咨询与建议

限定检索结果

文献类型

  • 4,501 篇 会议
  • 111 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 4,672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,382 篇 工学
    • 2,826 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 702 篇 信息与通信工程
    • 645 篇 电气工程
    • 382 篇 控制科学与工程
    • 210 篇 电子科学与技术(可...
    • 166 篇 机械工程
    • 124 篇 生物工程
    • 110 篇 动力工程及工程热...
    • 95 篇 仪器科学与技术
    • 95 篇 生物医学工程(可授...
    • 81 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 73 篇 光学工程
    • 71 篇 网络空间安全
    • 64 篇 材料科学与工程(可...
    • 59 篇 化学工程与技术
    • 56 篇 建筑学
  • 952 篇 理学
    • 571 篇 数学
    • 198 篇 物理学
    • 153 篇 生物学
    • 142 篇 统计学(可授理学、...
    • 125 篇 系统科学
    • 66 篇 化学
  • 800 篇 管理学
    • 475 篇 管理科学与工程(可...
    • 404 篇 图书情报与档案管...
    • 234 篇 工商管理
  • 114 篇 法学
    • 73 篇 社会学
  • 100 篇 医学
    • 69 篇 临床医学
  • 72 篇 经济学
    • 72 篇 应用经济学
  • 38 篇 农学
  • 37 篇 教育学
  • 14 篇 文学
  • 8 篇 军事学
  • 1 篇 艺术学

主题

  • 113 篇 distributed comp...
  • 92 篇 distributed comp...
  • 87 篇 parallel process...
  • 76 篇 computer science
  • 74 篇 distributed data...
  • 67 篇 computer communi...
  • 67 篇 parallel process...
  • 64 篇 computer archite...
  • 61 篇 artificial intel...
  • 60 篇 information syst...
  • 58 篇 data mining
  • 57 篇 concurrent compu...
  • 56 篇 information mana...
  • 53 篇 cloud computing
  • 53 篇 computer network...
  • 52 篇 software enginee...
  • 51 篇 computational mo...
  • 49 篇 blockchain
  • 48 篇 costs
  • 47 篇 database systems

机构

  • 11 篇 information syst...
  • 10 篇 king saud univer...
  • 8 篇 institute of inf...
  • 8 篇 school of inform...
  • 7 篇 college of infor...
  • 7 篇 distributed syst...
  • 6 篇 college of compu...
  • 6 篇 shanghai jiao to...
  • 6 篇 department of co...
  • 6 篇 school of inform...
  • 5 篇 school of automa...
  • 5 篇 china electric p...
  • 5 篇 tsinghua univ de...
  • 5 篇 national cims en...
  • 5 篇 tianjin universi...
  • 5 篇 school of electr...
  • 5 篇 ieee
  • 5 篇 research institu...
  • 5 篇 payame noor univ...
  • 5 篇 beijing univ pos...

作者

  • 21 篇 eyas el-qawasmeh
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 8 篇 chen zhen
  • 8 篇 yang chao-tung
  • 7 篇 yang yang
  • 7 篇 li kuan-ching
  • 7 篇 takizawa makoto
  • 6 篇 wang lei
  • 6 篇 yang yan
  • 6 篇 jack dongarra
  • 6 篇 liu yan
  • 6 篇 hsu ching-hsien
  • 6 篇 wang yu
  • 6 篇 wang xin
  • 6 篇 segundo moisés t...
  • 6 篇 luis enrique maf...
  • 6 篇 zhang ying
  • 5 篇 du wei
  • 5 篇 wang hui

