咨询与建议

限定检索结果

文献类型

  • 191,577 篇 会议
  • 1,430 篇 期刊文献
  • 400 册 图书
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 193,416 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,593 篇 工学
    • 86,429 篇 计算机科学与技术...
    • 63,696 篇 软件工程
    • 30,476 篇 信息与通信工程
    • 14,590 篇 控制科学与工程
    • 12,572 篇 电气工程
    • 10,396 篇 生物工程
    • 8,305 篇 电子科学与技术(可...
    • 7,629 篇 机械工程
    • 7,410 篇 生物医学工程(可授...
    • 5,673 篇 仪器科学与技术
    • 5,139 篇 光学工程
    • 4,746 篇 动力工程及工程热...
    • 4,545 篇 安全科学与工程
    • 4,321 篇 网络空间安全
    • 3,901 篇 化学工程与技术
    • 3,759 篇 交通运输工程
  • 43,350 篇 理学
    • 23,668 篇 数学
    • 11,208 篇 生物学
    • 9,432 篇 物理学
    • 7,276 篇 统计学(可授理学、...
    • 5,269 篇 系统科学
    • 4,052 篇 化学
  • 32,558 篇 管理学
    • 19,816 篇 管理科学与工程(可...
    • 15,267 篇 图书情报与档案管...
    • 9,773 篇 工商管理
  • 6,830 篇 医学
    • 5,811 篇 临床医学
    • 5,438 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,391 篇 法学
    • 4,402 篇 社会学
  • 3,668 篇 经济学
    • 3,613 篇 应用经济学
  • 3,249 篇 教育学
  • 2,630 篇 农学
  • 1,508 篇 文学
  • 535 篇 军事学
  • 370 篇 艺术学
  • 16 篇 历史学
  • 12 篇 哲学

主题

  • 9,517 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,701 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,530 篇 data mining
  • 3,485 篇 computer archite...
  • 3,415 篇 image coding
  • 3,273 篇 internet of thin...
  • 3,144 篇 security
  • 2,986 篇 servers
  • 2,948 篇 mobile computing
  • 2,912 篇 computer science
  • 2,894 篇 protocols
  • 2,667 篇 deep learning
  • 2,621 篇 machine learning
  • 2,554 篇 real-time system...
  • 2,544 篇 educational inst...
  • 2,466 篇 wireless sensor ...

