咨询与建议

限定检索结果

文献类型

  • 1,820 篇 会议
  • 19 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,846 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,182 篇 工学
    • 744 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 157 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 46 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 19 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 260 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 206 篇 理学
    • 109 篇 数学
    • 41 篇 生物学
    • 40 篇 系统科学
    • 24 篇 物理学
    • 24 篇 统计学(可授理学、...
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 84 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 46 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 32 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,836 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1846 条 记 录,以下是1641-1650 订阅
排序:
Password Guessing Attack on a Key Exchange Protocol Based on ECDLP
Password Guessing Attack on a Key Exchange Protocol Based on...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Chungen Xu Department of Applied Mathematics Nanjing University of Science & Technology Nanjing,China Yanjiong Yang Zijin College Nanjing University of Science & Technology Nanjing,China
Authentication and key exchange are fundamental for establishing secure communication channels over public insecure ***-party key exchange protocol is an important technique for two clients to agree a session key with... 详细信息
来源: 评论
Design of A Novel Multi-Rate QC-LDPC Decoder
Design of A Novel Multi-Rate QC-LDPC Decoder
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Pengjun Wang and Fanglong Yi Institute of Circuits and Systems Ningbo University Ningbo,China Xiaofang Zhou ASIC & Systems State Key Laboratory Fudan University Shanghai,China
Based on layered decoding and semi-parallel structure,a novel architecture of multi-rate QC-LDPC decoder is proposed in this *** can support any code rates without any changes in hardware to achieve higher hardware **... 详细信息
来源: 评论
Calibration of Radial Distortion via QR Factorization
Calibration of Radial Distortion via QR Factorization
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Wenqiao Zhu,Changyu Diao and Jingzhou Huang College of Computer Science Zhejiang University Hangzhou 310027,China
In this paper,the radial distortion correcting problem with the plimbline method is revisited,which uses the fact that in pinhole camera model a straight line in the scene should be imaged as a line in image space.A n... 详细信息
来源: 评论
A Key Management Scheme in Wireless Sensor Networks Based on Behavior Trust
A Key Management Scheme in Wireless Sensor Networks Based on...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Tao Liu School of Computer and Information AnHui Polytechnic University WuHu,China Ming-Zheng Zhou School of Computer and Information AnHui Polytechnic University WuHu,China
Wireless sensor networks(WSNs) are often deployed in unattended and hostile *** order to protect the sensitive data and securing communication,secret keys should be used to encrypt the exchanged messages between commu... 详细信息
来源: 评论
GPRS-based Environment Monitoring System and Its Application In Apple Production
GPRS-based Environment Monitoring System and Its Application...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Shaokun LU~(1,2),Meiyin DUAN,Ping ZHAO~3,Yunwen LANG~2 and Xiaoyin HUANG~2 1.College of Water Conservancy and Civil Engineering,China Agricultural University,Beijing,China 2.College of Basic Science and Information Engineering,Yunnan Agricultural University,Kunming,Yunnan,China 3.College of Foreign Languages,Yunnan Agricultural University,Kunming,Yunnan,China
This paper mainly presented a research in which a GPRS-based environment monitoring system(GEMS) was developed to collect meteorological data influencing apple *** data collected are transmitted to a web server throug... 详细信息
来源: 评论
A novel computer network intrusion detection algorithm based on OSVM and context validation
A novel computer network intrusion detection algorithm based...
收藏 引用
2016 ieee international conference on progress in informatics and computing
作者: Guohang Yin Youran Zhang Ziyi Zhao School of Software Engineering Shanghai Jiao Tong University School of Software Engineering Sichuan University
Instruction detection technology is a new generation of security technology that monitor networks or systems to avoid malicious activity and policy violation. Compared with traditional security protection measures suc... 详细信息
来源: 评论
The EM Algorithm for a Linear Regression Model with Application to a Diabetes Data
The EM Algorithm for a Linear Regression Model with Applicat...
收藏 引用
2016 ieee international conference on progress in informatics and computing
作者: Xun Zhang Jiale Deng Rui Su Department of Mathematics Nanjing University College of Life Science Wuhan University
Linear modeling is the most common used statistical technique to discover hidden relationship between underlying random variables of interests because of its simplicity and interpretability. In this paper, we utilize ... 详细信息
来源: 评论
Aerodynamic optimization designing of Airfoil based on Isight
Aerodynamic optimization designing of Airfoil based on Isigh...
收藏 引用
The 2010 ieee international conference on progress in informatics and computing
作者: Wei Wang,Rong Mo,Zhiyong Chang,Huibin Sun Ministry of Education Key Lab of Contemporary Design & Integrated Manu.Tech. Northwestern Polytechnical Univ. Xi'an,China
In order to improving the designing efficiency and achieving automation of airfoil optimization designing,A method which combined the airfoil parametric modeling software、the CFD software with Isight platform was pre... 详细信息
来源: 评论
A MIH and SDN based Framework for Optimizing Vertical Handover Performance
A MIH and SDN based Framework for Optimizing Vertical Handov...
收藏 引用
2016 ieee international conference on progress in informatics and computing
作者: Feng Liu Xiaohong Li Guangquan Xu School of Computer Science and Technology Tianjin University
Next generation mobile network is characterized by ubiquitous access. It is therefore challenging to address the convergence of heterogeneous network and performance of handover. In this paper, a novel vertical handov... 详细信息
来源: 评论
Hoisting Technique Simulation Based on Physical Engine for Launch Site
Hoisting Technique Simulation Based on Physical Engine for L...
收藏 引用
2016 ieee international conference on progress in informatics and computing
作者: Na Chen Pengxiang Yi Xiu Luo Liu Feng Wu Weiqing Li School of Computer Science and Engineering Nanjing University of Sci.& Tech. Beijing Special Engineering Design and Research Institute
Hoisting technique plays an important role of spaceflight test and launch. Simulation of hoisting technique can promote effectivity and safety. Based on finite automata, seven key steps of hoisting technique are analy... 详细信息
来源: 评论