咨询与建议

限定检索结果

文献类型

  • 191,938 篇 会议
  • 1,973 册 图书
  • 1,433 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,355 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,927 篇 工学
    • 86,613 篇 计算机科学与技术...
    • 63,779 篇 软件工程
    • 30,642 篇 信息与通信工程
    • 14,723 篇 控制科学与工程
    • 12,639 篇 电气工程
    • 10,398 篇 生物工程
    • 8,351 篇 电子科学与技术(可...
    • 7,746 篇 机械工程
    • 7,401 篇 生物医学工程(可授...
    • 5,717 篇 仪器科学与技术
    • 5,138 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,547 篇 安全科学与工程
    • 4,430 篇 网络空间安全
    • 3,909 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,474 篇 理学
    • 23,768 篇 数学
    • 11,210 篇 生物学
    • 9,444 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,280 篇 系统科学
    • 4,058 篇 化学
  • 32,618 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,303 篇 图书情报与档案管...
    • 9,771 篇 工商管理
  • 6,880 篇 医学
    • 5,810 篇 临床医学
    • 5,438 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,399 篇 法学
    • 4,407 篇 社会学
  • 3,675 篇 经济学
    • 3,619 篇 应用经济学
  • 3,255 篇 教育学
  • 2,631 篇 农学
  • 1,510 篇 文学
  • 536 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,521 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,700 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,537 篇 data mining
  • 3,485 篇 computer archite...
  • 3,413 篇 image coding
  • 3,270 篇 internet of thin...
  • 3,168 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,915 篇 computer science
  • 2,890 篇 protocols
  • 2,698 篇 machine learning
  • 2,680 篇 deep learning
  • 2,549 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 556 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 224 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 134 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 98 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,586 篇 英文
  • 3,413 篇 其他
  • 1,975 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195356 条 记 录,以下是221-230 订阅
排序:
Mobile-Aware Placement: Optimizing Energy Consumption and Delay of Data Stream Applications in Edge computing  4
Mobile-Aware Placement: Optimizing Energy Consumption and De...
收藏 引用
4th international conference on Computer Vision, Application, and Algorithm, CVAA 2024
作者: Jin, Pengcheng Wu, Yi Huang, Jingyu Ji, Ying Software Technology Co. Ltd. Jiangsu Suzhou China
With the rapid development of 5G and IoT, traditional cloud computing faces limitations due to increasing demands. Edge computing addresses these issues by offloading tasks to nearby nodes, thereby improving efficienc... 详细信息
来源: 评论
Faster Set Cover in the MPC Model  25
Faster Set Cover in the MPC Model
收藏 引用
26th international conference on Distributed computing and Networking, ICDCN 2025
作者: Ji, Hongyan Pai, Shreyas Pemmaraju, Sriram Sobel, Joshua The University of Iowa Iowa CityIA United States Indian Institute of Technology Madras Chennai India
The Massively Parallel Computation (MPC) model is a popular abstraction for large-scale distributed computing. The Set Cover problem is a classical combinatorial optimization problem that has a wide variety of applica... 详细信息
来源: 评论
A Study on Hardware-based Implementation of Homomorphic Encryption  3
A Study on Hardware-based Implementation of Homomorphic Encr...
收藏 引用
3rd international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, IITCEE 2025
作者: Singh, Gurdeep Mittal, Sonam Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Homomorphic encryption is an innovative cryptographic mechanism that allows performing cryptographic operations even on encoded data without intermediate decoding. As a result, sensitive information cannot be compromi... 详细信息
来源: 评论
Forecasting Net Profit in Artificial Mussel Farming Through Linear Regression Analysis  6
Forecasting Net Profit in Artificial Mussel Farming Through ...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Roshan Ackthar, M.J. Hema Vardhan, K. Abhilash, K. Saketh, R.M.V.S. Sundarrajan, R. Dept. Information Technology Kalasalingam Academy of Research and Education College Tamil Nadu Krishnankoil India
