咨询与建议

限定检索结果

文献类型

  • 1,325 篇 会议
  • 27 册 图书
  • 7 篇 期刊文献

馆藏范围

  • 1,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 973 篇 工学
    • 918 篇 计算机科学与技术...
    • 635 篇 软件工程
    • 236 篇 信息与通信工程
    • 131 篇 控制科学与工程
    • 101 篇 生物工程
    • 97 篇 电气工程
    • 64 篇 安全科学与工程
    • 60 篇 动力工程及工程热...
    • 58 篇 交通运输工程
    • 58 篇 网络空间安全
    • 47 篇 机械工程
    • 47 篇 生物医学工程(可授...
    • 42 篇 仪器科学与技术
    • 29 篇 建筑学
    • 28 篇 环境科学与工程(可...
  • 354 篇 理学
    • 183 篇 数学
    • 113 篇 生物学
    • 74 篇 统计学(可授理学、...
    • 58 篇 化学
    • 41 篇 物理学
    • 31 篇 系统科学
  • 347 篇 管理学
    • 237 篇 管理科学与工程(可...
    • 213 篇 图书情报与档案管...
    • 121 篇 工商管理
  • 62 篇 法学
    • 52 篇 社会学
  • 61 篇 医学
    • 54 篇 临床医学
    • 50 篇 基础医学(可授医学...
    • 32 篇 药学(可授医学、理...
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 28 篇 教育学
    • 28 篇 教育学
  • 14 篇 农学
  • 7 篇 文学
  • 2 篇 军事学

主题

  • 256 篇 big data
  • 79 篇 artificial intel...
  • 67 篇 cloud computing
  • 63 篇 machine learning
  • 50 篇 computational mo...
  • 49 篇 deep learning
  • 42 篇 internet of thin...
  • 41 篇 data models
  • 35 篇 training
  • 27 篇 data mining
  • 25 篇 neural networks
  • 24 篇 smart cities
  • 23 篇 predictive model...
  • 23 篇 edge computing
  • 21 篇 computational in...
  • 21 篇 feature extracti...
  • 19 篇 industries
  • 18 篇 object detection
  • 17 篇 social networkin...
  • 16 篇 data privacy

机构

  • 14 篇 ajou univ dept a...
  • 13 篇 school of big da...
  • 12 篇 renmin univ chin...
  • 11 篇 beijing key lab ...
  • 9 篇 college of compu...
  • 7 篇 university of ch...
  • 7 篇 beijing universi...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 shandong fundame...
  • 5 篇 college of big d...
  • 5 篇 national enginee...
  • 5 篇 shiga university...
  • 5 篇 ajou univ dept i...
  • 5 篇 riken center for...
  • 5 篇 gaoling school o...
  • 5 篇 chongqing univ s...
  • 5 篇 college of intel...

作者

  • 13 篇 shin hyunjung
  • 10 篇 liu yong
  • 7 篇 geng xin
  • 6 篇 zhou xiaokang
  • 6 篇 dai fei
  • 6 篇 mariano vladimir...
  • 6 篇 li shaojie
  • 6 篇 wang jun
  • 5 篇 xu ning
  • 5 篇 wang xiaofei
  • 5 篇 li xiuhua
  • 5 篇 yang yang
  • 5 篇 su bing
  • 5 篇 kim myungjun
  • 5 篇 zhao wei
  • 5 篇 qi jinli
  • 5 篇 wu yanmin
  • 5 篇 jin hai
  • 5 篇 gao yanxia
  • 5 篇 liu yiwen

