咨询与建议

限定检索结果

文献类型

  • 673 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 594 篇 工学
    • 522 篇 计算机科学与技术...
    • 282 篇 软件工程
    • 156 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 29 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 光学工程
    • 22 篇 化学工程与技术
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 201 篇 理学
    • 134 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 137 篇 管理学
    • 88 篇 图书情报与档案管...
    • 56 篇 管理科学与工程(可...
    • 35 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 689 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
696 条 记 录,以下是271-280 订阅
排序:
Event data analysis in large virtualized environment  3rd
Event data analysis in large virtualized environment
收藏 引用
3rd international conference on Cognitive computing and Information Processing, CCIP 2017
作者: Bharath, M.B. Ashoka, D.V. EMC Software and Services India Pvt. Ltd Bangalore India JSS Academy of Technical Education Bangalore India
Monitoring large virtualized datacenter is a daunting task. Around 3 to 3.5 million of events/alerts are received annually from 90+ customers, managed by our organization. Global command centers process these events i... 详细信息
来源: 评论
Hybrid optimization in big data: Error detection and data repairing by big data cleaning using CSO-GSA  3rd
Hybrid optimization in big data: Error detection and data re...
收藏 引用
3rd international conference on Cognitive computing and Information Processing, CCIP 2017
作者: Rama Satish, K.V. Kavya, N.P. RNS Institute of Technology Bengaluru India
data cleaning is an important process in the history of data acquisition, data storage, data management and data analytics, and is still go through rapid development. In fact, cleaning of data is considered as a very ... 详细信息
来源: 评论
Root table: Dynamic indexing scheme for access protection in e-healthcare cloud  3rd
Root table: Dynamic indexing scheme for access protection in...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Smithamol, M.B. Sridhar, Rajeswari Department of Computer Science and Engineering Anna University Chennai600025 India
The popularity and large-scale adoption of cloud computing have accelerated the development of e-healthcare systems. Outsourcing electronic health records (EHRs) demands the assurance of search privacy, given that dat... 详细信息
来源: 评论
data privacy in hadoop using anonymization and T-closeness  3rd
Data privacy in hadoop using anonymization and T-closeness
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Kaushik, Praveen Tayde, Varsha Dipak Maulana Azad National Institute of Technology Bhopal462003 India
As everyone uses internet today, modern technology generates huge amount of data every fraction of second. data gets generated from social sites, private and government organization, hospitals and educational institut... 详细信息
来源: 评论
Position error analysis of IRNSS data using big data analytics  3rd
Position error analysis of IRNSS data using big data analyti...
收藏 引用
3rd international conference on Cognitive computing and Information Processing, CCIP 2017
作者: Geetha Priya, M. Kiran Kumar, D.C. Centre for Incubation Innovation Research and Consultancy Jyothy Institute of Technology BangaloreKarnataka India
The current investigation involves the study and analysis of position error of IRNSS (Indian Regional Navigation Satellite System) receiver system data with respect to a fixed position using big data analytics tool na... 详细信息
来源: 评论
A novel clustering algorithm for leveraging data quality in wireless sensor network  3rd
A novel clustering algorithm for leveraging data quality in ...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Prathiba, B. Sankar, K. Jaya Sumalatha, V. Department of Electronics and Communication Engineering Jawaharlal Nehru Technological University Anantapur India Department of Electronics and Communication Engineering Vasavi College of Engineering Hyderabad India
Till date, the research work in Wireless Sensor Network is mainly inclined towards rectifying the problem associated with the nodes and protocol associated with it, e.g., energy problems, clustering issue, security lo... 详细信息
来源: 评论
An efficient parallel approach for mapping finite binomial series (special cases) on Bi swapped network mesh  3rd
An efficient parallel approach for mapping finite binomial s...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Gupta, Ashish Sarkar, Bikash Kanti Department of Computer Science and Engineering Birla Institute of Technology Mesra RanchiJharkhand India
The efficient parallel mapping of numerical problems (over different parallel architectures) is necessary for fast execution of massive data. In fact, it is a challenging task and significant ongoing subject of resear... 详细信息
来源: 评论
3rd international Symposium on Intelligent Systems Technologies and Applications, ISTA 2017
3rd International Symposium on Intelligent Systems Technolog...
收藏 引用
3rd international Symposium on Intelligent Systems Technologies and Applications, ISTA 2017
The proceedings contain 34 papers. The special focus in this conference is on Intelligent Systems Technologies and Applications. The topics include: Markov Chain monte carlo methods and evolutionary algorithms for aut...
来源: 评论
Quantum IDS for mitigation of DDoS attacks by mirai botnets  3rd
Quantum IDS for mitigation of DDoS attacks by mirai botnets
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Balasubramanian, Yagnesh Baggam, Durga Shankar Venkatraman, Swaminathan Ramaswamy, V. Department of Computer Science and Engineering Srinivasa Ramanujan Centre SASTRA University Kumbakonam India
The exponential growth and development of IoT has created several issues which will have to be tackled to ensure network security. Currently available intrusion detection systems not fully capable of protecting system... 详细信息
来源: 评论
Research on data forwarding algorithm based on link quality in vehicular Ad Hoc networks  3rd
Research on data forwarding algorithm based on link quality ...
收藏 引用
3rd international conference on Smart computing and Communications, SmartCom 2018
作者: Fan, Xiumei Cai, Hanyu Tian, Tian Faculty of Automation and Information Engineering Xi’an University of Technology Xi’an710048 China
Vehicular ad hoc networks (VANETs) realize remote data transmission via multi-hop communications. However, high relative vehicle mobility and frequent changes of the network topology inflict new problems on forwarding... 详细信息
来源: 评论