语言

  • 4,371 篇 英文
  • 282 篇 其他
  • 28 篇 中文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"任意字段=Proceedings of the 3rd International Conference on Parallel and Distributed Information Systems"
4672 条 记 录,以下是461-470 订阅
排序:
A 3D Streamline Selection Algorithm Based on Comprehensive Similarity  3
A 3D Streamline Selection Algorithm Based on Comprehensive S...
收藏 引用
3rd international conference on Artificial Intelligence and Computer Engineering, ICAICE 2022
作者: Hu, Xiaomei Weng, Jiahong Chai, Jianfei Zhang, Mingnan Li, Yilin Shanghai Key Laboratory of Intelligent Manufacturing and Robotics School of Mechatronic Engineering and Automation Shanghai University Shanghai200444 China Information Technology Office School of Mechatronic Engineering and Automation Shanghai University Shanghai200444 China
In order to avoid the occlusion problems and missing important features of streamlines in the flow field, this paper proposes a 3D streamline selection algorithm based on comprehensive similarity. The method starts wi... 详细信息
来源: 评论
Task Assignment Algorithm for Unmanned systems Based on Step Clustering Ant Colony  1
收藏 引用
3rd international conference on Autonomous Unmanned systems, ICAUS 2023
作者: Jiang, Jian Men, Xinghuo Zhang, Defeng Jiang, Wenkai Liu, Haiying State Key Laboratory of Complex Electromagnetic Environment Effects On Electronics and Information System LuoYang471003 China College of Astronautics Nanjing University of Aeronautics and Astronautics Nanjing210016 China
The task assignment of unmanned systems is widely used and has been studied extensively. However, when there are a large number of target points in the task area, it is often a difficult problem to carry out reasonabl... 详细信息
来源: 评论
Blockchain-based ciphertext access control for data sharing using key encapsulation mechanism  3
Blockchain-based ciphertext access control for data sharing ...
收藏 引用
3rd international conference on Blockchain Technology and information Security, ICBCTIS 2023
作者: Feng, Yashi Zhao, Jinyi Chen, Taowei Yu, Yimin School of Information Yunnan University of Finance and Economics Kunming China
The article presents a plan for distribnting access control and data sharing through CP-ABE. This plan allows for provable security and privacy protection without requiring authorization agencies. The main key of the ... 详细信息
来源: 评论
High Performance and Energy Efficient Floating-Point Multiplier on FPGA  3
High Performance and Energy Efficient Floating-Point Multipl...
收藏 引用
3rd IEEE international conference on Computer systems, ICCS 2023
作者: Zhang, Hao Zheng, Xueyi Ko, Seok-Bum Ocean University of China Information Science and Engineering Qingdao China University of Saskatchewan Electrical and Computer Engineering Saskatoon Canada
In this paper, a high performance and energy efficient double-precision floating-point multiplier is designed and implemented on FPGA devices. A novel mapping solution of the mantissa multiplier is proposed which make... 详细信息
来源: 评论
Real-Time Anomaly Detection in 5G Networks Through Edge Computing  3
Real-Time Anomaly Detection in 5G Networks Through Edge Comp...
收藏 引用
3rd IEEE international conference on Intelligent Techniques in Control, Optimization and Signal Processing, INCOS 2024
作者: Shaik, Riaz Raju, Dara Behera, Prakash Chandra Changala, Ravindra Mary, S. Suma Christal Balakumar, A. Kl University Department of Cse Andhra Pradesh Vaddeswaram India Vignana Bharathi Institute and Technology Dept. of Computer Science & Engineering Aushapur Ghatkesar India St. Claret College Department of Science Bangalore India Guru Nanak Institutions Technical Campus Department of Information Technology Hyderabad India Panimalar Engineering College Department of Information Technology Poonamalle Chennai India K. Ramakrishnan College of Engineering Department of Ece samayapuram Trichy India
Strong anomaly detection techniques are becoming more and more necessary as 5G networks develop in order to maintain network performance, security, and dependability. This study leverages the capabilities of Mobile Ed... 详细信息
来源: 评论
Software and Hardware Platform Technology of Embedded Device Based on Heterogeneous SoC Chip in substation  3
Software and Hardware Platform Technology of Embedded Device...
收藏 引用
3rd IEEE international conference on information Technology, Big Data and Artificial Intelligence, ICIBA 2023
作者: Zhiqiang, Yao Hui, Ren Xin, Xu Xin, Chen Yanping, Wu Jiajia, Zhu Chen, Fan Electric Power Research Institute Limited Company Nanjing Department of China Nanjing China State Grid Jiangsu Electric Power Co.LTD Information & Telecommunication Branch Nanjing China
In order to meet the demand of high-precision harmonic sampling in electronics power grid, and further improve the performance of secondary equipment such as substation measurement and control, PMU and broadband measu... 详细信息
来源: 评论
Enhancing Networked Embedded systems Using Deep Learning Techniques  3
Enhancing Networked Embedded Systems Using Deep Learning Tec...
收藏 引用
3rd IEEE international conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Asha, K. Kumar, Ritesh Fiza, Samreen Department of Life Sciences Karnataka India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Presidency University Department of Electronics and Communication Engineering Karnataka Bangalore India
Improving performance and flexibility is crucial in the field of networked embedded systems. Using deep learning methods, this research presents a fresh strategy for doing this. Our suggested approach involves creatin... 详细信息
来源: 评论
Security Attacks and Key Challenges in Blockchain Technology: A survey  3
Security Attacks and Key Challenges in Blockchain Technology...
收藏 引用
3rd international conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2022
作者: Krishnaraj Rao, N.S. Raghunadan, K.R. Dodmane, Radhakrishna Bhavya, K. Islam, Sardar M N Shetty, Surendra NMAM Institute of Technology Nitte Information Science and Engineering Karkala574110 India ISILC Victoria University MelbourneVIC8001 Australia Master of Computer Applications NMAM Institute of Technology Nitte Karkala574110 India
A blockchain is a decentralized, distributed, and open ledger that is used to record transactions across several computer clusters. Without a change in subsequent blocks, the record cannot be changed. Blockchain is a ... 详细信息
来源: 评论
Where to Turn: Road Fork Detection in Sparse 3D Point Cloud  3rd
Where to Turn: Road Fork Detection in Sparse 3D Point Clou...
收藏 引用
3rd international conference on Autonomous Unmanned systems, ICAUS 2023
作者: Hu, Di Zhang, Kai Zhong, Yipan Xu, Jiachen Yuan, Xia Zhao, Chunxia School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Research Institute of Intelligence Southwest Research Institute of Information Control Chengdu611700 China
Intersection detection plays a crucial role in localizing and planning the path of autonomous vehicles in urban environments. This paper presents a novel approach, PVWO, for adaptive intersection detection in autonomo... 详细信息
来源: 评论
A Comparative Analysis Between Quantum Machine Learning and Machine Learning on EEG Dataset  3
A Comparative Analysis Between Quantum Machine Learning and ...
收藏 引用
3rd IEEE international conference on Metrology for eXtended Reality, Artificial Intelligence and Neural Engineering, MetroXRAINE 2024
作者: Angrisani, Leopoldo De Benedetto, Egidio Di Bernardo, Alessandro Prevete, Roberto Tedesco, Annarita University of Naples Federico Ii Department of Information Technology and Electrical Engineering Naples Italy University of Naples Federico Ii Department of Public Health Naples Italy
In recent years, quantum technology has been developing in several fields, including quantum computing. Quantum Computing (QC) is a type of computing that uses quantum bits (qubits) instead of classical bits to perfor... 详细信息
来源: 评论