The idea of controlling muscular income loss is critical towards optimum performance and provides an assurance of efficient growth in the aquaculture sector. This study investigates factors determining net profit such... 详细信息
来源: 评论
Blockchain-based secure crowdsourcing scheme to support solution reuse  4
Blockchain-based secure crowdsourcing scheme to support solu...
收藏 引用
4th international conference on Network Communication and information Security, ICNCIS 2024
作者: Zhang, Yitong Cui, Wenxuan Miao, Jianchen Xi'an Aviation Computing Technology Research Institute Shaanxi Xian710065 China
Crowdsourcing is a way to solve complex tasks by publicly collecting solutions on the network. The crowdsourcing system that provides task completion and solution reuse facilitates human life and promotes economic dev... 详细信息
来源: 评论
Developing Critical Thinking Skills in Undergraduate Students: A Mapping Study in computing Education  17
Developing Critical Thinking Skills in Undergraduate Student...
收藏 引用
17th international conference on Computer Supported Education, CSEDU 2025
作者: de Andrade Mota, Davy dos Santos, Simone C. Informatic Center Federal University of Pernambuco Pernambuco Recife Brazil
In the dynamic context of the digital age, academic training in information technology (IT) transcends the mere assimilation of theoretical knowledge, equally requiring the promotion of critical thinking among student... 详细信息
来源: 评论
Real-Time Oil Spill Detection and Analysis Using Drones and SAR Imaging Techniques  5
Real-Time Oil Spill Detection and Analysis Using Drones and ...
收藏 引用
5th international conference on Emerging Systems and Intelligent computing, ESIC 2025
作者: Jagtap, Gaurav More, Harsh Khure, Siddhi Deshmukh, Sayli Mirajkar, Riddhi Futane, Pravin Vishwakarma Institute of Information Technology Department of Information Technology Pune411046 India
Oil spills are considerable environmental and economic threats to marine ecosystems. Source: Our idea describes a drone-based approach to provide real time detection and monitoring of oil spills in water bodies. A dro... 详细信息
来源: 评论
Weak Signal Detection technology in Big Data Based on Knowledge Base  24
Weak Signal Detection Technology in Big Data Based on Knowle...
收藏 引用
2nd international conference on Advances in Artificial Intelligence and Applications, AAIA 2024
作者: Zhou, Lei School of Cixi Zhejiang Business Technology Institute Ningbo China
With the development of science and technology and the progress of data processing technology, big data weak signal detection is playing an increasingly important role in scientific research and engineering applicatio... 详细信息
来源: 评论
Integration of Blockchain and Fog computing—A Review  5th
Integration of Blockchain and Fog Computing—A Review
收藏 引用
5th international conference on Advances in information Communication technology and computing, AICTC 2024
作者: Kaur, Nirbeh Kumar, Shubham Kumar, Ritik Ranjana, Khushi Anand, Kumar Abhishek Gupta, Shailendra Kumar Department of Computer Science and Engineering Chandigarh University Punjab Mohali India Department of Electrical Engineering Chandigarh University Punjab Mohali India
"Integration of blockchain and fog computing" involves the two different concepts, i.e. blockchain technology and fog computing which has something in common—the decentralised system. The rapid advancement ... 详细信息
来源: 评论
FOGSAFE: IoT enabled V2V communication system for enhanced visibility and safety in low visibility conditions  1st
FOGSAFE: IoT enabled V2V communication system for enhanced v...
收藏 引用
1st international conference on Applications of AI in 5G and IOT, ICAAI5GI 2024
作者: Ishita Izna Sharma, Kapil Department of Information Technology Delhi Technological University Delhi India
The development of the Internet of Things (IoT) idea in the form of Internet of Vehicles (IoV) has provided a solution to all of the challenges associated with operating a vehicle. The full potential of IoV creates a ... 详细信息
来源: 评论