咨询与建议

限定检索结果

文献类型

  • 191,826 篇 会议
  • 1,982 册 图书
  • 1,430 篇 期刊文献
  • 8 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 195,249 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 111,799 篇 工学
    • 86,467 篇 计算机科学与技术...
    • 63,729 篇 软件工程
    • 30,507 篇 信息与通信工程
    • 14,625 篇 控制科学与工程
    • 12,594 篇 电气工程
    • 10,397 篇 生物工程
    • 8,337 篇 电子科学与技术(可...
    • 7,687 篇 机械工程
    • 7,412 篇 生物医学工程(可授...
    • 5,718 篇 仪器科学与技术
    • 5,150 篇 光学工程
    • 4,751 篇 动力工程及工程热...
    • 4,546 篇 安全科学与工程
    • 4,328 篇 网络空间安全
    • 3,908 篇 化学工程与技术
    • 3,762 篇 交通运输工程
  • 43,383 篇 理学
    • 23,679 篇 数学
    • 11,208 篇 生物学
    • 9,436 篇 物理学
    • 7,277 篇 统计学(可授理学、...
    • 5,278 篇 系统科学
    • 4,055 篇 化学
  • 32,589 篇 管理学
    • 19,840 篇 管理科学与工程(可...
    • 15,270 篇 图书情报与档案管...
    • 9,779 篇 工商管理
  • 6,833 篇 医学
    • 5,812 篇 临床医学
    • 5,439 篇 基础医学(可授医学...
    • 3,266 篇 药学(可授医学、理...
  • 5,395 篇 法学
    • 4,402 篇 社会学
  • 3,677 篇 经济学
    • 3,621 篇 应用经济学
  • 3,267 篇 教育学
  • 2,634 篇 农学
  • 1,510 篇 文学
  • 537 篇 军事学
  • 385 篇 艺术学
  • 16 篇 历史学
  • 13 篇 哲学

主题

  • 9,517 篇 cloud computing
  • 6,203 篇 computational mo...
  • 4,701 篇 information tech...
  • 4,650 篇 feature extracti...
  • 4,047 篇 accuracy
  • 3,588 篇 training
  • 3,531 篇 data mining
  • 3,485 篇 computer archite...
  • 3,411 篇 image coding
  • 3,269 篇 internet of thin...
  • 3,163 篇 security
  • 2,982 篇 servers
  • 2,953 篇 mobile computing
  • 2,912 篇 computer science
  • 2,890 篇 protocols
  • 2,671 篇 machine learning
  • 2,667 篇 deep learning
  • 2,550 篇 real-time system...
  • 2,532 篇 educational inst...
  • 2,458 篇 wireless sensor ...

机构

  • 629 篇 university of ch...
  • 554 篇 institute of com...
  • 382 篇 school of comput...
  • 291 篇 chitkara univers...
  • 244 篇 maharishi school...
  • 223 篇 university of sc...
  • 187 篇 department of co...
  • 169 篇 faculty of infor...
  • 152 篇 department of co...
  • 150 篇 faculty of compu...
  • 143 篇 school of comput...
  • 143 篇 department of co...
  • 142 篇 lovely professio...
  • 133 篇 key laboratory o...
  • 127 篇 shenyang institu...
  • 118 篇 maharishi school...
  • 105 篇 school of inform...
  • 102 篇 state key labora...
  • 100 篇 institute of inf...
  • 99 篇 college of infor...

作者

  • 108 篇 lei wang
  • 99 篇 wang lei
  • 98 篇 leonard barolli
  • 76 篇 yang yang
  • 75 篇 wang wei
  • 73 篇 zhang tao
  • 67 篇 jian wang
  • 65 篇 china
  • 60 篇 wei wang
  • 59 篇 rui wang
  • 53 篇 bin wang
  • 51 篇 li wei
  • 50 篇 liu yang
  • 48 篇 li cheng
  • 47 篇 feng liu
  • 46 篇 zhang lin
  • 46 篇 xiao liu
  • 44 篇 bastieri d.
  • 42 篇 yongdong zhang
  • 42 篇 yang liu

