咨询与建议

限定检索结果

文献类型

  • 191,826 篇 会议
  • 1,982 册 图书
  • 1,430 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,249 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,799 篇 工学
    • 86,467 篇 计算机科学与技术...
    • 63,729 篇 软件工程
    • 30,507 篇 信息与通信工程
    • 14,625 篇 控制科学与工程
    • 12,594 篇 电气工程
    • 10,397 篇 生物工程
    • 8,337 篇 电子科学与技术(可...
    • 7,687 篇 机械工程
    • 7,412 篇 生物医学工程(可授...
    • 5,718 篇 仪器科学与技术
    • 5,150 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,546 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 3,908 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,383 篇 理学
    • 23,679 篇 数学
    • 11,208 篇 生物学
    • 9,436 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,589 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,270 篇 图书情报与档案管...
    • 9,779 篇 工商管理
  • 6,833 篇 医学
    • 5,812 篇 临床医学
    • 5,439 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,395 篇 法学
    • 4,402 篇 社会学
  • 3,677 篇 经济学
    • 3,621 篇 应用经济学
  • 3,267 篇 教育学
  • 2,634 篇 农学
  • 1,510 篇 文学
  • 537 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,517 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,701 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,531 篇 data mining
  • 3,485 篇 computer archite...
  • 3,411 篇 image coding
  • 3,269 篇 internet of thin...
  • 3,163 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,912 篇 computer science
  • 2,890 篇 protocols
  • 2,671 篇 machine learning
  • 2,667 篇 deep learning
  • 2,550 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 629 篇 university of ch...
  • 554 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 223 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 133 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 99 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 46 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,553 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195250 条 记 录,以下是4911-4920 订阅
Load-balance and coding Awareness Protocol Multicast in Space information Network
Load-balance and Coding Awareness Protocol Multicast in Spac...
收藏 引用
IEEE international conference on Electronic information and Communication technology (ICEICT)
作者: Liu, Yi nan Zhu, Mo NVIC Shenyang Aircraft Design & Res Inst Shenyang Peoples R China 65012 PLA Shenyang Peoples R China
Applications of multicast technology in space information network are increasing year by year. Due to the inherent characteristics of space information network, the existing multicast protocols are difficult to meet t... 详细信息
来源: 评论
Finding the Capacity of Next-Generation Networks by Linear Programming
Finding the Capacity of Next-Generation Networks by Linear P...
收藏 引用
IEEE international conference on Communication Systems (IEEE ICCS)
作者: Tan, Chee Wei Ho, Siu-Wai Lin, Shan Yeung, Raymond W. College of Science and Engineering City University of Hong Kong Hong Kong Institute for Telecommunications Research University of South Australia Australia Institute of Network Coding Department of Information Engineering Chinese University of Hong Kong Hong Kong Hong Kong Key Laboratory of Network Coding Key Technology and Application Shenzhen Research Institute Chinese University of Hong Kong Shenzhen China
Proving or disproving an information inequality is a crucial step in establishing the converse results in the coding theorems of communication networks. However, next generation networks are very large-scale, typicall... 详细信息
来源: 评论
Analysis of M-Ary modulation with M-Ary LDPC coding for DVC
Analysis of M-Ary modulation with M-Ary LDPC coding for DVC
收藏 引用
1st Joint international conference on Advances in Signal Processing and information technology, SPIT 2011 and the international conference on Recent Trends in information Processing and computing, IPC 2011
作者: Masoodhu Banu, N.M. Sasikumar, S. Sethu Institute of Technology Kariapatti Tamilnadu India Rover College of Engg. and Technology Perambalur Tamilnadu India
In this paper we consider the issue of Distributed Video coding (DVC) over practical channel which involves Gaussian noisy channel. Since the research on DVC over practical channel with respect to modulation is still ... 详细信息
