咨询与建议

限定检索结果

文献类型

  • 1,821 篇 会议
  • 19 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 1,847 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,183 篇 工学
    • 744 篇 计算机科学与技术...
    • 450 篇 软件工程
    • 216 篇 机械工程
    • 162 篇 控制科学与工程
    • 158 篇 信息与通信工程
    • 137 篇 电气工程
    • 115 篇 仪器科学与技术
    • 67 篇 电子科学与技术(可...
    • 49 篇 网络空间安全
    • 46 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 29 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 20 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 安全科学与工程
    • 17 篇 公安技术
  • 260 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 207 篇 理学
    • 109 篇 数学
    • 41 篇 生物学
    • 40 篇 系统科学
    • 25 篇 物理学
    • 24 篇 统计学(可授理学、...
  • 60 篇 医学
    • 41 篇 基础医学(可授医学...
    • 38 篇 临床医学
    • 21 篇 公共卫生与预防医...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 26 篇 教育学
    • 21 篇 教育学
  • 22 篇 农学
  • 15 篇 法学
  • 10 篇 文学
  • 10 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 147 篇 cloud computing
  • 92 篇 informatics
  • 84 篇 computational mo...
  • 55 篇 educational inst...
  • 54 篇 conferences
  • 46 篇 feature extracti...
  • 43 篇 data mining
  • 43 篇 servers
  • 40 篇 computer archite...
  • 39 篇 semantics
  • 39 篇 data models
  • 32 篇 monitoring
  • 32 篇 databases
  • 32 篇 accuracy
  • 30 篇 big data
  • 28 篇 software
  • 28 篇 training
  • 26 篇 visualization
  • 26 篇 security
  • 26 篇 standards

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 9 篇 cloud computing ...
  • 8 篇 dongguan researc...
  • 7 篇 national institu...
  • 7 篇 ieee beijing sec...
  • 7 篇 faculty of engin...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of scienc...
  • 6 篇 department of ma...
  • 6 篇 school of softwa...
  • 5 篇 qingdao academy ...
  • 5 篇 signal & informa...
  • 5 篇 cloud computing ...
  • 5 篇 collaborative in...
  • 5 篇 management schoo...
  • 5 篇 informatics cent...

作者

  • 13 篇 gang xiong
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 9 篇 xiaohua hu
  • 9 篇 paulo maciel
  • 8 篇 shangce gao
  • 7 篇 xiwei liu
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 stoyanova-doyche...
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xiong gang
  • 6 篇 shusaku tsumoto
  • 6 篇 anum masood
  • 6 篇 kris hauser
  • 6 篇 shoji hirano

