咨询与建议

限定检索结果

文献类型

  • 207,261 篇 会议
  • 2,867 篇 期刊文献
  • 2,167 册 图书
  • 9 篇 学位论文
  • 2 篇 科技报告
  • 1 件 标准

馆藏范围

  • 212,307 篇 电子文献
  • 7 种 纸本馆藏

日期分布

学科分类号

  • 121,452 篇 工学
    • 88,065 篇 计算机科学与技术...
    • 64,778 篇 软件工程
    • 28,931 篇 信息与通信工程
    • 16,540 篇 控制科学与工程
    • 13,993 篇 电气工程
    • 10,708 篇 生物工程
    • 10,303 篇 机械工程
    • 9,783 篇 电子科学与技术(可...
    • 7,962 篇 生物医学工程(可授...
    • 6,826 篇 仪器科学与技术
    • 5,513 篇 光学工程
    • 5,158 篇 动力工程及工程热...
    • 4,914 篇 化学工程与技术
    • 4,673 篇 安全科学与工程
    • 4,254 篇 网络空间安全
    • 4,119 篇 交通运输工程
  • 48,779 篇 理学
    • 26,182 篇 数学
    • 11,528 篇 生物学
    • 11,347 篇 物理学
    • 8,004 篇 统计学(可授理学、...
    • 6,122 篇 系统科学
    • 4,940 篇 化学
  • 37,236 篇 管理学
    • 22,317 篇 管理科学与工程(可...
    • 17,453 篇 图书情报与档案管...
    • 10,667 篇 工商管理
  • 7,297 篇 医学
    • 6,142 篇 临床医学
    • 5,780 篇 基础医学(可授医学...
  • 5,436 篇 法学
    • 4,390 篇 社会学
  • 4,326 篇 教育学
    • 4,106 篇 教育学
  • 4,323 篇 经济学
    • 4,201 篇 应用经济学
  • 2,958 篇 农学
  • 1,719 篇 文学
  • 565 篇 艺术学
  • 555 篇 军事学
  • 35 篇 历史学
  • 29 篇 哲学

主题

  • 10,522 篇 cloud computing
  • 6,468 篇 computational mo...
  • 6,234 篇 information tech...
  • 4,898 篇 feature extracti...
  • 4,266 篇 accuracy
  • 4,079 篇 data mining
  • 3,979 篇 training
  • 3,646 篇 computer archite...
  • 3,284 篇 computer science
  • 3,274 篇 mobile computing
  • 3,063 篇 security
  • 3,053 篇 internet of thin...
  • 2,970 篇 servers
  • 2,956 篇 educational inst...
  • 2,895 篇 machine learning
  • 2,884 篇 protocols
  • 2,839 篇 data models
  • 2,760 篇 deep learning
  • 2,629 篇 monitoring
  • 2,529 篇 predictive model...

机构

  • 653 篇 university of ch...
  • 570 篇 institute of com...
  • 443 篇 school of comput...
  • 243 篇 maharishi school...
  • 233 篇 faculty of infor...
  • 201 篇 school of inform...
  • 190 篇 department of co...
  • 151 篇 department of co...
  • 150 篇 faculty of compu...
  • 137 篇 institute of inf...
  • 135 篇 college of infor...
  • 132 篇 shenyang institu...
  • 125 篇 maharishi school...
  • 114 篇 department of co...
  • 114 篇 school of comput...
  • 113 篇 university of sc...
  • 112 篇 school of electr...
  • 111 篇 school of comput...
  • 106 篇 institute of inf...
  • 102 篇 telkom universit...

作者

  • 100 篇 leonard barolli
  • 97 篇 yang yang
  • 95 篇 lei wang
  • 88 篇 chen z.
  • 85 篇 wang wei
  • 83 篇 wei wang
  • 81 篇 zhang tao
  • 80 篇 jian wang
  • 76 篇 china
  • 74 篇 hoshina k.
  • 71 篇 liu yang
  • 65 篇 li wei
  • 57 篇 rui wang
  • 52 篇 feng liu
  • 51 篇 bin wang
  • 51 篇 wei li
  • 48 篇 li li
  • 47 篇 xiao liu
  • 47 篇 wang lei
  • 45 篇 xi chen

