咨询与建议

限定检索结果

文献类型

  • 1,568 篇 会议
  • 26 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 1,610 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,068 篇 工学
    • 876 篇 计算机科学与技术...
    • 569 篇 软件工程
    • 258 篇 信息与通信工程
    • 189 篇 电气工程
    • 155 篇 控制科学与工程
    • 84 篇 机械工程
    • 78 篇 生物工程
    • 67 篇 动力工程及工程热...
    • 61 篇 交通运输工程
    • 48 篇 电子科学与技术(可...
    • 44 篇 仪器科学与技术
    • 40 篇 生物医学工程(可授...
    • 34 篇 安全科学与工程
    • 30 篇 建筑学
    • 28 篇 土木工程
    • 22 篇 环境科学与工程(可...
    • 21 篇 光学工程
  • 361 篇 理学
    • 213 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 47 篇 系统科学
  • 235 篇 管理学
    • 164 篇 管理科学与工程(可...
    • 94 篇 工商管理
    • 87 篇 图书情报与档案管...
  • 47 篇 法学
    • 35 篇 社会学
  • 34 篇 医学
    • 32 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 29 篇 教育学
    • 28 篇 教育学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 9 篇 农学
  • 5 篇 文学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 71 篇 cloud computing
  • 56 篇 distributed comp...
  • 50 篇 artificial intel...
  • 46 篇 internet of thin...
  • 42 篇 ubiquitous compu...
  • 41 篇 computational mo...
  • 37 篇 intelligent netw...
  • 36 篇 computer archite...
  • 32 篇 computer science
  • 30 篇 training
  • 29 篇 edge computing
  • 28 篇 protocols
  • 26 篇 computer network...
  • 25 篇 big data
  • 25 篇 monitoring
  • 25 篇 blockchain
  • 24 篇 internet
  • 23 篇 machine learning
  • 23 篇 distributed data...
  • 22 篇 costs

机构

  • 16 篇 guangxi key labo...
  • 9 篇 wuzhou univ guan...
  • 8 篇 guangxi colleges...
  • 8 篇 college of compu...
  • 8 篇 faculty of trans...
  • 7 篇 university of sc...
  • 7 篇 school of cyber ...
  • 7 篇 institute of com...
  • 6 篇 huazhong univers...
  • 6 篇 three gorges int...
  • 6 篇 hubei province k...
  • 6 篇 university of ch...
  • 6 篇 changsha univers...
  • 5 篇 department of co...
  • 5 篇 institute of inf...
  • 5 篇 wuzhou univ guan...
  • 4 篇 singapore univer...
  • 4 篇 school of comput...
  • 4 篇 huazhong univers...
  • 4 篇 school of comput...

作者

  • 6 篇 li peng
  • 5 篇 zhang tao
  • 5 篇 wang wei
  • 5 篇 du ronghua
  • 5 篇 li xiaokun
  • 5 篇 hu wei
  • 4 篇 liu qin
  • 4 篇 cheng li
  • 4 篇 guo hui
  • 4 篇 yang yang
  • 4 篇 yukinobu hoshino
  • 4 篇 peng jun
  • 4 篇 wang haoran
  • 4 篇 huang qingming
  • 4 篇 vale zita
  • 4 篇 praca isabel
  • 4 篇 wang yonghao
  • 4 篇 hui guo
  • 4 篇 li xiang
  • 4 篇 jun peng

