek assistance from others. In case of ... 详细信息
来源: 评论
A hybrid transformation with a filter for advanced video coding
A hybrid transformation with a filter for advanced video cod...
收藏 引用
international conference on computing, communication and networking, ICCCN
作者: M. Ezhilarasan P. Thambidurai G. Harish M. Muthuraman R. Arulsezhian A. Arun V. Vijay Anand S. Dhinesh Kumar P. Navaneetha Krishnan Department of Computer Science & Engineering and Information Technology Pondicherry Engineering College Puducherry India
H.264/AVC is the most recent video coding standard developed by the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The main goal of the H.264/AVC standard has been to provide enhanced c... 详细信息
来源: 评论
Inter-networking security
Inter-networking security
收藏 引用
international conference on communication Systems
作者: G.W. Wang Inf. Technol. Inst. Nat. Comput. Board Singapore
Inter-networking security in a multi-vendor heterogeneous network environment is a critical problem for IT professionals. This paper analyzes the security threats in a multi-vendor network environment and proposes a n... 详细信息
来源: 评论