咨询与建议

限定检索结果

文献类型

  • 600 篇 会议
  • 18 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 632 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 436 篇 工学
    • 350 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 71 篇 信息与通信工程
    • 54 篇 电气工程
    • 32 篇 生物工程
    • 29 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 化学工程与技术
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
    • 16 篇 土木工程
    • 12 篇 机械工程
    • 10 篇 动力工程及工程热...
    • 9 篇 光学工程
    • 9 篇 冶金工程
    • 9 篇 环境科学与工程(可...
  • 142 篇 理学
    • 52 篇 物理学
    • 43 篇 数学
    • 39 篇 生物学
    • 22 篇 化学
    • 11 篇 系统科学
    • 11 篇 统计学(可授理学、...
  • 94 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 50 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 21 篇 医学
    • 17 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 11 篇 农学
  • 10 篇 教育学
    • 9 篇 教育学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 7 篇 文学
  • 6 篇 法学
  • 1 篇 哲学
  • 1 篇 军事学

主题

  • 114 篇 database systems
  • 34 篇 databases
  • 29 篇 database
  • 22 篇 data mining
  • 16 篇 database managem...
  • 12 篇 xml
  • 11 篇 information syst...
  • 10 篇 artificial intel...
  • 9 篇 query processing
  • 8 篇 information scie...
  • 8 篇 distributed data...
  • 7 篇 cameras
  • 7 篇 feature extracti...
  • 7 篇 protocols
  • 7 篇 relational datab...
  • 7 篇 ontology
  • 6 篇 computer science
  • 6 篇 scalability
  • 6 篇 throughput
  • 6 篇 big data

机构

  • 7 篇 database bioinfo...
  • 6 篇 purple mountain ...
  • 6 篇 shandong inspur ...
  • 4 篇 school of artifi...
  • 3 篇 chungbuk natl un...
  • 3 篇 china realtime d...
  • 3 篇 kribb korean bio...
  • 2 篇 college of compu...
  • 2 篇 shandong inspur ...
  • 2 篇 cisco systems in...
  • 2 篇 school of comput...
  • 2 篇 ama internationa...
  • 2 篇 univ aveiro inst...
  • 2 篇 research center ...
  • 2 篇 nari group corpo...
  • 2 篇 univ grenoble al...
  • 2 篇 shanghai key lab...
  • 2 篇 hansei univ div ...
  • 2 篇 college of life ...
  • 2 篇 nanchang yanchan...

作者

  • 10 篇 ryu keun ho
  • 7 篇 bhak jong
  • 7 篇 keun ho ryu
  • 3 篇 takagi toshihisa
  • 3 篇 hermansky hynek
  • 3 篇 xinyu gu
  • 3 篇 li haozhen
  • 3 篇 li jinbao
  • 3 篇 lehner wolfgang
  • 3 篇 tateisi yuka
  • 3 篇 boyuan zhang
  • 3 篇 kim woo-yeon
  • 3 篇 guo longjiang
  • 3 篇 gu xinyu
  • 3 篇 haozhen li
  • 3 篇 zhang boyuan
  • 3 篇 zhang hui
  • 2 篇 kim sungmin
  • 2 篇 kim hiseok
  • 2 篇 jung young jin

