咨询与建议

限定检索结果

文献类型

  • 8,440 篇 会议
  • 50 篇 期刊文献
  • 29 册 图书

馆藏范围

  • 8,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,427 篇 工学
    • 3,376 篇 计算机科学与技术...
    • 2,256 篇 软件工程
    • 1,099 篇 信息与通信工程
    • 819 篇 控制科学与工程
    • 769 篇 电气工程
    • 357 篇 生物工程
    • 334 篇 电子科学与技术(可...
    • 255 篇 机械工程
    • 251 篇 动力工程及工程热...
    • 195 篇 生物医学工程(可授...
    • 185 篇 网络空间安全
    • 178 篇 仪器科学与技术
    • 148 篇 交通运输工程
    • 140 篇 安全科学与工程
    • 139 篇 光学工程
    • 115 篇 化学工程与技术
  • 2,204 篇 理学
    • 1,653 篇 数学
    • 392 篇 生物学
    • 367 篇 统计学(可授理学、...
    • 331 篇 物理学
    • 305 篇 系统科学
    • 118 篇 化学
  • 1,107 篇 管理学
    • 804 篇 管理科学与工程(可...
    • 366 篇 图书情报与档案管...
    • 335 篇 工商管理
  • 174 篇 医学
    • 151 篇 临床医学
    • 145 篇 基础医学(可授医学...
  • 146 篇 法学
    • 121 篇 社会学
  • 132 篇 文学
    • 128 篇 新闻传播学
  • 114 篇 经济学
    • 112 篇 应用经济学
  • 58 篇 教育学
  • 43 篇 农学
  • 16 篇 军事学
  • 9 篇 艺术学

主题

  • 1,133 篇 convergence
  • 442 篇 cloud computing
  • 413 篇 optimization
  • 343 篇 computational mo...
  • 293 篇 genetic algorith...
  • 230 篇 information tech...
  • 200 篇 algorithm design...
  • 198 篇 particle swarm o...
  • 195 篇 neural networks
  • 182 篇 resource managem...
  • 178 篇 servers
  • 175 篇 training
  • 170 篇 internet of thin...
  • 162 篇 computer archite...
  • 143 篇 real-time system...
  • 143 篇 mobile computing
  • 141 篇 wireless sensor ...
  • 137 篇 educational inst...
  • 136 篇 costs
  • 129 篇 deep learning

机构

  • 37 篇 university of ch...
  • 28 篇 state key labora...
  • 25 篇 college of compu...
  • 25 篇 chitkara univers...
  • 22 篇 amrita vishwa vi...
  • 18 篇 beijing key labo...
  • 17 篇 school of comput...
  • 15 篇 university of sc...
  • 15 篇 shenyang institu...
  • 15 篇 college of compu...
  • 15 篇 school of inform...
  • 14 篇 school of comput...
  • 14 篇 department of co...
  • 14 篇 college of infor...
  • 13 篇 faculty of infor...
  • 13 篇 college of compu...
  • 13 篇 national univers...
  • 13 篇 institute of com...
  • 12 篇 communication un...
  • 12 篇 state key labora...

作者

  • 40 篇 jeong jongpil
  • 23 篇 kim dong-seong
  • 20 篇 lee jae-min
  • 19 篇 yang yang
  • 14 篇 wang hui
  • 14 篇 pan jeng-shyang
  • 13 篇 wang lei
  • 12 篇 zhiwei ye
  • 12 篇 dong-seong kim
  • 11 篇 sampedro gabriel...
  • 11 篇 peeta basa pati
  • 11 篇 younghan kim
  • 11 篇 jongpil jeong
  • 10 篇 jongwon kim
  • 10 篇 rajagopal shinu ...
  • 10 篇 lee jae min
  • 9 篇 jie yang
  • 9 篇 li li
  • 9 篇 liu yang
  • 9 篇 jae-min lee