语言

  • 207,303 篇 英文
  • 2,997 篇 其他
  • 2,314 篇 中文
  • 25 篇 俄文
  • 20 篇 法文
  • 18 篇 乌克兰文
  • 8 篇 阿拉伯文
  • 7 篇 葡萄牙文
  • 6 篇 西班牙文
  • 4 篇 德文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Applied Computing and Information Technology"
212311 条 记 录,以下是4991-5000 订阅
排序:
Steganography Based on Image Morphing
Steganography Based on Image Morphing
收藏 引用
international Joint conference on Awareness Science and technology and Ubi-Media computing (iCAST-UMEDIA)
作者: Zhao, Qiangfu Kunii, Tosiyasu L. Univ Aizu Dept Comp & Informat Syst Aizu Wakamatsu Fukushima Japan
Nowadays, large scale data-centers have been built around the world, and cloud computing is becoming more and more popular. With the help of cloud computing, users can access their data and obtain different services a... 详细信息
来源: 评论
Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics
Fast Tamper Detection for Hierarchical Data in Live Cloud Fo...
收藏 引用
IEEE international conference on Electro/information technology (EIT)
作者: Liu, Anyi Fu, Huirong Oakland Univ Dept Comp Sci & Engn Rochester MI 48309 USA
For digital forensics in the era of cloud computing, it is crucial that forensic artifacts are seized from a cloud infrastructure and analyzed in a timely manner. Unfortunately, when the forensic artifacts (e.g., the ... 详细信息
来源: 评论
Eye-Tracking Examination of the Anthropological Race, Gender and Verbal-Pictorial Relative Positions on Ergonomics of Visual information Presentation
Eye-Tracking Examination of the Anthropological Race, Gender...
收藏 引用
10th international conference on applied Human Factors and Ergonomics (AHFE) / international conference on Ergonomics in Design
作者: Michalski, Rafal Koszela-Kulinska, Joanna Wroclaw Univ Sci & Technol Fac Comp Sci & Management 27 Wybrzeze Wyspianskiego St PL-50370 Wroclaw Poland
information on how to present visual content in an ergonomic way is crucial in various fields. The current study examines how the gender, race of a person, and picture-slogan relative location influence subjects' ... 详细信息
来源: 评论
Research on information Security technology Based on Blockchain  3
Research on Information Security Technology Based on Blockch...
收藏 引用
3rd IEEE international conference on Cloud computing and Big Data Analysis (ICCCBDA)
作者: Liu, Liang Xu, Budong Shandong Normal Univ Jinan Shandong Peoples R China
information security is the key to the development of modern Internet technology. The distributed mechanism, decentralized mechanism, password mechanism and scripted mechanism of the Blockchain present a completely ne... 详细信息
来源: 评论
Research on Computer Processing technology of Big Data Based on Cloud Environment  3
Research on Computer Processing Technology of Big Data Based...
收藏 引用
3rd international conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC)
作者: Du, Chenglong Guangdong Univ Sci & Technol Dongguan 523083 Guangdong Peoples R China
With the development of The Times, the Internet has become an essential part of people's *** order to meet the needs of the market, it is necessary to continuously optimize and innovate in technology and display v... 详细信息
来源: 评论
A Survey of Computation Offloading in Edge computing
A Survey of Computation Offloading in Edge Computing
收藏 引用
international conference on Computer, information and Telecommunication Systems (IEEE CITS)
作者: Zheng, Tao Wan, Jian Zhang, Jilin Jiang, Congfeng Jia, Gangyong Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou 310018 Peoples R China Zhejiang Shuren Univ Coll Informat Sci & Technol Hangzhou 310015 Peoples R China
Computation offloading is a critical technology for emerging edge computing and Internet of things (IoT). It is views as a solution of the limited resources of IoT devices by offloading tasks to other devices or serve... 详细信息
来源: 评论
Forecasting stock exchange using soft computing techniques
Forecasting stock exchange using soft computing techniques
收藏 引用
2010 ACS/IEEE international conference on Computer Systems and Applications, AICCSA 2010
作者: Rahamneh, Zainab Reyalat, Mohamed Sheta, Alaa Aljahdali, Sultan Information Technology Department Prince Abdullah Bin Ghazi Faculty of Science and Information Technology Al-Balqa Applied University Salt Jordan Department of Computer Science and Engineering College of Computers and Information Systems Taif University Taif Saudi Arabia College of Computers and Information Systems Taif University Taif Saudi Arabia
The financial industry is becoming more and more dependent on advanced computer technologies in order to maintain competitiveness in a global economy. Fuzzy logic represents an exciting technology with a wide scope fo... 详细信息
来源: 评论
IoT Security: Ongoing Challenges and Research Opportunities  7
IoT Security: Ongoing Challenges and Research Opportunities
收藏 引用
IEEE 7th international conference on Service-Oriented computing and Applications (SOCA)
作者: Zhang, Zhi-Kai Cho, Michael Cheng Yi Wang, Chia-Wei Hsu, Chia-Wei Chen, Chong-Kuan Shieh, Shiuhpyng Natl Chiao Tung Univ Dept Comp Sci Hsinchu Taiwan
The Internet of Things (IoT) opens opportunities for wearable devices, home appliances, and software to share and communicate information on the Internet. Given that the shared data contains a large amount of private ... 详细信息
来源: 评论
THE RESEARCH AND IMPLEMENTATION OF CLOUD computing PLATFORM BASED ON DOCKER  11
THE RESEARCH AND IMPLEMENTATION OF CLOUD COMPUTING PLATFORM ...
收藏 引用
11th international Computer conference on Wavelet Active Media technology and information Processing (ICCWAMTIP)
作者: Liu, Di Zhao, Libin Univ Elect Sci & Technol China Int Ctr Wavelet Anal & Its Applicat Sch Informat & Software Engn Chengdu 611731 Peoples R China
Cloud computing is now leading-edge Internet technology and virtualization technology is one of the important part of cloud computing system. Virtualization, in computing, refers to the act of creating a virtual (rath... 详细信息
来源: 评论
Spectrum Monitoring System Based on Edge computing and Application  2
Spectrum Monitoring System Based on Edge Computing and Appli...
收藏 引用
2nd international conference on Artificial Intelligence, Automation, and High-Performance computing, AIAHPC 2022
作者: Wang, Ding Chen, Jianyun Zhou, Yongbin Li, Pan College of Intelligence Science and Technology National University of Defense Technology Changsha China Beijing Institute of Tracking Telecommunication Technology Beijing China
With the increase of the number of frequency terminals, the electromagnetic spectrum resource becomes particularly important. The traditional electromagnetic spectrum monitoring system is faced with the problems of in... 详细信息
来源: 评论