咨询与建议

限定检索结果

文献类型

  • 1,576 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 1,577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 899 篇 工学
    • 774 篇 计算机科学与技术...
    • 533 篇 软件工程
    • 253 篇 信息与通信工程
    • 194 篇 控制科学与工程
    • 130 篇 电气工程
    • 84 篇 网络空间安全
    • 78 篇 生物医学工程(可授...
    • 75 篇 安全科学与工程
    • 64 篇 交通运输工程
    • 62 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 45 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 42 篇 光学工程
    • 42 篇 石油与天然气工程
  • 306 篇 理学
    • 164 篇 数学
    • 83 篇 生物学
    • 73 篇 统计学(可授理学、...
    • 61 篇 物理学
    • 37 篇 系统科学
    • 33 篇 化学
  • 267 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 84 篇 工商管理
    • 34 篇 公共管理
  • 114 篇 医学
    • 80 篇 临床医学
    • 77 篇 公共卫生与预防医...
    • 64 篇 基础医学(可授医学...
  • 51 篇 法学
    • 48 篇 社会学
  • 39 篇 经济学
    • 39 篇 应用经济学
  • 18 篇 文学
  • 15 篇 教育学
  • 11 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 193 篇 data models
  • 157 篇 accuracy
  • 153 篇 computational mo...
  • 92 篇 training
  • 86 篇 feature extracti...
  • 86 篇 machine learning
  • 77 篇 predictive model...
  • 69 篇 data mining
  • 68 篇 deep learning
  • 63 篇 real-time system...
  • 57 篇 big data
  • 49 篇 adaptation model...
  • 45 篇 security
  • 44 篇 robustness
  • 41 篇 decision making
  • 40 篇 convolutional ne...
  • 39 篇 cloud computing
  • 36 篇 analytical model...
  • 35 篇 neural networks
  • 34 篇 optimization

机构

  • 14 篇 lovely professio...
  • 7 篇 shandong provinc...
  • 7 篇 key laboratory o...
  • 6 篇 college of mecha...
  • 6 篇 institute of aer...
  • 5 篇 lloyd institute ...
  • 5 篇 college of intel...
  • 5 篇 university of ch...
  • 5 篇 national univers...
  • 5 篇 department of co...
  • 5 篇 shandong fundame...
  • 5 篇 national univers...
  • 5 篇 institute of aer...
  • 4 篇 karnataka bangal...
  • 4 篇 shanghai jiao to...
  • 4 篇 school of comput...
  • 4 篇 chitkara univers...
  • 4 篇 new horizon coll...
  • 4 篇 srm institute of...
  • 4 篇 school of softwa...

作者

  • 7 篇 nijhawan ginni
  • 5 篇 jeanette miriam ...
  • 5 篇 lu xiaobo
  • 5 篇 singh navdeep
  • 4 篇 nicola franco
  • 4 篇 choudhry mani de...
  • 4 篇 akhil karnam
  • 4 篇 zhang rui
  • 4 篇 yu zhang
  • 4 篇 akshya j.
  • 4 篇 lihui wang
  • 4 篇 qu yuben
  • 4 篇 wang lihui
  • 4 篇 li lei
  • 4 篇 dong chao
  • 4 篇 dutt varun
  • 4 篇 puri chetan
  • 3 篇 yuangan wang
  • 3 篇 junqi luo
  • 3 篇 zhang lei

