咨询与建议

限定检索结果

文献类型

  • 3,226 篇 会议
  • 74 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 3,354 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,176 篇 工学
    • 1,933 篇 计算机科学与技术...
    • 702 篇 软件工程
    • 418 篇 电气工程
    • 333 篇 信息与通信工程
    • 181 篇 控制科学与工程
    • 79 篇 仪器科学与技术
    • 73 篇 生物医学工程(可授...
    • 64 篇 生物工程
    • 48 篇 机械工程
    • 46 篇 航空宇航科学与技...
    • 35 篇 电子科学与技术(可...
    • 33 篇 化学工程与技术
    • 30 篇 光学工程
    • 30 篇 网络空间安全
    • 28 篇 动力工程及工程热...
    • 27 篇 交通运输工程
  • 423 篇 管理学
    • 285 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 399 篇 理学
    • 199 篇 数学
    • 116 篇 物理学
    • 87 篇 生物学
    • 68 篇 统计学(可授理学、...
    • 50 篇 系统科学
    • 45 篇 化学
    • 42 篇 地球物理学
  • 77 篇 医学
    • 63 篇 基础医学(可授医学...
    • 57 篇 临床医学
    • 36 篇 药学(可授医学、理...
  • 56 篇 法学
    • 51 篇 社会学
  • 28 篇 教育学
  • 26 篇 经济学
  • 12 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 1,150 篇 data mining
  • 336 篇 big data
  • 212 篇 cloud computing
  • 150 篇 data models
  • 123 篇 feature extracti...
  • 118 篇 algorithm design...
  • 95 篇 databases
  • 80 篇 computational mo...
  • 74 篇 clustering algor...
  • 72 篇 training
  • 71 篇 semantics
  • 71 篇 machine learning
  • 65 篇 conferences
  • 63 篇 clustering
  • 63 篇 support vector m...
  • 63 篇 servers
  • 61 篇 classification a...
  • 56 篇 classification
  • 56 篇 sentiment analys...
  • 52 篇 predictive model...

机构

  • 41 篇 infn sezione di ...
  • 41 篇 infn sezione di ...
  • 41 篇 universidade de ...
  • 41 篇 universidad de m...
  • 41 篇 universidade de ...
  • 41 篇 torino
  • 41 篇 palacky universi...
  • 41 篇 palermo
  • 41 篇 infn sezione di ...
  • 41 篇 institute for as...
  • 41 篇 infn sezione di ...
  • 41 篇 rwth aachen univ...
  • 41 篇 institut für pro...
  • 41 篇 centro federal d...
  • 41 篇 university of ad...
  • 41 篇 charles universi...
  • 41 篇 universität hamb...
  • 40 篇 infn sezione di ...
  • 40 篇 sorbonne univers...
  • 40 篇 cnrs in2p3 ijcla...

作者

  • 42 篇 aloisio r.
  • 41 篇 almeida cheminan...
  • 41 篇 aglietta m.
  • 41 篇 anastasi g.a.
  • 41 篇 buscemi m.
  • 41 篇 catalani f.
  • 41 篇 de souza v.
  • 40 篇 bismark k.
  • 40 篇 fazzini n.
  • 40 篇 avila g.
  • 40 篇 emam m.
  • 40 篇 de mitri i.
  • 40 篇 covault c.e.
  • 40 篇 deligny o.
  • 40 篇 condorelli a.
  • 40 篇 cataldi g.
  • 40 篇 cobos cerutti a....
  • 40 篇 brack j.
  • 40 篇 conte m.
  • 40 篇 di matteo a.

