咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 13 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 603 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 471 篇 工学
    • 412 篇 计算机科学与技术...
    • 218 篇 软件工程
    • 112 篇 信息与通信工程
    • 80 篇 电气工程
    • 71 篇 控制科学与工程
    • 29 篇 生物工程
    • 27 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 石油与天然气工程
    • 18 篇 安全科学与工程
    • 16 篇 电子科学与技术(可...
    • 16 篇 网络空间安全
    • 14 篇 生物医学工程(可授...
    • 13 篇 光学工程
    • 13 篇 动力工程及工程热...
    • 9 篇 力学(可授工学、理...
    • 8 篇 环境科学与工程(可...
  • 162 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 117 篇 理学
    • 77 篇 数学
    • 41 篇 统计学(可授理学、...
    • 32 篇 生物学
    • 19 篇 物理学
    • 16 篇 系统科学
  • 21 篇 法学
    • 20 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 16 篇 医学
    • 15 篇 基础医学(可授医学...
    • 14 篇 临床医学
    • 11 篇 公共卫生与预防医...
  • 7 篇 农学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 100 篇 big data
  • 27 篇 cloud computing
  • 26 篇 machine learning
  • 24 篇 artificial intel...
  • 19 篇 deep learning
  • 15 篇 conferences
  • 14 篇 computational mo...
  • 13 篇 data mining
  • 12 篇 internet of thin...
  • 11 篇 edge computing
  • 10 篇 optimization
  • 10 篇 blockchain
  • 10 篇 data models
  • 8 篇 neural networks
  • 8 篇 mapreduce
  • 8 篇 clustering algor...
  • 7 篇 semantics
  • 7 篇 training
  • 6 篇 reinforcement le...
  • 6 篇 hadoop

机构

  • 9 篇 college of compu...
  • 7 篇 anhui xinhua uni...
  • 7 篇 school of big da...
  • 7 篇 national univers...
  • 4 篇 nanjing univ pos...
  • 4 篇 jiangsu engn lab...
  • 4 篇 nanjing univ pos...
  • 4 篇 school of comput...
  • 3 篇 univ chinese aca...
  • 3 篇 beijing univ pos...
  • 3 篇 north univ china...
  • 3 篇 college of intel...
  • 3 篇 deakin universit...
  • 3 篇 nanjing univ sci...
  • 3 篇 nanjing univ inf...
  • 2 篇 univ sci & techn...
  • 2 篇 school of artifi...
  • 2 篇 people's liberat...
  • 2 篇 information and ...
  • 2 篇 shanghai univ sc...

作者

  • 9 篇 mariano vladimir...
  • 6 篇 xu xiaolong
  • 5 篇 yue dong
  • 4 篇 zhang tengfei
  • 4 篇 zhang peng
  • 4 篇 li wei
  • 4 篇 wang yong
  • 3 篇 dai fei
  • 3 篇 shang yu
  • 3 篇 hu bin
  • 3 篇 zhang rui
  • 3 篇 ren fuji
  • 3 篇 blancaflor eric
  • 3 篇 gui zhiguo
  • 3 篇 qiang zhang
  • 3 篇 wu chao
  • 3 篇 cao yong
  • 3 篇 abisado mideth
  • 3 篇 li lei
  • 3 篇 zhang ming

