咨询与建议

限定检索结果

文献类型

  • 4,168 篇 会议
  • 59 册 图书
  • 37 篇 期刊文献

馆藏范围

  • 4,264 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,041 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,591 篇 软件工程
    • 636 篇 信息与通信工程
    • 509 篇 电气工程
    • 428 篇 控制科学与工程
    • 207 篇 生物工程
    • 163 篇 机械工程
    • 148 篇 生物医学工程(可授...
    • 142 篇 交通运输工程
    • 133 篇 动力工程及工程热...
    • 116 篇 电子科学与技术(可...
    • 97 篇 仪器科学与技术
    • 85 篇 建筑学
    • 85 篇 安全科学与工程
    • 82 篇 化学工程与技术
    • 70 篇 光学工程
    • 61 篇 土木工程
  • 908 篇 理学
    • 538 篇 数学
    • 219 篇 生物学
    • 143 篇 物理学
    • 142 篇 统计学(可授理学、...
    • 110 篇 系统科学
    • 98 篇 化学
  • 714 篇 管理学
    • 488 篇 管理科学与工程(可...
    • 288 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 115 篇 法学
    • 68 篇 社会学
  • 111 篇 医学
    • 98 篇 临床医学
    • 92 篇 基础医学(可授医学...
  • 78 篇 经济学
    • 78 篇 应用经济学
  • 61 篇 教育学
  • 43 篇 农学
  • 9 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 207 篇 cloud computing
  • 149 篇 distributed comp...
  • 117 篇 blockchain
  • 108 篇 internet of thin...
  • 101 篇 intelligent netw...
  • 95 篇 computational mo...
  • 93 篇 edge computing
  • 91 篇 artificial intel...
  • 86 篇 computer archite...
  • 73 篇 distributed data...
  • 71 篇 big data
  • 69 篇 servers
  • 62 篇 monitoring
  • 59 篇 wireless sensor ...
  • 55 篇 data models
  • 53 篇 intelligent syst...
  • 52 篇 data mining
  • 52 篇 protocols
  • 50 篇 computer network...
  • 49 篇 security

机构

  • 18 篇 university of ch...
  • 15 篇 key laboratory o...
  • 11 篇 state key labora...
  • 11 篇 institute of com...
  • 10 篇 wuhan university...
  • 10 篇 college of compu...
  • 10 篇 school of inform...
  • 9 篇 huazhong univers...
  • 9 篇 college of compu...
  • 9 篇 wuhan univ sci &...
  • 8 篇 school of comput...
  • 8 篇 school of electr...
  • 8 篇 institutes for r...
  • 8 篇 hubei province k...
  • 8 篇 national univers...
  • 8 篇 hubei prov key l...
  • 7 篇 shandong provinc...
  • 7 篇 school of automa...
  • 7 篇 chitkara univers...
  • 7 篇 school of comput...

作者

  • 14 篇 hu rong
  • 12 篇 qian bin
  • 12 篇 shi zhongzhi
  • 9 篇 zhang tao
  • 9 篇 li peng
  • 9 篇 wang wei
  • 8 篇 liu yang
  • 8 篇 yang yang
  • 8 篇 pan linqiang
  • 8 篇 wu hongjie
  • 8 篇 wang chen
  • 8 篇 hu wei
  • 7 篇 yao wenbin
  • 7 篇 barolli leonard
  • 7 篇 xu xiaolong
  • 7 篇 chen yuehui
  • 7 篇 wang lihui
  • 7 篇 li wei
  • 7 篇 bao wenzheng
  • 6 篇 corchado juan m.

