咨询与建议

限定检索结果

文献类型

  • 1,638 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 1,639 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 955 篇 工学
    • 824 篇 计算机科学与技术...
    • 565 篇 软件工程
    • 290 篇 信息与通信工程
    • 240 篇 控制科学与工程
    • 154 篇 电气工程
    • 106 篇 网络空间安全
    • 92 篇 安全科学与工程
    • 81 篇 交通运输工程
    • 79 篇 生物医学工程(可授...
    • 63 篇 生物工程
    • 58 篇 电子科学与技术(可...
    • 54 篇 动力工程及工程热...
    • 52 篇 仪器科学与技术
    • 52 篇 石油与天然气工程
    • 43 篇 光学工程
  • 329 篇 理学
    • 177 篇 数学
    • 81 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 69 篇 物理学
    • 46 篇 化学
    • 37 篇 系统科学
  • 306 篇 管理学
    • 239 篇 管理科学与工程(可...
    • 121 篇 图书情报与档案管...
    • 89 篇 工商管理
    • 42 篇 公共管理
  • 125 篇 医学
    • 85 篇 公共卫生与预防医...
    • 84 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 58 篇 法学
    • 55 篇 社会学
  • 45 篇 经济学
    • 45 篇 应用经济学
  • 18 篇 教育学
  • 18 篇 文学
  • 11 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 193 篇 data models
  • 158 篇 accuracy
  • 153 篇 computational mo...
  • 93 篇 machine learning
  • 92 篇 training
  • 87 篇 feature extracti...
  • 77 篇 predictive model...
  • 74 篇 deep learning
  • 70 篇 data mining
  • 64 篇 real-time system...
  • 60 篇 big data
  • 49 篇 adaptation model...
  • 46 篇 security
  • 44 篇 robustness
  • 42 篇 decision making
  • 40 篇 cloud computing
  • 40 篇 convolutional ne...
  • 36 篇 neural networks
  • 36 篇 analytical model...
  • 35 篇 artificial intel...

机构

  • 14 篇 lovely professio...
  • 7 篇 shandong provinc...
  • 7 篇 key laboratory o...
  • 6 篇 university of ch...
  • 6 篇 college of mecha...
  • 6 篇 institute of aer...
  • 5 篇 lloyd institute ...
  • 5 篇 srm institute of...
  • 5 篇 college of intel...
  • 5 篇 national univers...
  • 5 篇 department of co...
  • 5 篇 shandong fundame...
  • 5 篇 national univers...
  • 5 篇 institute of aer...
  • 4 篇 chitkara univers...
  • 4 篇 karnataka bangal...
  • 4 篇 srm institute of...
  • 4 篇 school of comput...
  • 4 篇 shenzhen institu...
  • 4 篇 chitkara univers...

作者

  • 7 篇 nijhawan ginni
  • 5 篇 fu lijun
  • 5 篇 choudhry mani de...
  • 5 篇 jeanette miriam ...
  • 5 篇 lu xiaobo
  • 5 篇 singh navdeep
  • 4 篇 nicola franco
  • 4 篇 akhil karnam
  • 4 篇 zhang rui
  • 4 篇 yu zhang
  • 4 篇 akshya j.
  • 4 篇 lihui wang
  • 4 篇 qu yuben
  • 4 篇 wang lihui
  • 4 篇 li lei
  • 4 篇 dong chao
  • 4 篇 dutt varun
  • 4 篇 puri chetan
  • 3 篇 yuangan wang
  • 3 篇 junqi luo