语言

  • 1,273 篇 英文
  • 303 篇 其他
  • 4 篇 中文
检索条件"任意字段=2024 IEEE International Conference on Cognitive Computing and Complex Data"
1577 条 记 录,以下是991-1000 订阅
排序:
Maritime Metaverse: A Historical Graph-based NGSI-LD Framework for Digital Twin Integration
Maritime Metaverse: A Historical Graph-based NGSI-LD Framewo...
收藏 引用
Metaverse computing, Networking and Applications (MetaCom), ieee international conference on
作者: Jieun Lee JaeSeung Song Sejong University Seoul Republic Of Korea
Leveraging the innovative Historical Graph-based NGSI-LD Framework, this research proposes a novel approach to enriching the metaverse by seamlessly integrating real-world data and digital twin platforms. The framewor... 详细信息
来源: 评论
Swarm Intelligence-Based Dynamic Virtual Machine Placement Optimization in Cloud data Centers
Swarm Intelligence-Based Dynamic Virtual Machine Placement O...
收藏 引用
Advances in computing, Communication and Networking (ICAC2N), international conference on
作者: Sanjay Mishra Monisha Awasthi Uttaranchal School of Computing Science Uttaranchal University Dehradun India
Virtual machine (VM) deployment is a critical aspect of cloud data center resource management that directly impacts performance, energy efficiency, and quality of service. Efficient VM deployment ensures optimal resou... 详细信息
来源: 评论
Utilizing Causal Learning for cognitive Management of 6G Networks
Utilizing Causal Learning for Cognitive Management of 6G Net...
收藏 引用
Machine Learning for Communication and Networking (ICMLCN), ieee international conference on
作者: Mehmet Karaca Jishnu Sadasivan Ahmet Cihat Baktir Alexandros Palaios András Zahemszky Ericsson Research Turkey Ericsson Research India Ericsson Research Germany Ericsson Research Sweden
In this paper, we study the use of causal reasoning for a cognitive network where we investigate causal discovery and its use in the context of 6G. The fundamental requirement in causal inference is to discover the ca... 详细信息
来源: 评论
The Parallel DCNN-LSTM Model for Cloud computing Prediction Based on an Improved SG Filter
The Parallel DCNN-LSTM Model for Cloud Computing Prediction ...
收藏 引用
Image Processing and Computer Applications (ICIPCA), ieee international conference on
作者: Bowen Yang Kaiming Jin Longhua Zou School of Computer Science and Engineering Beihang University Beijing China School of Economics Xiamen University Xiamen China
It is crucial to accurately predict the workload of large-scale cloud computing resources in order to better allocate and utilize them, but this has always been seen as a challenging task. Recently, LSTM has been wide... 详细信息
来源: 评论
Explainable Anomaly Detection: Counterfactual driven What-If Analysis
Explainable Anomaly Detection: Counterfactual driven What-If...
收藏 引用
ieee international conference on cognitive Machine Intelligence (CogMI)
作者: Logan Cummins Alexander Sommers Sudip Mittal Shahram Rahimi Maria Seale Joseph Jabour Thomas Arnold Computer Science & Engineering Mississippi State University US Department of Defense Engineer Research and Development Center
There exists three main areas of study inside of the field of predictive maintenance: anomaly detection, fault diagnosis, and remaining useful life prediction. Notably, anomaly detection alerts the stakeholder that an... 详细信息
来源: 评论
Forecasting Time Series through Motif Structure Analysis within Visibility Graph
Forecasting Time Series through Motif Structure Analysis wit...
收藏 引用
international conference on Automation and computing (ICAC)
作者: Tao Wen Yu-Wang Chen Decision and Cognitive Sciences Research Centre The University of Manchester UK
Time series forecasting is a fundamental and crucial problem in both academic research and industrial production. Various approaches have been developed to address this issue from different perspectives, each with its... 详细信息
来源: 评论
Understanding the Challenges of data Management in the AI Application Development
Understanding the Challenges of Data Management in the AI Ap...
收藏 引用
ieee international conference on Joint Cloud computing (JCC)
作者: Junchen Li Yang Zhang Kele Xu Tao Wang Huaimin Wang National University of Defense Technology China State Key Laboratory of Complex & Critical Software Environment China
With the development of AI model ecology pioneered by the large language models, data plays a more important and diversified role than the traditional one. In recent years, data problems have been increasingly noticed... 详细信息
来源: 评论
Enhancing data-Free Robustness Stealing Attack via Boundary data Generation
Enhancing Data-Free Robustness Stealing Attack via Boundary ...
收藏 引用
ieee/ACM Int'l conference on & Int'l conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Xiaoji Ma Weihao Guo Pingyuan Ge Ying Chen Qiuling Yue Yuqing Zhang School of Cyberspace Security Hainan University Haikou China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing China
With the continuous development of Machine Learning as a Service (MLaaS), model stealing has become an emerging problem in machine learning security in recent years. In model stealing, one typically obtains the soft l... 详细信息
来源: 评论
PentraFormer: Learning Agents for Automated Penetration Testing via Sequence Modeling
PentraFormer: Learning Agents for Automated Penetration Test...
收藏 引用
ieee/ACM Int'l conference on & Int'l conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Yunfei Wang Shixuan Liu Wenhao Wang Cheng Zhu Changjun Fan Kuihua Huang Chao Chen National Key Laboratory of Information Systems Engineering National University of Defense Technology Changsha China Laboratory for Big Data and Decision National University of Defense Technology Changsha China National University of Defense Technology Changsha China
The exponential growth of computer networks has intensified the requirement for robust security measures, rendering penetration testing—an essential practice that assesses vulnerabilities by simulating attacks—criti... 详细信息
来源: 评论
Security Analysis of Accounting Computerized Information System based on data Mining and Neural Networks
Security Analysis of Accounting Computerized Information Sys...
收藏 引用
Distributed computing and Electrical Circuits and Electronics (ICDCECE), ieee international conference on
作者: Yan Wang Xi 'an Mingde Institute of Technology Xi 'an Shaanxi China
The security issue of accounting by electronic data processing information systems is a complex system engineering. How to extract useful data from the massive amount of accounting by electronic data processing inform... 详细信息
来源: 评论