语言

  • 1,331 篇 英文
  • 21 篇 其他
  • 9 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=International Conference on Big Data Intelligence and Computing, DataCom 2022"
1359 条 记 录,以下是491-500 订阅
排序:
The Tele-Rehabilitaion as a Service (TRaaS) Project: Rationale, Study Design, and Methodology  19
The Tele-Rehabilitaion as a Service (TRaaS) Project: Rationa...
收藏 引用
19th IEEE international conference on e-Science, e-Science 2023
作者: Celesti, Antonio Sannino, Giovanna Bochicchio, Mario Fazio, Maria Villari, Massimo Celesti, Fabrizio Bonanno, Mirjam Calabrò, Rocco Salvatore University of Messina Department Mift Italy Naples Italy Department of Computer Science Università degli Studi di Bari Aldo Moro Bari Italy University of Siena Department of Medicine Surgery and Neuroscience Italy Ircss Centro Neurolesi 'Bonino Pulejo' Messina Italy
Tele-rehabilitation has recently emerged as an effective solution for providing assisted living, increasing clinical outcomes, positively enhancing patients' Quality of Life (QoL) and fostering their reintegration... 详细信息
来源: 评论
AIC-Bench: Workload Selection Methodology for Benchmarking AI Chips  24
AIC-Bench: Workload Selection Methodology for Benchmarking A...
收藏 引用
24th IEEE international conference on High Performance computing and Communications, 8th IEEE international conference on data Science and Systems, 20th IEEE international conference on Smart City and 8th IEEE international conference on Dependability in Sensor, Cloud and big data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Quan, Zhenyu Chen, Xiaoming Han, Yinhe Research Center for Intelligent Computing System Institute of Computing Technology Cas University of Chinese Academy of Sciences Beijing China
Artificial intelligence (AI) chips are gaining tremendous attention due to their successes in accelerating deep learning algorithms. AI chips need standard benchmarks to drive the advancements in their software and ha... 详细信息
来源: 评论
Analysis Of Cloud computing Security Threats and Countermeasures  10
Analysis Of Cloud Computing Security Threats and Countermeas...
收藏 引用
10th international conference on Reliability, Infocom Technologies and Optimization ,Trends and Future Directions, ICRITO 2022
作者: Kumari, Sushila Solanki, Kamna Dalal, Sandeep Dhankhar, Amita Rohtak India
The demand for Cloud computing (CC) is increasing at a higher growth rate because of the emerging technologies like machine learning, artificial intelligence, big data analytics, IoT, mobile supercomputing, serverless... 详细信息
来源: 评论
Design and Application of Intelligent Internet of Things Architecture Based on Digital Twin
Design and Application of Intelligent Internet of Things Arc...
收藏 引用
2022 international conference on Artificial intelligence, Information Processing and Cloud computing, AIIPCC 2022
作者: Liu, Han Li, Zhenghao Li, Xiuqiang Xu, Xia State Grid Shandong Electric Power Company Jinan250000 China State Grid Jinan Power Supply Company Jinan250000 China
Aiming at the problem of low similarity between virtual nodes and physical objects due to the weak design of virtual nodes in the current smart Internet of Things architecture design method, a smart Internet of Things... 详细信息
来源: 评论
Towards data-Driven Pediatrics in Zimbabwe  5
Towards Data-Driven Pediatrics in Zimbabwe
收藏 引用
5th international conference on Artificial intelligence, big data, computing and data Communication Systems (ICABCD)
作者: Batani, John Maharaj, Manoj Sewak Univ KwaZulu Natal Sch Management IT & Governance Durban South Africa
Efficient and effective healthcare systems utilize the available data at every level to provide evidence-based care and improve procedures and practice in order to meet the three goals of healthcare institutions - acc... 详细信息
来源: 评论
Massive data Exploration using Estimated Cardinalities
Massive Data Exploration using Estimated Cardinalities
收藏 引用
2022 IEEE international conference on Fuzzy Systems, FUZZ 2022
作者: Nerzic, Pierre Smits, Gregory Pivert, Olivier Lesot, Marie-Jeanne Université de Rennes 1 Irisa Lannion France Sorbonne Université Cnrs ParisLIP6 F-75005 France
Linguistic summaries are used in this work to provide personalized exploration functionalities on massive relational data. To ensure a fluid exploration of the data, cardinalities of the data properties described in t... 详细信息
来源: 评论
MODLSTM: A Method to Recognize DoS Attacks on Modbus/TCP
MODLSTM: A Method to Recognize DoS Attacks on Modbus/TCP
收藏 引用
IEEE international Performance, computing, and Communications conference (IPCCC)
作者: Zhang, Hao Min, Yuandong Liu, Sanya Tong, Hang Li, Yaopeng Cent China Normal Univ Fac Artificial Intelligence Educ Natl Engn Res Ctr Learning Wuhan 430079 Peoples R China Cent China Normal Univ Fac Artificial Intelligence Educ Natl Engn Lab Educ Big Data Wuhan 430079 Peoples R China
With the rapid development of technology, the scale of traffics in industrial control networks is increasing day by day. More malicious traffics brought terrible impacts on industrial areas. Modbus plays a momentous r... 详细信息
来源: 评论
Detection of DDoS Attack on Smart Home Infrastructure Using Artificial intelligence Models  12
Detection of DDoS Attack on Smart Home Infrastructure Using ...
收藏 引用
12th international conference on Cyber-Enabled Distributed computing and Knowledge Discovery (CyberC)
作者: Raja, Thejavathy Vengappa Ezziane, Zoheir He, Jun Ma, Xiaoqi Kazaure, Asmau Wali-Zubai Nottingham Trent Univ Dept Comp Sci Nottingham NG1 18NS England
The whole web world is concerned and constantly threatened by security intrusion. From the topmost corporate companies to the recently established start-ups, every company focuses on their network, system, and informa... 详细信息
来源: 评论
Amalgamation of Cloud computing with big data  7
Amalgamation of Cloud computing with big data
收藏 引用
7th international conference on Parallel, Distributed and Grid computing, PDGC 2022
作者: Gupta, Vanshit Verma, Vansh Kaur, Supreet Kaur, Inderpreet Chitkara University Chitkara University Institute of Engineering and Technology Department of Computer Science and Engineering Punjab India
As technology advances, massive amounts of data in many different formats are produced everywhere. The industries that have fueled the growth of data, including retail, media, finance, healthcare, and education, have ... 详细信息
来源: 评论
A novel real-time trajectory compression method for privacy protection  9
A novel real-time trajectory compression method for privacy ...
收藏 引用
9th IEEE international conference on data Science and Advanced Analytics (DSAA)
作者: Tao, Jiachun Chen, Liang Fang, Junhua Soochow Univ Dept CS & Tech Suzhou Peoples R China
As an essential branch of web service applications, the location-based service (LBS) plays an irreplaceable role in our daily lives. Usually, the LBS is time-sensitive, which requires the system to process trajectory ... 详细信息
来源: 评论