咨询与建议

限定检索结果

文献类型

  • 671 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 592 篇 工学
    • 520 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 28 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 200 篇 理学
    • 133 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 136 篇 管理学
    • 88 篇 图书情报与档案管...
    • 55 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 690 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
694 条 记 录,以下是541-550 订阅
排序:
Analysis Cryptographic for Electronic Votes in Systems of Distributed Architectures
Analysis Cryptographic for Electronic Votes in Systems of Di...
收藏 引用
2018 3rd international conference on Computer science and Information Engineering(ICCSIE 2018)
作者: Segundo Moisés Toapanta Toapanta Nathaly Vanessa Orellana Vélez Danny Wilfrido Barona Valencia Luis Enrique Mafla Gallegos Computer Science Department Universidad Politécnica Salesiana Ecuador Faculty of Engineering Systems Escuela Politécnica Nacional
It was considered that electronic voting is revolutionary around the world because of the new technological trends that are improving over time with their security and privacy in the different voting platforms;this pr... 详细信息
来源: 评论
Physical-layer security for DF two-way full-duplex cooperative wireless networks over rayleigh fading channels  17th
Physical-layer security for DF two-way full-duplex cooperati...
收藏 引用
17th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2017, 10th conference on Internet of Things and Smart Spaces, ruSMART 2017 and 3rd international Workshop on Nano-scale computing and Communications, NsCC 2017
作者: Tanash, Islam M. Magableh, Amer M. Al-Mistarihi, Mamoun F. Electrical Engineering Department Jordan University of Science and Technology Irbid Jordan
Cooperative communication is a new method that uses multi-hop communication to send the information from source to sink. The broadcast nature of wireless signals causes the communication process to be vulnerable to wi... 详细信息
来源: 评论
Masking Signature data Errors of software-Based Control Flow Checking Techniques Employing Redundancy Signature  3rd
Masking Signature Data Errors of Software-Based Control Flow...
收藏 引用
3rd international conference on Cloud computing and Security (ICCCS)
作者: Liu, Liping Ci, Linlin Liu, Wei Beijing Inst Technol Dept Comp Beijing Peoples R China
With technology scaling, transient faults are becoming an increasing threat to hardware reliability. Commodity systems must be made resilient to these in-field faults through very low-cost resiliency solutions. Up to ... 详细信息
来源: 评论
Evaluation of full-text retrieval system using collection of Serially Evolved Documents  17
Evaluation of full-text retrieval system using collection of...
收藏 引用
3rd international conference on Industrial and Business Engineering, ICIBE 2017
作者: Cho, Hwan-Gue Kim, Yeoneo Tak, Hae-Sung Shin, Young-Ju Choi, Kwang-Nam Kim, Han-Ho Lim, Chulsu Dep. of Computer Sci. and Eng. PUSAN National Univ. Korea Republic of Programming Language Laboratory PUSAN National Univ. Korea Republic of Korea Institute of Science and Technology Information Korea Republic of
Finding a document that is similar to a specified query document within a large document database is one of important issues in the Big data era, as most data available is in the form of unstructured texts. Our testin... 详细信息
来源: 评论
Technical research on the electric power big data platform of smart grid  3
Technical research on the electric power big data platform o...
收藏 引用
3rd international conference on Mechanical, Electronic and Information Technology Engineering, ICMITE 2017
作者: Ruiguang, M.A. Haiyan, Wang Quanming, Zhang Yuan, Liang State Grid Sichuan Economic Research Institute SGSERI Chengdu China College of Management Science Chengdu University of Technology Chengdu China
Through elaborating on the associated relationship among electric power big data, cloud computing and smart grid, this paper put forward general framework of electric power big data platform based on the smart grid. T... 详细信息
来源: 评论
Unsupervised Energy Disaggregation of Home Appliances  3rd
Unsupervised Energy Disaggregation of Home Appliances
收藏 引用
3rd international conference on Cloud computing and Security (ICCCS)
作者: Kamoto, Kondwani M. Liu, Qi Liu, Xiaodong Nanjing Univ Informat Sci & Technol Jiangsu Collaborat Innovat Ctr Atmospher Environm Nanjing Jiangsu Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp & Software Jiangsu Engn Ctr Network Monitoring Nanjing Jiangsu Peoples R China Edinburgh Napier Univ Sch Comp 10 Colinton Rd Edinburgh EH10 5DT Midlothian Scotland
Energy management is a growing concern especially with the increasing growth of smart appliances within the home. Energy disaggregation is an ongoing challenge to discover the appliance usage by examining the energy o... 详细信息
来源: 评论
Simulated annealing and natural neighbor for rational Bézier surface reconstruction from scattered data points  3rd
Simulated annealing and natural neighbor for rational Bézie...
收藏 引用
Proceedings of the 3rd international conference on Harmony Search Algorithm, ICHSA 2017
作者: Loucera, Carlos Iglesias, Andrés Gálvez, Akemi University of Cantabria Avda. de los Castros s/n Santander39005 Spain Department of Information Science Faculty of Sciences Toho University 2-2-1 Miyama Funabashi274-8510 Japan Department of Applied Mathematics and Computer Science University of Cantabria Avda. de los Castros s/n Santander39005 Spain
Surface reconstruction is a very important problem in fields such as geometric modeling and processing, and CAD/CAM. Most of the methods proposed to solve this problem rely on parametric polynomial schemes. However, t... 详细信息
来源: 评论
The current state and effects of agromatic: a systematic literature review  3rd
The current state and effects of agromatic: a systematic lit...
收藏 引用
3rd international conference on Technologies and Innovation, CITI 2017
作者: Bazán-Vera, William Bermeo-Almeida, Oscar Samaniego-Cobo, Teresa Alarcon-Salvatierra, Abel Rodríguez-Méndez, Ana Bazán-Vera, Valeria Computer Science Department Faculty of Agricultural Sciences Agrarian University of Ecuador Av. 25 de Julio y Pio Jaramillo P.O. BOX 09-04-100 Guayaquil Ecuador
IT (Information Technology) has been used to solve problems from different domains. In the context of agriculture, IT is being applied for increasing the productivity as well as for empowering farmers to make decision... 详细信息
来源: 评论
A deep learning based artificial neural network approach for intrusion detection  3rd
A deep learning based artificial neural network approach for...
收藏 引用
3rd international conference on Mathematics and computing, ICMC 2017
作者: Roy, Sanjiban Sekhar Mallik, Abhinav Gulati, Rishab Obaidat, Mohammad S. Krishna, P.V. School of Computer Science and Engineering VIT University Vellore India Fordham University New York United States University of Jordan Amman Jordan Department of Computer Science Sri Padmavati Mahila Visvavidyalayam Tirupati India
Security of data is considered to be one of the most important concerns in today’s world. data is vulnerable to various types of intrusion attacks that may reduce the utility of any network or systems. Constantly cha... 详细信息
来源: 评论
Message from Program Co-Chairs
Proceedings - 2017 3rd International Conference on Big Data ...
收藏 引用
Proceedings - 2017 3rd international conference on Big data computing and Communications, BigCom 2017 2017年 xii页
作者: Chen, Lei Tang, Shaojie Zhou, Shijie Hong Kong University of Science and Technology Hong Kong University of Texas at Dallas United States University of Electronic Science and Technology of China China
来源: 评论