咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 1 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 128 篇 计算机科学与技术...
    • 77 篇 软件工程
    • 41 篇 信息与通信工程
    • 35 篇 电气工程
    • 16 篇 控制科学与工程
    • 6 篇 生物工程
    • 5 篇 环境科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
    • 4 篇 农业工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 土木工程
    • 3 篇 石油与天然气工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 网络空间安全
  • 39 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 29 篇 理学
    • 10 篇 数学
    • 6 篇 生物学
    • 5 篇 大气科学
    • 5 篇 系统科学
    • 4 篇 物理学
  • 9 篇 教育学
    • 8 篇 教育学
  • 7 篇 法学
    • 4 篇 社会学
    • 3 篇 法学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 农学

主题

  • 40 篇 cloud computing
  • 22 篇 internet of thin...
  • 10 篇 edge computing
  • 8 篇 iot
  • 8 篇 mobile computing
  • 8 篇 fog computing
  • 6 篇 blockchain
  • 5 篇 big data
  • 5 篇 computational mo...
  • 4 篇 internet
  • 4 篇 machine learning
  • 4 篇 mobile communica...
  • 4 篇 ubiquitous compu...
  • 3 篇 internet of thin...
  • 3 篇 computer archite...
  • 3 篇 quality of servi...
  • 3 篇 algorithm design...
  • 3 篇 feature extracti...
  • 3 篇 business
  • 2 篇 fuzzy logic

机构

  • 3 篇 department of in...
  • 2 篇 united nations u...
  • 2 篇 department of so...
  • 2 篇 applied computin...
  • 2 篇 universidad de l...
  • 2 篇 beijing univ pos...
  • 1 篇 advanced computi...
  • 1 篇 university of za...
  • 1 篇 department of co...
  • 1 篇 ucla master of a...
  • 1 篇 school of comput...
  • 1 篇 univ malaya dept...
  • 1 篇 kongu engn coll ...
  • 1 篇 college of infor...
  • 1 篇 unist ece ulsan
  • 1 篇 dep. of electric...
  • 1 篇 college of mathe...
  • 1 篇 ama int univ dep...
  • 1 篇 nr elect co ltd ...
  • 1 篇 kielce univ tech...

作者

  • 3 篇 iribarne luis
  • 3 篇 yi sun
  • 3 篇 wannous muhammad
  • 3 篇 criado javier
  • 2 篇 luján-mora sergi...
  • 2 篇 zomaya albert y.
  • 2 篇 alulema darwin
  • 2 篇 paracha samiulla...
  • 2 篇 omar mwana said
  • 2 篇 li wei
  • 1 篇 niyato dusit
  • 1 篇 ni qiang
  • 1 篇 da silva marcus ...
  • 1 篇 yin jianwei
  • 1 篇 byeon gibeom
  • 1 篇 o'dea bridianne
  • 1 篇 nie feng ying
  • 1 篇 liu shangdong
  • 1 篇 secci stefano
  • 1 篇 duan baoyan

