咨询与建议

限定检索结果

文献类型

  • 191,938 篇 会议
  • 1,973 册 图书
  • 1,433 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,355 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,927 篇 工学
    • 86,613 篇 计算机科学与技术...
    • 63,779 篇 软件工程
    • 30,642 篇 信息与通信工程
    • 14,723 篇 控制科学与工程
    • 12,639 篇 电气工程
    • 10,398 篇 生物工程
    • 8,351 篇 电子科学与技术(可...
    • 7,746 篇 机械工程
    • 7,401 篇 生物医学工程(可授...
    • 5,717 篇 仪器科学与技术
    • 5,138 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,547 篇 安全科学与工程
    • 4,430 篇 网络空间安全
    • 3,909 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,474 篇 理学
    • 23,768 篇 数学
    • 11,210 篇 生物学
    • 9,444 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,280 篇 系统科学
    • 4,058 篇 化学
  • 32,618 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,303 篇 图书情报与档案管...
    • 9,771 篇 工商管理
  • 6,880 篇 医学
    • 5,810 篇 临床医学
    • 5,438 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,399 篇 法学
    • 4,407 篇 社会学
  • 3,675 篇 经济学
    • 3,619 篇 应用经济学
  • 3,255 篇 教育学
  • 2,631 篇 农学
  • 1,510 篇 文学
  • 536 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,521 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,700 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,537 篇 data mining
  • 3,485 篇 computer archite...
  • 3,413 篇 image coding
  • 3,270 篇 internet of thin...
  • 3,168 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,915 篇 computer science
  • 2,890 篇 protocols
  • 2,698 篇 machine learning
  • 2,680 篇 deep learning
  • 2,549 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 556 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 224 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 134 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 98 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,586 篇 英文
  • 3,413 篇 其他
  • 1,975 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195356 条 记 录,以下是371-380 订阅
排序:
The Evolution of Cloud computing Towards a Vendor Agnostic Market Place Using the SKY CONTROL Framework  15
The Evolution of Cloud Computing Towards a Vendor Agnostic M...
收藏 引用
15th international conference on Cloud computing and Services Science, CLOSER 2025
作者: Cocos, Henry-Norbert Baun, Christian Kappes, Martin Frankfurt University of Applied Sciences Nibelungeplatz 1 Frankfurt am MainD-60318 Germany
Multi-cloud environments offer benefits like vendor diversification and resilience but pose challenges such as increased management complexity, lack of cost transparency, and compliance. This concept paper introduces ... 详细信息
来源: 评论
HyCMAx: Power-Efficient Hybrid CMOS-Memristor Based Approximate Dividers for Error-Resilient Applications  38
HyCMAx: Power-Efficient Hybrid CMOS-Memristor Based Approxim...
收藏 引用
38th international conference on VLSI Design, VLSID 2025
作者: Pokharia, Monika Trivedi, Het Doshi, Siddharth Hegde, Ravi S. Mekie, Joycee Indian Institute of Technology Gandhinagar India
Approximate computing is a promising paradigm for improving the performance parameters of electronic systems at the expense of accuracy in error-resilient tasks such as multimedia processing, image multiplication, and... 详细信息
来源: 评论
Analysis of Artificial Intelligence technology Adoption in an Educational Environment: Open AI Case Study Using the Innovation Diffusion Theory Framework (IDT)
Analysis of Artificial Intelligence Technology Adoption in a...
收藏 引用
2025 international conference on Advancement in Data Science, E-learning and information System, ICADEIS 2025
作者: Pangestu, Yandi Putra Utomo, Rio Guntur Fathoni, Muhammad Faris School of Computing Telkom University Bandung Indonesia
This study aims to identify factors that influence the adoption of artificial intelligence (AI) technology, specifically the ChatGPT chatbot, in the context of higher education in Indonesia. Using an extended Innovati... 详细信息
来源: 评论
Review of Self-driving Car Based on NEAT Algorithm  5th
Review of Self-driving Car Based on NEAT Algorithm
收藏 引用
5th international conference on Advances in information Communication technology and computing, AICTC 2024
作者: Hotkar, Om Nambiar, Prahas Dhumane, Amol Chiwhane, Shwetambari Sharma, Aditi Dharrao, Deepak Meshram, Vishal Symbiosis Institute of Technology Pune India Vishwakarma Institute of Information Technology Pune India
In current meta of Artificial Intelligence and Machine Learning, Self-Driving has gained a lot of popularity. Due to one-on-many usages of the technology, it becomes a massive challenge to deliver edge-driven technolo... 详细信息
