咨询与建议

限定检索结果

文献类型

  • 671 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 592 篇 工学
    • 520 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 28 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 200 篇 理学
    • 133 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 136 篇 管理学
    • 88 篇 图书情报与档案管...
    • 55 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 690 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
694 条 记 录,以下是301-310 订阅
排序:
A Power and Performance Aware Routing Algorithm for Fat Tree Networks  3
A Power and Performance Aware Routing Algorithm for Fat Tree...
收藏 引用
IEEE 3rd international conference on Big data Security on Cloud (BigdataSecurity) / 3rd IEEE international conference on High Performance and Smart computing (HPSC) / 2nd IEEE international conference on Intelligent data and Security (IDS)
作者: Gao, Yongqiang Yu, Lei Inner Mongolia Univ Coll Comp Sci Hohhot Peoples R China
data center energy consumption has become one of the top concerns in designing and operating large-scale data centers as cloud service providers such as Amazon, Google, IBM and Microsoft have begun to establish more d... 详细信息
来源: 评论
Objective smoking: Towards smoking detection using smartwatch sensors  3rd
Objective smoking: Towards smoking detection using smartwatc...
收藏 引用
3rd international conference on Biomedical and Health Informatics, ICBHI 2017
作者: Maramis, C. Kilintzis, V. Scholl, P. Chouvarda, I. Lab of Computing & Medical Informatics Department of Medicine Aristotle University of Thessaloniki KEDIP Building University Campus Thessaloniki Greece Embedded Systems Department of Computer Science University of Freiburg Freiburg Germany
Smoking is arguably one of the most harmful lifestyle behaviors with well-known relations to dozens of diseases. As a consequence, smoking monitoring and cessation support have been popular targets for the emerging fi... 详细信息
来源: 评论
Message from the CCIoT-2017 Symposium Chairs
Proceedings - 2017 IEEE International Conference on Internet...
收藏 引用
Proceedings - 2017 IEEE international conference on Internet of Things, IEEE Green computing and Communications, IEEE Cyber, Physical and Social computing, IEEE Smart data, iThings-GreenCom-CPSCom-Smartdata 2017 2018年 2018-January卷 1xxvi页
作者: Miao, Wang Najjari, Noushin Wang, Haozhe Zhao, Zhiwei University of Exeter United Kingdom University of Electronic Science and Technology of China China
来源: 评论
Fuzzy entropy based feature selection for website user classification in EDoS defense  3rd
Fuzzy entropy based feature selection for website user class...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Bhingarkar, Sukhada Shah, Deven MIT College of Engineering Pune Pune India Thakur College of Engineering and Technology Mumbai India
Economic Denial of Sustainability (EDoS) attack is one of the major web security attacks performed on cloud hosted websites that exploits cloud’s utility model by fraudulently consuming metered resources such as netw... 详细信息
来源: 评论
data Model Logger - data Discovery for Extract-Transform-Load  19
Data Model Logger - Data Discovery for Extract-Transform-Loa...
收藏 引用
19th IEEE international conference on High Performance computing and Communications (HPCC) / 15th IEEE international conference on Smart City (SmartCity) / 3rd IEEE international conference on data science and Systems (DSS)
作者: Madhikermi, Manik Buda, Andrea Dave, Bhargav Framling, Kary Aalto Univ Sch Sci POB 15400 FI-00076 Espoo Finland
Information Systems (ISs) are fundamental to streamline operations and support processes of any modern enterprise. Being able to perform analytics over the data managed in various enterprise ISs is becoming increasing... 详细信息
来源: 评论
Message from the GreenCom-2017 Workshop/Symposium Chairs
Proceedings - 2017 IEEE International Conference on Internet...
收藏 引用
Proceedings - 2017 IEEE international conference on Internet of Things, IEEE Green computing and Communications, IEEE Cyber, Physical and Social computing, IEEE Smart data, iThings-GreenCom-CPSCom-Smartdata 2017 2018年 2018-January卷 xxx页
作者: Yassein, Muneer Bani Yang, Shusen Huang, Haojun Jordan University of Science and Technology Jordan Xian Jiaotong University China Wuhan University China
来源: 评论
A text mining based literature analysis for learning theories and computer science education  3rd
A text mining based literature analysis for learning theorie...
收藏 引用
3rd international conference on Advanced Intelligent Systems and Informatics, AISI 2017
作者: Hodhod, Rania Fleenor, Hillary Columbus State University ColumbusGA31907 United States
Text mining has been successfully used to discover interesting patterns and extract useful information from analyzing massive text data exists on the internet, books and other text sources. Computer science education ... 详细信息
来源: 评论
Efficient Asynchronous Communication Between Virtual Machines in Embedded Systems  19
Efficient Asynchronous Communication Between Virtual Machine...
收藏 引用
19th IEEE international conference on High Performance computing and Communications (HPCC) / 15th IEEE international conference on Smart City (SmartCity) / 3rd IEEE international conference on data science and Systems (DSS)
作者: Wang, Rui Xu, Libin Bai, Yuebin Wang, Zhongzhao Yang, Hailong Zhang, Lijun Beihang Univ Sch Comp Sci & Engn Beijing Peoples R China Sci & Technol Commun Networks Lab Shijiazhuang Hebei Peoples R China
Embedded virtualization systems become increasingly important in the light of mobile computing era. Current OKL4 technology has overcome some limitations of plain virtualization by introducing microkernel approach but... 详细信息
来源: 评论
An Efficient Type-Agnostic Approach for Finding Sub-sequences in data  19
An Efficient Type-Agnostic Approach for Finding Sub-sequence...
收藏 引用
19th IEEE international conference on High Performance computing and Communications (HPCC) / 15th IEEE international conference on Smart City (SmartCity) / 3rd IEEE international conference on data science and Systems (DSS)
作者: Chapuis, Bertil Garbinato, Benoit Andritsos, Periklis Univ Lausanne Lausanne Switzerland Univ Toronto Toronto ON Canada
In this paper, we present an efficient type-agnostic approach for finding sub-sequences in data, such as text documents or GPS trajectories. Our approach relies on data deduplication for creating an inverted index. In... 详细信息
来源: 评论
Big data Model of Security Sharing Based on Blockchain  3
Big Data Model of Security Sharing Based on Blockchain
收藏 引用
3rd international conference on Big data computing and Communications (BIGCOM)
作者: Li Yue Huang Junqin Qin Shengzhi Wang Ruijin Univ Elect Sci & Technol China Chengdu Sichuan Peoples R China
The rise of big data age in the Internet has led to the explosive growth of data size. However, trust issue has become the biggest problem of big data, leading to the difficulty in data safe circulation and industry d... 详细信息
来源: 评论