咨询与建议

限定检索结果

文献类型

  • 1,821 篇 会议
  • 19 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,847 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,183 篇 工学
    • 744 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 158 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 46 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 20 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 260 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 207 篇 理学
    • 109 篇 数学
    • 41 篇 生物学
    • 40 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 84 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 46 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 32 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,827 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1847 条 记 录,以下是1051-1060 订阅
排序:
A Database Optimization Method Based on Program Business Logic Adjustment
A Database Optimization Method Based on Program Business Log...
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Lixia Liu Xiaohua Qiu Dept. of Information Engineering Engineering University of CAPF
Most system developers pay little attention toprogram business logic mightimpact on system performance in the database adjustment and optimization process. Based on summary of database optimization manners, they are d... 详细信息
来源: 评论
Computational Complexity on the Cores of Bin Covering Games
Computational Complexity on the Cores of Bin Covering Games
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Qizhi Fang Jianyuan Sun School of Mathematical Sciences Ocean University of China
In this paper, we introduce a cooperative game model arising from bin covering problem, called bin covering game, and discuss the computational complexity issues on the core and the approximate core of the game. Makin... 详细信息
来源: 评论
Digital Evidence Evaluation System Based on Computer System Environment Analysis
Digital Evidence Evaluation System Based on Computer System ...
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Gonglong Chen Department of Computer Science and Technology East China University of Political Science and Law
In cybercrime, the evaluation results of the weight of digital evidence are directly influencing the cognizance of the relevant case, further influencing the judgment of the case. Now, it lacks a universally accepted ... 详细信息
来源: 评论
A Sociology-based Interaction Relationship Model in IoT
A Sociology-based Interaction Relationship Model in IoT
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Huijuan Zhang Yuji Shen School of Software Enginnering Tongji University
Objects having social properties is a well explored field in Sociology and the idea has been introduced intothe field of Internet of Things(IoT) recently. In this paper, the authors analyze some social features of IoT... 详细信息
来源: 评论
A key exchange system based on some bicyclic biquadratic number fields
A key exchange system based on some bicyclic biquadratic num...
收藏 引用
ieee international conference on Multimedia computing and Systems (ICMCS)
作者: Soufiane Mezroui Abdelmalek Azizi M'Hammed Ziane Department of Mathematics and Informatics Mohamed First University Oujda Morocco
Buchmann and Williams presented in 1988 a key exchange system based on the quadratic imaginary fields. In this paper, we introduce a key exchange protocol based on some imaginary biquadratic fields which is inspired b... 详细信息
来源: 评论
The evaluation of the business operation performance by applying Grey Relational Analysis  1
收藏 引用
1st Euro-China conference on Intelligent Data Analysis and Applications, ECC 2014
作者: Zhao, Dingtao Kuo, Su-Hui Wang, Tien-Chin University of Science and Technology of China China Department of International Business National Kaohsiung University of Applied Sciences 415 Chien-Kung Road Kaohsiung City80778 Taiwan
The effect of the business operation performance has a great influence on the growth and development of a corporation;therefore, the purpose of measuring the business operation performance is to understand whether the... 详细信息
来源: 评论
A Preliminary Analysis on BLMAB-Based Approximate Optimization Support for Multi Agent Simulations on Multi-core and GPU-Based computing Environment
A Preliminary Analysis on BLMAB-Based Approximate Optimizati...
收藏 引用
ieee international conference on Service-Oriented computing and Applications (SOCA)
作者: Yoshihito Sano Yoshiaki Kadono Naoki Fukuta Graduate School of Informatics Shizuoka University Shizuoka Japan
There are strong demands to utilize multi-core computing resources effectively for large-scale and highly detailed multi-agent simulations. We have proposed a framework to assist parameter tuning process of multi-core... 详细信息
来源: 评论
What Can OpenStack Adopt from a Ganeti-Based Open-Source IaaS?
What Can OpenStack Adopt from a Ganeti-Based Open-Source Iaa...
收藏 引用
ieee international conference on Cloud computing, CLOUD
作者: Elton Qevani Marianthi Panagopoulou Christoforos Stampoltas Athanasios Tsitsipas Dimosthenis Kyriazis Marinos Themistocleous Department of Digital Systems University of Piraeus Piraeus Greece CISUC/Department of Informatics Engineering Coimbra Portugal
Cloud computing is becoming a widely adopted paradigm for the provision of different types of ICT services. Building on a set of combined technologies, it enables service provision following on-demand usage patterns. ... 详细信息
来源: 评论
From "i love you babe" to "leave me alone" - romantic relationship breakups on twitter  6
From "i love you babe" to "leave me alone" - romantic relati...
收藏 引用
6th international conference on Social informatics, SocInfo 2014
作者: Garimella, Venkata Rama Kiran Weber, Ingmar Cin, Sonya Dal Aalto University Finland Qatar Computing Research Institute Finland University of Michigan Finland
We use public data from Twitter to study the breakups of the romantic relationships of 661 couples. Couples are identified through profile references such as @user1 writing "@user2 is the best boyfriend ever!!&qu... 详细信息
来源: 评论
Study in Usefulness of Middleware-Only Provenance
Study in Usefulness of Middleware-Only Provenance
收藏 引用
ieee international conference on e-Science and Grid computing
作者: Quan Zhou Devarshi Ghoshal Beth Plale Indiana University Bloomington Bloomington IN US School of Informatics and Computing Indiana University Bloomington IN
Data provenance is the lineage of a digital artifact or object. Its capture in workflow-controlled distributed applications is well studied but less is known about quality of provenance captured solely through existin... 详细信息
来源: 评论