咨询与建议

限定检索结果

文献类型

  • 60,568 篇 会议
  • 2,755 篇 期刊文献
  • 997 册 图书
  • 12 篇 学位论文
  • 1 件 标准
  • 1 篇 专利
  • 1 篇 科技报告

馆藏范围

  • 64,334 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 32,747 篇 工学
    • 26,934 篇 计算机科学与技术...
    • 15,229 篇 软件工程
    • 11,116 篇 信息与通信工程
    • 5,608 篇 电气工程
    • 3,653 篇 控制科学与工程
    • 2,803 篇 电子科学与技术(可...
    • 1,193 篇 动力工程及工程热...
    • 1,067 篇 机械工程
    • 895 篇 仪器科学与技术
    • 878 篇 生物工程
    • 670 篇 生物医学工程(可授...
    • 494 篇 安全科学与工程
    • 471 篇 光学工程
    • 465 篇 交通运输工程
    • 455 篇 网络空间安全
    • 425 篇 建筑学
    • 324 篇 材料科学与工程(可...
    • 324 篇 土木工程
  • 8,469 篇 理学
    • 5,966 篇 数学
    • 1,473 篇 统计学(可授理学、...
    • 1,183 篇 系统科学
    • 1,128 篇 物理学
    • 1,041 篇 生物学
  • 5,403 篇 管理学
    • 3,936 篇 管理科学与工程(可...
    • 1,965 篇 工商管理
    • 1,713 篇 图书情报与档案管...
  • 781 篇 法学
    • 496 篇 社会学
  • 617 篇 医学
    • 469 篇 临床医学
    • 400 篇 基础医学(可授医学...
  • 575 篇 经济学
    • 572 篇 应用经济学
  • 202 篇 文学
  • 187 篇 农学
  • 162 篇 教育学
  • 107 篇 军事学
  • 18 篇 艺术学
  • 2 篇 哲学

主题

  • 7,056 篇 computer network...
  • 4,674 篇 computer archite...
  • 4,373 篇 computer science
  • 4,159 篇 distributed comp...
  • 3,701 篇 wireless sensor ...
  • 2,957 篇 application soft...
  • 2,784 篇 protocols
  • 2,580 篇 computational mo...
  • 2,307 篇 hardware
  • 2,272 篇 neural networks
  • 2,191 篇 bandwidth
  • 2,152 篇 delay
  • 2,140 篇 distributed comp...
  • 2,037 篇 routing
  • 1,852 篇 costs
  • 1,609 篇 resource managem...
  • 1,608 篇 intelligent netw...
  • 1,512 篇 network topology
  • 1,422 篇 control systems
  • 1,402 篇 ip networks

机构

  • 93 篇 school of comput...
  • 66 篇 ibm thomas j. wa...
  • 60 篇 department of co...
  • 59 篇 department of co...
  • 49 篇 school of comput...
  • 45 篇 school of electr...
  • 36 篇 school of comput...
  • 36 篇 department of sy...
  • 32 篇 college of compu...
  • 32 篇 department of el...
  • 29 篇 inria
  • 29 篇 school of comput...
  • 29 篇 department of el...
  • 28 篇 department of el...
  • 28 篇 ibm thomas j. wa...
  • 28 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 department of sy...
  • 27 篇 department of co...
  • 27 篇 shandong provinc...

作者

  • 50 篇 m. takizawa
  • 26 篇 kowalski dariusz...
  • 26 篇 li li
  • 25 篇 santoro nicola
  • 24 篇 yu wang
  • 24 篇 s.k. das
  • 23 篇 k.g. shin
  • 23 篇 kuhn fabian
  • 23 篇 peleg david
  • 23 篇 p.k. srimani
  • 23 篇 jun wang
  • 23 篇 klaus wehrle
  • 23 篇 duato j.
  • 22 篇 dhabaleswar k. p...
  • 22 篇 l.m. ni
  • 21 篇 sens pierre
  • 21 篇 xiaodong lu
  • 19 篇 guohong cao
  • 19 篇 y. shibata
  • 18 篇 torsten hoefler