语言

  • 4,194 篇 英文
  • 55 篇 其他
  • 30 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=17th International Conference on Distributed Computing and Intelligent Technology"
4264 条 记 录,以下是4121-4130 订阅
排序:
Blockchain-enabled Edge computing Framework for Hierarchic Cluster-based Federated Learning
Blockchain-enabled Edge Computing Framework for Hierarchic C...
收藏 引用
international conference on Wireless Communications and Signal Processing (WCSP)
作者: Xiaoge Huang Yuhang Wu Zhi Chen Qianbin Chen Jie Zhang School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Communication and Information Engineering University of Sheffield United Kingdom
Federated learning implements decentralized machine learning tasks without exposing users' private data. However, in practical scenarios, intelligent devices data pertain to different fields are non-independent an... 详细信息
来源: 评论
DEEP FEATURE WEIGHTING IN NAIVE BAYES FOR CHINESE TEXT CLASSIFICATION
DEEP FEATURE WEIGHTING IN NAIVE BAYES FOR CHINESE TEXT CLASS...
收藏 引用
2016 4th IEEE international conference on Cloud computing and Intelligence Systems(IEEE CCIS2016)
作者: Qiaowei Jiang Wen Wang Xu Han Shasha Zhang Xinyan Wang Cong Wang School of Software Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications School of Automation Beijing University of Posts and Telecommunications Air Force General Hospital
Naive Bayes(NB) continues to be one of the popular methods for text categorization because of its simplicity, efficiency and efficacy. In all of the existing feature weighting approaches, the learned feature weights a... 详细信息
来源: 评论
Detection and Evaluation of Cybersecurity threats in MANET Based on AI
Detection and Evaluation of Cybersecurity Threats in MANET B...
收藏 引用
Ubiquitous computing and intelligent Information Systems (ICUIS), international conference on
作者: R. Mohandas Karthik Kumar Vaigandla N. Sivapriya Kirubasankar K Department of Electronics & Communication Engineering Chennai Institute of Technology Chennai Tamil Nadu Department of Electronics & Communication Engineering Balaji Institute of Technology and Science Warangal Telangana Department of Computer Applications Cauvery College for Women Trichy Tamil Nadu
this research focuses on the use of AI to enhance the security of Mobile Ad-hoc Networks (MANETs), which aredecentralized and mobile wireless networks characterized by their dynamic nature. the work aims to assess the... 详细信息
来源: 评论
Robust Categorical Data Clustering Guided by Multi-Granular Competitive Learning
Robust Categorical Data Clustering Guided by Multi-Granular ...
收藏 引用
international conference on distributed computing Systems
作者: Shenghong Cai Yiqun Zhang Xiaopeng Luo Yiu-Ming Cheung Hong Jia Peng Liu Guangdong University of Technology Guangzhou China Guangzhou Huali College Guangzhou China Hong Kong Baptist University Hong Kong SAR China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
Data set composed of categorical features is very common in big data analysis tasks. Since categorical features are usually with a limited number of qualitative possible values, the nested granular cluster effect is p... 详细信息
来源: 评论
Uncertain Investment Models for an Insurer with Ruin Constraint
Uncertain Investment Models for an Insurer with Ruin Constra...
收藏 引用
2012 IEEE 19th international conference on Industrial Engineering and Engineering Management(IE&EM 2012)
作者: Qing-feng Song Kai Shi School of Science Tianjin Institute of Urban Construction School of Computer Science and Communication Engineering Tianjin University of Technology
this paper focuses on the optimal investment proportion problem of insurance premium for an insurer in uncertain environments. Two uncertain investment models with ruin constraint are investigated, namely, an investme... 详细信息
来源: 评论
A Hypothesis Testing Using the Total Time on Test from Censored Data as Test Statistic
A Hypothesis Testing Using the Total Time on Test from Censo...
收藏 引用
the 2011 international conference on computing,Information and Control(ICCIC 2011)
作者: Shih-Chuan Cheng Department of Mathematics Creighton University
the total time on test for censored data from an exponentially distributed population has been proved to be a prediction sufficient(or adequate) statistic by Nair and Cheng [10] in light of the works by Cheng and Mord... 详细信息
来源: 评论
Dynamic look-ahead time in book-ahead reservation in QoS-enabled networks
Dynamic look-ahead time in book-ahead reservation in QoS-ena...
收藏 引用
IEEE international conference on Networks
作者: I. Ahmad J. Kamruzzaman S. Aswathanarayaniah Gippsland School of Computing and Information Technology Monash University Australia
In recent time book-ahead (BA) reservation has drawn increasing attention as multimedia and distributed applications become functionally richer. Book-ahead reservation has proved itself as an effective technique for t... 详细信息
来源: 评论
IoT Based Smart Systems using Artificial Intelligence and Machine Learning: Accessible and intelligent Solutions
IoT Based Smart Systems using Artificial Intelligence and Ma...
收藏 引用
international conference on Information Systems and Computer Networks (ISCON)
作者: Bilal Ahmed Mirza Shuja Hari Mohan Mishra Ahmed Qtaishat Mukesh Kumar School of Computer Application Lovely Professional University Phagwara Punjab Department of Information Technology Sohar University Sohar Sultanate of Oman
the Internet of things (IoT) has grown in importance in both the technological and social spheres as consumers want smarter homes, more efficient businesses, and more efficient healthcare systems. the social setting i... 详细信息
来源: 评论
Transforming IoT with Federated Multimodal Learning: A Privacy-Centric Approach
Transforming IoT with Federated Multimodal Learning: A Priva...
收藏 引用
intelligent Technologies (CONIT), international conference on
作者: Ankita Suryavanshi Shiva Mehta Mukesh Kumar Siddhant thapliyal Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Computer Science and Engineering Graphic Era Hill University Dehradun Uttarakhand India Computer Science and Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India
Suppliers face significant challenges when discussing cloud-based health apps, such as implementing highly secure procedures and rigorous privacy safeguards. this applies to the fact that the acceptance of these appli... 详细信息
来源: 评论
A Particle Swarm Optimization based Feature Selection Method for Accident Severity Analysis
A Particle Swarm Optimization based Feature Selection Method...
收藏 引用
IEEE international conference on Cyber technology in Automation, Control, and intelligent Systems
作者: Chenye Qiu Xingquan Zuo Fei Xiang School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Reducing accident severity is an effective mean to improve road safety level. Many researches have been done to identify the risky features which would influence the accident severity. Many risky features need to be c... 详细信息
来源: 评论