来源: 评论
Contrast Memory for Unsupervised Anomaly Detection
Contrast Memory for Unsupervised Anomaly Detection
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Jiahao Chen, Yiqiang Xing, Yunbing Gu, Yang Lan, Xiangyuan Institute of Computing Technology Chinese Academy of Sciences Beijing China Pengcheng Laboratory Shenzhen China University of Chinese Academy of Sciences Beijing China Beijing Key Laboratory of Mobile Computing and Pervasive Device Beijing China Guangzhou China
Real-world multivariate time series unsupervised anomaly detection is a challenging problem due to intricate temporal correlations. Recently, impressive progress have been made in tackling this issue through the desig... 详细信息
来源: 评论
Fingerprint Secure Authentication with distributed keys  24
Fingerprint Secure Authentication with distributed keys
收藏 引用
8th international conference on Electronic information technology and Computer Engineering, EITCE 2024
作者: Liu, Yunfan Ma, Cheng Chen, Yiru Kuang, Houdong Wang, Huiyong School of Mathematics and Computing Science Guilin University of Electronic Technology Guangxi Guilin China
Nowadays, when biometric identification is widely used, privacy protection in identification has become a very important issue. In recent years, many scholars have contributed to the biometric authentication with cryp... 详细信息
来源: 评论
Exploring Multimodal information Fusion in Spoken Off-Topic Degree Assessment  13th
Exploring Multimodal Information Fusion in Spoken Off-Topic ...
收藏 引用
13th international conference on Natural Language Processing and Chinese computing
作者: Cong, Fan Shen, Guo Wumaier, Aishan Xinjiang Univ Sch Comp Sci & Technol Urumqi Peoples R China
Currently, most research methods for spoken off-topic detection are based on the results of upstream speech recognition tasks. However, upstream speech recognition tasks may introduce issues such as homophones, text r... 详细信息
来源: 评论
The Cram of Network Safety with its Sharp Attacks and Protective Measures  1
The Cram of Network Safety with its Sharp Attacks and Protec...
收藏 引用
1st international conference on AIML-Applications for Engineering and technology, ICAET 2025
作者: Deshpande, Sakshi Devare, Aniket Dhakulkar, Malhar Ingle, Anup Chippalkatti, Srinivas Deshpande, Arati Vishwakarma Institute of Information Technology Pune India Vishwakarma University Pune India Vishwakarma Institute of Technology Pune India
In Security stands as a cornerstone in the realm of computing and networking technology. At the heart of every endeavor in network design, planning, construction, and operation lies the pivotal necessity of a robust s... 详细信息
来源: 评论
Learning to Program: Mapping Errors and Misconceptions of Python Novices to Support the Design of Intelligent Programming Tutors  17
Learning to Program: Mapping Errors and Misconceptions of Py...
收藏 引用
17th international conference on Computer Supported Education, CSEDU 2025
作者: van der Heyden, Lisa Batur, Fatma Chounta, Irene-Angelica Department of Human-centered Computing and Cognitive Science University of Duisburg-Essen Duisburg Germany Computing Education Research Group University of Duisburg-Essen Essen Germany
Students often struggle with basic programming tasks after their first programming course. Adaptive tutoring systems can support students’ practice by generating tasks, providing feedback, and evaluating students’ p... 详细信息
来源: 评论
AI Modeling and Water Quality Sensing Technique Proffers Water Security: An Open Review  3
AI Modeling and Water Quality Sensing Technique Proffers Wat...
收藏 引用
3rd international conference on Electronics and Renewable Systems, ICEARS 2025
作者: Wilfred Blessing, N.R. Palarimath, Suresh Gunasekaran, Hemalatha Haidar, Sk Wasim Sutherlin Subitha, G. Sarmila, J. University of Technology and Applied Sciences College of Computing and Information Sciences Ibri Oman University of Technology and Applied Sciences College of Computing and Information Sciences Salalah Oman Stella Mary's College of Engineering Department of Computer Science and Engineering Kanyakumari District India St. Xavier's Catholic College of Engineering Department of Computer Science and Engineering Tamil Nadu Chunkankadai India
Water Quality Sensors (WQSs) are becoming a promised tool in water quality data assessment and scientific value of aquatic structure. Such sensors are broadly used to produce live results by evaluating major water qua... 详细信息
来源: 评论