来源: 评论
Effectively teaching coding standards in programming  05
Effectively teaching coding standards in programming
收藏 引用
6th ACM SIG-information technology Education conference, SIGITE 2005
作者: Li, Xiaosong Prasad, Christine Computing and Information Technology Unitec New Zealand Carrington Rd Auckland New Zealand
In this paper, we report on a study that was carried out to investigate students' opinions on learning and accepting coding standards in programming courses. We used a questionnaire survey to gather data. We also ... 详细信息
来源: 评论
Sabotage-proof Messenger Discovery for Protesters based on Brownian motion and Erasure coding  19
Sabotage-proof Messenger Discovery for Protesters based on B...
收藏 引用
19th international conference on Wireless and Mobile computing, Networking and Communications (WiMob)
作者: Liang, Chunchao Cheng, Wen Dotter, Todd Parkhurst, Zachary Marywood Univ Dept Sci Scranton PA 18509 USA Southern Arkansas Univ Dept Math & Comp Sci Magnolia AR USA
Sabotage-proof message dissemination is critical for a successful protest. To successfully propagate the messages to the crowd, it is critical to develop a sabotage-proof protocol to discover the messengers for inform... 详细信息
来源: 评论
Contrasting MISO Schemes for IM/DD FSO Communications with Photon-Counting Receivers  14
Contrasting MISO Schemes for IM/DD FSO Communications with P...
收藏 引用
14th IEEE international Wireless Communications and Mobile computing conference (IWCMC)
作者: Abou-Rjeily, Chadi Mawla, Rami Lebanese Amer Univ Dept Elect & Comp Engn Beirut Lebanon
In this paper, we consider the problem of Multiple-Input-Single-Output (MISO) Free-Space Optical (FSO) communications with intensity-modulation and direct-detection (IM/DD). Unlike the commonly adopted Gaussian-noise ... 详细信息
来源: 评论
Network coding for flooding-based routing in underwater sensor networks  9
Network coding for flooding-based routing in underwater sens...
收藏 引用
9th ACM international conference on Underwater Networks and Systems, WUWNet 2014
作者: Isufi, Elvin Leus, Geert Dol, Henry University of Perugia Dept. Eng. Perugia06125 Italy Delft Univ. of Technology Dept. Electrical Eng. CD Delft2628 Netherlands TNO Acoustics and Sonar Dept. AK The Hague2597 Netherlands
In this work, we propose a flooding-based routing protocol using network coding for underwater communications. Due to the high amount of duplicates that flooding-based protocols flood into the network, the sharing of ... 详细信息
来源: 评论
A Tight Estimation of the Security Gap over the Fast Fading Wiretap Channel
A Tight Estimation of the Security Gap over the Fast Fading ...
收藏 引用
9th international Wireless Communications and Mobile computing conference (IWCMC)
作者: Baldi, Marco Bianchi, Marco Maturo, Nicola Chiaraluce, Franco Univ Politecn Marche DII Ancona Italy
In this paper, we provide a tight estimation of the security gap for the wiretap channel with fast Rayleigh fading. The error rate has already been used as a practical physical layer security metric, and the security ... 详细信息
来源: 评论
Research on the Sharing Model of University Archives information Resources Based on Cloud computing  13
Research on the Sharing Model of University Archives Informa...
收藏 引用
13th international conference on Measuring technology and Mechatronics Automation (ICMTMA)
作者: Li, Du Xian Med Univ Xian 710021 Peoples R China
In order to overcome the security and integrity problems of the traditional university file information resource sharing model, the paper proposes a new cloud computing-based university file information resource shari... 详细信息
来源: 评论
Novel coding Techniques for Image Compression
收藏 引用
3rd international conference on Teaching and Computational Science (WTCS)
作者: Li, Xiaoguang Wang, Hongyong Henan Univ Technol Coll Informat Sci & Technol Zhengzhou 450000 Peoples R China
Image compression is a key technique in the fields of communications and multimedia, and it has very broad application prospects. On the basis of the image compression technologies reviewing, this paper mainly discuss... 详细信息
来源: 评论