咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 18 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,879 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 850 篇 计算机科学与技术...
    • 610 篇 软件工程
    • 225 篇 机械工程
    • 196 篇 控制科学与工程
    • 189 篇 信息与通信工程
    • 121 篇 仪器科学与技术
    • 82 篇 电子科学与技术(可...
    • 70 篇 电气工程
    • 63 篇 生物工程
    • 53 篇 生物医学工程(可授...
    • 49 篇 网络空间安全
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 27 篇 化学工程与技术
    • 24 篇 交通运输工程
    • 23 篇 光学工程
  • 411 篇 管理学
    • 321 篇 管理科学与工程(可...
    • 99 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 330 篇 理学
    • 196 篇 数学
    • 70 篇 生物学
    • 48 篇 系统科学
    • 46 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 25 篇 化学
  • 64 篇 医学
    • 50 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 44 篇 经济学
    • 44 篇 应用经济学
  • 30 篇 教育学
    • 25 篇 教育学
  • 27 篇 法学
    • 25 篇 社会学
  • 14 篇 艺术学
  • 13 篇 文学
  • 7 篇 农学
  • 5 篇 军事学
  • 1 篇 哲学

主题

  • 96 篇 informatics
  • 77 篇 cloud computing
  • 62 篇 computational mo...
  • 40 篇 feature extracti...
  • 34 篇 conferences
  • 32 篇 data mining
  • 27 篇 semantics
  • 27 篇 data models
  • 26 篇 computer archite...
  • 25 篇 peer to peer com...
  • 25 篇 accuracy
  • 24 篇 wireless sensor ...
  • 22 篇 monitoring
  • 22 篇 visualization
  • 22 篇 mobile computing
  • 22 篇 ubiquitous compu...
  • 21 篇 humans
  • 21 篇 software
  • 21 篇 training
  • 20 篇 context

机构

  • 25 篇 school of comput...
  • 12 篇 department of co...
  • 10 篇 3-30-1 wajiro-hi...
  • 9 篇 national institu...
  • 9 篇 school of inform...
  • 9 篇 school of softwa...
  • 7 篇 school of inform...
  • 7 篇 ieee beijing sec...
  • 7 篇 school of comput...
  • 7 篇 school of inform...
  • 7 篇 faculty of engin...
  • 7 篇 department of la...
  • 6 篇 shanghai univers...
  • 6 篇 information depa...
  • 6 篇 school of comput...
  • 6 篇 school of scienc...
  • 6 篇 school of comput...
  • 6 篇 department of ma...
  • 6 篇 department of ap...
  • 6 篇 school of inform...

作者

  • 16 篇 xhafa fatos
  • 14 篇 barolli leonard
  • 10 篇 jing zhang
  • 10 篇 bin sheng
  • 9 篇 ping li
  • 8 篇 shangce gao
  • 8 篇 durresi arjan
  • 7 篇 li zhuo
  • 7 篇 yinglin wang
  • 7 篇 wang yinglin
  • 7 篇 yi zhang
  • 7 篇 jin sun
  • 7 篇 zhou mengqi
  • 6 篇 xin liu
  • 6 篇 mino gjergji
  • 6 篇 anum masood
  • 6 篇 hossain m.a.
  • 6 篇 yonghui dai
  • 5 篇 kouvatsos demetr...
  • 5 篇 bin zhang

