咨询与建议

限定检索结果

文献类型

  • 60,601 篇 会议
  • 1,896 篇 期刊文献
  • 998 册 图书
  • 9 篇 学位论文
  • 1 件 标准
  • 1 篇 专利

馆藏范围

  • 63,506 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 31,885 篇 工学
    • 26,098 篇 计算机科学与技术...
    • 14,700 篇 软件工程
    • 10,330 篇 信息与通信工程
    • 5,591 篇 电气工程
    • 3,645 篇 控制科学与工程
    • 2,795 篇 电子科学与技术(可...
    • 1,188 篇 动力工程及工程热...
    • 1,052 篇 机械工程
    • 891 篇 仪器科学与技术
    • 863 篇 生物工程
    • 669 篇 生物医学工程(可授...
    • 490 篇 安全科学与工程
    • 471 篇 光学工程
    • 464 篇 交通运输工程
    • 454 篇 网络空间安全
    • 424 篇 建筑学
    • 325 篇 材料科学与工程(可...
    • 323 篇 土木工程
  • 8,434 篇 理学
    • 5,960 篇 数学
    • 1,463 篇 统计学(可授理学、...
    • 1,183 篇 系统科学
    • 1,121 篇 物理学
    • 1,024 篇 生物学
  • 5,380 篇 管理学
    • 3,919 篇 管理科学与工程(可...
    • 1,958 篇 工商管理
    • 1,709 篇 图书情报与档案管...
  • 781 篇 法学
    • 496 篇 社会学
  • 606 篇 医学
    • 463 篇 临床医学
    • 398 篇 基础医学(可授医学...
  • 571 篇 经济学
    • 568 篇 应用经济学
  • 201 篇 文学
  • 184 篇 农学
  • 161 篇 教育学
  • 107 篇 军事学
  • 17 篇 艺术学
  • 1 篇 哲学

主题

  • 6,960 篇 computer network...
  • 4,657 篇 computer archite...
  • 4,344 篇 computer science
  • 4,140 篇 distributed comp...
  • 3,336 篇 wireless sensor ...
  • 2,938 篇 application soft...
  • 2,788 篇 protocols
  • 2,584 篇 computational mo...
  • 2,312 篇 hardware
  • 2,261 篇 neural networks
  • 2,188 篇 bandwidth
  • 2,154 篇 distributed comp...
  • 2,151 篇 delay
  • 2,038 篇 routing
  • 1,850 篇 costs
  • 1,612 篇 intelligent netw...
  • 1,610 篇 resource managem...
  • 1,509 篇 network topology
  • 1,413 篇 control systems
  • 1,413 篇 ip networks

机构

  • 94 篇 school of comput...
  • 65 篇 ibm thomas j. wa...
  • 59 篇 department of co...
  • 59 篇 department of co...
  • 49 篇 school of comput...
  • 45 篇 school of electr...
  • 37 篇 department of sy...
  • 36 篇 school of comput...
  • 32 篇 college of compu...
  • 32 篇 department of el...
  • 29 篇 inria
  • 29 篇 school of comput...
  • 29 篇 department of el...
  • 28 篇 department of el...
  • 28 篇 ibm thomas j. wa...
  • 27 篇 department of el...
  • 27 篇 department of sy...
  • 27 篇 department of co...
  • 27 篇 shandong provinc...
  • 27 篇 department of co...

作者

  • 50 篇 m. takizawa
  • 26 篇 li li
  • 26 篇 s.k. das
  • 24 篇 yu wang
  • 24 篇 santoro nicola
  • 24 篇 kowalski dariusz...
  • 23 篇 k.g. shin
  • 23 篇 kuhn fabian
  • 23 篇 p.k. srimani
  • 23 篇 jun wang
  • 23 篇 klaus wehrle
  • 23 篇 duato j.
  • 22 篇 dhabaleswar k. p...
  • 22 篇 l.m. ni
  • 22 篇 peleg david
  • 21 篇 sens pierre
  • 21 篇 xiaodong lu
  • 19 篇 guohong cao
  • 19 篇 y. shibata
  • 18 篇 torsten hoefler

