咨询与建议

限定检索结果

文献类型

  • 530 篇 会议
  • 70 册 图书
  • 3 篇 期刊文献

馆藏范围

  • 603 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 340 篇 工学
    • 306 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 115 篇 信息与通信工程
    • 50 篇 电气工程
    • 24 篇 控制科学与工程
    • 20 篇 生物工程
    • 13 篇 机械工程
    • 11 篇 电子科学与技术(可...
    • 9 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 土木工程
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
  • 68 篇 理学
    • 33 篇 数学
    • 22 篇 生物学
    • 15 篇 物理学
    • 12 篇 系统科学
    • 4 篇 化学
    • 4 篇 统计学(可授理学、...
  • 46 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 14 篇 教育学
    • 14 篇 教育学
  • 11 篇 医学
    • 11 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 10 篇 法学
    • 9 篇 社会学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 4 篇 农学
    • 4 篇 作物学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 mobile computing
  • 18 篇 information syst...
  • 16 篇 multimedia commu...
  • 16 篇 multimedia infor...
  • 15 篇 multimedia syste...
  • 15 篇 artificial intel...
  • 15 篇 user interfaces ...
  • 15 篇 cloud computing
  • 14 篇 mobile communica...
  • 12 篇 wireless communi...
  • 12 篇 ubiquitous compu...
  • 11 篇 computer communi...
  • 11 篇 information stor...
  • 10 篇 multimedia servi...
  • 8 篇 quality of servi...
  • 8 篇 multimedia
  • 8 篇 streaming media
  • 8 篇 mobile handsets
  • 7 篇 information syst...
  • 7 篇 pervasive comput...

机构

  • 5 篇 faculty of engin...
  • 5 篇 beijing universi...
  • 4 篇 multimedia unive...
  • 4 篇 university of te...
  • 4 篇 bournemouth univ...
  • 4 篇 institute of com...
  • 4 篇 gdynia maritime ...
  • 3 篇 universiti tekni...
  • 3 篇 dongguk universi...
  • 3 篇 institute of hea...
  • 3 篇 west pomeranian ...
  • 3 篇 beijing universi...
  • 3 篇 beijing universi...
  • 2 篇 beijing key labo...
  • 2 篇 faculty of engin...
  • 2 篇 college of compu...
  • 2 篇 university of sa...
  • 2 篇 school of inform...
  • 2 篇 department of in...
  • 2 篇 university of a ...

作者

  • 5 篇 julie a. jacko
  • 5 篇 lech piotr
  • 4 篇 ireneusz czarnow...
  • 4 篇 liang meiyu
  • 4 篇 mazurek przemysl...
  • 4 篇 li ang
  • 4 篇 alfonso mateos c...
  • 4 篇 lakhmi c. jain
  • 3 篇 tan wooi-haw
  • 3 篇 foo yee-loo
  • 3 篇 de-shuang huang
  • 3 篇 xue zhe
  • 3 篇 fiza abdul rahim
  • 3 篇 fastowicz jarosl...
  • 3 篇 ajith abraham
  • 3 篇 du junping
  • 3 篇 li yawen
  • 3 篇 guan zeli
  • 3 篇 okarma krzysztof
  • 3 篇 rahim fiza abdul