语言

  • 1,867 篇 英文
  • 9 篇 其他
  • 3 篇 中文
检索条件"任意字段=The 2010 IEEE International Conference on Progress in Informatics and Computing"
1879 条 记 录,以下是131-140 订阅
排序:
Parallelizing Convolutional Neural Network for the Handwriting Recognition Problems with Different Architectures  5
Parallelizing Convolutional Neural Network for the Handwriti...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Junhao Zhou Weibin Chen Guishen Peng Hong Xiao Hao Wang Zhigang Chen computer science Macau university of science and technology computer science Politecnico Di Milano computer science Guangdong University of Technology computer science Norwegian University of Science and Technology
As the convolutional neural network(CNN) algorithm is proved to be uncomplicated in the image preconditioning and relatively simple train the original image, it has become popular in image classification. Apart from t... 详细信息
来源: 评论
Playing Games with Reinforcement Learning via Perceiving Orientation and Exploring Diversity  5
Playing Games with Reinforcement Learning via Perceiving Ori...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Dong Zhang Le Yang Haobin Shi Fangqing Mou Mengkai Hu School of Automation Northwestern Polytechnical University School of Computer Science Northwestern Polytechnical University School of Electronics and Information Northwestern Polytechnical University School of Electronics Engineering and Computer Science Peking University
The reinforcement learning can guide the agents to perform optimally under various complex *** reinforcement learning has brought breakthrough for many domains, they are constrained by two bottlenecks: extremely delay... 详细信息
来源: 评论
Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud computing  5
Efficient Anonymous Attribute-Based Encryption with Access P...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Chanying Huang Kedong Yan Songjie Wei Gongxuan Zhang Dong Hoon Lee School of Computer Science and Engineering Nanjing University of Science and Technology Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing University of Science&Technology Graduate School of Information Security Korea University
Cloud computing is a revolutionary information technology paradigm, which provides users with unlimited, scalale, low-cost and convenient resource services, but when data is outsourced to a semi-trusted cloud server, ... 详细信息
来源: 评论
Multimodal deep learning network based hand ADLs tasks classification for prosthetics control  5
Multimodal deep learning network based hand ADLs tasks class...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Li Zhengyi Zhou Hui Yang Dandan Xie Shuiqin School of Biomedical Engineering South-Central University for Nationalities Key Laboratory of Cognitive Science South-Central University for Nationalities College of Electronics and Information South-Central University for Nationalities
Natural control methods based on surface electromyography(sEMG) and pattern recognization are promising for hand ***, the control robustness offered by scientific research is still not sufficient for many activities o... 详细信息
来源: 评论
Design and Implementation for Tujia Brocade Cultural Coordinate Panorama Display System Based on Touch Screen  5
Design and Implementation for Tujia Brocade Cultural Coordin...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Zhao Gang Di Bingbing Zhu Wenjuan Li Yaxu He Hui Zan Hui School of Educational Information Technology Central China Normal University National Engineering Research Center for E-Learning Central China Normal University
To get rid of durance of distribution environment on Tujia Brocade dissemination and provide a more comprehensive and immersive learning environment of Tujia brocade, this paper designs a system on Tujia Brocade cultu... 详细信息
来源: 评论
Developing an EC Computer Policy, 1965-1974
收藏 引用
ieee ANNALS OF THE HISTORY OF computing 2010年 第1期32卷 44-59页
作者: Van Laer, Arthe Univ Louvain Louvain Belgium Univ Louvain Namur Belgium
In the late 1960s, the European Community (EC) Commission tried to develop a common industrial policy to help Europe establish a competitive position in the informatics sector. Before the middle of the 1970s, only a f... 详细信息
来源: 评论
A Heuristic Task Dispatching Algorithm in the Clouds  2
A Heuristic Task Dispatching Algorithm in the Clouds
收藏 引用
2nd ieee international conference on progress in informatics and computing (PIC)
作者: Luo, Fei Yi, Jianjun E China Univ Sci & Technol Sch Informat & Engn Shanghai 200237 Peoples R China PowerLeader Sci & Technol Grp Co Ltd Shenzhen Peoples R China E China Univ Sci & Technol Sch Mech & Power Engn Shanghai 200237 Peoples R China
Cloud computing is becoming a popular solution for storing data and executing applications, where task dispatching in the scheduling policy is significant to the overall performance in the Cloud systems. To minimize t... 详细信息
来源: 评论
Mineral Identification and Geological Mapping Using Near-Infrared Spectroscopy Analysis  5
Mineral Identification and Geological Mapping Using Near-Inf...
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Xiu Liancun Zheng Zhizhong Chen Chunxia Gao Yang Nanjing Center China Geological Survey Key Laboratory of R&D of Spectrum Detection Geological Instrument China Geological Survey Jiangsu Provincial Key Laboratory of Spectral Imaging and Intelligent Sensing
In recent years, the near-infrared spectroscopy measurement technology in China has made considerable progress;it has been widely used in the fields of agriculture, chemistry, geology, and medicine measurement. The ne... 详细信息
来源: 评论
Detection of coordinated attacks using alert correlation model
Detection of coordinated attacks using alert correlation mod...
收藏 引用
2010 1st ieee international conference on progress in informatics and computing, PIC 2010
作者: Alserhani, Faeiz Akhlaq, Monis Awan, Irfan U. Cullen, Andrea J. Informatics Research Institute University of Bradford BD7 1DP United Kingdom
Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the pro... 详细信息
来源: 评论
Efficient Pose Machine Based on Parameter-Sensitive Hashing  5
Efficient Pose Machine Based on Parameter-Sensitive Hashing
收藏 引用
2017 international conference on progress in informatics and computing(PIC)
作者: Shangchi Lin Bowen Liu Yang Wen Anum Masood Bin Sheng Ping Li Xin Liu Haoyang Yu Weiyao Lin Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Mathematics and Information Technology The Education University of Hong Kong Faculty of Information Technology Macau University of Science and Technology Shenzhen Tencent Computer System Co.Ltd. Department of Electronic Engineering Shanghai Jiao Tong University
In this paper, we propose an efficient pose machine using Parameter-Sensitive Hashing(PSH) techniques. Based on the original pose machine, which is a sequential prediction framework, we employ the Convolutional Neural... 详细信息
来源: 评论