语言

  • 62,964 篇 英文
  • 923 篇 其他
  • 417 篇 中文
  • 49 篇 葡萄牙文
  • 7 篇 法文
  • 4 篇 西班牙文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 俄文
检索条件"任意字段=International Symposium on Computer Networks and Distributed Systems"
64336 条 记 录,以下是431-440 订阅
排序:
Exploring Human Perception of AI-Generated Artworks
Exploring Human Perception of AI-Generated Artworks
收藏 引用
IEEE international symposium on Technology and Society (ISTAS)
作者: Rueda-Arango, Y. Dianey Rojas-Velazquez, David Gorelova, Aleksandra, V Lopez-Rincon, Alejandro Univ Utrecht Div Pharmacol Utrecht Netherlands
As image generators based on diffusion models and Generative Adversarial networks (GANs) become widely accessible and user-friendly, it is crucial to explore the impact of AI-generated artworks. These creations, which... 详细信息
来源: 评论
An Enhanced Face Spoof Detection using ResNet50 Based Cosine Learning Rate
An Enhanced Face Spoof Detection using ResNet50 Based Cosine...
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Hussein, Layth Sharanya, D. Kumar, Gotte Ranjith Prashanth, V. Ramya, R. The Islamic University Department of Computers Techniques Engineering College of Technical Engineering Najaf Iraq Department of Cse Hyderabad India Sr University Department of Computer Science & Artificial Intelligence Warangal India Nitte Meenakshi Institute of Technology Department of Electrical & Electronics Engineering Bengaluru India Bannari Amman Institute of Technology Department of Computer Science and Engineering Sathyamangalam India
In recent times, face biometric systems have recognized widely and got attention in computer vision. Further, the biometric face recognition systems are susceptible for face spoofing attacks, where an attacker uses a ... 详细信息
来源: 评论
Advancing Blockchain-Enabled InterPlanetary File System with Substrate for distributed Data Storage  4
Advancing Blockchain-Enabled InterPlanetary File System with...
收藏 引用
4th international Conference on Emerging Trends in networks and computer Communications, ETNCC 2024
作者: Nododile, Thandile Nyirenda, Clement N University of the Western Cape Department of Computer Science South Africa
In addressing the significant challenges caused by the expansion of data storage needs in blockchain systems, this paper explores the integration of the InterPlanetary File System (IPFS) with Substrate-based blockchai... 详细信息
来源: 评论
Quantum Cryptography Techniques for Enhancing Security in IoT Communications
Quantum Cryptography Techniques for Enhancing Security in Io...
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Naga, Suresh Bysani Venkata Kotiyal, Arnav Battula, R.S.S. Raju Patil, Harshal Dharangutti, Yogesh Natrayan, L. Eightfold.ai Ex - Cohesity CA United States Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Aditya University Department of Computer Applications Surampalem India Iilm University School of Computer Science & Engineering Greater Noida India Department of Law Pune India School of Engineering Simats Department of Mechanical Engineering Saveetha Kuthambakkam India
A system of wirelessly communicative sensors embedded in a person's clothing. In order to remotely monitor and treat a patient's health, sensor devices are embedded in clothing, skin, and the human body itself... 详细信息
来源: 评论
12thIFAC symposium on Control of Power and Energy systems, CPES 2024 - Proceedings
12thIFAC Symposium on Control of Power and Energy Systems, C...
收藏 引用
12thIFAC symposium on Control of Power and Energy systems, CPES 2024
The proceedings contain 138 papers. The topics discussed include: maximizing the performance of data-driven capacity estimation for lithium-ion battery;optimizing the placement and sizing of a predefined number of bat...
来源: 评论
PERMAVOST 2024 - Proceedings of the 2024 4th Workshop on Performance EngineeRing, Modelling, Analysis, and VisualizatiOn STrategy, Part of: HPDC 2024 - 33rd international symposium on High-Performance Parallel and distributed Computing
PERMAVOST 2024 - Proceedings of the 2024 4th Workshop on Per...
收藏 引用
4th Workshop on Performance EngineeRing, Modelling, Analysis, and VisualizatiOn STrategy, PERMAVOST 2024
The proceedings contain 3 papers. The topics discussed include: cost-efficient construction of performance models;using benchmarking and regression models for predicting CNN training time on a GPU;and benchmarking mac...
来源: 评论
Optimal Computation in Leaderless and Multi-Leader Disconnected Anonymous Dynamic networks  37
Optimal Computation in Leaderless and Multi-Leader Disconnec...
收藏 引用
37th international symposium on distributed Computing, DISC 2023
作者: Di Luna, Giuseppe A. Viglietta, Giovanni DIAG Sapienza University of Rome Italy Department of Computer Science and Engineering University of Aizu Japan
We give a simple characterization of which functions can be computed deterministically by anonymous processes in dynamic networks, depending on the number of leaders in the network. In addition, we provide efficient d... 详细信息
来源: 评论
Image Cryptography using AES-256 Algorithm
Image Cryptography using AES-256 Algorithm
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Chandel, Taniska Gangodkar, Ninad Gautam, Abhiraj Lohumi, Yogesh Ghazi, Mohd Rehan Goyal, Ashtha University Department of Computer Science and Engineering Dehradun India Graphic Era Hill University School of Computing Dehradun India
Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing use of social networking, ... 详细信息
来源: 评论
Addressing Dataset misalignment in medical image synthesis with GANs and alignment networks  3
Addressing Dataset misalignment in medical image synthesis w...
收藏 引用
3rd international symposium on computer Applications and Information systems, ISCAIS 2024
作者: You, Panlu Jing, Wanting Gao, Xiaolian Cheng, Dapeng School of Computer Science Shandong Institute of Business and Technology Shandong Province Yantai China
Generative Adversarial networks (GANs)1 have demonstrated remarkable success in generating realistic images, and are increasingly used for image-to-image translation tasks in medical imaging. However, methods like Pix... 详细信息
来源: 评论
A Change Detection Algorithm for High Resolution Remote Sensing Images based on Data Analysis
A Change Detection Algorithm for High Resolution Remote Sens...
收藏 引用
2024 international Conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Liu, Tao Zhang, Bohan Heilongjiang Institute of Technology College of Computer Science and Technology Harbin China China University of Geosciences School of Information Engineering Wuhan China Wuhan University State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan China
With the development of remote sensing technology to high resolution, high resolution remote sensing images are widely used in change detection. This paper uses Convolutional Neural Network (CNN) as its core model. Th... 详细信息
来源: 评论