咨询与建议

限定检索结果

文献类型

  • 671 篇 会议
  • 16 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 592 篇 工学
    • 520 篇 计算机科学与技术...
    • 281 篇 软件工程
    • 155 篇 信息与通信工程
    • 117 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 生物工程
    • 28 篇 控制科学与工程
    • 24 篇 动力工程及工程热...
    • 22 篇 化学工程与技术
    • 21 篇 光学工程
    • 21 篇 环境科学与工程(可...
    • 20 篇 电子科学与技术(可...
    • 18 篇 材料科学与工程(可...
    • 15 篇 机械工程
    • 12 篇 安全科学与工程
    • 11 篇 建筑学
  • 200 篇 理学
    • 133 篇 数学
    • 52 篇 统计学(可授理学、...
    • 46 篇 生物学
    • 34 篇 物理学
    • 30 篇 系统科学
    • 22 篇 化学
  • 136 篇 管理学
    • 88 篇 图书情报与档案管...
    • 55 篇 管理科学与工程(可...
    • 34 篇 工商管理
  • 33 篇 医学
    • 32 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 20 篇 法学
    • 15 篇 社会学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 9 篇 教育学
  • 7 篇 农学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 39 篇 big data
  • 34 篇 data mining
  • 27 篇 cloud computing
  • 14 篇 data models
  • 13 篇 internet of thin...
  • 13 篇 soft sensors
  • 12 篇 mapreduce
  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 predictive model...
  • 9 篇 forecasting
  • 8 篇 soft computing
  • 8 篇 accuracy
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 privacy
  • 6 篇 data security
  • 6 篇 optimization
  • 6 篇 data analytics
  • 6 篇 computational mo...

机构

  • 5 篇 taiyuan univ tec...
  • 5 篇 beihang univ sch...
  • 4 篇 univ chinese aca...
  • 4 篇 cairo
  • 4 篇 school of data a...
  • 4 篇 nanjing univ inf...
  • 3 篇 beijing univ pos...
  • 3 篇 department of in...
  • 3 篇 university of el...
  • 3 篇 business develop...
  • 3 篇 chongqing univ p...
  • 3 篇 sun yat sen univ...
  • 3 篇 chongqing univ p...
  • 3 篇 henan univ sch c...
  • 3 篇 department of co...
  • 3 篇 edinburgh napier...
  • 3 篇 south china univ...
  • 3 篇 school of comput...
  • 2 篇 school of inform...
  • 2 篇 department of co...

作者

  • 4 篇 guo shuai
  • 3 篇 kirichek ruslan
  • 3 篇 zaslavsky arkady
  • 3 篇 wang ping
  • 3 篇 hassanien aboul ...
  • 3 篇 huang haihui
  • 3 篇 gao yuxiang
  • 3 篇 liu qi
  • 3 篇 vikrant bhateja
  • 3 篇 suresh chandra s...
  • 3 篇 fuyong ge
  • 3 篇 ziyi su
  • 3 篇 liu xiaodong
  • 3 篇 misra sanjay
  • 3 篇 gai keke
  • 3 篇 qiu meikang
  • 3 篇 bera tushar kant...
  • 3 篇 liu tao
  • 3 篇 nagaraju j.
  • 3 篇 zhou jiehan

