咨询与建议

限定检索结果

文献类型

  • 51 篇 会议
  • 2 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 55 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 27 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 7 篇 机械工程
    • 7 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 3 篇 电气工程
    • 3 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 6 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 4 篇 理学
    • 3 篇 数学
    • 3 篇 生物学
    • 2 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 9 篇 cloud computing
  • 4 篇 big data
  • 4 篇 mobile communica...
  • 3 篇 protocols
  • 3 篇 virtualization
  • 2 篇 internet of thin...
  • 2 篇 reliability
  • 2 篇 deep learning
  • 2 篇 computer archite...
  • 2 篇 informatics
  • 2 篇 ontologies
  • 2 篇 quality of servi...
  • 2 篇 authentication
  • 2 篇 servers
  • 2 篇 semantics
  • 2 篇 security
  • 2 篇 pricing
  • 2 篇 emotion recognit...
  • 2 篇 business
  • 2 篇 vehicles

机构

  • 3 篇 school of comput...
  • 2 篇 national institu...
  • 2 篇 key laboratory o...
  • 2 篇 the 28th researc...
  • 2 篇 collaborative in...
  • 1 篇 guru gobind sing...
  • 1 篇 national institu...
  • 1 篇 school of electr...
  • 1 篇 beijing univ pos...
  • 1 篇 faculty of compu...
  • 1 篇 school of comput...
  • 1 篇 college of compu...
  • 1 篇 arizona state un...
  • 1 篇 faculty of compu...
  • 1 篇 shanghai shang d...
  • 1 篇 teachers college...
  • 1 篇 nyu ctr urban sc...
  • 1 篇 univ macau dept ...
  • 1 篇 hainan universit...
  • 1 篇 faculty of techn...

作者

  • 2 篇 ibrahim ghafir
  • 2 篇 zhenmin tang
  • 2 篇 manmath narayan ...
  • 2 篇 zhang kang
  • 2 篇 qiong wang
  • 2 篇 m murugappan
  • 2 篇 wende dong
  • 2 篇 sathiyanarayanan...
  • 2 篇 vaclav prenosil
  • 2 篇 xiaodong liu
  • 2 篇 yulei wu
  • 2 篇 mohammad hammoud...
  • 2 篇 banshidhar majhi
  • 2 篇 shuyin tao
  • 2 篇 pankajkumar sa
  • 1 篇 christopher yang
  • 1 篇 nie gang
  • 1 篇 hu yihong
  • 1 篇 kasia muldner
  • 1 篇 sidhu manjit sin...