语言

  • 170 篇 英文
  • 5 篇 其他
  • 2 篇 中文
  • 1 篇 阿拉伯文
检索条件"任意字段=International Conference on WWW/Internet 2017 and Applied Computing 2017"
177 条 记 录,以下是31-40 订阅
排序:
Development of Reliable Wireless Communication System for Secure Blockchain-based Energy Trading  16
Development of Reliable Wireless Communication System for Se...
收藏 引用
16th international Joint conference on Computer Science and Software Engineering (JCSSE) - Knowledge Evolution Towards Singularity of Man-Machine Intelligence
作者: Huang, Zhuoxian Suankaewmanee, Kongrath Kang, Jiawen Niyato, Dusit Sin, Ng Pei Nanyang Technol Univ Energy Res Inst NTU Singapore Singapore Nanyang Technol Univ Sch Engn & Comp Sci Singapore Singapore
Blockchain technology is being developed rapidly in recent years. It has been applied to stock trading, supply chain auditing, crowd-funding, energy trading, and internet-of-Things. Specifically, in internet-of-Things... 详细信息
来源: 评论
Efficient auction mechanism for edge computing resource allocation in mobile blockchain  21
Efficient auction mechanism for edge computing resource allo...
收藏 引用
21st IEEE international conference on High Performance computing and Communications, 17th IEEE international conference on Smart City and 5th IEEE international conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Liu, Xuelian Wu, Jigang Chen, Long Xia, Chengpeng School of Computer Science and Technology Guangdong University of Technology Guangzhou China
Blockchain technique has been widely applied in various fields, such as finance, internet of Things, law, etc. However, it is a challenge to apply blockchain technique for mobile applications, as the mobile devices ca... 详细信息
来源: 评论
A Cooperative Indoor Localization Enhancement Framework on Edge computing Platforms for Safety-Critical Applications  15
A Cooperative Indoor Localization Enhancement Framework on E...
收藏 引用
15th international conference on Mobile Ad-Hoc and Sensor Networks (MSN)
作者: Liu Chang Wang Chun Luo Juan He Qian Hunan Univ Coll Comp Sci & Elect Engn Changsha 410082 Hunan Peoples R China Guilin Univ Elect Technol Sch Comp & Informat Secur Guilin 541004 Guangxi Peoples R China
With the maturity and popularity of the internet of Things (IoT), wireless communication techniques have been vastly applied in daily lives. However, indoor localization has been remained as a challenge due to the ins... 详细信息
来源: 评论
Inquiring Evaluation Aspects of Universal Design and Natural Interaction in Socioenactive Scenarios  13th
Inquiring Evaluation Aspects of Universal Design and Natural...
收藏 引用
13th international conference on Universal Access in Human-Computer Interaction (UAHCI) part of the 21st international conference on Human-Computer Interaction (HCI)
作者: dos Santos, Andressa Cristina Margareth Lima Maike, Vanessa Regina Mendez Mendoza, Yusseli Lizeth da Silva, Jose Valderlei Bonacin, Rodrigo Dos Reis, Julio Cesar Calani Baranauskas, Maria Cecilia Univ Estadual Campinas Inst Comp UNICAMP Campinas SP Brazil Nucleus Appl Informat Educ NIED Campinas SP Brazil Ctr Informat Technol CTI Campinas SP Brazil Parana State Secretary Educ SEED PR Maringa Parana Brazil
New technologies and ubiquitous sysltems present new forms and modalities of interaction. Evaluating such systems, particularly in the novel socioenactive scenario, poses a difficult issue, as existing instruments do ... 详细信息
来源: 评论
Cryptography algorithm based on cohort intelligence  2nd
Cryptography algorithm based on cohort intelligence
收藏 引用
2nd international conference on Data Engineering and Communication Technology, ICDECT 2017
作者: Sarmah, Dipti Kapoor Kale, Ishaan R. Symbiosis Institute of Technology Symbiosis International University Pune411042 India
Information security is very important in the current era as we share most of the information through digital media/internet. Cryptography is a technique which converts the secret information into some other form whic... 详细信息
来源: 评论
Improved adaptive fault tolerance model for increasing reliability in cloud computing using event-B  7th
Improved adaptive fault tolerance model for increasing relia...
收藏 引用
7th Computer Science On-line conference, CSOC 2018
作者: Ali, Ammar Alhaj Jasek, Roman Krayem, Said Chramcov, Bronislav Zacek, Petr Faculty of Applied Informatics Tomas Bata University in Zlin Zlin Czech Republic
Cloud computing provide services to many users at the same time by providing virtual resources via internet, General example of cloud services is Google apps, provided by Google. In most of cloud applications, process... 详细信息
来源: 评论
Metamorphic Testing of Mapping Software  1
收藏 引用
Web Technologies track at the 32rd ACM/SIGAPP Symposium On applied computing, SAC 2017, Web Technologies track at the 33nd ACM/SIGAPP Symposium On applied computing, SAC 2018 and oftware Development for Mobile Devices, Wearables, and the internet-of-Things Minitrack at the 51st Hawaii international conference on System Sciences, HICSS 2018
作者: Brown, Joshua Zhou, Zhi Quan Chow, Yang-Wai Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
Mapping software is difficult to test because it is very costly to evaluate its output. This difficulty is generally known as the oracle problem, a fundamental challenge in software testing. In this paper, we propose ... 详细信息
来源: 评论
Review: Data security models developed by blockchain technology for different business domains  11
Review: Data security models developed by blockchain technol...
收藏 引用
11th international conference on Knowledge and Systems Engineering, KSE 2019
作者: Hirani, Mohib Halgamuge, Malka N. Duong Thu Hang, Pham Charles Sturt University School of Computing and Mathematics MelbourneVIC3000 Australia University of Melbourne Dep. of Electrical and Electronic Engineering VIC3010 Australia University of da Nang University of Science and Education Faculty of Information Technology Viet Nam
This study investigates a range of data security models developed to achieve data security using blockchain technology for different industrial domains. Current industries utilize data-driven mechanisms for decision m... 详细信息
来源: 评论
Evaluation of business english majors teaching quality based on the attribute importance of rough set  2019
Evaluation of business english majors teaching quality based...
收藏 引用
3rd international Workshop on Education, Big Data and Information Technology, EBDIT 2019
作者: Fan, Yanying Jiang, Suping Zhang, Zimin Chen, Guanping Chen, Yangming Li, Biqing College of Mathematics and Computer Hezhou University Hezhou Guangxi542899 China Guangxi Talent International College Qinzhou Guangxi535000 China College of Tourism and Sports Hezhou University Hezhou542899 China School of Mathematics and Computer Science Hezhou University Hezhou542899 China School of Information and Communication Engineering Hezhou University Hezhou Guangxi542899 China
Aiming at the unreasonable weight allocation in traditional teaching evaluation, rough set theory (RST) is applied to the process of teaching evaluation. Using the Teaching Quality evaluation data of Business English ... 详细信息
来源: 评论
Trust Assessment for internet of Things in Multi-access Edge computing  32
Trust Assessment for Internet of Things in Multi-access Edge...
收藏 引用
32nd IEEE international conference on Advanced Information Networking and Applications (AINA)
作者: Ruan, Yefeng Durresi, Arjan Uslu, Suleyman Indiana Univ Purdue Univ Indianapolis Indianapolis IN 46202 USA
Multi-access Edge computing nowadays attracts much attention from researchers. It aims to provide end users with better performance via using mobile telecommunication infrastructure and techniques. internet of Things ... 详细信息
来源: 评论