语言

  • 613 篇 英文
  • 15 篇 其他
  • 4 篇 中文
  • 1 篇 俄文
检索条件"任意字段=8th International Conference on Extending Database Technology"
633 条 记 录,以下是111-120 订阅
排序:
Implementation Graph database Framework for Credit Card Fraud Detection  8
Implementation Graph Database Framework for Credit Card Frau...
收藏 引用
8th international conference on Computer Science and Computational Intelligence, ICCSCI 2023
作者: Mauliddiah, Nurrahmi Suharjito Computer Science Department BINUS Online Learning Bina Nusantara University Jakarta11480 Indonesia Industrial Engineering Department BINUS Graduate Program - Master of Industrial Engineering Bina Nusantara University Jakarta11480 Indonesia
Credit card use is becoming more and more commonplace every day. Financial organizations and credit card customers lose a lot of money because of complicated illegal transactions. Fraudsters constantly stay on top of ... 详细信息
来源: 评论
Lotnet: A Low Overhead Approach for Cellular Traffic Prediction of Large-Scale Urban Area
Lotnet: A Low Overhead Approach for Cellular Traffic Predict...
收藏 引用
IEEE international conference on Network Infrastructure and Digital Content (IC-NIDC)
作者: Dongliang Li Haozhen Li Hui Zhang Boyuan Zhang Xinyu Gu Beijing University of Posts and Telecommunications Beijing China Shandong Inspur Database Technology Co. Ltd Jinan China Purple Mountain Laboratories Nanjing China
With the continuous development of mobile communication technology and the arrival of the 5G era, the demand for mobile data traffic is increasing. Accurate traffic prediction is of great significance in meeting users...
来源: 评论
Proceedings - 8th international conference on Applied Computing and Information technology, ACIT 2021
Proceedings - 8th International Conference on Applied Comput...
收藏 引用
8th international conference on Applied Computing and Information technology, ACIT 2021
the proceedings contain 24 papers. the topics discussed include: estimation of emotional scenes from lifelog videos with moving average of facial expression intensity;facial expression intensity estimation using deep ...
来源: 评论
Robust WI-FI Enabled Human Activity Recognition Via Unsupervised Adversarial Domain Adaptation
Robust WI-FI Enabled Human Activity Recognition Via Unsuperv...
收藏 引用
IEEE international conference on Network Infrastructure and Digital Content (IC-NIDC)
作者: Jiahui Chen Haozhen Li Lei Li Boyuan Zhang Xinyu Gu School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China Shandong Inspur Database Technology Co. Ltd Jinan China Purple Mountain Laboratories Nanjing China
Human action recognition using Wi - Fi signals can significantly facilitate the development of human-computer interaction applications in a wide range of applications. A key challenge of existing research is construct...
来源: 评论
Towards Robust Autonomous Vehicle Software: extending SAM for a Holistic Security Analysis
Towards Robust Autonomous Vehicle Software: Extending SAM fo...
收藏 引用
international conference on System Reliability and Science (ICSRS)
作者: Alexander Fischer Ramin Tavakoli Kolagari Faculty of Computer Science Nuremberg Institute of Technology Bavaria Germany
the Security Abstraction Model (SAM) is a meta-model that enables comprehensive security modeling and does not only consider technological aspects, but also takes into consideration the influence of social engineering... 详细信息
来源: 评论
A database File Storage Optimization Strategy Based on High-Relevance Mode Access Data Compression  8th
A Database File Storage Optimization Strategy Based on High...
收藏 引用
8th international conference on Artificial Intelligence and Security , ICAIS 2022
作者: Gao, Rui Lu, Yixuan Liu, Jian Yu, Jun Tian, Weiguo Du, Haiwen Kang, Chuanmeng Yin, Weiqi Zhu, Dongjie Shanghai J.Y-JZ Network Technology Service Co. Ltd. Shanghai200233 China School of Computer Science and Technology Harbin Institute of Technology Weihai264209 China Co. Ltd. Shanghai200065 China School of Astronautics Harbin Institute of Technology Harbin150001 China
With the improvement of social informatization and the popularization of Internet of things devices, the scale, complexity and diversity of data are currently growing rapidly, and traditional storage solutions have be... 详细信息
来源: 评论
Normalization Framework for Vulnerability Risk Management in Cloud  8
Normalization Framework for Vulnerability Risk Management in...
收藏 引用
8th international conference on Future Internet of things and Cloud, FiCloud 2021
作者: Ahmadi, Vida Arlos, Patrik Casalicchio, Emiliano Blekinge Institute of Technology City Network International AB Dept. of Computer Science Karlskrona Sweden Blekinge Institute of Technology Dept. of Computer Science Karlskrona Sweden Dept. of Computer Science Sapienza University of Rome Italy
Vulnerability Risk Management (VRM) is a critical element in cloud security that directly impacts cloud providers' security assurance levels. Today, VRM is a challenging process because the dramatic increase of kn... 详细信息
来源: 评论
Training CSI Feedback Model with Federated Learning in Massive Mimo Systems
Training CSI Feedback Model with Federated Learning in Massi...
收藏 引用
IEEE international conference on Network Infrastructure and Digital Content (IC-NIDC)
作者: Zhilin Du Haozhen Li Lei Li Boyuan Zhang Zhenyu Liu Xinyu Gu School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China Shandong Inspur Database Technology Co. Ltd Jinan China Purple Mountain Laboratories Nanjing China
the basic centralized learning method in Deep learning-based downlink channel state information (CSI) feedback requires a large dataset that needs to be collected either in advance with huge time and workforce costs o...
来源: 评论
Monitoring and Alarming Activity of Islamic Prayer (Salat) Posture Using Image Processing  8
Monitoring and Alarming Activity of Islamic Prayer (Salat) P...
收藏 引用
8th international conference on Computer and Communication Engineering, ICCCE 2021
作者: Rahman, Md Mozasser Alharazi, Rayan Abbas Ahmed Badri, Muhammad Khairul Imran B Zainal Universiti Tun Hussein Onn Malaysia Department of Mechanical Engineering Technology Muar Malaysia International Islamic University Malaysia Kulliyyah of Engineering Department of Mechatronics Kuala Malaysia
this paper introduced a Salat Inspection and Training System based on Machine Vision and Image Processing Subject. In Islam, prayer (i.e., Salat) is the second pillar of Islam. It is the most important and fundamental... 详细信息
来源: 评论
Fuzzy database and Interface to Analyze Management System Operations  21
Fuzzy Database and Interface to Analyze Management System Op...
收藏 引用
8th international conference on Applied Computing and Information technology, ACIT 2021
作者: Shiono, Yasunori Goto, Takaaki Yoshizumi, Toshihiro Tsuchida, Kensei Yokohama National University Yokohama-shi Kanagawa Japan Kaetsu University Kodaira-shi Tokyo Japan Toyo University Kawagoe-shi Saitama Japan
Management systems, such as Information Security Management Systems (ISMS) and IT Service Management Systems (ITSMS), are typically applied to the entire organization, and such systems attempt to provide continual imp... 详细信息
来源: 评论