咨询与建议

限定检索结果

文献类型

  • 1,430 篇 会议
  • 28 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 1,471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,281 篇 工学
    • 1,181 篇 计算机科学与技术...
    • 855 篇 软件工程
    • 149 篇 信息与通信工程
    • 121 篇 生物工程
    • 103 篇 控制科学与工程
    • 84 篇 电气工程
    • 44 篇 生物医学工程(可授...
    • 30 篇 建筑学
    • 29 篇 网络空间安全
    • 27 篇 机械工程
    • 26 篇 安全科学与工程
    • 22 篇 动力工程及工程热...
    • 21 篇 土木工程
    • 20 篇 环境科学与工程(可...
  • 289 篇 理学
    • 124 篇 数学
    • 123 篇 生物学
    • 33 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 18 篇 化学
    • 17 篇 系统科学
  • 265 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 106 篇 工商管理
  • 204 篇 法学
    • 198 篇 社会学
  • 46 篇 医学
    • 46 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 26 篇 公共卫生与预防医...
    • 19 篇 药学(可授医学、理...
  • 40 篇 教育学
    • 40 篇 教育学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 7 篇 农学
  • 4 篇 艺术学
  • 2 篇 文学

主题

  • 143 篇 computer support...
  • 61 篇 social computing
  • 51 篇 social networkin...
  • 36 篇 human computer i...
  • 33 篇 groupware
  • 32 篇 crowdsourcing
  • 30 篇 collaboration
  • 27 篇 social media
  • 25 篇 interactive comp...
  • 22 篇 computer-support...
  • 21 篇 design
  • 20 篇 computer-mediate...
  • 19 篇 computer program...
  • 18 篇 cscw
  • 17 篇 crisis informati...
  • 17 篇 ubiquitous compu...
  • 16 篇 artificial intel...
  • 12 篇 collaborative wo...
  • 12 篇 mobile computing
  • 12 篇 privacy

机构

  • 13 篇 key laboratory o...
  • 12 篇 carnegie mellon ...
  • 12 篇 univ washington ...
  • 10 篇 school of comput...
  • 9 篇 tongji universit...
  • 8 篇 school of comput...
  • 8 篇 stanford univ st...
  • 7 篇 guangdong univer...
  • 7 篇 fudan university
  • 7 篇 univ michigan sc...
  • 7 篇 georgia institut...
  • 6 篇 georgia inst tec...
  • 6 篇 northwestern uni...
  • 6 篇 school of data a...
  • 6 篇 shandong univers...
  • 6 篇 human-computer i...
  • 6 篇 qatar computing ...
  • 5 篇 fujian provincia...
  • 5 篇 school of comput...
  • 5 篇 college of intel...

作者

  • 15 篇 dabbish laura
  • 12 篇 guo kun
  • 11 篇 rodden tom
  • 11 篇 gu ning
  • 9 篇 palen leysia
  • 9 篇 fussell susan r.
  • 9 篇 gilbert eric
  • 9 篇 sun chengzheng
  • 8 篇 bernstein michae...
  • 8 篇 kraut robert e.
  • 8 篇 ding xianghua
  • 8 篇 gutwin carl
  • 8 篇 hongfei fan
  • 8 篇 semaan bryan
  • 8 篇 kittur aniket
  • 8 篇 lampinen airi
  • 8 篇 starbird kate
  • 7 篇 ackerman mark s.
  • 7 篇 dongning liu
  • 7 篇 voida amy

