咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 6 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 query processing
  • 1 篇 computational ef...
  • 1 篇 real time system...
  • 1 篇 big data
  • 1 篇 digital twins
  • 1 篇 redundancy
  • 1 篇 mutual authentic...
  • 1 篇 key agreement
  • 1 篇 vehicle-to-grid
  • 1 篇 physically unclo...
  • 1 篇 industrial inter...

机构

  • 2 篇 national yunlin ...
  • 1 篇 the university o...
  • 1 篇 algorithmic data...
  • 1 篇 old dominion uni...
  • 1 篇 international in...
  • 1 篇 leiden institute...
  • 1 篇 college of compu...
  • 1 篇 graduate school ...
  • 1 篇 lahore garrison ...
  • 1 篇 department of mo...
  • 1 篇 riphah internati...
  • 1 篇 old dominion uni...
  • 1 篇 department of so...
  • 1 篇 university of sa...
  • 1 篇 algorithmic data...
  • 1 篇 machine learning...
  • 1 篇 old dominion uni...
  • 1 篇 copelabs lusófon...
  • 1 篇 algorithmic data...
  • 1 篇 department of co...

作者

  • 3 篇 das ashok kumar
  • 3 篇 mahmood khalid
  • 2 篇 siebes arno
  • 2 篇 shetty sachin
  • 2 篇 shamshad salman
  • 1 篇 asif muhammad
  • 1 篇 rodrigues joel j...
  • 1 篇 kharel rupak
  • 1 篇 de knijf jeroen
  • 1 篇 feelders ad
  • 1 篇 van leeuwen matt...
  • 1 篇 knobbe arno
  • 1 篇 shamshad usman
  • 1 篇 ahmad maaz bin
  • 1 篇 saleem muhammad ...
  • 1 篇 akram waseem
  • 1 篇 hussain shafiq
  • 1 篇 hussain ibrar
  • 1 篇 javed safdar hus...

语言

  • 7 篇 英文
检索条件"机构=Algorithmic Data Analysis"
7 条 记 录,以下是1-10 订阅
排序:
Queries for data analysis
Queries for data analysis
收藏 引用
11th International Symposium on Intelligent data analysis, IDA 2012
作者: Siebes, Arno Algorithmic Data Analysis Group Universiteit Utrecht Netherlands
If we view data as a set of queries with an answer, what would a model be? In this paper we explore this question. The motivation is that there are more and more kinds of data that have to be analysed. data of such a ... 详细信息
来源: 评论
Sharing data with guaranteed privacy
Sharing data with guaranteed privacy
收藏 引用
European Conference on Machine Learning, ECML 1989
作者: Siebes, Arno Algorithmic Data Analysis Group Universiteit Utrecht Utrecht Netherlands
Big data is both a curse and a blessing. A blessing because the unprecedented amount of detailed data allows for research in, e.g., social sciences and health on scales that were until recently unimaginable. A curse, ... 详细信息
来源: 评论
An experimental comparison of different inclusion relations in frequent tree mining
An experimental comparison of different inclusion relations ...
收藏 引用
作者: De Knijf, Jeroen Feelders, Ad Algorithmic Data Analysis Group Department of Information and Computing Sciences Universiteit Utrecht PO Box 80.089 3508 TB Utrecht Netherlands
In recent years a variety of mining algorithms, to derive all frequent subtrees from a database of labeled ordered rooted trees has been developed. These algorithms share properties such as enumeration strategies and ... 详细信息
来源: 评论
Diverse subgroup set discovery
Diverse subgroup set discovery
收藏 引用
作者: Van Leeuwen, Matthijs Knobbe, Arno Machine Learning Department of Computer Science Katholieke Universiteit Leuven Leuven Belgium Algorithmic Data Analysis Department of Information and Computer Sciences Universiteit Utrecht Utrecht Netherlands Leiden Institute of Advanced Computer Science Universiteit Leiden Leiden Netherlands
Large data is challenging for most existing discovery algorithms, for several reasons. First of all, such data leads to enormous hypothesis spaces, making exhaustive search infeasible. Second, many variants of essenti... 详细信息
来源: 评论
A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment
收藏 引用
IEEE Internet of Things Journal 2023年 第18期10卷 16650-16657页
作者: Shamshad, Salman Mahmood, Khalid Shamshad, Usman Hussain, Ibrar Hussain, Shafiq Das, Ashok Kumar The University of Lahore Department of Software Engineering Lahore54590 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan Riphah International University Riphah School of Computing and Innovation Lahore54000 Pakistan University of Sahiwal Department of Computer Science Sahiwal57000 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Virginia Modeling Analysis and Simulation Center SuffolkVA23435 United States
The energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize the conventional intelligent transportation systems (ITSs) a... 详细信息
来源: 评论
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
收藏 引用
Journal of Advanced Research 2024年 62卷 155-163页
作者: Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Kharel, Rupak Das, Ashok Kumar Shetty, Sachin Rodrigues, Joel J.P.C. School of Psychology and Computer Science University of Central Lancashire Preston United Kingdom Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Punjab Sahiwal 57000 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center and Center for Cybersecurity Education and Research Old Dominion University Suffolk 23435 VA United States COPELABS Lusófona University Campo Grande 376 Lisbon 1749-024 Portugal
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical... 详细信息
来源: 评论