咨询与建议

限定检索结果

文献类型

  • 1,821 篇 会议
  • 19 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,847 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,183 篇 工学
    • 744 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 158 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 46 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 20 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 260 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 207 篇 理学
    • 109 篇 数学
    • 41 篇 生物学
    • 40 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 84 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 46 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 32 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,827 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1847 条 记 录,以下是1141-1150 订阅
排序:
A Flexi Fare Bus (F2B) System to Reduce Bus Bunching Problem
A Flexi Fare Bus (F2B) System to Reduce Bus Bunching Problem
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Ting Wang Research and Innovation SAP Asia Pte Ltd
In this work we study a problem which has been bothering both passengers and operators in the public transportation system long enough – the Bus Bunching *** typically means twoor more buses of the same service route... 详细信息
来源: 评论
A Research on Constructing Mongolian Treebank Based on Phrase Structure Grammar
A Research on Constructing Mongolian Treebank Based on Phras...
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Arong Yu Xia Siriguleng Wang College of Computer & Information Engineering Inner Mongolia Normal University
This paper mainly introduced the research on constructing Mongolian Treebank based on phrase structure grammar. Having Considered related Mongolian Treebank work and Mongolian words characteristics, we developed a Mon... 详细信息
来源: 评论
Analysis and Design of a Multi-bit Sigma-Delta Modulator for Chromatography Application
Analysis and Design of a Multi-bit Sigma-Delta Modulator for...
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Yu Li Sengwei Wang Huiwen Wu Jianping Luo Department of Electronic and communication East China University of Science and Technology Center of Technology Leadcore Technology Co. Ltd
This paper presents the parameters design, modeling and performance analysis of the Sigma-Delta Modulator(SDM) for chromatography application. Chromatograph instruments often have rigid requirements tothe output analo... 详细信息
来源: 评论
Runtime Adaptation of Embedded Tasks with A-Priori Known Timing Behavior Utilizing On-Line Partner-Core Monitoring and Recovery
Runtime Adaptation of Embedded Tasks with A-Priori Known Tim...
收藏 引用
ieee/IFIP international conference on Embedded and Ubiquitous computing, EUC
作者: Ioannis Christoforakis Othon Tomoutzoglou Dimitrios Bakoyiannis George Kornaros Informatics Engineering Department Technological Educational Institute of Crete Heraklion Greece
As the development of heterogeneous embedded Systems-on-Chip with a multitude of hardware accelerator coprocessors creates new possibilities for evolution in aerospace, medicine, communications and consumer eras, impr... 详细信息
来源: 评论
Toward a dynamic analysis technique to locate framework misuses that cause unexpected side effects
Toward a dynamic analysis technique to locate framework misu...
收藏 引用
ACIS international conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Izuru Kume Masahide Nakamura Naoya Nitta Etsuya Shibayama Graduate School of Information Science Nara Institute of Science and Technology Ikoma Nara Japan Graduate School of System Informatics Kobe University Nada Kobe Japan Faculty of Intelligence and Informatics Konan University Higashinada Kobe Japan Information Technology Center The University of Tokyo Bunkyo Tokyo Japan
Recently many frameworks are used in software development without proper documentation, and are misused by application developers in calling framework APIs. Debugging a failure caused by a wrong API call is difficult ... 详细信息
来源: 评论
Detection of Web Spambot in the Presence of Decoy Actions
Detection of Web Spambot in the Presence of Decoy Actions
收藏 引用
ieee international conference on Big Data and Cloud computing (BdCloud)
作者: Vida Ghanaei Costas S. Iliopoulos Solon P. Pissis Department of Informatics King's College London Strand London UK
Based on the recent research and statistics by Symantec, significant amount of all global web traffic and email traffic is marked as spam. Spambot is basically a robot that maliciously traverses the World Wide Web (WW... 详细信息
来源: 评论
A New Selective VideoEncryption Algorithm for the H.264 Standard
A New Selective VideoEncryption Algorithm for the H.264 Stan...
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Qiuhua Wang Xingjun Wang Shenzhen Key Lab. of Information Sci&Tech/Shenzhen Engineering Lab. of IS&DRM Department of Electronic Engineering/Graduate School at Shenzhen Tsinghua University
A great many algorithms of videoencryption have been proposed nowadays with the necessity of data rights management, especially the selective videoencryption algorithms, which ensure the security of the information an... 详细信息
来源: 评论
An Empirical Study on User Participation in Interest Communities:A Socio-psychological Perspective
An Empirical Study on User Participation in Interest Communi...
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Ziyun Zhuang Jingliang Chen Bo Zhang Business School University of Shanghai for Science and Technology School of Printing and Publishing University of Shanghai for Science and Technology
This paper proposed a research model toinvestigate the factors that drive users toparticipate in interest communities. The model takes a socio-psychological perspective of flow theory, social presence theory, social c... 详细信息
来源: 评论
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
A Robust Authentication Scheme for Observing Resources in th...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Mian Ahmad Jan Priyadarsi Nanda Xiangjian He Zhiyuan Tan Ren Ping Liu Centre for Innovation in IT Services and Applications (iNEXT) University of Technology Sydney Australia Computational Informatics CSIRO Sydney Australia
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to r... 详细信息
来源: 评论
Modeling and Orbit Control for Stratospheric Satellite
Modeling and Orbit Control for Stratospheric Satellite
收藏 引用
2014 ieee international conference on progress in informatics and computing
作者: Tao Liu Bin Bin Yan WenJuan Gu Yun Feng Yu College of Astronautics Northwestern Polytechnical University
According tothe characteristics of the stratospheri satellite tether, consider the tether's own gravity and flexibility build the model of the tether by using piecewise analysis an iterative calculation method. Th... 详细信息
来源: 评论