语言

  • 61,174 篇 英文
  • 1,886 篇 其他
  • 430 篇 中文
  • 48 篇 葡萄牙文
  • 7 篇 法文
  • 4 篇 西班牙文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 俄文
检索条件"任意字段=International Symposium on Computer Networks and Distributed Systems"
63507 条 记 录,以下是1091-1100 订阅
排序:
Effect of Measurement Uncertainty on PV Output Power Estimation
Effect of Measurement Uncertainty on PV Output Power Estimat...
收藏 引用
international symposium on Innovative and Interdisciplinary Applications of Advanced Technologies, IAT 2024
作者: Mašić, Fatima Džemić, Zijad Šarić, Mirza International Burch University Sarajevo71000 Bosnia and Herzegovina
The recent increase in distributed generators due to the benefits they bring, such as a decrease in CO2 emissions, deforestation, increase in energy efficiency, and creation of employment opportunities for locals, wit... 详细信息
来源: 评论
Design of MAC-layer Protocols for distributed NOMA-based VLC networks  13
Design of MAC-layer Protocols for Distributed NOMA-based VLC...
收藏 引用
13th international symposium on Communication systems, networks and Digital Signal Processing (CSNDSP)
作者: Rallis, Konstantinos G. Papanikolaou, Vasilis K. Diamantoulakis, Panagiotis D. Dowhuszko, Alexis A. Hamalainen, Jyri Karagiannidis, George K. Aristotle Univ Thessaloniki Dept Elect & Comp Engn GR-54124 Thessaloniki Greece Aalto Univ Dept Commun & Networking Espoo 02150 Finland
In this paper, a visible light communication (VLC) cellular network that utilizes non-orthogonal multiple access (NOMA) is investigated. To deal with the high inter-cell interference attributed to the high-density of ... 详细信息
来源: 评论
On Intrinsic Cause and Defense of Adversarial Examples in Deep Neural networks  19th
On Intrinsic Cause and Defense of Adversarial Examples in...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the Security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European symposium on Research in computer Security, ESORICS 2024
作者: Tasaki, Hajime Chao, Jinhui Department of Information and System Engineering Chuo University Bunkyo Tokyo1-13-27 Kasuga Japan
The existence of so-called adversarial examples has become a serious threat to Deep Neural networks (DNN) and their applications, especially security-sensitive ones. Explanations and defenses mainly focused on inside ... 详细信息
来源: 评论
Design and implementation of a dedicated 5G communication terminal for distributed power sources  3
Design and implementation of a dedicated 5G communication te...
收藏 引用
3rd international Conference on Electronics Technology and Artificial Intelligence, ETAI 2024
作者: Gao, Zunhai Lu, Hongxia Zhou, Kang Yu, Yue School of Information and Artificial Intelligence Nanchang Institute of Science and Technology Nanchang China Economics and Management School Hubei Business College Wuhan China School of Mathematics and Computer Science Wuhan Polytechnic University Wuhan China
With the increasing integration of renewable energy into the power grid, the demand for efficient communication systems for managing and controlling distributed power sources has become urgent. Here, we introduce the ... 详细信息
来源: 评论
Research on Speaker Recognition Based on the ECAPA-TDNN Method  9
Research on Speaker Recognition Based on the ECAPA-TDNN Meth...
收藏 引用
9th international symposium on computer and Information Processing Technology, ISCIPT 2024
作者: Gan, Zhenye Zhang, Xu Northwest Normal University College of Physics and Electronic Engineering Lanzhou China Engineering Research Center of Gansu Province for Intelligent Information Technology and Application Lanzhou China
Speaker recognition, also known as speaker identification, encompasses two major functions: speaker identification and speaker verification. It is a critical branch of speech processing. The aim of this technology is ... 详细信息
来源: 评论
FedRAL: Cost-Effective distributed Annotation via Federated Reinforced Active Learning
FedRAL: Cost-Effective Distributed Annotation via Federated ...
收藏 引用
2024 IEEE international Conference on Big Data, BigData 2024
作者: Lazaridis, Yannis Kastellos, Anestis Psaltis, Athanasios Daras, Petros Centre for Research and Technology Hellas Thessaloniki Greece
This paper addresses the challenge of reducing annotation costs in distributed learning environments, particularly in systems with limited data and computational resources, such as those found in edge devices. We prop... 详细信息
来源: 评论
Enhancing Intrusion Detection in Smart Grids: A Machine Learning-based Defense Against DDoS Attacks with Imbalance-Aware Optimization  3
Enhancing Intrusion Detection in Smart Grids: A Machine Lear...
收藏 引用
3rd international Conference on Electronics and Renewable systems, ICEARS 2025
作者: Mahaveerakannan, R. Kumar, T. Rajesh Balamanigandan, R. Vasarao, Parnandi Srinu Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai602105 India Swarnandhra College of Engineering and Technology Department of Computer Science and Engineering West Godavari District Andhra Pradesh Narsapur India
The presence of numerous bidirectional communication devices connecting customers to the grid makes smart grid networks particularly vulnerable to network attacks. As an instance of a network attack that could impact ... 详细信息
来源: 评论
Probing the Convergence of Vehicular Edge Metaverse and 6G: Blockchain-enabled Framework  18
Probing the Convergence of Vehicular Edge Metaverse and 6G: ...
收藏 引用
18th IEEE international Conference on Advanced networks and Telecommunications systems, ANTS 2024
作者: Kumar, Shree Chaudhary, Rajat Budhiraja, Ishan Bennett University School of Computer Science and Engineering Technology Greater Noida India
The convergence of vehicular networks and the Meta-verse, referred to as the Vehicular Edge Metaverse is set to revolutionize both transportation and in-car experiences. This paradigm shift envisions vehicles not only... 详细信息
来源: 评论
Feature Reduction-based Intrusion Detection (FRID) in Satellite-Terrestrial Integrated networks  5
Feature Reduction-based Intrusion Detection (FRID) in Satell...
收藏 引用
5th international Conference on High Performance Big Data and Intelligent systems, HDIS 2023
作者: Yao, Lin Tian, Ziyuan Deng, Jing Wu, Guowei Li, Li DUT-RU International School of Information Science & Engineering Dalian University of Technology Dalian China School of Software Dalian University of Technology Dalian China The Department of Computer Science UNC Greensboro UNC NC Greensboro27412 United States Department of Computer and Information Science University of Macau China
Satellite-Terrestrial Integrated networks (STINs) integrate satellite networks, the Internet, and mobile wireless networks and are able to provide powerful services to users. In STIN, satellite gateways play an import... 详细信息
来源: 评论
The Smart Optimization of Security systems in Wireless Personal Sensor networks  2
The Smart Optimization of Security Systems in Wireless Perso...
收藏 引用
2nd IEEE international Conference on distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Das, Sunanda Sindhu Madhuri, G. Department of Computer Science and Engineering Bangalore India
Wireless personal sensor networks (WPSNs) are an emerging technology that provides a platform for monitoring and collecting data from a variety of sources. These networks are used to monitor environmental, health, and... 详细信息
来源: 评论