咨询与建议

限定检索结果

文献类型

  • 3,226 篇 会议
  • 74 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 3,354 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,176 篇 工学
    • 1,933 篇 计算机科学与技术...
    • 702 篇 软件工程
    • 418 篇 电气工程
    • 333 篇 信息与通信工程
    • 181 篇 控制科学与工程
    • 79 篇 仪器科学与技术
    • 73 篇 生物医学工程(可授...
    • 64 篇 生物工程
    • 48 篇 机械工程
    • 46 篇 航空宇航科学与技...
    • 35 篇 电子科学与技术(可...
    • 33 篇 化学工程与技术
    • 30 篇 光学工程
    • 30 篇 网络空间安全
    • 28 篇 动力工程及工程热...
    • 27 篇 交通运输工程
  • 423 篇 管理学
    • 285 篇 管理科学与工程(可...
    • 139 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 399 篇 理学
    • 199 篇 数学
    • 116 篇 物理学
    • 87 篇 生物学
    • 68 篇 统计学(可授理学、...
    • 50 篇 系统科学
    • 45 篇 化学
    • 42 篇 地球物理学
  • 77 篇 医学
    • 63 篇 基础医学(可授医学...
    • 57 篇 临床医学
    • 36 篇 药学(可授医学、理...
  • 56 篇 法学
    • 51 篇 社会学
  • 28 篇 教育学
  • 26 篇 经济学
  • 12 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 军事学

主题

  • 1,150 篇 data mining
  • 336 篇 big data
  • 212 篇 cloud computing
  • 150 篇 data models
  • 123 篇 feature extracti...
  • 118 篇 algorithm design...
  • 95 篇 databases
  • 80 篇 computational mo...
  • 74 篇 clustering algor...
  • 72 篇 training
  • 71 篇 semantics
  • 71 篇 machine learning
  • 65 篇 conferences
  • 63 篇 clustering
  • 63 篇 support vector m...
  • 63 篇 servers
  • 61 篇 classification a...
  • 56 篇 classification
  • 56 篇 sentiment analys...
  • 52 篇 predictive model...

机构

  • 41 篇 infn sezione di ...
  • 41 篇 infn sezione di ...
  • 41 篇 universidade de ...
  • 41 篇 universidad de m...
  • 41 篇 universidade de ...
  • 41 篇 torino
  • 41 篇 palacky universi...
  • 41 篇 palermo
  • 41 篇 infn sezione di ...
  • 41 篇 institute for as...
  • 41 篇 infn sezione di ...
  • 41 篇 rwth aachen univ...
  • 41 篇 institut für pro...
  • 41 篇 centro federal d...
  • 41 篇 university of ad...
  • 41 篇 charles universi...
  • 41 篇 universität hamb...
  • 40 篇 infn sezione di ...
  • 40 篇 sorbonne univers...
  • 40 篇 cnrs in2p3 ijcla...

作者

  • 42 篇 buscemi m.
  • 42 篇 aloisio r.
  • 42 篇 catalani f.
  • 42 篇 de souza v.
  • 41 篇 bismark k.
  • 41 篇 fazzini n.
  • 41 篇 avila g.
  • 41 篇 emam m.
  • 41 篇 de mitri i.
  • 41 篇 covault c.e.
  • 41 篇 deligny o.
  • 41 篇 almeida cheminan...
  • 41 篇 aglietta m.
  • 41 篇 condorelli a.
  • 41 篇 anastasi g.a.
  • 41 篇 cataldi g.
  • 41 篇 cobos cerutti a....
  • 41 篇 brack j.
  • 41 篇 conte m.
  • 41 篇 di matteo a.

