咨询与建议

限定检索结果

文献类型

  • 671 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 592 篇 工学
    • 520 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 28 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 200 篇 理学
    • 133 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 136 篇 管理学
    • 88 篇 图书情报与档案管...
    • 55 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 690 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
694 条 记 录,以下是341-350 订阅
排序:
Periodic Scheduling of Profiling-Based Floating-Window Bandwidth Reservations for Scientific Collaboration  19
Periodic Scheduling of Profiling-Based Floating-Window Bandw...
收藏 引用
19th IEEE international conference on High Performance computing and Communications (HPCC) / 15th IEEE international conference on Smart City (SmartCity) / 3rd IEEE international conference on data science and Systems (DSS)
作者: Wang, Yongqiang Wu, Chase Q. Hou, Aiqin Northwest Univ Sch Informat Sci & Technol Xian 710127 Shaanxi Peoples R China New Jersey Inst Technol Dept Comp Sci Newark NJ 07102 USA
An increasing number of scientific applications carry out big data transfer through dedicated networks for global collaboration, where bandwidth scheduling plays a critical role in improving the utilization of network... 详细信息
来源: 评论
Prediction of new bioactive molecules of chemical compound using boosting ensemble methods  3rd
收藏 引用
3rd international conference on soft computing in data science, scds 2017
作者: Hashim, Haslinda Saeed, Faisal Kolej Yayasan Pelajaran Johor KM16 Jalan Kulai-Kota Tinggi Kota TinggiJohor81900 Malaysia Information Systems Department Faculty of Computing Universiti Teknologi Malaysia SkudaiJohor81310 Malaysia College of Computer Science and Engineering University of Taibah Medina Saudi Arabia
Virtual screening (VS) methods can be categorized into structure-based virtual screening (SBVS) that involves knowledge about the target’s 3D structure and ligand-based virtual screening (LBVS) approaches that utiliz... 详细信息
来源: 评论
Protection policy in networked locations using machine learning and data science approach  3
Protection policy in networked locations using machine learn...
收藏 引用
3rd international conference on Applied and Theoretical computing and Communication Technology, iCATccT 2017
作者: Reddy, S. Sai Satyanarayana Shahabadkar, Ramesh Mamatha, Ch. Chatterjee, Priyadarshini Vardhaman College of Engineering Kacharam Shamshabad Hyderabad Telangana501 218 India
A protection policy employs diverse techniques and mechanisms to sense protection related glitches and coercions in a networked location. The protection policy is big-data focused and services machine learning techniq... 详细信息
来源: 评论
A Taxi Gap Prediction Method via Double Ensemble Gradient Boosting Decision Tree  3
A Taxi Gap Prediction Method via Double Ensemble Gradient Bo...
收藏 引用
IEEE 3rd international conference on Big data Security on Cloud (BigdataSecurity) / 3rd IEEE international conference on High Performance and Smart computing (HPSC) / 2nd IEEE international conference on Intelligent data and Security (IDS)
作者: Zhang, Xiao Wang, Xiaorong Chen, Wei Tao, Jie Huang, Weijing Wang, Tengjiao Peking Univ Sch EECS Key Lab High Confidence Software Technol MOE Beijing 100871 Peoples R China China Elect Power Res Inst Technol & Strategy Res Ctr Beijing 100192 Peoples R China
Predicting the gap between taxi demand and supply in taxi booking apps is completely new and important but challenging. However, manually mining gap rule for different conditions may become impractical because of mass... 详细信息
来源: 评论
N2DLOF: A New Local Density-Based Outlier Detection Approach for Scattered data  19
N2DLOF: A New Local Density-Based Outlier Detection Approach...
收藏 引用
19th IEEE international conference on High Performance computing and Communications (HPCC) / 15th IEEE international conference on Smart City (SmartCity) / 3rd IEEE international conference on data science and Systems (DSS)
作者: Su, Shubin Xiao, Limin Zhang, Zhoujie Gu, Fei Ruan, Li Li, Shupan He, Zhenxue Huo, Zhisheng Yan, Baicheng Wang, Haitao Liu, Shaobo Beihang Univ State Key Lab Software Dev Environm Beijing 100191 Peoples R China Beihang Univ Sch Comp Sci & Engn Beijing 100191 Peoples R China Space Star Technol Co Ltd Beijing 100086 Peoples R China
Since the Local Outlier Factor (LOF) was first proposed, there is a large family of approaches that is derived from it. For the reason that the existing local outliers detection approaches only focus on the extent of ... 详细信息
来源: 评论
Fast and efficient data acquisition in radiation affected large WSN by predicting transfaulty nodes  3rd
Fast and efficient data acquisition in radiation affected la...
收藏 引用
3rd international conference on Next Generation computing Technologies, NGCT 2017
作者: Pandey, Manish Dhanoriya, Sachin Bhagat, Amit Maulana Azad National Institute of Technology Bhopal462003 India
Wireless Sensor Network is a collection of spatially distributed sensor nodes/motes those are connected wirelessly to form network topology. However, despite their great usefulness they are also vulnerable to misbehav... 详细信息
来源: 评论
A Blockchain-based Process Provenance for Cloud Forensics  3
A Blockchain-based Process Provenance for Cloud Forensics
收藏 引用
3rd IEEE international conference on Computer and Communications (ICCC)
作者: Zhang, Yong Wu, Songyang Jin, Bo Du, Jiaying Minist Publ Secur Res Inst 3 Shanghai 201204 Peoples R China
Because of the distributed nature of cloud computing, the data of cloud may be stored and processed across jurisdictional borders. In such case, collecting digital evidence from cloud computing requires multiparty coo... 详细信息
来源: 评论
Secured data transmission using improvised Arnold Cat map in WSN  3
Secured data transmission using improvised Arnold Cat map in...
收藏 引用
3rd international conference on Advances in computing, Communication and Automation (Fall), ICACCA 2017
作者: Istwal, Yasha Verma, Shashi Kant Computer Science and Engg. GBPEC Pauri Garhwal246194 India
This paper is based on secured transmission of data using modified Arnold Cat map using 802.11a/g in WSN. For secure transmission of data, information is transformed in the coded form using data encoded method. Becaus... 详细信息
来源: 评论
Cluster-based Best Match Scanning for Large-Scale Missing data Imputation  3
Cluster-based Best Match Scanning for Large-Scale Missing Da...
收藏 引用
3rd international conference on Big data computing and Communications (BIGCOM)
作者: Yu, Weiqing Zhu, Wendong Liu, Guangyi Kan, Bowen Zhao, Ting Liu, He GEIRI North Amer San Jose CA 95134 USA GEIRI Beijing Peoples R China
High-quality data are the prerequisite for analyzing and using big data to guarantee the value of the data. Missing values in data is a common yet challenging problem in data analytics and data mining, especially in t... 详细信息
来源: 评论
Pattern recognition of balinese carving motif using learning vector quantization (LVQ)  3rd
收藏 引用
3rd international conference on soft computing in data science, scds 2017
作者: Mahawan, I. Made Avendias Harjoko, Agus Department of Computer Science and Electronics University of Gadjah Mada Yogyakarta Indonesia
Bali is a world tourism destination with its cultural uniqueness, one of the Balinese cultural products that need to be maintained is the art of Balinese carvings in traditional buildings and sacred buildings, to inhe... 详细信息
来源: 评论