语言

  • 911 篇 英文
  • 727 篇 其他
  • 5 篇 中文
检索条件"任意字段=2024 IEEE International Conference on Cognitive Computing and Complex Data"
1639 条 记 录,以下是1191-1200 订阅
排序:
StarFlow: fine-grained execution of workflows in Hybrid Cloud HPC for data stream applications  23
StarFlow: fine-grained execution of workflows in Hybrid Clou...
收藏 引用
Proceedings of the ieee/ACM 16th international conference on Utility and Cloud computing
作者: Luca Ferrucci Marco Danelutto Patrizio Dazzi University of Pisa Pisa IT
Nowadays we are witnessing the diffusion of the Function-as-a-service paradigm, that has emerged due to its ability to deploy fine-grained units of computation on heterogeneous resources on-demand, reducing costs and ... 详细信息
来源: 评论
Innovative cognitive Stroke Detection Analysis using Deep Learning Methodology  5
Innovative Cognitive Stroke Detection Analysis using Deep Le...
收藏 引用
5th ieee international conference on Electro-computing Technologies for Humanity, NIGERCON 2024
作者: Kanna, R. Kishore Anitha, R. Sundaramoorthy, K. Tengey, Clement Banappagoudar, Sudharani B. Salau, Ayodeji Olalekan Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Biomedical Engineering Chennai India Jerusalem College of Engineering Department of Biomedical Engineering Chennai India Jerusalem College of Engineering Department of Information Technology Chennai India Department of Electrical Electronics Accra Technical University Ghana Itm University School of Nursing Science MP Gwalior India Afe Babalola University Department of Electrical/Electronics and Computer Engineering Ado-Ekiti Nigeria Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Tamil Nadu Chennai India
Stroke is the second leading cause of death, and the World Health Organization defined stroke as 'a rapidly progressive set of clinical symptoms characterized by central (or global), persistent brain dysfunction f... 详细信息
来源: 评论
data Poisoning Attacks in cognitive computing
Data Poisoning Attacks in Cognitive Computing
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Anjan K Koundinya S S Patil Chandu B R Department of Information Science and Engineering B M S Institute Of Technology And Management Bengaluru Karnataka India Information Technology Solutions B M S Institute Of Technology And Management Bengaluru Karnataka India Department of Electronics and Communication Engineering B M S Institute Of Technology And Management Bengaluru Karnataka India
data poisoning attacks pose a significant threat to the integrity of machine learning (ML) models, impacting their ability to generate accurate predictions. This research delves into the realm of adversarial ML [1], s... 详细信息
来源: 评论
Preliminary Research on Automatic data Augmentation for Irony Detection
Preliminary Research on Automatic Data Augmentation for Iron...
收藏 引用
ieee international conference on Research, Innovation and Vision for the Future
作者: Chang ZiShen Michal Ptaszynski Fumito Masui Text Information Processing Laboratory Kitami Institute of Technology Kitami Japan
This paper presents a method to expand the Japanese irony sentences dataset. The main idea is to enhance existing classification models by collecting new data, using existing models, and extracting new data candidates... 详细信息
来源: 评论
cognitive and Autonomic IoT System Design  8
Cognitive and Autonomic IoT System Design
收藏 引用
8th international conference on Software Defined Systems (SDS)
作者: Athamena, Belkacem Houhamdi, Zina Al Ain Univ Coll Business Business Adm Dept Al Ain U Arab Emirates Al Ain Univ Coll Engn Cybersecur Dept Al Ain U Arab Emirates
Currently, the Internet of Things (IoT) usage ob-serves a drastic growth in several areas and participates in the rapid universe digitalization. Henceforward, the IoT systems next generation will be more difficult to ... 详细信息
来源: 评论
Introducing Timer-driven Requesting Scheme to Segmented File Download Methods Using Parallel TCP/MPTCP Connections on Multiple Paths
Introducing Timer-driven Requesting Scheme to Segmented File...
收藏 引用
ieee international Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Junichi Funasaka Noriaki Hiraoka Graduate School of Information Sciences Hiroshima City University Hiroshima JAPAN
The proliferation of diverse network technologies has enabled concurrent utilization of multiple network media, such as WiFi and 4G/5G links on modern smartphones. While this advancement facilitates simultaneous downl... 详细信息
来源: 评论
Research on Visualization Processing of Military Time Series data
Research on Visualization Processing of Military Time Series...
收藏 引用
ieee international conference on Computer and Communication Engineering Technology (CCET)
作者: Jianhong Feng Qinghua Xu Haisheng Li Jiangna Guo Haoyang Lv Yubao Xie Unit 32366 of the Chinese People's Liberation Army Beijing China China Academy of Electronics and Information Technology Beijing China
With the rapid development of information technology, the demand for the application of massive temporal data in the military field is gradually increasing. The visualization of time series data in the military field ... 详细信息
来源: 评论
Exploring the Diagnostic Potential of LLMs in Schizophrenia Detection through EEG Analysis
Exploring the Diagnostic Potential of LLMs in Schizophrenia ...
收藏 引用
ieee international conference on Bioinformatics and Biomedicine (BIBM)
作者: Michele Guerra Roberto Milanese Michele Deodato Madalina G. Ciobanu Fausto Fasano Mosaic Research Center – DiBT University of Molise Pesche Italy Department of Control and Computer Engineering Politecnico di Torino Torino Italy Division of Science New York University Abu Dhabi United Arab Emirates Department of Computer Science University of Salerno Fisciano(SA) Italy
Schizophrenia is a psychiatric disorder that presents significant diagnostic challenges due to its complex neurophysiological characteristics. This paper investigates the potential of Large Language Models (LLMs), suc... 详细信息
来源: 评论
A Multi-Stage Spike Stream Processing and Image Reconstruction Method for Industrial Applications
A Multi-Stage Spike Stream Processing and Image Reconstructi...
收藏 引用
ieee international conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Shuaipeng Wu Changhao Yuan Kejiang Ye Southern University of Science and Technology Chinese Academy of Sciences Shenzhen Institute of Advanced Technology University of Chinese Academy of Sciences
With the advancement of new industrialization, production processes or scenarios characterized by automation and intelligence require monitoring by more powerful visual inspection tools to maintain production continui... 详细信息
来源: 评论
Development of Cryptographic Algorithms for Protecting Cloud data from Insider Threats
Development of Cryptographic Algorithms for Protecting Cloud...
收藏 引用
ieee international conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON)
作者: Abidemi Emmanuel Adeniyi Mercy Oka Ebute Halleluyah Oluwatobi Aworinde Agbotiname Lucky Imoize Joseph Bamidele Awotunde Oluwaferanmi Adedamola Adewusi Department of Computer Science Bowen University Iwo Department of Accounting Anderson School of Management University of New Mexico USA Department of Computer Science Bowen University Iwo Nigeria Department of Electrical and Electronics Engineering University of Lagos Akoka Lagos Nigeria Department of Computer Science University of Ilorin Ilorin Nigeria
Today’s digitalized environment could not function without cloud data security, especially regarding insider threats. This research aims to identify the susceptibility of cloud data to insider attacks by devising cry... 详细信息
来源: 评论