咨询与建议

限定检索结果

文献类型

  • 1,820 篇 会议
  • 19 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,842 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,182 篇 工学
    • 744 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 157 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 46 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 19 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 260 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 206 篇 理学
    • 109 篇 数学
    • 41 篇 生物学
    • 40 篇 系统科学
    • 24 篇 物理学
    • 24 篇 统计学(可授理学、...
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 84 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 46 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 32 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,832 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1842 条 记 录,以下是1641-1650 订阅
排序:
Security Analysis of Cryptosystem Based on Quasigroups
Security Analysis of Cryptosystem Based on Quasigroups
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Yingying Hu,Yunqing Xu Mathematics Department Ningbo University Ningbo 315211,China
Consider quasigroup operations *1,*2,…,*n on a finite set A,we use them to define a transformation E(n):A+→A+,where A+={x1x2…xk|xi∈A,k≥1}.The function E(n) have several useful properties suitable for many cryptog... 详细信息
来源: 评论
Image Classification Based on Multi-feature Combination and PCA-RBaggSVM
Image Classification Based on Multi-feature Combination and ...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Yan Fu,Yanming Xian School of Computer,Xi'an University of Science and Technology,Xi'an,China
In conventional image classification methods, complementary advantages between various single features of images are not fully applied;meanwhile,redundant information exists in the extracted *** a result,accuracy of i... 详细信息
来源: 评论
Application of UCON in SSL VPN System
Application of UCON in SSL VPN System
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Zhihe Fang,Hongjun He,Li Luo, Zhipeng Duan,Yang Wang School of Computer National University of Defense Technology Changsha,China Wenzheng Zhang Science and Technology on Communication Security Laboratory Sichuan,China
SSL VPN is the simplest solution technology which can be used to access to enterprise resources by remote *** is no effective access control capacity in SSL VPN *** this paper,we use UCON model to build a set of fine-... 详细信息
来源: 评论
ECA Rule-Based Configurable Frame of Distributed System Monitoring
ECA Rule-Based Configurable Frame of Distributed System Moni...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Jingxin Peng,Jian Cao Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai,China
Due to the developing of network technology,the increasing size of enterprises,the rising of cloud computing,the monitoring of large scale distributed computing is more and more *** studies of Distributed Monitoring o... 详细信息
来源: 评论
A Structural Attack on Grain
A Structural Attack on Grain
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Neda Rohani Mohammad Reza Aref Javad Mohajeri Information System and Security Lab(ISSL) Department of Electrical Engineering Sharif University of Technology TehranIran Electronics Research Center Sharif University of Technology Tehran Iran
Grain is one of the eSTREAM project candidates in the hardware profile with 160 bits of internal *** this paper we present a kind of structural attack applied on this *** use two approximations of the nonlinear filter... 详细信息
来源: 评论
Agent-Based Energy-efficient Routing Algorithm in Wireless Sensor Networks
Agent-Based Energy-efficient Routing Algorithm in Wireless S...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Yuqing Zhang Faculty of Software Fujian Normal University Fuzhou,China Danhua Hu Electric and Control Department Fujian Electric Design Institution Fuzhou,China
With the development of wireless sensor networks,the routing protocol shall concern about not only the energy consumption of a single node,but also the balance of energy consumption across the whole network,so as to m... 详细信息
来源: 评论
Recognition of Natural Scene Images Based on Graphs
Recognition of Natural Scene Images Based on Graphs
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Qiangrong Jiang,Weina Wei College of Computer Science and Technology Beijing University of Technology Beijing,China
The interpretation of natural scenes,generally so obvious and effortless for humans,still remains a challenge in computer *** this paper we propose to design binary classifiers capable to recognize some generic natura... 详细信息
来源: 评论
A Universal Platform for Wireless Sensor and Actor Network Applications
A Universal Platform for Wireless Sensor and Actor Network A...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Shuqin Zhang,Yuejun Dong,Zhiyong Dong and Yan Cui School of Computer Science Zhongyuan University of Technology 450007 Zhengzhou,China
Wireless sensor and actor networks are becoming a basis for a rapidly increasing range of applications in industrial measurement-control(M&C) *** application has different requirements in terms of M&C task,nod... 详细信息
来源: 评论
Estimation of Distribution Algorithm Based on Multivariate Gaussian Copulas
Estimation of Distribution Algorithm Based on Multivariate G...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Ying Gao,Xiao Hu,Huiliang Liu Department of Computer Science and Technology,Guangzhou University Guangzhou,510006,P.R.of China
Copula is a powerful tool for multivariate probability *** of distribution algorithms are a class of optimization algorithms based on probability distribution model. This paper introduces a new estimation of distribut... 详细信息
来源: 评论
Simulation Experiment of Continuous Double Auction Stock Market Based on Multi-Agent Model
Simulation Experiment of Continuous Double Auction Stock Mar...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Hongtao Zhou,Jiang Jiang,Wei Zeng,Guangyong Liu and Yi Wang Institute of Systems Engineering Huazhong University of Science and Technology Wuhan,China
This paper uses the agent-based modeling approach to construct an artificial stock market with the continuous double auction *** this market,several psychological effects that described in behavioral finance(such as a... 详细信息
来源: 评论