咨询与建议

限定检索结果

文献类型

  • 673 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 594 篇 工学
    • 522 篇 计算机科学与技术...
    • 282 篇 软件工程
    • 156 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 29 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 光学工程
    • 22 篇 化学工程与技术
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 201 篇 理学
    • 134 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 137 篇 管理学
    • 88 篇 图书情报与档案管...
    • 56 篇 管理科学与工程(可...
    • 35 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 689 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
696 条 记 录,以下是461-470 订阅
排序:
Distributed Source Encoding for Enhancement of Embedding Payload in Reversible data Hiding
Distributed Source Encoding for Enhancement of Embedding Pay...
收藏 引用
3rd international conference on computing, Communication, Control and Automation (ICCUBEA)
作者: Shilimkar, Amruta R. Shah, S. K. Smt Kashibai Navale Coll Engn Elect & Telecommun Pune Maharashtra India
Due to fast development of communication network and multimedia technology, security becomes a critical issue in information trade process over the network. Reversible data hiding is the art and science of imperceptib... 详细信息
来源: 评论
An Electric Power Sensor data Oriented data Cleaning Solution  14
An Electric Power Sensor Data Oriented Data Cleaning Solutio...
收藏 引用
14th international Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN) / 11th international conference on Frontier of Computer science and Technology (FCST) / 3rd international Symposium of Creative computing (ISCC)
作者: Liu, He Chen, Jiangqi Huang, Fupeng Li, Han Global Energy Interconnect Res Inst Adv Comp & Big Data Technol Lab SGCC Beijing Peoples R China North China Univ Technol Coll Comp Sci Beijing Key Lab Integrat & Anal Large Scale Strea Beijing Peoples R China
With the development of Smart Grid Technology, more and more electric power sensor data are utilized in various electric power systems. To guarantee the effectiveness of such systems, it is necessary to ensure the qua... 详细信息
来源: 评论
Achieving Personalized and Privacy-Preserving Range Queries over Outsourced Cloud data
Achieving Personalized and Privacy-Preserving Range Queries ...
收藏 引用
IEEE international conference on Communications (ICC) / Wireless Communications Symposium / 3rd Workshop on Optical Wireless Communications (OWC)
作者: Shen, Yao Huang, Liusheng Yang, Wei Univ Sci & Technol China Sch Comp Sci & Technol Hefei Anhui Peoples R China Univ Sci & Technol China Suzhou Inst Adv Study Suzhou Peoples R China
With the increasing prevalence of cloud computing, data owners prefer to outsource their databases to the cloud. For the protection of data privacy, sensitive data have to be encrypted before outsourcing, which introd... 详细信息
来源: 评论
Grid-based indexing and search algorithms for large-scale and high-dimensional data  14
Grid-based indexing and search algorithms for large-scale an...
收藏 引用
14th international Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN) / 11th international conference on Frontier of Computer science and Technology (FCST) / 3rd international Symposium of Creative computing (ISCC)
作者: Yang, Chuanfu Li, Zhiyang Qu, Wenyu Liu, Zhaobin Qi, Heng Dalian Maritime Univ Coll Informat Sci & Technol Dalian 116026 Peoples R China Tianjin Univ Sch Comp Software Tianjin 300000 Peoples R China Nagoya Univ Grad Sch Informat Nagoya Aichi Japan
The rapid development of Internet has resulted in massive information overloading recently. These information is usually represented by high-dimensional feature vectors in many related applications such as recognition... 详细信息
来源: 评论
A distributed multi-exemplar affinity propagation clustering algorithm based on mapreduce  3
A distributed multi-exemplar affinity propagation clustering...
收藏 引用
3rd IEEE international conference on Big data computing Service and Applications, BigdataService 2017
作者: Yang, Yu-Bo Wang, Chang-Dong Lai, Jian-Huang School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China
Clustering algorithm is one of the fundamental techniques in data mining, which plays a crucial role in various applications, such as pattern recognition, document retrieval, and computer vision. As so far, many effec... 详细信息
来源: 评论
Unsupervised Anomaly Detection Algorithm of Graph data Based on Graph Kernel  4
Unsupervised Anomaly Detection Algorithm of Graph Data Based...
收藏 引用
4th IEEE international conference on Cyber Security and Cloud computing, CSCloud 2017 and 3rd IEEE international conference of Scalable and Smart Cloud, SSC 2017
作者: Zhang, Lili Wang, Huibin Li, Chenming Shao, Yehong Ye, Qing College of Computer and Information Engineering Hohai University Nanjing China Arts and Science Ohio University Southern IrontonOH United States
Nowadays, there are a lot of graph data in many fields such as biology, medicine, social networks and so on. However, it is difficult to detect anomaly and get the useful information if we want to apply the traditiona... 详细信息
来源: 评论
Improvised dedupication with keys and chunks in HDFS storage  3
Improvised dedupication with keys and chunks in HDFS storage
收藏 引用
3rd IEEE international conference on science Technology, Engineering and Management, ICONSTEM 2017
作者: Kumar, S. Pradeep Aswini, A. Kavithadevi, M. Ramya, S. Department of Computer Science and Engineering Rajalakshmi Institute of Technology India
Cloud computing has providing unlimited storage space to store data in cloud. Service providers can increase space in cloud by incorporating with de-duplication systems. In the previous de-duplication systems, they co... 详细信息
来源: 评论
Robust Correspondence Detection by L2E Estimator for Retinal Image Registration  14
Robust Correspondence Detection by L2E Estimator for Retinal...
收藏 引用
14th international Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN) / 11th international conference on Frontier of Computer science and Technology (FCST) / 3rd international Symposium of Creative computing (ISCC)
作者: Wei, Lifang Yang, Changcai Zhou, Shucheng Chen, Riqing Pan, Lin Fujian Agr & Forestry Univ Coll Comp & Informat Sci Inst Smart Agr & Forestry & Big Data Fuzhou Fujian Peoples R China Fuzhou Univ Coll Phys & Informat Engn Fuzhou Fujian Peoples R China
Establishing reliable correspondences is often challenging for retinal image registration with poor quality and low overlap. The conventional local search methods usually find many incorrect correspondences by feature... 详细信息
来源: 评论
Distributed Resource Sharing in Fog-assisted Big data Streaming
Distributed Resource Sharing in Fog-assisted Big Data Stream...
收藏 引用
IEEE international conference on Communications (ICC) / Wireless Communications Symposium / 3rd Workshop on Optical Wireless Communications (OWC)
作者: Yin, Bo Shen, Wenlong Cheng, Yu Cai, Lin X. Li, Qing IIT Dept Elect & Comp Engn Chicago IL 60616 USA Symantec Corp Mountain View CA USA
Fog computing is a promising architectural pattern to reduce the amount of data that is transferred to the cloud for processing and analysis. In this paper, we study fog-assisted data streaming scenario in which fog n... 详细信息
来源: 评论
data Engineering and Intelligent computing: Proceedings of IC3T 2016
收藏 引用
2017年
作者: Suresh Chandra Satapathy Vikrant Bhateja K Srujan Raju B Janakiramaiah
The book is a compilation of high-quality scientific papers presented at the 3rd international conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologi...
来源: 评论