咨询与建议

限定检索结果

文献类型

  • 1,817 篇 会议
  • 20 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,844 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,182 篇 工学
    • 744 篇 计算机科学与技术...
    • 449 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 157 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 45 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 19 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 259 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 205 篇 理学
    • 109 篇 数学
    • 40 篇 生物学
    • 40 篇 系统科学
    • 24 篇 统计学(可授理学、...
    • 23 篇 物理学
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 83 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 45 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 31 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,835 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1844 条 记 录,以下是71-80 订阅
排序:
Kernelized convex hull for visual tracking  5
Kernelized convex hull for visual tracking
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Jun Wang Yuanyun Wang Chengzhi Deng Shengqian Wang Jiangxi Province Key Laboratory of Water Information Cooperative Sensing and Intelligent Processing Nanchang Institute of Technology School of Information Engineering Nanchang Institute of Technology
In visual tracking, developing a robust appearance model is a challenging task due to variations of object appearances such as background clutter, illumination variation and partial occlusion. In existing tracking alg... 详细信息
来源: 评论
The Application of Natural Language Processing in Compiler Principle System  5
The Application of Natural Language Processing in Compiler P...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Yujia Zhai Lizhen Liu Wei Song Chao Du Xinlei Zhao Information and Engineering College Capital Normal University College of Foreign Languages Capital Normal University
Compiling principle is an important course of computer science major,which mainly introduces general principles and basic methods of the construction of compiling programs *** to high demands of the logic analysis abi... 详细信息
来源: 评论
Specialization or Generalization: A Study on Breadth-First Graph Traversal on GPUs  5
Specialization or Generalization: A Study on Breadth-First G...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Wenyong Zhong Yanxin Cao Jiawen Li Jianhua Sun Hao Chen College of Computer Science and Electronic Engineering Hunan University
GPUs(Graphics processing units) have been increasingly adopted for large-scale graph processing by exploiting the inherent parallelism. There have been many efforts in designing specialized graph analytics and general... 详细信息
来源: 评论
Deep learning based forensic face verification in videos  5
Deep learning based forensic face verification in videos
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Jinhua Zeng Jinfeng Zeng Xiulian Qiu Institute of Forensic Science Ministry of Justice
Deep learning for face identification-verification application has been proven to be fruitful. Human faces constituted the main information for human identification besides gait, body silhouette, etc. Deep learning fo... 详细信息
来源: 评论
An Energy-Aware Mapping Algorithm for Mesh-based Network-on-Chip Architectures  5
An Energy-Aware Mapping Algorithm for Mesh-based Network-on-...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Jin Sun Yi Zhang School of Computer Science and Engineering Nanjing University of Science and Technology
Network-on-chip(NoC) mapping algorithms significantly affect NoC system performance in terms of communication cost and energy consumption. For a specific application represented by a task graph, this paper proposes ... 详细信息
来源: 评论
Pseudo-Inverse Locality Preserving Iterative Hashing  5
Pseudo-Inverse Locality Preserving Iterative Hashing
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Zhongshu Du Yongli Wang Huacheng Sun Nanjing University of Science and Technology
Hashing learning has attracted increasing attention these years with the rapid increase of data. Some highdimensional data have caused the ’dimension disaster’ which make traditional methods ineffective. In this pap... 详细信息
来源: 评论
A Convolutional Neural Network Method for Relation Classification  5
A Convolutional Neural Network Method for Relation Classific...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Qin Zhang Jianhua Liu Ying Wang Zhixiong Zhang National Science Library Chinese Academy of Sciences University of Chinese Academy of Sciences Wuhan Documentation and Information Center Chinese Academy of Sciences
Up to now, the relation classification systems focus on using various features generated by parsing modules. However, feature extraction is a time consuming work. Selecting wrong features also lead to classification e... 详细信息
来源: 评论
Video Enhancement Using Temporal-Spatial Total Variation Retinex and Luminance Adaptation  5
Video Enhancement Using Temporal-Spatial Total Variation Ret...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Liqian Wang Wenze Shao Qi Ge Haibo Li Liang Xiao Zhihui Wei College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications School of computer science and Engineering Nanjing University of Science and Technology
In this paper, we propose a video enhancement method using temporal-spatial total variation Retinex and luminance adaption. To utilize the temporal information between video frames, we construct a illumination data fi... 详细信息
来源: 评论
Towards Fuzzy QoS Driven Service Selection with User Requirements  5
Towards Fuzzy QoS Driven Service Selection with User Require...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Jiajun Xu Lin Guo Ruxia Zhang Yin Zhang Hualang Hu Fei Wang Zhiyuan Pei Key Laboratory of Cultivated Land Use Ministry of Agriculture Chinese Academy of Agricultural Engineering
Many QoS-aware service selection approaches assume that the QoS attributes are crisp values and the actual user requirements are not taken into consideration, when the service-oriented applications are constructed. As... 详细信息
来源: 评论
Collaborative Intrusion Detection as a Service in Cloud computing Environment  3
Collaborative Intrusion Detection as a Service in Cloud Comp...
收藏 引用
3rd ieee international conference on progress in Informatcs and computing (ieee PIC)
作者: Liang, Hong Ge, Yufei Wang, Wenjiao Chen, Lin China Univ Petr East China Coll Comp & Commun Engn Qingdao Peoples R China
With the growing trends of cloud computing, the security issues in this area are growing at the same speed as its development. Some malicious intruders and other malware activities tend to find the inner vulnerabiliti... 详细信息
来源: 评论