语言

  • 8,349 篇 英文
  • 143 篇 其他
  • 38 篇 中文
  • 1 篇 法文
检索条件"任意字段=International Conference on Computing and Convergence Technology"
8519 条 记 录,以下是181-190 订阅
排序:
State Monitoring Method of Optical Cable Combined with Computer Multi-Information Sensing Fusion technology  3
State Monitoring Method of Optical Cable Combined with Compu...
收藏 引用
3rd international conference on Electronic Informationtechnology and Smart Agriculture, ICEITSA 2023
作者: Chen, Yilong Zhu, Jingkai Gan, Zhong Feng, Chen State Grid Shanghai Municipal Electric Power Company Shanghai China
In order to improve the real-time monitoring effect of optical cable state, this paper combines computer multi-information sensing fusion technology to monitor optical cable state in real time, and develops a technolo... 详细信息
来源: 评论
PentraFormer: Learning Agents for Automated Penetration Testing via Sequence Modeling  17
PentraFormer: Learning Agents for Automated Penetration Test...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE international conference on Internet of Things, iThings 2024, 20th IEEE international conference on Green computing and Communications, GreenCom 2024, 17th IEEE international conference on Cyber, Physical and Social computing, CPSCom 2024, 10th IEEE international conference on Smart Data, SmartData 2024
作者: Wang, Yunfei Liu, Shixuan Wang, Wenhao Zhu, Cheng Fan, Changjun Huang, Kuihua Chen, Chao National University of Defense Technology National Key Laboratory of Information Systems Engineering Changsha China National University of Defense Technology Laboratory for Big Data and Decision Changsha China National University of Defense Technology Changsha China
The exponential growth of computer networks has intensified the requirement for robust security measures, rendering penetration testing - an essential practice that assesses vulnerabilities by simulating attacks - cri... 详细信息
来源: 评论
Unveiling Hidden Patterns: Clustering Algorithms on C Code embedding  9
Unveiling Hidden Patterns: Clustering Algorithms on C Code e...
收藏 引用
9th IEEE international conference for convergence in technology, I2CT 2024
作者: Spoorthi, M. Savant, Richa Vivek Seshadri, Samarth Narmada, Nakka Pati, Peeta Basa Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bengaluru India
Automatic grading can help streamline assessment by using advanced algorithms to evaluate embedded C programs swiftly and objectively. This technology ensures standardized evaluations, providing quick and objective fe... 详细信息
来源: 评论
An Initialization Method of Genetic Algorithm for Robot Path Planning Based on Directed Acyclic Graph and Effective Obstacles*  25
An Initialization Method of Genetic Algorithm for Robot Path...
收藏 引用
25th IEEE international conference on Industrial technology, ICIT 2024
作者: Li, Yanjie Liu, Xiongding Wei, Wu School Of Automation Jiangsu University Of Science And Technology Zhenjiang China School Of Automation Science And Engineering South China University Of Technology Guangzhou China
Genetic algorithm (GA) has received widespread attention in robot path planning with its advantages of parallel computing. The quality of the initial population is a key factor in improving the efficiency of GA, so re... 详细信息
来源: 评论
Research on Quantitative Evaluation technology for Intelligent Cabin  3
Research on Quantitative Evaluation Technology for Intellige...
收藏 引用
3rd international conference on Intelligent computing, Communication and convergence, ICI3C 2023
作者: Zhou, Sheng Zhou, Wei Geng, Xin Liu, Lu Dong, Xuan Research Institute of Highway Ministry of Transport Ministry of Transport Beijing China Key Laboratory of Operation Safety Technology on Transport Vehicles Ministry of Transport PRC No. 8 Xitucheng Road Beijing Haidian District100088 China
In recent years, the development of intelligent cabins has been rapid, but testing and evaluation usually involves detecting a single component, lacking a quantitative evaluation method for the overall performance of ... 详细信息
来源: 评论
Revolutionizing Military Training: A Comprehensive Review of Tactical and Technical Training through Augmented Reality, Virtual Reality, and Haptics  9
Revolutionizing Military Training: A Comprehensive Review of...
收藏 引用
9th IEEE international conference for convergence in technology, I2CT 2024
作者: Tanwar, Vishesh Anand, Vatsala Aggarwal, Priyanshi Kumar, Mukesh Kumar, Gotte Ranjith Chitkara University Institute of Engineering & Technology Chitkara University Punjab India Graphic Era Hill University Computer Science And Engineering Uttarakhand Dehradun248002 India Sr University School of Computer Science & Artificial Intelligence Warangal India
With technologies such as robots, artificial intelligence, the Internet of Things, and quantum computing being developed to attain digital superiority, modern military applications have the potential to fundamentally ... 详细信息
来源: 评论
Elucidating the role of Device architecture for Mott-insulator based Memory technology  9
Elucidating the role of Device architecture for Mott-insulat...
收藏 引用
9th IEEE international conference for convergence in technology, I2CT 2024
作者: Maramreddy, Sainath Reddy Arige, Sumanth Dixit, Tejendra Iiitdm Kancheepuram Department of Ece Chennai600127 India
Emerging memory technologies are driven by the escalating demand for advanced, high-performance, and energy-efficient memory solutions. Traditional technologies, while effective, face challenges in meeting the demands... 详细信息
来源: 评论
Rail Camera: An Edge Resource Management for Smart Farm Application  14
Rail Camera: An Edge Resource Management for Smart Farm Appl...
收藏 引用
14th international conference on Information and Communication technology convergence, ICTC 2023
作者: Kum, Seungwoo Moon, Jaewon Kim, Youngkee Carvajal, Alejandro Barrera Oh, Seungtaek Perez, Francisco Andres Korea Electronics Technology Institute Information and Media Research Center Seongnam Korea Republic of Ct Engineering Group Madrid Spain
Edge computing is one of the most important technology for the industry to realize analysis with deep learning technology. The edge computing architecture provides many benefits over cloud computing, since it reduces ... 详细信息
来源: 评论
Decentralized Face Recognition Surveillance System Leveraging the convergence of IoT, Cloud computing, and Blockchain  14
Decentralized Face Recognition Surveillance System Leveragin...
收藏 引用
14th international conference on Advances in computing, Control, and Telecommunication Technologies, ACT 2023
作者: Sarapu, Sharat Chandra Manchi Hegde, Nagaratna Parameshwar Vikkurty, Sireesha Mubeen, Sameeha Department of Computer Science and Engineering Vasavi College of Engineering Hyderabad India
The traditional CCTV security systems are very vulnerable as they are centralized and any damage done to the central server results in alteration of the evidence entirely. Moreover, there is space for innovation in th... 详细信息
来源: 评论
SoK: Autonomic computing Based Mehods for ICS/SCADA and IIoT Security
SoK: Autonomic Computing Based Mehods for ICS/SCADA and IIoT...
收藏 引用
2024 IEEE international conference on Cyber Security and Resilience, CSR 2024
作者: Rouff, Christopher Tekeoglu, Ali Johns Hopkins University Applied Physics Laboratory & Jhu Whiting School of Engineering United States Leidos Innovations Center United States Johns Hopkins University Whiting School of Engineering United States
Industrial Control Systems (ICS) stand out as a prime target for global attackers due to their critical role in many nation's infrastructure. The autonomy and proactive nature of autonomic systems make them inhere... 详细信息
来源: 评论