语言

  • 190,553 篇 英文
  • 3,339 篇 其他
  • 1,913 篇 中文
  • 19 篇 俄文
  • 10 篇 法文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 乌克兰文
  • 2 篇 德文
检索条件"任意字段=International Conference on Information Technology - Coding and Computing"
195250 条 记 录,以下是571-580 订阅
排序:
ADA-Gen: Iterative and Incremental Generation of Full-Stack Apps for Learning Agile/DevOps Software Development Practices  17
ADA-Gen: Iterative and Incremental Generation of Full-Stack ...
收藏 引用
17th international conference on Computer Supported Education, CSEDU 2025
作者: Duong, Ta Nguyen Binh School of Computing and Information Systems Singapore Management University Singapore
To learn Agile/DevOps practices effectively, students need to apply them in an actual software development project. This is challenging if students are mostly from non-computing backgrounds and they do not have time i... 详细信息
来源: 评论
Automated Cardiomegaly Detection from Chest X-rays Using InceptionV3: A Deep Learning Approach  4
Automated Cardiomegaly Detection from Chest X-rays Using Inc...
收藏 引用
4th international conference on Power, Control and computing Technologies, ICPC2T 2025
作者: Jain, Eshika Bhardwaj, Rishabh Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura140401 India Chitkara Centre for Research and Development Chitkara University Himachal Pradesh 174103 India
In this work, InceptionV3 is applied to identify cardiomegaly from chest X-ray images through a deep learning technique. The dataset, sourced from Kaggle, contains 5, 552 balanced images across two classes: The presen... 详细信息
来源: 评论
Permissioned Blockchain Security Pqfabric from Quantum and Classical Attacks  1
Permissioned Blockchain Security Pqfabric from Quantum and C...
收藏 引用
1st international conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Tamilarasi, C. Bhavadrarani, K. Kittappa, Thiagarajan Subashini, N. Anitha, V. Vimalraj, E. B.S.Abdur Rahman Crescent Institute of Science & Technology Department of Computer Science and Engineering Chennai India V.S.B. Engineering College Department of Computer Science and Engineering Karur India Rajalakshmi Institute of Technology Department of Mathematics Chennai600124 India Sathyabama Institute of Science and Technology Department of Mathematics Chennai600119 India Panimalar Engineering College Department of CSE Poonamallee Chennai600123 India School of Computing Mohan Babu University Andhra Pradesh Tirupati India
Old style cryptographic techniques are genuinely compromised by the development of quantum computing, which requires the formation of safety ideal models that are impervious to quantum mistakes. A new permissioned blo... 详细信息
来源: 评论
Big Data-Driven Practices of Educational information technology in Personalized Instruction  14th
Big Data-Driven Practices of Educational Information Technol...
收藏 引用
14th international conference on Frontier computing, FC 2024
作者: Chen, Jinhuan School of Marxism Guangdong Polytechnic of Environmental Protection Engineering Guangdong Foshan528216 China
The advent of the big data era has brought the biggest impact on education work is the use of all kinds of information technology in education work. The use of information technology can significantly improve the qual... 详细信息
来源: 评论
Transforming Hospital Visitor Screening with Cloud-Powered Deep Learning for Safety and Security
Transforming Hospital Visitor Screening with Cloud-Powered D...
收藏 引用
2025 IEEE international Students' conference on Electrical, Electronics and Computer Science, SCEECS 2025
作者: Joseph Rajan, D. Antony Sivanesan, T.M. Mohankumar, N. Srinivasan, M. Sivaraman, Audithan Velmurugan, S. Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Symbiosis Institute of Technology Pune India P. S. v College of Engineering and Technology Department of Information Technology Tamilnadu Krishnagiri India Department of Information Technology Jafferpur New Delhi110073 India T.J.S. Engineering College Department of Electronics and Communication Engineering Tamil Nadu India
This research describes a novel approach to hospital visitor screening utilizing cloud-powered deep learning using convolutional neural networks (CNNs). Our proposed approach will fill this need by improving threat de... 详细信息
来源: 评论
Enhancing the Security of Healthcare Data in Cloud computing Environments  2
Enhancing the Security of Healthcare Data in Cloud Computing...
收藏 引用
2nd international conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Sajwan, Himani Kumari, Anjali Chauhan, Garima Kumar, Raj School of Computer Applications Manav Rachna International Institute of Research & Studies Faridabad India
Cloud computing has completely evolved the way health care data is managed, but it also introduces critical security vulnerabilities that can compromise the privacy of patient information and threaten regulatory compl... 详细信息
来源: 评论
Low Resolution Deepfake Face Detection using Multi-Scale Discrete Cosine Transform and Vision Transformer  3
Low Resolution Deepfake Face Detection using Multi-Scale Dis...
收藏 引用
3rd international conference on Intelligent Systems, Advanced computing, and Communication, ISACC 2025
作者: Uddin, Main Fu, Zhangjie Zhang, Xiang Arnob, Abu Bakor Hayat Nanjing University of Information Science and Technology School of Computer Science Nanjing China Nanjing University of Information Science and Technology School of Artificial Intelligence Nanjing China
Deepfake technology uses generative adversarial networks to produce highly authentic counterfeit images and videos, which raises a significant global security concern by disseminating fake information through online p... 详细信息
来源: 评论
Design of Farmland Meteorological Visualization Management System Based on Digital Twins
Design of Farmland Meteorological Visualization Management S...
收藏 引用
2025 Asia-Europe conference on Cybersecurity, Internet of Things and Soft computing, CITSC 2025
作者: Xu, Yong Lv, Zhenqiang Chen, Zhiling Chan, Choon Kit Luo, Kun School of Artificial Intelligence and Smart Manufacturing Hechi University Hechi China Inti International University Faculty of Engineering and Quantity Surveying Negeri Sembilan Nilai Malaysia Inti International University Faculty of Education and Liberal Arts Negeri Sembilan Nilai Malaysia
To precisely monitor farmland conditions, we need to mitigate the risk of crop yield reduction due to natural disasters and other factors, and enhance the accuracy of agricultural production decisions, an agricultural... 详细信息
来源: 评论
Comparative Analysis of Execution Time for Sequential and Data-Decomposed Parallel Program
Comparative Analysis of Execution Time for Sequential and Da...
收藏 引用
international Scientific-Professional conference on information technology (IT)
作者: Radovan Čikić Miloš Milić Siniša Vlajić Faculty of Organizational Sciences University of Belgrade Jove Ilića 154 Belgrade Serbia
When complex computing in programming is mandatory, it’s important to choose a proper way to minimize execution time. Sequential and parallel approaches to source code execution each have their own pros and cons, and... 详细信息
来源: 评论
VideoQA-TA: Temporal-Aware Multi-Modal Video Question Answering  31
VideoQA-TA: Temporal-Aware Multi-Modal Video Question Answer...
收藏 引用
31st international conference on Computational Linguistics, COLING 2025
作者: Wu, Zhixuan Cheng, Bo Han, Jiale Ma, Jiabao Zhang, Shuhao Chen, Yuli Li, Changbao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Hong Kong University of Science and Technology Hong Kong North China Institute of Computing Technology China
Video question answering (VideoQA) has recently gained considerable attention in the field of computer vision, aiming to generate answers rely on both linguistic and visual reasoning. However, existing methods often a... 详细信息
来源: 评论