机构

  • 629 篇 university of ch...
  • 545 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 221 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 149 篇 school of comput...
  • 142 篇 lovely professio...
  • 140 篇 key laboratory o...
  • 137 篇 department of co...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 104 篇 lei wang
  • 103 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 73 篇 zhang tao
  • 73 篇 wang wei
  • 67 篇 jian wang
  • 65 篇 china
  • 59 篇 wei wang
  • 57 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 49 篇 li cheng
  • 46 篇 feng liu
  • 46 篇 zhang lin
  • 45 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 188,720 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
193417 条 记 录,以下是4801-4810 订阅
排序:
Social-enhanced recommendation using graph-based contrastive learning  25
Social-enhanced recommendation using graph-based contrastive...
收藏 引用
25th IEEE international conferences on High Performance computing and Communications, 9th international conference on Data Science and Systems, 21st IEEE international conference on Smart City and 9th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Xue, Peng Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
The social network-based recommendation model use social network information to mitigate data sparsity issues and improve the accuracy of recommendation models. However, In most social network-based recommendation alg... 详细信息
来源: 评论
Assessing the Applicability of Adversarial Machine Learning Approaches for Cybersecurity  2
Assessing the Applicability of Adversarial Machine Learning ...
收藏 引用
2nd international conference on Advances in Computation, Communication and information technology, ICAICCIT 2024
作者: Takkalapally, Prashamsh Sharma, Nandan Jaggi, Arjun Hudani, Karim Gupta, Ketan Natarajan, Yuvaraj Department of Engineering Computing and Mathematical Sciences Lewis University United States Senior Security Analyst BC Public Service VictoriaBC Canada HCLTech San DiegoCA United States Tampa FL United States Dept. of Information Technology University of The Cumberlands WilliamsburgKY United States Department of Computer Science Engineering Sri Shakthi institute of engineering and technology Tamil Nadu Coimbatore India
Adverse machine learning (AML) is a rising area of study that uses system-mastering algorithms to perceive malicious hobbies or to discover malicious adversaries in cybersecurity settings. This research domain combine... 详细信息
来源: 评论
Deep Learning-based Workload Prediction in Cloud computing to Enhance the Performance  3
Deep Learning-based Workload Prediction in Cloud Computing t...
收藏 引用
3rd international conference on Secure Cyber computing and Communications, ICSCCC 2023
作者: Bansal, Sujay Kumar, Mohit Dr. B R Ambedkar National Institute of Technology Computer Science and Engineering Jalandhar India Dr. B R Ambedkar National Institute of Technology Information Technology Jalandhar India
The cloud paradigm offers a plethora of valuable services to end users through virtualization, aiming to improve resource utilization and reduce services cost. But unpredictable demand of end users degrades the servic... 详细信息
来源: 评论
Research on the Application of Power System Cryptography Based on Quantum Key
Research on the Application of Power System Cryptography Bas...
收藏 引用
2024 international conference on Innovative Design and Intelligent Manufacturing, IDIM 2024
作者: Dong, Wu Liu, Xu Peng, Linyu Liu, Kang Peng, Dili Wang, Tao Shi, Ji Zuo, Jun Power Dispatching Control Center of Guizhou Power Grid Guiyang550002 China
The research and test of the security protection technology of distribution network quantum encryption information based on 5G multi access edge computing applies the communication technology and quantum encryption te... 详细信息
来源: 评论
Vehicular Network Security: Threats, Vulnerabilities and Countermeasures  15
Vehicular Network Security: Threats, Vulnerabilities and Cou...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Dhabliya, Dharmesh Thangarasu, N. Khurana, Shivam Raajini, X. Mercilin Goyal, Shobhit Arunkumar, D.T. Vishwakarma Institute of Technology Department of Information Technology Maharashtra Pune India Karpagam Academy of Higher Education Department of Computer Science Coimbatore641021 India Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research for Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai127 India Quantum University Research Center Quantum University India School of Engineering and Technology Mechaical Engineering Karnataka Bangalore India
Vehicular community protection (VNS) covers a diffusion of security measures to ensure the secure, cozy, and dependable operation of motors on the street. VNS is an essential software of the Internet of Things, and it... 详细信息
来源: 评论
Application of Kernel Density Estimation in Stock Trading Volume Distribution  24
Application of Kernel Density Estimation in Stock Trading Vo...
收藏 引用
2024 international conference on Artificial Intelligence of Things and computing, AITC 2024
作者: Fan, Yaqiang Cheng, Ximing School of Science Beijing Information Science and Technology University Beijing China
Stock trading volume is an important indicator reflecting market activity and investor behavior. It is of great significance to study its distribution characteristics and dynamic changes for understanding market behav... 详细信息
来源: 评论
Pre-Trained Encoder Decoder Transformer Model for Language Processing  6
Pre-Trained Encoder Decoder Transformer Model for Language P...
收藏 引用
6th international conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Farhan Akthar, K. Deepaksakthi, V.K. Tamizhselvi, A. Department of Information Technology St.Joseph’s College of Engineering Chennai India
Tamil language processing in NLP has yet to be outstanding, mainly because of the absence of high-quality resources. In this project, a novel approach to address these limitations is to build an encoder-decoder transf... 详细信息
来源: 评论
A Review on Blockchain Based Security in Education  3
A Review on Blockchain Based Security in Education
收藏 引用
3rd international conference on Pervasive computing and Social Networking, ICPCSN 2023
作者: Sheela Rani, P. Kaveri, C. Nivedha, M. Niveda, S. Lakshi, K. Sandhiya, R. Panimalar Engineering College Information Technology Dept Chennai India
Blockchain technology is very well positioned, and the education industry may greatly benefit from blockchain technology, which can be used for digital credentials, academic records, learning management systems, fundi... 详细信息
来源: 评论
Optimizing Hyperspectral Anomaly Detection with a Scalable Quantum Snow Geese Non-Local Neural Network Algorithm  4
Optimizing Hyperspectral Anomaly Detection with a Scalable Q...
收藏 引用
4th international conference on Ubiquitous computing and Intelligent information Systems, ICUIS 2024
作者: Ramkumar, M.Siva Emayavaramban, G. Latha, G.Charlyn Pushpa Giri, Jayant Al-Qawasmi, Khaled Sns College of Technology Department of Ece India Jct College of Engineering and Technology Department of Ece India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Dept of Information Technology Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Saveetha University Department of Vlsi Microelectronics TN Chennai602105 India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Hyperspectral Anomaly Detection (HAD) focuses on identifying unusual objects or patterns in hyperspectral imagery (HSI) that differ from the normal background or surrounding pixels. In the past two decades, anomaly de... 详细信息
来源: 评论
A Simulation Study of Battery Integrated Photovoltaic System for Gram Panchayat Development information Kiosk  5
A Simulation Study of Battery Integrated Photovoltaic System...
收藏 引用
5th international conference on Circuits, Control, Communication and computing, I4C 2024
作者: Hemachandra, G. Arakeri, Megha P Lakshmana Samprathi, H.S. Shilpa, H.B. Nanditha, S. Ramaiah Institute of Technology Department of Eee Bengaluru India Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Department of Computer Science and Engineering Manipal India Seamovations Labs Pvt.Ltd Bengaluru India
In rural India, gram panchayats serve as vital administrative bodies that require access to accurate information on government initiatives aimed at fostering community growth. However, these gram panchayats frequently... 详细信息
来源: 评论