咨询与建议

限定检索结果

文献类型

  • 1,820 篇 会议
  • 19 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,846 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,182 篇 工学
    • 744 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 157 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 46 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 19 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 260 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 206 篇 理学
    • 109 篇 数学
    • 41 篇 生物学
    • 40 篇 系统科学
    • 24 篇 物理学
    • 24 篇 统计学(可授理学、...
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 84 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 46 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 32 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,836 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1846 条 记 录,以下是1321-1330 订阅
排序:
Formal analysis of cross-validation based on decremental sampling scheme
Formal analysis of cross-validation based on decremental sam...
收藏 引用
ieee international conference on Granular computing (GRC)
作者: Shusaku Tsumoto Shoji Hirano Department of Medical Informatics Shimane University Shimane Japan
Cross validation method has been widely used for estimation of performance of classifiers and statistical method. However, compared with other resampling methods, cross-validation has not yet theoretically investigate... 详细信息
来源: 评论
Towards Better Semantics for Services in eHealth Standards: A Reference Ontology Approach
Towards Better Semantics for Services in eHealth Standards: ...
收藏 引用
international Workshop on Enterprise Distributed Object computing, EDOCW
作者: Zoran Milosevic João Paulo A. Almeida Julio C. Nardi Deontik Pty Ltd Brisbane Australia Ontology & Conceptual Modeling Research Group (NEMO) Federal University of Espírito Santo Vitória Brazil Informatics Department Federal Institute of Espírito Santo Colatina Brazil
Responding to a wide range of interoperability requirements for eHealth, the HL7 standardization organization has recently published an initial version of the SOA Healthcare Ontology (SHO). The purpose of this effort ... 详细信息
来源: 评论
Examining Adaptive Case Management to Support Processes for Enterprise Architecture Management
Examining Adaptive Case Management to Support Processes for ...
收藏 引用
international Workshop on Enterprise Distributed Object computing, EDOCW
作者: Matheus Hauder Dominik Münch Felix Michel Alexej Utz Florian Matthes Technische Universität München (TUM) Chair for Informatics 19 (sebis) Garching bei München Germany Technische Universitat Munchen Munchen Bayern DE
Enterprise Architecture (EA) management is a well-defined practice for conducting coherent analysis, design, planning, and implementation for the successful execution of business strategy. In practice many organizatio... 详细信息
来源: 评论
A multi-drop distributed smart sensor network based on ieee1451.3
A multi-drop distributed smart sensor network based on IEEE1...
收藏 引用
2014 international conference on informatics, Networking and Intelligent computing(INIC 2014)
作者: H.W.Lu L.H.Shang M.Zhou School of Computer Science and Engineering Beihang University School of Energy and Power Engineering Huazhong University of Science and Technology
Traditional sensor networks,with centralized point-to-point architecture and various sensors,usually use a mass of cables,which will result in high cable costs,complex wiring,space occupying,deployment and maintaining... 详细信息
来源: 评论
Shared Memory Buffer Management for Heterogeneous Packet Processing
Shared Memory Buffer Management for Heterogeneous Packet Pro...
收藏 引用
international conference on Distributed computing Systems
作者: Patrick Eugster Kirill Kogan Sergey Nikolenko Alexander Sirotkin Department of Computer Science Purdue University Steklov Institute of Mathematics at St. Petersburg of the Russian Academy of Sciences Higher School of Economics National Research University St. Petersburg Institute for Informatics of the Russian Academy of Sciences
Packet processing increasingly involves heterogeneous requirements. We consider the well-known model of a shared memory switch with bounded-size buffer and generalize it in two directions. First, we consider unit-size... 详细信息
来源: 评论
A cross-layer approach for improving WiFi performance
A cross-layer approach for improving WiFi performance
收藏 引用
international Wireless Communications and Mobile computing conference, IWCMC
作者: Kien Nguyen Yusheng Ji Shigeki Yamada National Institute of Informatics Tokyo Japan
This paper introduces a cross-layer implementation, named WiPoMu, that aims to improve efficiency and resilience of the traditional WiFi model. WiPoMu is developed based on three key technologies: Wireless virtualizat... 详细信息
来源: 评论
A decision-theoretic planning approach for clinical practice guideline modelling
A decision-theoretic planning approach for clinical practice...
收藏 引用
ieee EMBS international conference on Information Technology Applications in Biomedicine (ITAB)
作者: Dionisio Acosta Juan M. Garcia-Gomez CHIME The Farr Institute of Health Informatics Research UK IBIME Universitat Politecnica de Valencia Valencia Spain
Current formalisms for modelling a Clinical Practice Guideline (CPG) as a Computer-Interpretable Guideline (CIG) do not support the explicit representation of uncertainty due to the unpredictability of treatment outco... 详细信息
来源: 评论
Prediction and Evaluation of Traffic States at Signalized Intersections
Prediction and Evaluation of Traffic States at Signalized In...
收藏 引用
2014 ieee international conference on Service Operations and Logistics,and informatics
作者: Ji-quan Shen Qing-jie Kong State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of Sciences School of Computer Science and Technology Henan Polytechnic University Member IEEE
The parallel transportation system based on the method of ACP(Artificial systems,computing experiments,Parallel Control)will promote the level of city traffic intelligent decision and scientific management.A key pro...
来源: 评论
Heterogeneous CPU-GPU computing for the finite volume method on 3D unstructured meshes
Heterogeneous CPU-GPU computing for the finite volume method...
收藏 引用
international conference on Parallel and Distributed Systems (ICPADS)
作者: Johannes Langguth Xing Cai Simula Research Laboratory Norway Department of Informatics University of Oslo Oslo Norway
A recent trend in modern high-performance computing environments is the introduction of accelerators such as GPU and Xeon Phi, i.e. specialized computing devices that are optimized for highly parallel applications and... 详细信息
来源: 评论
Q-Learning: From Computer Network Security to Software Security
Q-Learning: From Computer Network Security to Software Secur...
收藏 引用
international conference on Machine Learning and Applications (ICMLA)
作者: Arisoa S. Randrianasolo Larry D. Pyeatt School of Computing and Informatics Lipscomb University Nashville TN USA Department of Mathematics and Computer Science South Dakota School of Mines and Technology Rapid City SD USA
Reinforcement learning techniques become more popular in computer network security. The same reinforcement learning techniques developed for network security can be applied to software security as well. This research ... 详细信息
来源: 评论