语言

  • 690 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=3rd International Conference on Soft Computing in Data Science, SCDS 2017"
694 条 记 录,以下是561-570 订阅
排序:
Steganalysis with CNN Using Multi-channels Filtered Residuals  3rd
Steganalysis with CNN Using Multi-channels Filtered Residual...
收藏 引用
3rd international conference on Cloud computing and Security (ICCCS)
作者: Yuan, Yafei Lu, Wei Feng, Bingwen Weng, Jian Sun Yat Sen Univ Sch Data & Comp Sci Guangzhou 510006 Guangdong Peoples R China Jinan Univ Coll Informat Sci & Technol Guangzhou 510632 Guangdong Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China
In the current study of steganalysis, Convolutional Neural Network (CNN) have attracted many scholars' attention. Recently, some effective CNN architectures have been proposed with better results than traditional ... 详细信息
来源: 评论
Spatiotemporal Radio Tomographic Imaging with Bayesian Compressive Sensing for RSS-Based Indoor Target Localization  3rd
Spatiotemporal Radio Tomographic Imaging with Bayesian Compr...
收藏 引用
3rd international conference on Cloud computing and Security (ICCCS)
作者: Shang, Baolin Tan, Jiaju Hong, Xiaobing Guo, Xuemei Wang, Guoli Liu, Gonggui Xue, Shouren Sun Yat Sen Univ Sch Data & Comp Sci Key Lab Machine Intelligence & Adv Comp Minist Educ Guangzhou Guangdong Peoples R China Nankai Univ Tianjin Key Lab Intelligent Robot Inst Robot & Automat Informat Syst Tianjin Peoples R China Vkan Certificat & Testing Co Ltd Guangzhou Guangdong Peoples R China
Wireless sensor network based device-free localization (DFL) is now widely used in security and monitoring systems for indoor and outdoor areas. Multipath fading induced noises often degrade the performance of the DFL... 详细信息
来源: 评论
Scalable automated analysis of access control and privacy policies  3rd
Scalable automated analysis of access control and privacy po...
收藏 引用
3rd international conference on Future data and Security Engineering, FDSE 2016 and the 10th international conference on Advanced computing and Applications, ACOMP 2016
作者: Truong, Anh Ranise, Silvio Nguyen, Thanh Tung Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh City Viet Nam Security and Trust Unit FBK-Irst Trento Italy
Access Control is becoming increasingly important for today ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a co... 详细信息
来源: 评论
Improved STDM Watermarking Using Semantic Information-Based JND Model  3rd
Improved STDM Watermarking Using Semantic Information-Based ...
收藏 引用
3rd international conference on Cloud computing and Security (ICCCS)
作者: Wang, Chunxing Zhang, Teng Wan, Wenbo Sun, Jiande Li, Jing Xu, Meiling Shandong Normal Univ Sch Phys & Elect Jinan 250014 Shandong Peoples R China Shandong Normal Univ Sch Informat Sci & Engn Jinan 250014 Shandong Peoples R China Shandong Normal Univ Inst Data Sci & Technol Jinan 250014 Shandong Peoples R China Shandong Management Univ Sch Mech & Elect Engn Jinan 250100 Shandong Peoples R China
The perceptual just noticeable distortion (JND) model has attracted increasing attention in the field of the quantization-based watermarking framework. The JND model can provide a superior trade-off between robustness... 详细信息
来源: 评论
An Android App Recommendation Approach by Merging Network Traffic Cost  3rd
An Android App Recommendation Approach by Merging Network Tr...
收藏 引用
3rd international conference on Cloud computing and Security (ICCCS)
作者: Su, Xin Liu, Xuchong Lin, Jiuchuan Tong, Yu Hunan Police Acad Hunan Prov Key Lab Network Invest Technol Changsha Hunan Peoples R China Hunan Police Acad Key Lab Network Crime Invest Hunan Prov Coll Changsha Hunan Peoples R China Hunan Police Acad Dept Informat Technol Changsha Hunan Peoples R China Minist Publ Secur Res Inst 3 Key Lab Informat Network Secur Shanghai Peoples R China
A large amount and different types of mobile applications are being offered to end users via app markets. Existing mobile app markets generally recommend the most popular mobile apps to mobile users for purpose of fac... 详细信息
来源: 评论
One-class collective anomaly detection based on LSTM-RNNs  3rd
One-class collective anomaly detection based on LSTM-RNNs
收藏 引用
3rd international conference on Future data and Security Engineering, FDSE 2016 and the 10th international conference on Advanced computing and Applications, ACOMP 2016
作者: Nguyen Thi, Nga Cao, Van Loi Le-Khac, Nhien-An Institute of Electronic Institute of Military Science and Technology Hanoi Viet Nam University College Dublin Dublin Ireland
Intrusion detection for computer network systems has been becoming one of the most critical tasks for network administrators today. It has an important role for organizations, governments and our society due to the va... 详细信息
来源: 评论
Plenary Panel: Convergence of High-Performance computing and Communication, Smart City, and data sciences and Systems: Fields Helping Grand Challenges and Each Other
Plenary Panel: Convergence of High-Performance Computing and...
收藏 引用
IEEE international conference on High Performance computing and Communications (HPCC)
Summary form only given. The complete presentation was not made available for publication as part of the conference proceedings. The plenary panel “Convergence of High-Performance computing and Communication, Smart C... 详细信息
来源: 评论
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems  3rd
Workload-Aware Page-Level Flash Translation Layer for NAND F...
收藏 引用
3rd international conference on Cloud computing and Security (ICCCS)
作者: Wang, Huibing Lin, Mingwei Xiong, Jinbo Lin, Li Xiao, Ruliang Fujian Normal Univ Coll Math & Informat Fuzhou 350108 Fujian Peoples R China Fujian Engn Res Ctr Publ Serv Big Data Min & Appl Fuzhou 350108 Fujian Peoples R China
Demand-based flash translation layer is an efficient page-level flash translation layer, which can effectively reduce the RAM (Random Access Memory) footprint of NAND flash-based storage systems. However, this demand-... 详细信息
来源: 评论
Preface
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and computing 2018年 700卷 v-vi页
作者: Ghazali, Rozaida Deris, Mustafa Mat Nawi, Nazri Mohd Abawajy, Jemal H. Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Batu Pahat Johor Malaysia School of Information Technology Deakin University GeelongVIC Australia
来源: 评论
Message from General Co-Chairs
Proceedings - 2017 3rd International Conference on Big Data ...
收藏 引用
Proceedings - 2017 3rd international conference on Big data computing and Communications, BigCom 2017 2017年 xi页
作者: Qin, Zhiguang Cheng, Xiuzhen Hou, Mengshu George Washington University United States University of Electronic Science and Technology of China China
来源: 评论