咨询与建议

限定检索结果

文献类型

  • 3,226 篇 会议
  • 74 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 3,354 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,176 篇 工学
    • 1,933 篇 计算机科学与技术...
    • 702 篇 软件工程
    • 418 篇 电气工程
    • 333 篇 信息与通信工程
    • 181 篇 控制科学与工程
    • 79 篇 仪器科学与技术
    • 73 篇 生物医学工程(可授...
    • 64 篇 生物工程
    • 48 篇 机械工程
    • 46 篇 航空宇航科学与技...
    • 35 篇 电子科学与技术(可...
    • 33 篇 化学工程与技术
    • 30 篇 光学工程
    • 30 篇 网络空间安全
    • 28 篇 动力工程及工程热...
    • 27 篇 交通运输工程
  • 423 篇 管理学
    • 285 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 399 篇 理学
    • 199 篇 数学
    • 116 篇 物理学
    • 87 篇 生物学
    • 68 篇 统计学(可授理学、...
    • 50 篇 系统科学
    • 45 篇 化学
    • 42 篇 地球物理学
  • 77 篇 医学
    • 63 篇 基础医学(可授医学...
    • 57 篇 临床医学
    • 36 篇 药学(可授医学、理...
  • 56 篇 法学
    • 51 篇 社会学
  • 28 篇 教育学
  • 26 篇 经济学
  • 12 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 1,150 篇 data mining
  • 336 篇 big data
  • 212 篇 cloud computing
  • 150 篇 data models
  • 123 篇 feature extracti...
  • 118 篇 algorithm design...
  • 95 篇 databases
  • 80 篇 computational mo...
  • 74 篇 clustering algor...
  • 72 篇 training
  • 71 篇 semantics
  • 71 篇 machine learning
  • 65 篇 conferences
  • 63 篇 clustering
  • 63 篇 support vector m...
  • 63 篇 servers
  • 61 篇 classification a...
  • 56 篇 classification
  • 56 篇 sentiment analys...
  • 52 篇 predictive model...

机构

  • 41 篇 infn sezione di ...
  • 41 篇 infn sezione di ...
  • 41 篇 universidade de ...
  • 41 篇 universidad de m...
  • 41 篇 universidade de ...
  • 41 篇 torino
  • 41 篇 palacky universi...
  • 41 篇 palermo
  • 41 篇 infn sezione di ...
  • 41 篇 institute for as...
  • 41 篇 infn sezione di ...
  • 41 篇 rwth aachen univ...
  • 41 篇 institut für pro...
  • 41 篇 centro federal d...
  • 41 篇 university of ad...
  • 41 篇 charles universi...
  • 41 篇 universität hamb...
  • 40 篇 infn sezione di ...
  • 40 篇 sorbonne univers...
  • 40 篇 cnrs in2p3 ijcla...

作者

  • 42 篇 aloisio r.
  • 41 篇 almeida cheminan...
  • 41 篇 aglietta m.
  • 41 篇 anastasi g.a.
  • 41 篇 buscemi m.
  • 41 篇 catalani f.
  • 41 篇 de souza v.
  • 40 篇 bismark k.
  • 40 篇 fazzini n.
  • 40 篇 avila g.
  • 40 篇 emam m.
  • 40 篇 de mitri i.
  • 40 篇 covault c.e.
  • 40 篇 deligny o.
  • 40 篇 condorelli a.
  • 40 篇 cataldi g.
  • 40 篇 cobos cerutti a....
  • 40 篇 brack j.
  • 40 篇 conte m.
  • 40 篇 di matteo a.