语言

  • 53 篇 英文
  • 2 篇 其他
检索条件"任意字段=4th IEEE International Conference on Progress in Informatics and Computing, PIC 2016"
55 条 记 录,以下是31-40 订阅
排序:
How Meta-heuristic Algorithms Contribute to Deep Learning in the Hype of Big Data Analytics  4th
How Meta-heuristic Algorithms Contribute to Deep Learning in...
收藏 引用
4th international conference on Advanced computing, Networking and informatics (ICACNI)
作者: Fong, Simon Deb, Suash Yang, Xin-she Univ Macau Dept Comp Informat Sci Macau Peoples R China INNS India Reg Chapter 7th Floor Jorar Ranchi 834010 Jharkhand India Middlesex Univ Sch Sci & Technol London NW4 4BT England
Deep learning (DL) is one of the most emerging types of contemporary machine learning techniques that mimic the cognitive patterns of animal visual cortex to learn the new abstract features automatically by deep and h... 详细信息
来源: 评论
Mobile Edge computing: progress and Challenges
Mobile Edge Computing: Progress and Challenges
收藏 引用
ieee international conference on Mobile Cloud computing, Services, and Engineering (MobileCloud)
作者: Hongxing Li Guochu Shou Yihong Hu Zhigang Guo Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications Beijing China
Mobile Edge computing (MEC) provides mobile and cloud computing capabilities within the access network, and aims to unite the telco and IT at the mobile network edge. this paper presents an investigation on the progre... 详细信息
来源: 评论
Social Engineering Attack Strategies and Defence Approaches
Social Engineering Attack Strategies and Defence Approaches
收藏 引用
international conference on Future Internet of things and Cloud (FiCloud)
作者: Ibrahim Ghafir Vaclav Prenosil Ahmad Alhejailan Mohammad Hammoudeh FI Masaryk University School of Computing Manchester Metropolitan University Faculty of Informatics School of Computing Manchester School of Computing Manchester Masaryk University Brno Czech Republic Faculty of Informatics School of Computing Manchester School of Computing Manchester Metropolitan University Manchester UK
this paper examines the role and value of information security awareness efforts in defending against social engineering attacks. It categories the different social engineering threats and tactics used in targeting em... 详细信息
来源: 评论
An adaptive information-theoretic approach for identifying temporal correlations in big data sets  4
An adaptive information-theoretic approach for identifying t...
收藏 引用
4th ieee international conference on Big Data, Big Data 2016
作者: Ho, Nguyen Vo, Huy Vu, Mai Dipartimento di Elettronica Informazione e Bioingegneria Politécnico di Milano Milan Italy Center for Urban Science and Progress New York University New York United States Department of Computer Science City College of New York New York United States Department of Electrical and Computer Engineering Tufts University MedfordMA United States
In the past two decades, new developments in computing, sensing and crowdsourced data have resulted in an explosion in the availability of quantitative information. the possibilities of analyzing this so-called 'b... 详细信息
来源: 评论
Modeling and analysis of complex computer systems-the MTCCS approach
Modeling and analysis of complex computer systems-the MTCCS ...
收藏 引用
ieee international conference on Engineering of Complex Computer Systems
作者: H. Toetenel R.L. Spelberg S. Stuurman J. van Katwijk Faculty of Technical Mathematics and Informatics Delft University of Technnology Delft Netherlands
the paper presents results from work in progress on finding a method for formal specification and verification of real time concurrent systems that incorporate a non trivial data component. We have extended Timed CCS,... 详细信息
来源: 评论
the education of leaders in the face of 4th digital revolution  11
The education of leaders in the face of 4th digital revoluti...
收藏 引用
11th international Multi-conference on Complexity, informatics and Cybernetics, IMCIC 2020
作者: Dobrowolska, Malgorzata Deja, Agnieszka Silesian University of Technology International Center for Interdisciplinary Research Gliwice44-100 Poland
the fourth digital revolution forces modern education ofpersonnel and leaders responsible for introduction of newtechnologies 4.0. the article presents a new vision of educationof engineers responsible for technologie... 详细信息
来源: 评论
Notice of Violation of ieee Publication Principles: A Music Identification System Based on Audio Fingerprint
Notice of Violation of IEEE Publication Principles: A Music ...
收藏 引用
international conference on Applied computing and Information Technology/international conference on Computational Science and Intelligence (ACIT-CSI)
作者: Yong Fan Shuang Feng School of Computer Communication University of China Beijing China
Notice of Violation of ieee Publication Principles "A Music Identification System Based On Audio Fingerprint" by Yong Fan, Shuang Feng in the 4th international conference on Applied computing and Information...
来源: 评论
An Analysis of Scientific Production in Big Data Knowledge Domain on Google Books, YouTube and ieee Explore® Digital Library  20
An Analysis of Scientific Production in Big Data Knowledge D...
收藏 引用
4th international conference on Cloud and Big Data computing, ICCBDC 2020
作者: Gotsev, Lyubomir Shoikova, Elena University of Library Studies and Information Technologies Tsarigradsko Shose Blvd 119 Tsarigradsko Shose Blvd. Sofia1784 Bulgaria
the paper aims to reveal the current state of book, video and article production in Big Data Knowledge Domain on particular platforms by examining the capabilities of Application Programming Interface (API) technology... 详细信息
来源: 评论
An Adaptive Information-theoretic Approach for Identifying Temporal Correlations in Big Data Sets
An Adaptive Information-Theoretic Approach for Identifying T...
收藏 引用
4th ieee international conference on Big Data (Big Data)
作者: Nguyen Ho Huy Vo Mai Vu Politecn Milan Dipartimento Elettron Informaz & Bioingn Milan Italy NYU Ctr Urban Sci & Progress New York NY USA CUNY City Coll Dept Comp Sci New York NY USA Tufts Univ Dept Elect & Comp Engn Medford MA 02155 USA
In the past two decades, new developments in computing, sensing and crowdsourced data have resulted in an explosion in the availability of quantitative information. the possibilities of analyzing this so-called "... 详细信息
来源: 评论
A Survey on Network Security Monitoring Systems
A Survey on Network Security Monitoring Systems
收藏 引用
ieee international conference on Future Internet of things and Cloud Workshops (FiCloudW)
作者: Ibrahim Ghafir Vaclav Prenosil Jakub Svoboda Mohammad Hammoudeh FI Manchester Metropolitan University Faculty of Informatics Masaryk University Brno Czech Republic School of Computing Manchester Metropolitan University Manchester UK
Network monitoring is a difficult and demanding task that is a vital part of a network administrator's job. Network administrators are constantly striving to maintain smooth operation of their networks. If a netwo... 详细信息
来源: 评论