咨询与建议

限定检索结果

文献类型

  • 191,938 篇 会议
  • 1,973 册 图书
  • 1,433 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,355 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,927 篇 工学
    • 86,613 篇 计算机科学与技术...
    • 63,779 篇 软件工程
    • 30,642 篇 信息与通信工程
    • 14,723 篇 控制科学与工程
    • 12,639 篇 电气工程
    • 10,398 篇 生物工程
    • 8,351 篇 电子科学与技术(可...
    • 7,746 篇 机械工程
    • 7,401 篇 生物医学工程(可授...
    • 5,717 篇 仪器科学与技术
    • 5,138 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,547 篇 安全科学与工程
    • 4,430 篇 网络空间安全
    • 3,909 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,474 篇 理学
    • 23,768 篇 数学
    • 11,210 篇 生物学
    • 9,444 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,280 篇 系统科学
    • 4,058 篇 化学
  • 32,618 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,303 篇 图书情报与档案管...
    • 9,771 篇 工商管理
  • 6,880 篇 医学
    • 5,810 篇 临床医学
    • 5,438 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,399 篇 法学
    • 4,407 篇 社会学
  • 3,675 篇 经济学
    • 3,619 篇 应用经济学
  • 3,255 篇 教育学
  • 2,631 篇 农学
  • 1,510 篇 文学
  • 536 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,521 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,700 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,537 篇 data mining
  • 3,485 篇 computer archite...
  • 3,413 篇 image coding
  • 3,270 篇 internet of thin...
  • 3,168 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,915 篇 computer science
  • 2,890 篇 protocols
  • 2,698 篇 machine learning
  • 2,680 篇 deep learning
  • 2,549 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 630 篇 university of ch...
  • 556 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 224 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 134 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 98 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 47 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,586 篇 英文
  • 3,413 篇 其他
  • 1,975 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195356 条 记 录,以下是41-50 订阅
A privacy protection strategy based on homomorphic encryption and neural networks  24
A privacy protection strategy based on homomorphic encryptio...
收藏 引用
8th international conference on Electronic information technology and Computer Engineering, EITCE 2024
作者: Liu, Lingli Du, Xiongxiong Ma, Mingcheng Wang, Dong Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Henan University Henan Kaifeng China
In recent years, incidents of data abuse and privacy leakage remind people that improper use of big data technology can bring disastrous consequences. To realize the true value of data, data sharing is needed. This pa... 详细信息
来源: 评论
Efficient Atlas coding Strategy using cropping for Object-based MPEG Immersive Video  27
Efficient Atlas Coding Strategy using cropping for Object-ba...
收藏 引用
27th international conference on Advanced Communications technology, ICACT 2025
作者: Oh, Jaiyoung Li, Xin Oh, Kwan-Jung Lee, Gwang Soon Jang, Euee S. Department of Computer Science Hanyang University Seoul Korea Republic of Daejeon Korea Republic of
In this study, we propose an efficient atlas coding strategy for the object-based MPEG Immersive Video (MIV) coding standard. The main concept of Object-based MIV is to use a video codec, such as High Efficiency Video... 详细信息
来源: 评论
Trust Collaboration for Edge computing  24
Trust Collaboration for Edge Computing
收藏 引用
14th international conference on Communication and Network Security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur... 详细信息
来源: 评论
Enhancing Mobile Wallet Usability through Developer Guidelines: Addressing Challenges in the Sri Lankan Market  5
Enhancing Mobile Wallet Usability through Developer Guidelin...
收藏 引用
5th international conference on Advanced Research in computing, ICARC 2025
作者: Samaradiwakara, Dilum Jayalal, Shantha Withanaarachchi, Amila University of Kelaniya Faculty of Science Department of Industrial Management Kelaniya Sri Lanka Waikato Institute of Technology Center for Information Technology Hamilton3240 New Zealand
The Sri Lankan market has witnessed a growing reliance on mobile wallets for financial transactions, driven by increased smartphone penetration and government initiatives promoting digital payments. However, usability... 详细信息
来源: 评论
Distributed optical fiber acoustic sensing system based on laser pulse coding  4
Distributed optical fiber acoustic sensing system based on l...
收藏 引用
4th international Computational Imaging conference, CITA 2024
作者: Bai, Weidong Wang, Yu Jia, Hong Zhao, Yushen Liu, Xin Bai, Qing Jin, Baoquan Key Laboratory of Advanced Transducer and Intelligent Control Systems Ministry of Education and Shanxi Province Taiyuan University of Technology 79 Yingzexi Avenue Taiyuan030024 China College of Physics and Optoelectronic Engineering Taiyuan University of Technology 79 Yingzexi Avenue Taiyuan030024 China College of Electronic Information Engineering Taiyuan University of Technology 79 Yingzexi Avenue Taiyuan030024 China
The enhancement of signal-to-noise ratio (SNR) represents a significant challenge for distributed optical fiber acoustic sensing systems. This paper presents a distributed optical fiber acoustic sensing system based o... 详细信息
来源: 评论
A design of management software for satellite edge computing payloads
A design of management software for satellite edge computing...
收藏 引用
2024 international conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Chen, Shuo Zhang, Yue Gao, Jixing Yu, Zhigang Xu, Zhiping China Academic of Electronics and Information Technology China
With the rapid advancement of aerospace electronics, the traditional single-satellite application paradigm is transitioning towards collaborative networking involving multiple satellites. Furthermore, the continuous i... 详细信息
来源: 评论
Optimizing Load Balancing in Edge computing: A Novel Algorithm Integrating Grey Wolf Optimizer and Tabu Search  24
Optimizing Load Balancing in Edge Computing: A Novel Algorit...
收藏 引用
8th international conference on Electronic information technology and Computer Engineering, EITCE 2024
作者: Zheng, Liquan Tan, Long Heilongjiang University Heilongjiang Harbin China
The internet’s evolution has highlighted cloud computing’s limitations, such as latency and bandwidth issues, prompting interest in edge computing to address these. Effective load balancing is essential to fully lev... 详细信息
来源: 评论
Generative Image Steganography Based on Latent Space Vector coding and Diffusion Model  1
收藏 引用
2nd international conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Liu, Weisong Yang, Jianfeng Huang, Jiewen El-Latif, Ahmed A. Abd Zhou, Zhili School of Artificial Intelligence Guangzhou University Guangzhou China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia
Image steganography is a technology that embed secret information within a cover image to obtain a stego-image for covert communication. The transmission of undetectable stego-images via social media can facilitate se... 详细信息
来源: 评论
Blockchain-based trusted facial expression recognition system  5
Blockchain-based trusted facial expression recognition syste...
收藏 引用
5th international conference on Signal Processing and Computer Science, SPCS 2024
作者: Zhou, Xiaoyang Ying, Baohua Yue, Yuebo Xie, Linjun Li, Peiyuan Wei, Junjun Liu, Ying Sun, Kai Yan, Jingjie Innovation Research Institute Co. LTD Nanjing China Innovation Research Institute Co. LTD Nanjing China School of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China China Mobile Communications Group Jiangsu Co. LTD. Nanjing Branch Nanjing China
This paper proposes a face authentication and facial expression recognition system based on blockchain and trusted computing technology. With the continuous development of digital technology, people's demand for i... 详细信息
来源: 评论
Trust-Based Identity Privacy for Edge computing  24
Trust-Based Identity Privacy for Edge Computing
收藏 引用
14th international conference on Communication and Network Security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
College of Computer Science Beijing University of technology, Beijing 100124, China, 1374622525@*** This paper proposes a trust collaboration technology for edge computing, addressing trust isolation and security issu... 详细信息
来源: 评论