语言

  • 3,304 篇 英文
  • 28 篇 其他
  • 18 篇 中文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 德文
检索条件"任意字段=2016 International Conference on Data Mining and Advanced Computing, SAPIENCE 2016"
3354 条 记 录,以下是391-400 订阅
排序:
Fire Detection in a Varying Topography Using Landsat-8 for Nainital Region, India  3
Fire Detection in a Varying Topography Using Landsat-8 for N...
收藏 引用
3rd international conference for Convergence in Technology, I2CT 2018
作者: Suresh, Babu K.V. Vanama, Venkata Sai Krishna International Institute of Information Technology Lab for Spatial Informatics Hyderabad India Mumbai India
Forest fires are the most frequent phenomenon during the summer season in India, and especially in the hilly terrains of Uttarakhand forests. Remote sensing sensors such as Moderate Resolution Imaging Spectroradiomete... 详细信息
来源: 评论
The QUasi-Affine TRansformation Evolution (QUATRE) Algorithm: An Overview  4th
The QUasi-Affine TRansformation Evolution (QUATRE) Algorithm...
收藏 引用
4th Euro-China conference on Intelligent data Analysis and Applications, ECC 2017
作者: Meng, Zhenyu Pan, Jeng-Shyang Li, Xiaoqing Department of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Fujian Provincial Key Lab of Big Data Mining and Applications Fujian University of Technology Fuzhou China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China
QUasi-Affine TRansformation Evolution (QUATRE) algorithm is a new simple but powerful stochastic optimization algorithm proposed recently. The QUATRE algorithm aims to tackle the representational/positional bias inbor... 详细信息
来源: 评论
Machine Learning based Video Coding using data-driven Techniques and advanced Models
Machine Learning based Video Coding using Data-driven Techni...
收藏 引用
IEEE international conference on Cognitive Informatics
作者: Sam Kwong City University of Hong Kong Hong Kong
In June 6th 2016, Cisco released the white paper [1], VNI Forecast and Methodology 2015–2020, reported that 82 percent of Internet traffic will come from video applications such as video surveillance, content deliver... 详细信息
来源: 评论
data mining and analytics for exploring bulgarian diabetic register  19th
Data mining and analytics for exploring bulgarian diabetic r...
收藏 引用
19th international conference on data Analytics and Management in data Intensive Domains, DAMDID/RCDL 2017
作者: Boytcheva, Svetla Angelova, Galia Angelov, Zhivko Tcharaktchiev, Dimitar Institute of Information and Communication Technologies Bulgarian Academy of Sciences 25A Acad. G. Bonchev Street Sofia1113 Bulgaria ADISS Lab Ltd. 4 Hristo Botev Blvd Sofia1463 Bulgaria University Specialized Hospital for Active Treatment of Endocrinology – Medical University Sofia 2 Zdrave Street Sofia1431 Bulgaria
This paper discusses the need of building diabetic registers in order to monitor the disease development and assess the prevention and treatment plans. The automatic generation of a nation-wide Diabetes Register in Bu... 详细信息
来源: 评论
MIMiS: Minimally Intrusive mining of Smartphone User Behaviors  10
MIMiS: Minimally Intrusive Mining of Smartphone User Behavio...
收藏 引用
IEEE/ACM international conference on Advances in Social Networks Analysis and mining (ASONAM)
作者: Devineni, Pravallika Papalexakis, Evangelos E. Michalska, Kalina Faloutsos, Michalis Univ Calif Riverside Dept Comp Sci Riverside CA 92521 USA Univ Calif Riverside Dept Psychol Riverside CA 92521 USA
The proliferation of smartphones has lead researchers towards using them as an observational tool in psychological science. However, there is little effort towards protecting user privacy in these analyses. The overar... 详细信息
来源: 评论
Optimized DPCluster Based on Iterative KNN  5
Optimized DPCluster Based on Iterative KNN
收藏 引用
5th IEEE international conference on Cloud computing and Intelligence Systems (CCIS)
作者: Li, Hengyu He, Xu Yang, Wenyu Zhang, Lujia Huang, Qing Zou, Zhiqiang Nanjing Univ Posts & Telecommun Coll Comp Nanjing 210023 Jiangsu Peoples R China Jiangsu Key Lab Big Data Secur & Intelligent Proc Nanjing 210023 Jiangsu Peoples R China Nanjing Univ Posts & Telecommun Bell Honors Sch Nanjing 210023 Jiangsu Peoples R China Nanjing Univ Posts & Telecommun Coll Telecommun & Informat Engn Nanjing 210023 Jiangsu Peoples R China
Density peaks clustering (DPCluster) algorithm published in the journal Science in 2014 is a novel clustering algorithm based on density, which is simple and efficient. However, in this algorithm, the selection of its... 详细信息
来源: 评论
Digging Deep Inside: An Extended Analysis of SCHOLAT E-Learning data  3rd
收藏 引用
3rd international conference on Human Centered computing (HCC)
作者: Akram, Aftab Fu, Chengzhou Tang, Yong Jiang, Yuncheng Guo, Kun South China Normal Univ Sch Comp Sci Guangzhou 510631 Guangdong Peoples R China Univ Educ Lahore 54000 Pakistan Fuzhou Univ Coll Math & Comp Sci Fuzhou 350116 Fujian Peoples R China Fuzhou Univ Fujian Prov Key Lab Network Comp & Intelligent In Fuzhou 350116 Fujian Peoples R China
More and more higher education institutions are adopting computer based learning management system to boost learning of the students. Networking and collaboration through social media platforms are vital realities. Le... 详细信息
来源: 评论
Guest Editor's Introduction to the Special Section on Social Network Security
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE computing 2018年 第4期15卷 549-550页
作者: Qiu, Meikang Xiang, Yang Zhang, Yan Columbia Univ New York NY 10027 USA Swinburne Univ Technol Hawthorn Vic 3122 Australia Univ Oslo N-0315 Oslo Norway
The nine papers included in this special section focus on cyber security methods to protect social network services. The emerging paradigm of social network provides an enormous number of novel approaches to implement... 详细信息
来源: 评论
international conference on Intelligent computing and Applications  1st ed. 2018
收藏 引用
丛书名: Advances in Intelligent Systems and computing
2018年
作者: Subhransu Sekhar Dash Swagatam Das Bijaya Ketan Panigrahi
The bookis a collection of best papers presented in international conference on Intelligent computing and Applications (ICICA 2016) organized by Department of Computer Engineering, D. Y. Patil College of Engineering, ...
来源: 评论
Outlier detection over distributed trajectory streams
Outlier detection over distributed trajectory streams
收藏 引用
2018 SIAM international conference on data mining, SDM 2018
作者: Mao, Jiali Sun, Pengda Jin, Cheqing Zhou, Aoying School of Data Science and Engineering East China Normal University School of Computing China West Normal University China School of Computer Science and Software Engineering East China Normal University China
The wide deployments of GPS-embedded devices have produced multiple rapid voluminous trajectory streams, which needs to be analyzed to extract abnormal behaviors of moving objects in real-time. To date, outlier detect... 详细信息
来源: 评论