咨询与建议

限定检索结果

文献类型

  • 1,817 篇 会议
  • 20 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,844 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,182 篇 工学
    • 744 篇 计算机科学与技术...
    • 449 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 157 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 45 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 19 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 259 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 205 篇 理学
    • 109 篇 数学
    • 40 篇 生物学
    • 40 篇 系统科学
    • 24 篇 统计学(可授理学、...
    • 23 篇 物理学
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 83 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 45 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 31 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,835 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1844 条 记 录,以下是51-60 订阅
排序:
Coupled Autoencoders Learning for Zero-shot Classification with Domain Shift  5
Coupled Autoencoders Learning for Zero-shot Classification w...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Guangcheng Sun Songsong Wu Guangwei Gao Fei Wu Xiao-Yuan Jing School of Automation Nanjing University of Posts and Telecommunications
Zero-shot classification(ZSC) aims to classify images from the class whose training samples are unavailable. A typical method addressing this issue is to learn a projection from feature space to attribute space so tha... 详细信息
来源: 评论
Military Object Detection Using Multiple Information Extracted from Hyperspectral Imagery  5
Military Object Detection Using Multiple Information Extract...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Chen ke School of Computer Science and Engineering Nanjing University of Science and Technology
Object detection is a very significant task for a huge range of applications. For example, the detection of military vehicles is very useful for the defense and intelligence. In recent years, hyperspectral imagery(HSI... 详细信息
来源: 评论
A Blockchain-based Verification for Sharing Data Securely  5
A Blockchain-based Verification for Sharing Data Securely
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Yu Liu Haopeng Chen Fei Hu School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Key Laboratory China Aeronautical Radio Electronics Research Institute
For the sake of protecting users' privacy from the malicious data which is shared by other people and leasing the pressure of the clouds, an approach of verification based on the Blockchain is put forward in our a... 详细信息
来源: 评论
Polarization and Solar Altitude Correlation Analysis and Application in Object Detection  5
Polarization and Solar Altitude Correlation Analysis and App...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Jie Shen Zhe Chen Cen Xu Huibin Wang College of Computer and Information Engineering Hohai University
Complicated optical scenes generally exist on the water surface. The noise originated from the light reflection seriously blocks the performance of the object detection *** paper analyzes the correlation between the i... 详细信息
来源: 评论
Filtering Combined Dynamic Stochastic Resonance for Enhancement of Dark and Low-contrast Images  5
Filtering Combined Dynamic Stochastic Resonance for Enhancem...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Haijiao Liu Jun Zhang School of Science Nanjing University of Science and Technology
Dynamic stochastic resonance(DSR) based dark and low-contrast image enhancement has attracted more and more attention in recent years. For DSR based image enhancement,noise is essential and will be enhanced simultaneo... 详细信息
来源: 评论
Evaluation Method and Decision Support of Network Education Based on Association Rules  5
Evaluation Method and Decision Support of Network Education ...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Junyan Zhao Aixiang Wang Network Education College East China University of Science and Technology
With the development of network technology, decision support and data mining has been widely applied in many fields, such as finance, marketing, quality analysis. But it isn't applied widely in the evaluation of n... 详细信息
来源: 评论
An Improved Constraint Model for Team Tactical Position Selection in Games  5
An Improved Constraint Model for Team Tactical Position Sele...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Weilong Yang Long Qin Quanjun Yin Yabing Zha College of Information System and Management National University of Defense Technology
With the rapid development of agent modeling technology, the modeling of agent behavior plays an important role in simulation system especially for games and training system. As the basic part of agent behavior modeli... 详细信息
来源: 评论
A Random Chemical Reaction Algorithm based on Double Containers for Robot Path Planning  5
A Random Chemical Reaction Algorithm based on Double Contain...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Qing Yang Zhong Yang Guo-Xiong Hu Wei Du College of Automation Engineering Nanjing University of Aeronautics & Astronautics
Aiming at the path planning problem of mobile robots in unknown environment,a random chemical reaction algorithm based on double containers is *** new algorithm is inspired by the bacterial foraging algorithm and appl... 详细信息
来源: 评论
An Automatic Pipeline Of Delineation And 3D Profile Mapping For Potential Exploration Targets From Mineral Data Of Limited Drilling Cores  5
An Automatic Pipeline Of Delineation And 3D Profile Mapping ...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Shaoming Zhu Liancun Xiu Yan Lu School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Geological Survey Center
The three-dimensional geological modeling and orebody visualization based on a small number of drilling cores are key issues for three-dimensional geological exploration. In this paper, we present an automatic pipelin... 详细信息
来源: 评论
Intemittent Control with Reinforcement Leaning  5
Intemittent Control with Reinforcement Leaning
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Haibo Shi Yaoru Sun Guangyuan Li Department of Computer Science College of Electronics and Information Engineering Tongji University
In this study, a hierarchical architecture for the intermittent control under the minimum transition hypothesis(MTH) was implemented. A two-stage hierarchy was adopted to perform the high-level and the low-level con... 详细信息
来源: 评论