语言

  • 3,304 篇 英文
  • 28 篇 其他
  • 18 篇 中文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 德文
检索条件"任意字段=2016 International Conference on Data Mining and Advanced Computing, SAPIENCE 2016"
3354 条 记 录,以下是461-470 订阅
排序:
SFSC: Segment feature sampling classifier for time series classification  4th
SFSC: Segment feature sampling classifier for time series cl...
收藏 引用
4th international conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2018
作者: Meng, Fanshan Yue, Tianbai Wang, Hongzhi Gao, Hong Li, Yaping Massive Data Computing Research Center Harbin Institute of Technology Xidazhijie. 92 Harbin China
Time series classification research is important in data mining. However, the existing methods are not fast and accurate enough. Common classification algorithms cannot satisfy the requirements of time series classifi... 详细信息
来源: 评论
A Random Forest Model for Mental Disorders Diagnostic Systems  2nd
收藏 引用
2nd international conference on advanced Intelligent Systems and Informatics (AISI)
作者: Abou-Warda, Horeya Belal, Nahla A. El-Sonbaty, Yasser Darwish, Sherif Arab Acad Sci Technol & Maritime Transport Coll Comp & Informat Technol POB 1029 Alexandria Egypt El Mamoura Hosp Psychiat & Addict Treatment Dept Dual Diag Alexandria Egypt
data mining has established new applications in medicine over the last few years. Using mental disorders diagnostic systems, data possession, and data analysis has been of enormous succor for clinicians to recognize d... 详细信息
来源: 评论
Perlustration on Techno Level Classification of Deduplication Techniques in Cloud for Big data Storage  8
Perlustration on Techno Level Classification of Deduplicatio...
收藏 引用
8th international conference on advanced computing (ICoAC)
作者: Karthika, R. N. Valliyammai, C. Abisha, D. Anna Univ MIT Dept Comp Technol Madras Tamil Nadu India
In the bygone, the exploration in computing focused on cloud computing, big data, and the internet of things (IOT). Irrespective of what computing is used, there is always a requirement for storage. The challenge face... 详细信息
来源: 评论
Knowledge inference from a small water quality dataset with multivariate statistics and data-mining
Knowledge inference from a small water quality dataset with ...
收藏 引用
international conference of ICT for Adapting Agriculture to Climate Change, AACC 2017
作者: Simmonds, Jose Gómez, Juan A. Ledezma, Agapito Departamento de Informática Universidad Carlos III de Madrid Avenida de la Universidad 30 Leganés28911 Spain Departamento de Biología Marina Universidad de Panamá Estafeta Universitaria Apartado 3366 Panamá 4 Panama
Multivariate analysis (MV) and data mining (DM) techniques were applied to a small water quality dataset obtained from the surface waters at three water quality monitoring stations in the Petaquilla River Basin, Panam... 详细信息
来源: 评论
Performance Evaluation of Lazy and Decision Tree Classifier: A data mining Approach for Global Celebrity's Death Analysis
Performance Evaluation of Lazy and Decision Tree Classifier:...
收藏 引用
international conference on Research in Intelligent and computing in Engineering (RICE)
作者: Vivek Kumar Roman Zinovyev Abhishek Verma Prayag Tiwari Dept. of Automated Control System National University of Science & Technology-MiSiS Moscow Russian Federation Dept.of Semiconductor Electronic National University of Science & Technology-MiSiS Moscow Russian Federation Dept.of CSE Malaviya National Institute of Technology Jaipur India Dept.of Information Engineering University of PaPadova Italy
In present world data is a valuable asset. The best utilization of this asset by means of technology gives an upper hand to an organization. Technologies like machine learning, data mining, and artificial intelligence... 详细信息
来源: 评论
Network Traffic Anomaly Detection Based on Wavelet Analysis  16
Network Traffic Anomaly Detection Based on Wavelet Analysis
收藏 引用
16th IEEE/ACIS international conference on Software Engineering Research, Management and Applications (SERA)
作者: Du, Zhen Ma, Lipeng Li, Huakang Li, Qun Sun, Guozi Liu, Zichang Jiangsu Key Lab Big Data & Secur & Intelligent Pr Nanjing 210023 Jiangsu Peoples R China NUPT Sch Comp Sci Nanjing 210023 Jiangsu Peoples R China Collaborat Innovat Ctr Econ Crime Invest & Preven Nanchang 330103 Jiangxi Peoples R China State Key Lab Math Engn & Adv Comp Wuxi 214125 Peoples R China
Network traffic anomaly detection is an important research content in the field of network and security management. By analyzing network traffic, the health of the network environment can be intuitively evaluated. In ... 详细信息
来源: 评论
2nd international Congress on Information and Communication Technology, ICICT 2016
收藏 引用
2nd international Congress on Information and Communication Technology, ICICT 2016
The proceedings contain 32 papers. The special focus in this conference is on Information and Communication Technology. The topics include: Preface;automation of railway engine pilot security system using multimodal b...
来源: 评论
FP-Growth Implementation Using Tries for Association Rule mining  1
收藏 引用
6th international conference on Soft computing for Problem Solving (SocProS)
作者: Goel, Manu Goel, Kanu Thapar Univ CSED Patiala Punjab India
With the advent of technology the past few years have seen the rise in the field of data mining. data mining generally considered as the process of extracting the useful information by finding the hidden and the non-t... 详细信息
来源: 评论
The design and implementation of building energy saving potential online diagnosis method Based on data mining techniques
The design and implementation of building energy saving pote...
收藏 引用
international conference on Intelligent Transportation, Big data & Smart City (ICITBS)
作者: Liu Jianwei Tianjin Light Ind Vocat Tech Coll Tianjin 300232 Peoples R China
In modern architecture, advanced building automation system is widely used for automatic monitoring and control of all kinds of building systems, but the actual operation data of the building which is stored in the sy... 详细信息
来源: 评论
Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards  4th
Efficient Anonymous Password-Authenticated Key Exchange Sche...
收藏 引用
4th Euro-China conference on Intelligent data Analysis and Applications, ECC 2017
作者: Wu, Tsu-Yang Fang, Weicheng Chen, Chien-Ming Wang, Eric Ke Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology Fuzhou350118 China Harbin Institute of Technology Shenzhen Graduate School Shenzhen China
Anonymous authentication is designed to hide the user’s identity from any verifiers during an authentication session. Since passwords prevail in many authentication systems, anonymous password-authenticated key excha... 详细信息
来源: 评论