语言

  • 1,421 篇 英文
  • 38 篇 其他
  • 17 篇 中文
检索条件"任意字段=Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing"
1471 条 记 录,以下是211-220 订阅
排序:
Adaboost-based Graph Convolutional Networks with Channel Attention for Intrusion Detection in Internet-of-Things  21
Adaboost-based Graph Convolutional Networks with Channel Att...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International conference on Big Data and Cloud computing, 16th IEEE International conference on social computing and Networking and 13th International conference on Sustainable computing and Communications, ISPA/BDCloud/socialCom/SustainCom 2023
作者: Long, Jing Luo, Cuiting Chen, Ruxin Liang, Wei Qin, Zheng Hunan Normal University College of Information Science and Engineering Changsha410081 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China
With the increasing proliferation of Internet of Things (IoT) and industrial big data technologies, while IoT scenarios offer intelligent services, cyberspace faces various types of threats and attacks. Despite Graph ... 详细信息
来源: 评论
MCoT: Multi-Modal Vehicle-to-Vehicle cooperative Perception with Transformers  29
MCoT: Multi-Modal Vehicle-to-Vehicle Cooperative Perception ...
收藏 引用
29th IEEE International conference on Parallel and Distributed Systems, ICPADS 2023
作者: Shi, Shanwei Zhang, Chaokun Lv, Aojia He, Shen Tianjin University College of Intelligence and Computing Tianjin China China Xiong'an Group Digital City Technology Co. Ltd. Xiong'an China
Highly accurate perception is one of the pivotal factors for the safe operation of Intelligent Connected Vehicles (ICVs). Nevertheless, occlusion blind spots, limited fields-of-view, and low-point density of the senso... 详细信息
来源: 评论
Application of Edge computing in Investigation and Interrogation  21
Application of Edge Computing in Investigation and Interroga...
收藏 引用
5th International conference on Electronic Information Technology and computer Engineering, EITCE 2021
作者: Gong, Siyuan Chen, Xiang People's Public Security University of China Beijing China
Under the background of the trial-centered litigation system reform, the investigation and interrogation work, as the basic link before trial in criminal proceedings, has required higher standards of evidence collecti... 详细信息
来源: 评论
Do You Really Understand What I Mean? A Visual Representation of Micro-operation Intention  24
Do You Really Understand What I Mean? A Visual Representatio...
收藏 引用
24th IEEE International conference on computer supported cooperative work in Design (IEEE CSCWD)
作者: Wang, Zhuo Wang, Yang Bai, Xiangliang Zhang, Shusheng He, Weiping Huo, Xiangyu Northwestern Polytech Univ Sch Mech & Elect Engn Xian Peoples R China Xinxiang Aviat Ind Grp Co Ltd Civil Aircraft Div Xinxiang Aviat Ind Grp Xinxiang Henan Peoples R China Zhengzhou Univ Sch Mech & Elect Engn Zhengzhou Peoples R China
In AR assembly, only experienced workers can complete the physical tasks with high operation precision requirements. The reason is that they use their brains to transform the information reflecting micro-operation int... 详细信息
来源: 评论
Community supported Agriculture: The Concept of Solidarity in Mitigating Between Harvests and Needs  21
Community Supported Agriculture: The Concept of Solidarity i...
收藏 引用
CHI conference on Human Factors in computing Systems
作者: Landwehr, Marvin Engelbutzeder, Philip Wulf, Volker Univ Siegen Siegen Germany Int Inst SocioInformat IISI Bonn Germany
There is a developing recognition of the social and economic costs entailed in global supply chains. In this paper, we report on efforts to provide alternative, more sustainable and resilient models of production. Com... 详细信息
来源: 评论
Efficient and Secure Collaborative Processing in Mobile Edge computing via Blockchain  15
Efficient and Secure Collaborative Processing in Mobile Edge...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International conferences on Internet of Things, iThings 2022, 18th IEEE International conferences on Green computing and Communications, GreenCom 2022, 2022 IEEE International conference on Cyber, Physical and social computing, CPSCom 2022 and 8th IEEE International conference on Smart Data, SmartData 2022
作者: Le, Yuwei Jiang, Yiheng Ling, Xintong Wang, Jiaheng Southeast University National Mobile Communications Research Laboratories Nanjing210096 China Purple Mountain Laboratories Nanjing211100 China
Mobile edge computing (MEC) provides resource-hungry, energy-efficient, latency-sensitive, and privacy-secure computing services close to end-users, whereas the services are usually restricted to a single network. Blo... 详细信息
来源: 评论
How to Train a (Bad) Algorithmic Caseworker: A Quantitative Deconstruction of Risk Assessments in Child Welfare
How to Train a (Bad) Algorithmic Caseworker: A Quantitative ...
收藏 引用
2022 CHI conference on Human Factors in computing Systems, CHI EA 2022
作者: Saxena, Devansh Repaci, Charles Sage, Melanie D Guha, Shion Dept. of Computer Science Marquette University MilwaukeeWI United States School of Medicine Washington University in St. Louis Saint LouisMO United States School of Social Work University at Bufalo BuffaloNY United States Faculty of Information University of Toronto TorontoON Canada
Child welfare (CW) agencies use risk assessment tools as a means to achieve evidence-based, consistent, and unbiased decision-making. These risk assessments act as data collection mechanisms and have been further deve... 详细信息
来源: 评论
Ensuring Data Freshness for In-Storage computing with cooperative Buffer Manager
Ensuring Data Freshness for In-Storage Computing with Cooper...
收藏 引用
2025 Design, Automation and Test in Europe conference, DATE 2025
作者: Xue, Jin Song, Yuhong Guo, Yang Shao, Zili The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong
In-storage computing (ISC) aims to mitigate the excessive data movement between the host memory and storage by offloading computation to storage devices for in-situ execution. However, ensuring data freshness remains ... 详细信息
来源: 评论
Human perceptions on moral responsibility of ai: A case study in ai-assisted bail decision-making  21
Human perceptions on moral responsibility of ai: A case stud...
收藏 引用
2021 CHI conference on Human Factors in computing Systems: Making Waves, Combining Strengths, CHI 2021
作者: Lima, Gabriel Grgic-Hlaca, Nina Cha, Meeyoung School of Computing Kaist Data Science Group Ibs Korea Republic of
How to attribute responsibility for autonomous artifcial intelligence (AI) systems' actions has been widely debated across the humanities and social science disciplines. This work presents two experiments (N=200 e... 详细信息
来源: 评论
Reinforcement learning-based IoT sensor scheduling strategy for bridge structure health monitoring  15
Reinforcement learning-based IoT sensor scheduling strategy ...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International conferences on Internet of Things, iThings 2022, 18th IEEE International conferences on Green computing and Communications, GreenCom 2022, 2022 IEEE International conference on Cyber, Physical and social computing, CPSCom 2022 and 8th IEEE International conference on Smart Data, SmartData 2022
作者: Zhang, Yuan Wu, Hengshan Yi, Lingzhi Luo, Bin Qiu, Yun Tang, Feilong School of Civil Engineering University of South China China Department of Computer Science St. Francis Xavier University Canada Foshan Highway and Bridge Engineering Monitoring Station Co China The School of Data Science and Engineering East China Normal University Shanghai200062 China
Internet of Things (IoT) based Bridge Structural Health Monitoring (BSHM) is a hot topic in the field of civil engineering and computer science, and has been widely concerned by academia and industry. The lifetime of ... 详细信息
来源: 评论