语言

  • 589 篇 英文
  • 9 篇 中文
  • 6 篇 其他
检索条件"任意字段=Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia"
603 条 记 录,以下是31-40 订阅
排序:
Enhancing Intrusion Prevention with Explainable Convolutional Neural Networks: Recent Developments and Promising Applications  8
Enhancing Intrusion Prevention with Explainable Convolutiona...
收藏 引用
8th international conference on Communication and Electronics Systems, ICCES 2023
作者: Chitnis, Ajay Chandre, Pankaj Pathan, Shafi DevOps Architect Hcl Technologies Uk Limited Pune India Mit Art Design & Technology University Mit School of Computing Department of Computer Science & Engineering Pune India
the proliferation of cyberattacks in recent years has led to an increased demand for effective intrusion prevention systems (IPS). Convolutional Neural Networks (CNNs) have shown promise in improving the accuracy of I... 详细信息
来源: 评论
Authentication Methods that use Haptic and Audio: A Review  8
Authentication Methods that use Haptic and Audio: A Review
收藏 引用
8th international Cryptology and Information Security conference 2022, CRYPTOLOGY2022
作者: Kam, Yvonne Hwei-Syn Chin, Ji-Jian Faculty of Engineering Multimedia University Selangor Malaysia Faculty of Computing & Informatics Multimedia University Selangor Malaysia
Authentication is an important step for many applications eg. banking, communications etc. Identity theft can happen because the systems that we use are vulnerable to observation attacks both by a person (shoulder sur... 详细信息
来源: 评论
Designing Pervasive Games Oriented Towards the Elderly: A Case Study  7th
Designing Pervasive Games Oriented Towards the Elderly: A Ca...
收藏 引用
7th and 8th international conference on Information and Communication Technologies for Ageing Well and e-Health, ICT4AWE 2021 and ICT4AWE 2022
作者: Lacuesta, Raquel Gallardo, Jesús Hernández, Silvia Pérez, Álvaro Department of Computing and Systems Engineering University of Zaragoza Teruel Spain Pre-departmental Unit of Fine Arts University of Zaragoza Teruel Spain
Elderly people is a segment of population that is quickly increasing during the last years. In the digital society where we live, it is not bearable that this segment of population remains out of the advances in infor... 详细信息
来源: 评论
A Study of DM-TPACK Evaluation Methods for Middle School Mathematics Teachers  24
A Study of DM-TPACK Evaluation Methods for Middle School Mat...
收藏 引用
8th international conference on Education and multimedia Technology, ICEMT 2024
作者: Zhang, En Chen, Ruxian Chen, Sailan Chen, Yuanhua Wang, Ying Yin, Ruiyao Institute of Computing Science and Technology Guangzhou University Guangzhou China Institute of Mathematics and Information Science Guangzhou University Guangzhou China Software Engineering Institute of Guangzhou Guangzhou China
the theoretical framework of Technological Pedagogical Content Knowledge (TPACK) provides a foundation for the integration of information technology and disciplines. Dynamic mathematical software, as the most widely u... 详细信息
来源: 评论
Dynamic Behavior Pattern: Mining the Fraudsters in Telecom Network  24
Dynamic Behavior Pattern: Mining the Fraudsters in Telecom N...
收藏 引用
24th IEEE international conference on High Performance computing and Communications, 8th IEEE international conference on Data Science and Systems, 20th IEEE international conference on Smart City and 8th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Li, Dengshi Zeng, Lu Hu, Ruimin Huang, Zijun Liang, Xiaocong Zang, Yilong School of Artificial Intelligence Jianghan University Wuhan China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
In telecom network fraud, the fraud method of the fraudsters varies significantly in different periods. However, the traditional method of telecom fraud is to train the telecom fraud mining model through the user'... 详细信息
来源: 评论
Host Bypassing: Let your GPU speak Ethernet  8
Host Bypassing: Let your GPU speak Ethernet
收藏 引用
8th IEEE international conference on Network Softwarization (NetSoft) - Network Softwarization Coming of Age - New Challenges and Opportunities
作者: Kundel, Ralf Anderweit, Leonard Markussen, Jonas Griwodz, Carsten Abboud, Osama Becker, Benjamin Meuser, Tobias Tech Univ Darmstadt Multimedia Commun Lab Darmstadt Germany Univ Oslo Dept Informat Oslo Norway Dolphin Interconnect Solut AS Oslo Norway Huawei Technol Munich Germany
Hardware acceleration of network functions is essential to meet the challenging Quality of Service requirements in nowadays computer networks. Graphical Processing Units (GPU) are a widely deployed technology that can... 详细信息
来源: 评论
Redesign of a conference from In-Person to Online. Case Study: ICCCC  8th
Redesign of a Conference from In-Person to Online. Case Stud...
收藏 引用
8th international conference on Computers Communications and Control (ICCCC)
作者: Dzitac, Ioan Dzitac, Simona Filip, Florin Gheorghe Manolescu, Misu-Jan Agora Univ Oradea Piata Tineretului 8 Oradea 410526 Romania Univ Oradea Univ 1 Oradea Romania Romanian Acad 125 Calea Victoriei Bucharest Romania
"Intelligent Methods for computing, Communications and Control" volume, published by Springer in "advances in Intelligent Systems and computing" Series, is in fact the proceedings of the 8th Intern... 详细信息
来源: 评论
Knowledge and Perceived Security as Driven the Continuance Use of mobile Fintech Payments  8
Knowledge and Perceived Security as Driven The Continuance U...
收藏 引用
8th international conference on Information Management and Technology, ICIMTech 2023
作者: Ikhsan, Ridho Bramulya Fernando, Yudi Fernando, Erick Gui, Anderes Fakhrorazi, Ahmad Wahyuni-Td, Ika Sari Binus Online Learning Bina Nusantara University Management Department Jakarta11480 Indonesia Universitas Multimedia Nusantara Faculty of Engineering and Informatics Department of Information System Tangerang Indonesia School of Information Systems Bina Nusantara University Information Systems Department Jakarta11480 Indonesia Ghazali Shafie Graduate School of Government Universiti Utara Malaysia Kedah Malaysia Universitas Andalas Faculty of Economics Accounting Department Padang Indonesia
the issue of security in the use of payment-based technology is considered essential to continue to be studied because of the impact of advances in technology and information. One of the payment methods that is develo... 详细信息
来源: 评论
A Relational Triple Extraction Method Based on Feature Reasoning for Technological Patents  8
A Relational Triple Extraction Method Based on Feature Reaso...
收藏 引用
8th IEEE international conference on Cloud computing and Intelligence Systems, CCIS 2022
作者: Fang, Runze Du, Junping Shao, Yingxia Guan, Zeli Beijing University of Posts and Telecommunications School of Computer Science Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing100876 China
the relation triples extraction method based on table filling can address the issues of relation overlap and bias propagation. However, most of them only establish separate table features for each relationship, which ... 详细信息
来源: 评论
Cross-modal Search Method of Technology Video based on Adversarial Learning and Feature Fusion  8
Cross-modal Search Method of Technology Video based on Adver...
收藏 引用
8th IEEE international conference on Cloud computing and Intelligence Systems, CCIS 2022
作者: Liu, Xiangbin Du, Junping Liang, Meiyu Li, Ang Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Communication Software and Multimedia School of Computer Science National Pilot Software Engineering School Beijing100876 China
Technology videos contain rich multi-modal information. In cross-modal information search, the data features of different modalities cannot be compared directly, so the semantic gap between different modalities is a k... 详细信息
来源: 评论