咨询与建议

限定检索结果

文献类型

  • 209,207 篇 会议
  • 2,863 篇 期刊文献
  • 2,180 册 图书
  • 10 篇 学位论文
  • 2 篇 科技报告
  • 1 件 标准

馆藏范围

  • 214,261 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 122,360 篇 工学
    • 88,722 篇 计算机科学与技术...
    • 65,223 篇 软件工程
    • 29,228 篇 信息与通信工程
    • 16,844 篇 控制科学与工程
    • 14,198 篇 电气工程
    • 10,729 篇 生物工程
    • 10,373 篇 机械工程
    • 9,909 篇 电子科学与技术(可...
    • 8,003 篇 生物医学工程(可授...
    • 6,862 篇 仪器科学与技术
    • 5,596 篇 光学工程
    • 5,218 篇 动力工程及工程热...
    • 4,950 篇 化学工程与技术
    • 4,722 篇 安全科学与工程
    • 4,353 篇 网络空间安全
    • 4,171 篇 交通运输工程
  • 49,087 篇 理学
    • 26,369 篇 数学
    • 11,557 篇 生物学
    • 11,445 篇 物理学
    • 8,060 篇 统计学(可授理学、...
    • 6,125 篇 系统科学
    • 4,970 篇 化学
  • 37,488 篇 管理学
    • 22,465 篇 管理科学与工程(可...
    • 17,567 篇 图书情报与档案管...
    • 10,757 篇 工商管理
  • 7,369 篇 医学
    • 6,190 篇 临床医学
    • 5,823 篇 基础医学(可授医学...
  • 5,480 篇 法学
    • 4,414 篇 社会学
  • 4,370 篇 教育学
    • 4,150 篇 教育学
  • 4,342 篇 经济学
    • 4,220 篇 应用经济学
  • 2,982 篇 农学
  • 1,724 篇 文学
  • 569 篇 艺术学
  • 556 篇 军事学
  • 35 篇 历史学
  • 28 篇 哲学

主题

  • 10,589 篇 cloud computing
  • 6,598 篇 computational mo...
  • 6,308 篇 information tech...
  • 5,011 篇 feature extracti...
  • 4,559 篇 accuracy
  • 4,088 篇 data mining
  • 4,069 篇 training
  • 3,681 篇 computer archite...
  • 3,289 篇 computer science
  • 3,270 篇 mobile computing
  • 3,143 篇 security
  • 3,097 篇 internet of thin...
  • 2,996 篇 machine learning
  • 2,977 篇 servers
  • 2,951 篇 deep learning
  • 2,948 篇 educational inst...
  • 2,932 篇 data models
  • 2,904 篇 protocols
  • 2,700 篇 real-time system...
  • 2,698 篇 monitoring

机构

  • 674 篇 university of ch...
  • 577 篇 institute of com...
  • 444 篇 school of comput...
  • 243 篇 maharishi school...
  • 235 篇 faculty of infor...
  • 202 篇 school of inform...
  • 190 篇 department of co...
  • 154 篇 faculty of compu...
  • 151 篇 department of co...
  • 141 篇 shenyang institu...
  • 141 篇 institute of inf...
  • 134 篇 college of infor...
  • 125 篇 maharishi school...
  • 117 篇 university of sc...
  • 116 篇 department of co...
  • 114 篇 lovely professio...
  • 114 篇 school of comput...
  • 112 篇 school of electr...
  • 111 篇 school of comput...
  • 109 篇 college of intel...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 88 篇 chen z.
  • 87 篇 wang wei
  • 83 篇 wei wang
  • 81 篇 zhang tao
  • 79 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 58 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 48 篇 xiao liu
  • 48 篇 li li
  • 47 篇 wang lei
  • 45 篇 xi chen

