咨询与建议

限定检索结果

文献类型

  • 1,817 篇 会议
  • 20 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,844 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,182 篇 工学
    • 744 篇 计算机科学与技术...
    • 449 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 157 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 45 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 19 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 259 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 205 篇 理学
    • 109 篇 数学
    • 40 篇 生物学
    • 40 篇 系统科学
    • 24 篇 统计学(可授理学、...
    • 23 篇 物理学
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 83 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 45 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 31 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,835 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1844 条 记 录,以下是31-40 订阅
排序:
Visual Tracking via Sparse Coding and Spectral Residual  5
Visual Tracking via Sparse Coding and Spectral Residual
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Wei Li Meng Ding College of Jin Cheng Nanjing University of Aeronautics and Astronautics College of Civil Aviation Nanjing University of Aeronautics and Astronautics
This paper proposed a tracking algorithm based on sparse coding and spectral residual saliency under the framework of particle filtering. The proposed algorithm can be divided into three parts. Firstly, spectral resid... 详细信息
来源: 评论
An object tracking method using deep learning and adaptive particle filter for night fusion image  5
An object tracking method using deep learning and adaptive p...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Xiaoyan Qian Lei Han Yanlin Zhang Meng Ding Nanjing University of Aeronautics and Astronautics College of Civil Aviation
In this paper, we propose an online visual tracking algorithm for fused sequences via deep learning and adaptive Particle filter(PF). Our algorithm pretrains a simplified Convolution Neural Network(CNN) to obtain a ge... 详细信息
来源: 评论
A Parameterized Flattening Control Flow Based Obfuscation Algorithm with Opaque Predicate for Reduplicate Obfuscation  5
A Parameterized Flattening Control Flow Based Obfuscation Al...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Zheheng Liang Wenlin Li Jing Guo Deyu Qi Jijun Zeng CSG-key Laboratory of Information Technology Testing Information Center of Guangdong Power Grid Co. Ltd School of Computer Science and Technology South China University of Technology
In order to enhance the white box security of software, we proposed a reduplicate code obfuscation algorithm to protect the source code. Firstly, we apply the parameter decomposition tree to formalize the code, and th... 详细信息
来源: 评论
A Heuristic Task Dispatching Algorithm in the Clouds  2
A Heuristic Task Dispatching Algorithm in the Clouds
收藏 引用
2nd ieee international conference on progress in informatics and computing (PIC)
作者: Luo, Fei Yi, Jianjun E China Univ Sci & Technol Sch Informat & Engn Shanghai 200237 Peoples R China PowerLeader Sci & Technol Grp Co Ltd Shenzhen Peoples R China E China Univ Sci & Technol Sch Mech & Power Engn Shanghai 200237 Peoples R China
Cloud computing is becoming a popular solution for storing data and executing applications, where task dispatching in the scheduling policy is significant to the overall performance in the Cloud systems. To minimize t... 详细信息
来源: 评论
Research on ZigBee based Wireless Network System Core Techniques: A Theoretical Approach  3
Research on ZigBee based Wireless Network System Core Techni...
收藏 引用
3rd ieee international conference on progress in Informatcs and computing (ieee PIC)
作者: Xu, Peifu Zhang, Xun China Tobacco Zhejiang Ind Co LTD Hangzhou 310009 Zhejiang Peoples R China
With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this resea... 详细信息
来源: 评论
An Importance-Based Approach for Mining Approximate Roles  5
An Importance-Based Approach for Mining Approximate Roles
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Lei Sun Ning Pan Liangsheng He Zhiqiang Zhu Zhengzhou Information Science and Technology Institute
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,th... 详细信息
来源: 评论
Capacities-based distant-water fishery cold chain network design considering yield uncertainty and demand dynamics  5
Capacities-based distant-water fishery cold chain network de...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Xiangqun Song Qianli Ma Wenyuan Wang Yun Peng State Key Laboratory of Coastal and Offshore Engineering Dalian University of Technology
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover... 详细信息
来源: 评论
Distribution Law of User Comments on Hot News  5
Distribution Law of User Comments on Hot News
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Hong Zong Xiuzhi Wu Chunxiang Xue Fen Chen Nanjing University of Science and Technology Jiangsu Collaborative Innovation Center of Social Safety Science and Technology
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objecti... 详细信息
来源: 评论
The Study of Image Feature Extraction and Classification  5
The Study of Image Feature Extraction and Classification
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Jingjin Guo Lizhen Liu Wei Song Chao Du Xinlei Zhao Information and Engineering College Capital Normal University Foreign Language College Capital Normal University
As we all know, research continues in the areas of image classification development in computer vision. People eagerly hope to achieve a perfect classification accuracy, however,many results of these experiments are l... 详细信息
来源: 评论
A Rule-based Method for Detecting the Missing Common Requirements in Software Product Line  5
A Rule-based Method for Detecting the Missing Common Require...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Jianzhang Zhang Yinglin Wang Wentao Wang Nan Niu School of Information Management and Engineering Shanghai University of Finance and Economics Department of EECS University of Cincinnati
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family ... 详细信息
来源: 评论