语言

  • 1,419 篇 英文
  • 189 篇 其他
  • 9 篇 中文
检索条件"任意字段=21st International Conference on Distributed Computing and Intelligent Technology"
1610 条 记 录,以下是811-820 订阅
排序:
Abnormal Events and Behavior Detection in Crowd Scenes Based on Deep Learning and Neighborhood Component Analysis Feature Selection  1st
Abnormal Events and Behavior Detection in Crowd Scenes Based...
收藏 引用
1st international conference on Artificial Intelligence and Computer Visions, AICV 2020
作者: Almazroey, Alaa Atallah Jarraya, Salma Kammoun Computer Science Department Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia MIR@CL Laboratory Sfax University Sfax Tunisia
In the last few years, surveillance cameras have been massively distributed both indoors and outdoors in public, due to security concerns creating a need to monitor unexpected actions or activities in a scene. An inte... 详细信息
来源: 评论
Privstream: Enabling privacy-preserving inferences on IoT data stream at the edge  21
PrivStream: Enabling privacy-preserving inferences on IoT da...
收藏 引用
21st IEEE international conference on High Performance computing and Communications, 17th IEEE international conference on Smart City and 5th IEEE international conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Wang, Dan Ren, Ju Xu, Chugui Liu, Juncheng Wang, Zhibo Zhang, Yaoxue Shen, Xuemin School of Computer Science and Engineering Central South University China School of Cyber Science and Engineering Wuhan University China Department of Electronic and Computer Engineering University of Waterloo Canada
Differential privacy (DP) has been recognized as a useful technique to achieve the trade-off between privacy guarantee and data utility. However, applying DP on the continuous data stream to protect sensitive inferred... 详细信息
来源: 评论
CFADefense: A security solution to detect and mitigate crossfire attacks in software-defined iot-edge infrastructure  21
CFADefense: A security solution to detect and mitigate cross...
收藏 引用
21st IEEE international conference on High Performance computing and Communications, 17th IEEE international conference on Smart City and 5th IEEE international conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Rafique, Wajid He, Xin Liu, Zifan Sun, Yuhu Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Managing the Internet of Things (IoT) infrastructure has become a critical challenge due to an enormous increase in the connected devices and the lack of available security solutions. Software-Defined Networking (SDN)... 详细信息
来源: 评论
Fast convergence average consensus-based time synchronization with innovative implementation  21
Fast convergence average consensus-based time synchronizatio...
收藏 引用
21st IEEE international conference on High Performance computing and Communications, 17th IEEE international conference on Smart City and 5th IEEE international conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Shi, Fanrong Tuo, Xianguo Ran, Lili Ren, Zhenwen Yang, Simon X. School of Information Engineering University of Science and Technology Mianyang China Sichuan University of Science and Engineering Zigong China School of Engineering University of Guelph Guelph Canada
The robust average consistency theory is ideal for building time synchronization in the dynamic and distributed networks, however it remains the major challenge due to the iteration. Existing consensus-based approache... 详细信息
来源: 评论
A skeleton pattern representation method for anomaly detection in wireless sensor networks  21
A skeleton pattern representation method for anomaly detecti...
收藏 引用
21st IEEE international conference on High Performance computing and Communications, 17th IEEE international conference on Smart City and 5th IEEE international conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Chen, Yanping Yang, Ping Gao, Cong Wang, Zhongmin Yu, Zhong School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Xi'an China School of Communications and Information Engineering Xi'an University of Posts and Telecommunications Xi'an710121 China
Anomaly detection of time series in wireless sensor networks has gained significant attention. Researchers employ representation techniques to reduce the dimensionality of time series. The Piecewise Aggregate Pattern ... 详细信息
来源: 评论
Response generation reflecting the personality of a chat dialogue system
Response generation reflecting the personality of a chat dia...
收藏 引用
international Symposium on Soft computing and intelligent Systems (SCIS)
作者: Toru Sugimoto Yusuke Temmanya Faculty of Engineering Shibaura Institute of Technology Tokyo Japan
This paper investigates the relationship between speakers' personalities and their utterances in dialogue, and propose a response generation method that reflects the personality of a chat dialogue system. We const... 详细信息
来源: 评论
Application of Mathematical Evidence to Estimate the Demand for Parking Spaces for Motorways
Application of Mathematical Evidence to Estimate the Demand ...
收藏 引用
international Scientific conference Transport of the 21st Century, ISCT21 2019
作者: stawowy, Marek Perlicki, Krzysztof Czarnecki, Tomasz Wilczewski, Grzegorz Warsaw University of Technology Warsaw Poland
This article presents the application of uncertainty modelling based on DS (Dempster and Shafer) mathematical evidence in order to estimate the factors which enable to determine the parameter defining the attractivene... 详细信息
来源: 评论
Frost Prediction for Vineyard Using Machine Learning
Frost Prediction for Vineyard Using Machine Learning
收藏 引用
international Symposium on Soft computing and intelligent Systems (SCIS)
作者: Yosuke Tamura Liya Ding Kosuke Noborio Kazuki Shibuya School of Science and Technology Meiji University Kawasaki Japan School of Agriculture Meiji University Kawasaki Japan
Frost damage in vineyard is severe. In this study, we use the concept of causal modeling proposed in our previous study to predict the frost in vineyards located in Hokkaido, Japan. It is possible to use a trained mod... 详细信息
来源: 评论
Aggregations of Subjective Probabilities Based on Logical Information Source Model and of Possibilistic CFs Using Dempster's Rule
Aggregations of Subjective Probabilities Based on Logical In...
收藏 引用
international Symposium on Soft computing and intelligent Systems (SCIS)
作者: Koichi Yamada Nagaoka University of Technology Nagaoka Niigata JAPAN
The paper reviews an aggregation of multiple possibilities for a hypothesis based on a logical information source model proposed recently, and applies the approach to a new aggregation of subjective probabilities. It ... 详细信息
来源: 评论
Automatic Detection of Beginner's Welding Joint
Automatic Detection of Beginner's Welding Joint
收藏 引用
international Symposium on Soft computing and intelligent Systems (SCIS)
作者: Shigeru Kato Takanori Hino Hironori Kumeno Tomomichi Kagawa Hajime Nobuhara Niihama College National Institute of Technology Niihama-City Ehime Japan University of Tsukuba Tsukuba-City Ibaraki Japan
This paper describes the construction of a system for the automatic evaluation of stainless steel plates welded by beginners. As a subgoal for that purpose, we constructed RCNN that automatically detects welded joints... 详细信息
来源: 评论