语言

  • 586 篇 英文
  • 11 篇 其他
  • 6 篇 中文
检索条件"任意字段=5th IEEE International Conference on Big Data Intelligence and Computing, DataCom 2019"
603 条 记 录,以下是41-50 订阅
排序:
Parameter Identification of Norton Equivalent Model from Harmonic Monitoring data  5
Parameter Identification of Norton Equivalent Model from Har...
收藏 引用
5th ieee international conference on Cloud computing and intelligence Systems (CCIS)
作者: Shao, Zhenguo Xu, Haobo Jiang, Ruobin Fuzhou Univ Coll Elect Engn & Automat Fuzhou Fujian Peoples R China
A method of identifying the operating parameters of harmonic customers based on historical monitoring data is introduced in this paper. Firstly, PCA is used to reduce the original harmonic data dimensions and determin... 详细信息
来源: 评论
Distributed Active Learning Strategies on Edge computing  6
Distributed Active Learning Strategies on Edge Computing
收藏 引用
6th ieee international conference on Cyber Security and Cloud computing (ieee CSCloud) / 5th ieee international conference on Edge computing and Scalable Cloud (ieee EdgeCom)
作者: Qian, Jia Hansen, Lars Kai Gochhayat, Sarada Prasad Tech Univ Denmark Dept Appl Math & Comp Sci Lyngby Denmark Old Dominion Univ Virginia Modeling Anal & Simulat Ctr Norfolk VA USA
Fog platform brings the computing power from the remote cloud-side closer to the edge devices to reduce latency, as the unprecedented generation of data causes ineligible latency to process the data in a centralized f... 详细信息
来源: 评论
Secure Desktop computing in the Cloud  6
Secure Desktop Computing in the Cloud
收藏 引用
6th ieee international conference on Cyber Security and Cloud computing (ieee CSCloud) / 5th ieee international conference on Edge computing and Scalable Cloud (ieee EdgeCom)
作者: Krisler, Brian Pal, Partha Bertilson, Zech thomsen, Dan Raytheon BBN Techonolgies Cambridge MA 02138 USA Raytheon BBN Technol Cambridge MA USA Raytheon BBN Technol Minneapolis MN USA SIFT LLC Minneapolis MN USA
As companies begin to transition the computation that employees perform on their desktop and the management of the desktop computing infrastructure to the cloud, the need for securing such cloud-hosted user computing ... 详细信息
来源: 评论
Research on big data Processing Model of Edge-Cloud Collaboration in Cyber-Physical Systems  5
Research on Big Data Processing Model of Edge-Cloud Collabor...
收藏 引用
5th ieee international conference on big data Analytics (ICBDA)
作者: Yue, Zhifeng Zhu, Zhixiang Wang, Chuang Du, Wenbo Xian Univ Posts & Telecommun Inst IoT & IT Based Industrializat Xian Peoples R China
With the improvement of the level of industrial intelligence, the traditional Cyber-Physical Systems (CPS) upload a large amount of data to the cloud computing center, which greatly reduces the quality of service (QoS... 详细信息
来源: 评论
ClustCrypt: Privacy-preserving clustering of unstructured big data in the cloud  21
ClustCrypt: Privacy-preserving clustering of unstructured bi...
收藏 引用
21st ieee international conference on High Performance computing and Communications, 17th ieee international conference on Smart City and 5th ieee international conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Zobaed, S.M. Ahmad, Sahan Gottumukkala, Raju Salehi, Mohsen Amini School of Computing and Informatics Informatics Research Institute University of Louisiana at Lafayette Louisiana70504 United States
Security and confidentiality of big data stored in the cloud are important concerns for many organizations to adopt cloud services. One common approach to address the concerns is client-side encryption where data is e... 详细信息
来源: 评论
Development and Verification of Multi-class data in Artificial intelligence Model Group Based on Cloud computing  5
Development and Verification of Multi-class Data in Artifici...
收藏 引用
5th ieee international conference on Artificial intelligence and big data, ICAIBD 2022
作者: Xiang, Qian Sichuan Sino-Tech College of Information Technology Chengdu China
Artificial intelligence (AI) has been widely studied. Due to the increasingly wide application of multi-class data, with the characteristics of rapid arrival, rapid change, huge quantity, and potential infinity, the o... 详细信息
来源: 评论
A regression prediction model based on incremental iteration for big industrial data  21
A regression prediction model based on incremental iteration...
收藏 引用
21st ieee international conference on High Performance computing and Communications, 17th ieee international conference on Smart City and 5th ieee international conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Yu, Yao Yi, Dajiang Tang, Zhuo Ou, Deyin Zeng, Ailing Li, Jingning Hunan University College of Information Science and Engineering Changsha China
the existence of a large number of data sets produced in the industry increases the need for algorithms that efficiently use resources such as storage space and computational efficiency. One of the challenges that mac... 详细信息
来源: 评论
Secure Multimedia data Systems in the Era of Artificial intelligence: Significant Progress and Vision for the Future  5
Secure Multimedia Data Systems in the Era of Artificial Inte...
收藏 引用
5th ieee international conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
作者: thuraisingham, Bhavani Univ Texas Dallas Richardson TX 75083 USA
Multimedia data systems manage complex data types such as text, images, audio, and video. Extensive research and development efforts in multimedia data management systems have been carried out since the1980s. Furtherm... 详细信息
来源: 评论
Industrial Cyber Intelligent Control Operating System that Hybrid with IEC 61499 and big data on Edge computing  5
Industrial Cyber Intelligent Control Operating System that H...
收藏 引用
5th ieee international conference on Artificial intelligence and big data, ICAIBD 2022
作者: Su, Weibin MacHica, Ivy Kim Xu, Gang He, Zhengfang Kong, Yanchun University of Southeastern Philippines College of Information and Computing Davao Philippines Yunnan Technology and Business University Edge Computing Network Center Kunming China Faculty of Construction Engineering Kunming Metallurgy College Kunming China
IEC 61499 and big data systems, which are also distributed architecture, but they belong to two independent and unrelated platforms due to different network and control concepts. With the development of intelligent ma... 详细信息
来源: 评论
Anomaly Detection Models for Smart Home Security  5
Anomaly Detection Models for Smart Home Security
收藏 引用
5th ieee Int Conf on big data Security on Cloud (bigdataSecurity) / 5th ieee Int Conf on High Performance and Smart computing (ieee HPSC) / 4th ieee Int Conf on Intelligent data and Security (ieee IDS)
作者: Ramapatruni, Sowmya Narayanan, Sandeep Nair Mittal, Sudip Joshi, Anupam Joshi, Karuna Univ Maryland Baltimore Cty Comp Sci & Engn Baltimore MD 21227 USA
Recent years have seen significant growth in the adoption of smart homes devices. these devices provide convenience, security, and energy efficiency to users. For example, smart security cameras can detect unauthorize... 详细信息
来源: 评论