语言

  • 1,794 篇 英文
  • 52 篇 其他
  • 2 篇 中文
检索条件"任意字段=2014 IEEE International Conference on Progress in Informatics and Computing"
1847 条 记 录,以下是961-970 订阅
排序:
SECURITY VULNERABILITIES AND RISKS IN INDUSTRIAL USAGE OF WIRELESS COMMUNICATION  19
SECURITY VULNERABILITIES AND RISKS IN INDUSTRIAL USAGE OF WI...
收藏 引用
19th ieee international conference on Emerging Technology and Factory Automation (ETFA)
作者: Plosz, S. Farshad, A. Tauber, M. Lesjak, C. Ruprechter, T. Pereira, N. Austrian Inst Technol A-2444 Seibersdorf Austria Infineon Technol Austria A-8020 Graz Austria Polytech Inst Porto P-4200072 Oporto Portugal
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial ... 详细信息
来源: 评论
Symmetry in sequent calculus and Matte Blanco's bi-logic
Symmetry in sequent calculus and Matte Blanco's bi-logic
收藏 引用
ieee international conference on Cognitive informatics
作者: Giulia Battilotti Department of Mathematics University of Padova Italy
We discuss the problem of symmetry, namely of the orientation of the logical consequence, represented by the sequent sign in sequent calculus. We show that the problem is surprisingly entangled with the problem of “b... 详细信息
来源: 评论
A rough-fuzzy perception-based computing for a vision-based wall-following robot
A rough-fuzzy perception-based computing for a vision-based ...
收藏 引用
ieee international conference on Cognitive informatics
作者: Tong Duan Witold Kinsner Department of Electrical and Computer Engineering University of Manitoba Winnipeg Manitoba Canada
This paper presents a new perception-based computing approach in a wall-following algorithm. The proposed perception-based computing uses a rough-fuzzy theory, which is an extension of the conventional fuzzy-based con... 详细信息
来源: 评论
Towards a hosted private cloud storage solution for application service provider
Towards a hosted private cloud storage solution for applicat...
收藏 引用
作者: Lu, Hsin Tse Kao, Chia Hung Wu, Po Hsuan Lee, Yi Hsuan Cloud System Software Institute Institute for Information Industry Taipei Taiwan School of Informatics University of Edinburgh Edinburgh United Kingdom
Private cloud storage solutions, such as Oxygen Cloud and COSA (Cloud Object Storage Appliance), which provide file synchronization and sharing with high performance and integral security for enterprises. Those soluti... 详细信息
来源: 评论
Pattern recognition in mental processes: Determining vestiges of the subconscious through ultrametric component analysis
Pattern recognition in mental processes: Determining vestige...
收藏 引用
ieee international conference on Cognitive informatics
作者: Fionn Murtagh School of Computer Science and Informatics De Montfort University Leicester England
We develop a novel consensus of hierarchical clusterings. We do this in order to have a framework (including visualization and supporting interpretation) for the parts of the data that are determined to be ultrametric... 详细信息
来源: 评论
Formal analysis of cross-validation for rule induction using probabilistic indices
Formal analysis of cross-validation for rule induction using...
收藏 引用
ieee international conference on Cognitive informatics
作者: Shusaku Tsumoto Shoji Hirano Department of Medical Informatics Shimane University Shimane Japan
This paper proposes a new framework for evaluation of cross-validation methods for rule induction based on statistical indices by using incremental sampling scheme. Although incremental sampling scheme is used for inc... 详细信息
来源: 评论
Learning algorithm and neurocomputing architecture for NDS Neurons
Learning algorithm and neurocomputing architecture for NDS N...
收藏 引用
ieee international conference on Cognitive informatics
作者: Mario Antoine Aoun Mounir Boukadoum Department of the Phd Program in Cognitive Informatics Université du Québec à Montréal UQAM Montréal QC Canada
We implement a learning algorithm for Nonlinear Dynamic State (NDS) Neurons in the framework of Nonlinear Transient Computation (NTC). The learning procedure is based on Spike-Timing Dependent Plasticity (STDP); which... 详细信息
来源: 评论
Big data and societal challenges
Big data and societal challenges
收藏 引用
ieee international conference on Cognitive informatics
作者: Dilip Patel London South Bank University London London GB
Summary form only given. Massive data sets produced by smart cities, science and health systems throw up challenges of storing, analyzing and visualizing data for the purposes of benefitting society. We look at how ad... 详细信息
来源: 评论
Characterization of Operational Failures from a Business Data Processing SaaS Platform  2014
Characterization of Operational Failures from a Business Dat...
收藏 引用
36th international conference on Software Engineering (ICSE)
作者: Di Martino, Catello Kalbarczyk, Zbigniew Iyer, Ravishankar K. Goel, Geetika Sarkar, Santonu Ganesan, Rajeshwari Univ Illinois Coordinated Sci Lab Urbana IL 61801 USA Infosys Labs Next Gen Comp Lab Bangalore Karnataka India
This paper characterizes operational failures of a production Custom Package Good Software-as-a-Service (SaaS) platform. Events log collected over 283 days of in-field operation are used to characterize platform failu... 详细信息
来源: 评论
Provably secure Peer-link establishment protocol for wireless mesh networks
Provably secure Peer-link establishment protocol for wireles...
收藏 引用
international conference on Advances in computing, Communications and informatics (ICACCI)
作者: Rakesh Matam Somanath Tripathy Bhumireddy Swathi Department of CSE Indian Institute of Information Technology Guwahati Department of CSE Indian Institute of Technology Patna
The existing Peer link establishment protocol documented in ieee 802.11s standard is not secure and vulnerable against relay and wormhole attacks. To address this issue, an efficient technique using location informati... 详细信息
来源: 评论