语言

  • 205,830 篇 英文
  • 6,409 篇 其他
  • 2,420 篇 中文
  • 25 篇 俄文
  • 18 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 7 篇 葡萄牙文
  • 6 篇 西班牙文
  • 2 篇 德文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
214265 条 记 录,以下是341-350 订阅
排序:
Threat-Specific Security Risk Evaluation in the Cloud  3
Threat-Specific Security Risk Evaluation in the Cloud
收藏 引用
international conference on Advances in computing, Communication and applied Informatics (ACCAI)
作者: Roobini, M. S. TejaSatyanrayana, B. SaiVenkataGirish, B. Sridevi, N. Pothumani, S. Sathyabama Inst Sci & Technol Dept Comp Sci & Engn Chennai 600119 Tamil Nadu India
In the modern world, data exchange security is a major concern. Users upload files to the data sharing system that have been encrypted using a private key. Because it makes it more difficult for the data owner to keep... 详细信息
来源: 评论
Evaluation on Segmented File Download Methods Using Parallel TCP/MPTCP Connections on Multiple Paths
Evaluation on Segmented File Download Methods Using Parallel...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Funasaka, Junichi Hiraoka, Noriaki Graduate School of Information Sciences Hiroshima City University Hiroshima Japan
The emergence of mobile terminals capable of utilizing multiple communication media presents an opportunity to enhance segmented file download methods by aggregating their bandwidth. Previous research has shown the po... 详细信息
来源: 评论
A Framework for User Biometric Privacy Protection in UAV Delivery Systems with Edge computing
A Framework for User Biometric Privacy Protection in UAV Del...
收藏 引用
IEEE international conference on Pervasive computing and Communications (PerCom)
作者: Yao, Aiting Pal, Shantanu Dong, Chengzu Li, Xuejun Liu, Xiao Anhui Univ Sch Comp Sci & Technol Hefei Peoples R China Deakin Univ Sch Informat Technol Melbourne Vic Australia
The development of intelligent logistics increasingly leads the evolution of future supply chain technology. As an innovative technology in the field of logistics, Unmanned Aerial Vehicles (UAVs) provide efficient, fa... 详细信息
来源: 评论
An Efficient Steganographic Approach for Securing Text Transmission Using S-Box in Cloud  2
An Efficient Steganographic Approach for Securing Text Trans...
收藏 引用
2nd international conference on Business Analytics for technology and Security, ICBATS 2023
作者: Ashraf, Humaira Malik, Javeria Ihsan, Uswa Al-Quayed, Fatima Humayun, Mamoona Jhanjhi, N.Z. International Islamic University Department of Computer Science and Software Engineering Islamabad Pakistan Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Taylor's University Malaysia Applied Science Research Center Applied Science Private University Amman11937 Jordan
In era of modern world and technology where everything is digitalized. Cloud computing emerged as one of the fastest growing parts of digital industry. With the Succor of cloud computing models, business accomplishes ... 详细信息
来源: 评论
Alternative Location Recommendation Methods to Avoid Crowding at Tourist Sites  9
Alternative Location Recommendation Methods to Avoid Crowdin...
收藏 引用
9th IEEE/ACIS international conference on Big Data, Cloud computing, and Data Science, BCD 2024
作者: Inaba, Kohki Iwashita, Motoi Graduate School of Social Systems Science Chiba Institute of Technology Chiba Japan Chiba Institute of Technology Dept. of Management Information Science Chiba Japan
Domestic travel has been revitalized following the shift of new coronavirus infection to category 5 infection. This has led to an increase in international visitors, but they are concentrated in major inbound cities s... 详细信息
来源: 评论
Advancing Support Vector Machines for Automated Medical Image Diagnosis
Advancing Support Vector Machines for Automated Medical Imag...
收藏 引用
2024 international conference on Optimization computing and Wireless Communication, ICOCWC 2024
作者: Agrawal, Ajay Gupta, Rupal Jebaraj, N.R. Solomon Sanskriti University Department of Mechanical Engineering Uttar Pradesh Mathura India Teetthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India
aid vector machines (SVMs) have become increasingly famous as computerized clinical photograph diagnosis gear due to their high performance in numerous duties, including binary classification and object segmentation. ... 详细信息
来源: 评论
Efficient Covert Communication Scheme Based on Ethereum  22
Efficient Covert Communication Scheme Based on Ethereum
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Li, Yuanyuan Chen, Wei Huang, Xin Han, Peng Zheng, Shenhai Zhu, Zhiqin Chongqing Univ Posts & Telecommun Coll Comp Sci & Technol Chongqing Peoples R China Chongqing Univ Posts & Telecommun Sch Automat Chongqing Peoples R China Chongqing Res Ctr Informat & Automat Technol Chongqing Peoples R China
Due to the continuous improvement of traffic analysis technology, traditional covert channels have become insecure and vulnerable to human sabotage. Blockchain technology has the characteristics of immutability and an... 详细信息
来源: 评论
Deep Reinforcement Learning for Video Caching and Updating in Mobile Edge computing Systems  4
Deep Reinforcement Learning for Video Caching and Updating i...
收藏 引用
4th international conference on Communication technology and information technology, ICCTIT 2024
作者: Liang, Minqun Huang, Ying Zhang, Jiahao Ye, Wanque Guangxi Eco-engineering Vocational and Technical College College of Vehicle and Information Engineering Liuzhou China Guangxi Normal University School of Computer Science and Engineering Guilin China
Using mobile edge computing (MEC) servers to cache and update video resources can not only save network bandwidth and computing resources, but also adjust the bit rate of video playback according to real-time network ... 详细信息
来源: 评论
Attribute Extraction of Geographic Entities Based on the LERT Pre-trained Model  24
Attribute Extraction of Geographic Entities Based on the LER...
收藏 引用
3rd international conference on Artificial Intelligence and Intelligent information Processing, AIIIP 2024
作者: Li, Zeyu North China Institute of Computing Technology Beijing China
Geographic information systems(GIS) are now changing from two-dimensional expression to three-dimensional expression, and the geographic data gradually transforms into a more intuitive and more applied method of expre... 详细信息
来源: 评论
Adoption of Blockchain technology for Digital Heritage to Improve Heritage Security  4
Adoption of Blockchain Technology for Digital Heritage to Im...
收藏 引用
4th international conference of Science and information technology in Smart Administration, ICSINTESA 2024
作者: Inayatulloh Bina Nusantara University Information Systems Department School of Information System Jakarta11480 Indonesia
Inheritance is all inheritance left by an heir in the form of rights, obligations, or assets left by someone after death. This includes everything that can be passed on to heirs, including assets, securities, and othe... 详细信息
来源: 评论