语言

  • 3,327 篇 英文
  • 18 篇 中文
  • 5 篇 其他
  • 2 篇 葡萄牙文
  • 2 篇 俄文
检索条件"任意字段=2016 International Conference on Data Mining and Advanced Computing, SAPIENCE 2016"
3354 条 记 录,以下是81-90 订阅
排序:
An advanced data Science Model Based on Big data Analytics for Urban Driving Cycle Construction in China  2020
An Advanced Data Science Model Based on Big Data Analytics f...
收藏 引用
2020 international conference on computing, Networks and Internet of Things, CNIOT 2020
作者: Qin, Yana Yang, Haolin Guo, Mengjie Guo, Meicheng Inner Mongolia University of Technology Inner-Mongolia China Institute of Computing Technology Chinese Academy of Sciences Beijing China
In recent years, with the rapid growth of car ownership, Chinese road traffic conditions have changed a lot. Governments, enterprises, and the public are increasingly finding that the increasing deviation between the ... 详细信息
来源: 评论
A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic
A Glimpse of the Whole: Detecting Few-shot Android Malware E...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
作者: Wenhao Li Xiao-Yu Zhang Huaifeng Bao Qiang Wang Haichao Shi Zhaoxuan Li Institute of Information Engineering Chinese Academy of Sciences Beijing China
Reversing binary samples is a conventional way to detect Android malware and is limited by the prosperity of code obfuscation. Detecting network traffic generated by Android malware can counter the advanced obfuscatio... 详细信息
来源: 评论
Research on Scientific data Management in Big data Era  20
Research on Scientific Data Management in Big Data Era
收藏 引用
4th international conference on Computer Science and Application Engineering, CSAE 2020
作者: Man, Rui Zhou, Guomin Fan, Jingchao Agricultural Information Institute Chinese Academy of Agricultural Sciences and National Agricultural Science Data Center Beijing China Department of Science and Technology Management Chinese Academy of Agricultural Sciences and National Agricultural Science Data Center Beijing China
Scientific data is an important strategic resource in the era of big data. Efficient management and wide circulation are the key ways to enhance the value of scientific data resources. With the transformation of the i... 详细信息
来源: 评论
A Deep Autoencoder Based Outlier Detection for Time Series
A Deep Autoencoder Based Outlier Detection for Time Series
收藏 引用
2020 IEEE international conference on Power, Intelligent computing and Systems, ICPICS 2020
作者: Wang, Jin Miao, Fang You, Lei Fan, Wenjie School of Information Science and Technology Chengdu University Chengdu China Institute of Big Data Chengdu University Chengdu China
Time series outlier detection is an important topic in data mining, having significant applications in reality. Due to the complexity and dynamics of time series, it is quite difficult to detect outlier in time series... 详细信息
来源: 评论
Transformative computing for Distributed Services Management Protocols  34th
Transformative Computing for Distributed Services Management...
收藏 引用
34th international conference on advanced Information Networking and Applications, AINA 2020
作者: Ogiela, Lidia Takizawa, Makoto Ogiela, Urszula Department of Cryptography and Cognitive Informatics Pedagogical University of Krakow Podchorążych 2 Street Kraków30-084 Poland Department of Advanced Sciences Hosei University 3-7-2 Kajino-cho Tokyo Koganei-shi184-8584 Japan Pedagogical University of Krakow Podchorążych 2 Street Kraków30-084 Poland
This paper describes new solutions for distributed services management protocols. The new idea will be based on use transformative computing methodology in services securing algorithms. Such solutions will be based on... 详细信息
来源: 评论
Analysis Dropout Situation of Business Computer Students at University of Phayao  2nd
Analysis Dropout Situation of Business Computer Students at ...
收藏 引用
22nd international conference on Interactive Collaborative Learning (ICL) / 48th IGIP international conference on Engineering Pedagogy - Impact of the 4th Industrial Revolution on Engineering Education
作者: Nuankaew, Pratya Nuankaew, Wongpanya Phanniphong, Kanakarn Fooprateepsiri, Rerkchai Bussaman, Sittichai Univ Phayao Phayao Thailand Rajabhat Mahasarakham Univ Maha Sarakham Thailand Rajamangala Univ Technol Tawan Ok Chon Buri Thailand
This paper aims to analyze the situation of dropout of business computer students at University of Phayao. The composition of the goal consists of 3 main points, including summarizing the situation from the past to th... 详细信息
来源: 评论
Hybrid Algorithm and Forecasting Technology of Network Public Opinion Based on BP Neural Network  9th
Hybrid Algorithm and Forecasting Technology of Network Publi...
收藏 引用
9th international Workshop of advanced Manufacturing and Automation, IWAMA 2019
作者: Zhang, Ronghua Liu, Changzheng Ma, Hongliang Intelligent and Distributed Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China College of Information Science and Technology Shihezi University Shihezi832000 China
Based on the hybrid algorithm and BP neural network, the forecasting technology of network public opinion was studied. After detailed introduction of the research background and significance, the concept and developme... 详细信息
来源: 评论
mining defects of result-sensitive function based on information entropy  6th
Mining defects of result-sensitive function based on informa...
收藏 引用
6th international conference on Artificial Intelligence and Security,ICAIS 2020
作者: Chen, Lin Yang, Chunfang Liu, Fenlin Gong, Daofu Yin, ZhongXu Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Result-sensitive function is a typical type of security-sensitive function. The misuse of result-sensitive functions often leads to a lot kinds of software defects. Existing defect detection methods based on code mini... 详细信息
来源: 评论
Matrix-Based data Security in Cloud computing Using advanced Cramer-Shoup Cryptosystem
Matrix-Based Data Security in Cloud Computing Using Advanced...
收藏 引用
Springer international conference on Emerging Technologies in data mining and Information Security (IEMIS)
作者: Sirajudeen, Y. Mohamed Anitha, R. Sri Venkateswara Coll Engn DST SERB Cloud Res Lab Sriperumbudur 602117 Tamil Nadu India
Cloud computing allows users to store data in a distributed cloud storage. So the data are stored in different geographical locations which will predominantly increase the vulnerability of the data. The natural way to... 详细信息
来源: 评论
FabricGene: A Higher-Level Feature Representation of Fabric Patterns for Nationality Classification  16th
FabricGene: A Higher-Level Feature Representation of Fabric ...
收藏 引用
16th international conference on advanced data mining and Applications (ADMA)
作者: Yu, Shuang Li, Xiongfei Wang, Hancheng Zhang, Xiaoli Chen, Shiping Jilin Univ Key Lab Symbol Computat & Knowledge Engn Minist Educ Changchun Peoples R China Jilin Univ Coll Comp Sci & Technol Changchun Peoples R China CSIRO Data61 Sydney NSW 2016 Australia
Nationality fabric classification is a significant work to promote the protection work of fabric patterns and further reveal its unique connotation and inheritance rules in big data era. Thus, how to ascertain the fea... 详细信息
来源: 评论