咨询与建议

限定检索结果

文献类型

  • 673 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 594 篇 工学
    • 522 篇 计算机科学与技术...
    • 282 篇 软件工程
    • 156 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 29 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 光学工程
    • 22 篇 化学工程与技术
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 201 篇 理学
    • 134 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 137 篇 管理学
    • 88 篇 图书情报与档案管...
    • 56 篇 管理科学与工程(可...
    • 35 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 689 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
696 条 记 录,以下是381-390 订阅
排序:
Exploring Diversified Incentive Strategies for Long-term Participatory Sensing data Collections  3
Exploring Diversified Incentive Strategies for Long-term Par...
收藏 引用
3rd international conference on Big data computing and Communications (BIGCOM)
作者: Ji, Xinna Zhao, Dong Yang, Hao Liu, Liang Beijing Univ Posts & Telecommun Beijing Key Lab Intelligent Telecommun Software & Beijing Peoples R China
The popularity of smartphones provides a new data collection paradigm, participatory sensing, which extends existing web-based crowdsourcing applications to pervasively collect sensing data around the physical world. ... 详细信息
来源: 评论
Efficient bottom-up Mining of Attribute Based Access Control Policies  3
Efficient bottom-up Mining of Attribute Based Access Control...
收藏 引用
3rd IEEE international conference on Collaboration and Internet computing (CIC)
作者: Talukdar, Tanay Batra, Gunjan Vaidya, Jaideep Atluri, Vijayalakshmi Sural, Shamik Rutgers Business Sch MSIS Dept Newark NJ 08854 USA IIT Kharagpur Dept Comp Sci & Engn Kharagpur W Bengal India
Attribute Based Access Control (ABAC) is fast replacing traditional access control models due to its dynamic nature, flexibility and scalability. ABAC is often used in collaborative environments. However, a major hurd... 详细信息
来源: 评论
data exchange protocol in self-organizing computing environments  3
Data exchange protocol in self-organizing computing environm...
收藏 引用
3rd international conference on Information Technology and Nanotechnology (ITNT)
作者: Filimonov, D. V. Timofeeva, S. V. Sukhov, A. M. Samara Natl Res Univ 34 Moskovskoe Shosse Samara 443086 Russia
The paper describes the development of a data exchange protocol for self-organizing computing environments with minimal delay. This protocol is designed for networks of mobile devices based on the neighborhoods method... 详细信息
来源: 评论
SEESH: Sleep-awake energy efficient super heterogeneous routing protocol for Wireless Sensor Networks  3
SEESH: Sleep-awake energy efficient super heterogeneous rout...
收藏 引用
3rd international conference on Advances in computing, Communication and Automation (Fall), ICACCA 2017
作者: Singh, Vikas Thakkar, V.M. Goswami, Vasudev Computer Science and Engineering GBPEC Pauri Ghurdauri India
Wireless Sensor Networks are extensively using the idea of heterogeneity to increase the throughput, network lifetime, and stability. Many routing algorithms on the idea of heterogeneity are proposed that mainly focus... 详细信息
来源: 评论
An approach to handel nondeterminism in fuzzy time series forecasting by hesitant fuzzy sets  3
An approach to handel nondeterminism in fuzzy time series fo...
收藏 引用
3rd international conference on Advances in computing, Communication and Automation (Fall), ICACCA 2017
作者: Bisht, Kamlesh Dhyani, Makrand Kumar, Sanjay Department of Mathematics Statistics and Computer Science G. B. Pant University of Agriculture and Technology Pantnagar Uttarakhand263145 India
In this present study, we have addressed the issue of hesitancy in fuzzy set based forecasting method that occurs due to the availability of several fuzzification method of time series data and propose integrated fuzz... 详细信息
来源: 评论
Performance analysis of intrusion detection systems in the cloud computing  3
Performance analysis of intrusion detection systems in the c...
收藏 引用
3rd international conference of Cloud computing Technologies and Applications, CloudTech 2017
作者: Derfouf, Mostapha Eleuldj, Mohsine Department of Computer Science Mohammadia School of Engineers MOHAMMED v UNIVERSITY in Rabat Morocco
Cloud computing is a paradigm that provides access to compute infrastructure on demand by allowing a user to use a big number of virtual machines (VMs) to solve a given computational problem. Before implementing new a... 详细信息
来源: 评论
Experience of using the WELCOME remote monitoring system on patients with COPD and comorbidities  3rd
Experience of using the WELCOME remote monitoring system on ...
收藏 引用
3rd international conference on Biomedical and Health Informatics, ICBHI 2017
作者: Kaimakamis, E. Perantoni, E. Serasli, E. Kilintzis, V. Chouvarda, I. Kayyali, R. Nabhani-Gebara, S. Chang, J. Siva, R. Hibbert, R. Philips, N. Karamitros, D. Raptopoulos, A. Frerichs, I. Wacker, J. Maglaveras, N. Lab of Computing Medical Informatics and Biomedical Imaging Technologies School of Medicine Aristotle University of Thessaloniki Ag. Dimitriou street Thessaloniki Greece Pulmonary Department General Hospital "G. Papanikolaou" Thessaloniki Greece Faculty of Science Engineering and Computing Kingston University Kingston-upon-Thames United Kingdom Chest Clinic and Research and Development Croydon University Hospital Croydon United Kingdom EXUS Company Athens Greece Department of Anesthesiology and Intensive Care Medicine University Medical Centre Schleswig-Holstein Kiel Germany CSEM Company Neuchatel Switzerland
The WELCOME system is an innovative telemonitoring system designed to provide constant monitoring of COPD patients also suffering from other major comorbidities. It consists of a sensors vest capable of recording vari... 详细信息
来源: 评论
An Evaluation Method of data Valuation Based on Analytic Hierarchy Process  14
An Evaluation Method of Data Valuation Based on Analytic Hie...
收藏 引用
14th international Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN) / 11th international conference on Frontier of Computer science and Technology (FCST) / 3rd international Symposium of Creative computing (ISCC)
作者: Qiu, Shaoming Du, Xiuli Zhang, Dong Dalian Univ Coll Informat Engn Dalian Peoples R China
In the data migration study, in order to make migration efficient, accurately measuring the value of data is useful. Aiming at the problem that the existing data value measure method can not describe the true value of... 详细信息
来源: 评论
A privacy preservation scheme in cloud environment  3
A privacy preservation scheme in cloud environment
收藏 引用
3rd IEEE international conference on Advances in Electrical and Electronics, Information, Communication and Bio-Informatics, AEEICB 2017
作者: Agarkhed, Jayashree Ashalatha, R. Department of Computer Science Poojya Doddappa Appa College of Engineering Kalaburagi Karnataka India
Cloud computing is named as virtual computing in information technology which makes use of virtual data centers and also needs ultimate privacy protection. The cloud computing features aims at providing security and c... 详细信息
来源: 评论
Fault Detection and Diagnosis of Analog Circuit Using soft computing Technique
Fault Detection and Diagnosis of Analog Circuit Using Soft C...
收藏 引用
3rd international conference on computing, Communication, Control and Automation (ICCUBEA)
作者: Mandaogade, Nitin N. Ingole, Prashant V. Thakare, Sneha GHRCEM Dept EXTC Amravati Maharashtra India PRMITR IT Dept Amravati Maharashtra India
Circuit fault diagnosis is an important area for electronic manufacturing industries. For critical applications, it is desired to design & develop the system that will detect the fault appearing condition by analy... 详细信息
来源: 评论