咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 19 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 1,885 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,588 篇 工学
    • 1,533 篇 计算机科学与技术...
    • 811 篇 软件工程
    • 140 篇 信息与通信工程
    • 119 篇 电气工程
    • 111 篇 控制科学与工程
    • 59 篇 生物工程
    • 42 篇 仪器科学与技术
    • 29 篇 化学工程与技术
    • 22 篇 机械工程
    • 20 篇 建筑学
    • 17 篇 生物医学工程(可授...
    • 15 篇 土木工程
    • 14 篇 交通运输工程
    • 14 篇 网络空间安全
    • 13 篇 安全科学与工程
  • 497 篇 管理学
    • 364 篇 图书情报与档案管...
    • 190 篇 管理科学与工程(可...
    • 75 篇 工商管理
    • 15 篇 公共管理
  • 255 篇 理学
    • 150 篇 数学
    • 68 篇 生物学
    • 47 篇 统计学(可授理学、...
    • 27 篇 化学
    • 26 篇 系统科学
    • 18 篇 物理学
  • 61 篇 法学
    • 58 篇 社会学
  • 30 篇 医学
    • 23 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 22 篇 经济学
    • 21 篇 应用经济学
  • 15 篇 农学
    • 13 篇 作物学
  • 7 篇 文学
  • 6 篇 教育学
  • 1 篇 军事学

主题

  • 255 篇 data mining
  • 150 篇 search engines
  • 66 篇 information retr...
  • 53 篇 websites
  • 45 篇 web search
  • 38 篇 semantic web
  • 37 篇 web services
  • 36 篇 linked data
  • 33 篇 web mining
  • 32 篇 big data
  • 30 篇 recommender syst...
  • 29 篇 machine learning
  • 27 篇 data visualizati...
  • 25 篇 semantics
  • 19 篇 web pages
  • 18 篇 deep learning
  • 18 篇 internet
  • 18 篇 cloud computing
  • 16 篇 natural language...
  • 16 篇 databases

机构

  • 22 篇 microsoft resear...
  • 14 篇 microsoft res as...
  • 12 篇 microsoft res re...
  • 11 篇 baidu inc people...
  • 10 篇 univ amsterdam
  • 10 篇 yahoo research b...
  • 10 篇 tsinghua univ pe...
  • 9 篇 alibaba grp peop...
  • 8 篇 fudan univ sch c...
  • 8 篇 carnegie mellon ...
  • 8 篇 beijing key lab ...
  • 7 篇 renmin univ chin...
  • 7 篇 univ chinese aca...
  • 7 篇 microsoft resear...
  • 7 篇 amazon seattle w...
  • 7 篇 microsoft res re...
  • 7 篇 university of am...
  • 7 篇 microsoft redmon...
  • 7 篇 renmin univ chin...
  • 6 篇 fudan univ sch c...

作者

  • 17 篇 zhang min
  • 16 篇 chang yi
  • 16 篇 ma shaoping
  • 16 篇 yin dawei
  • 15 篇 liu yiqun
  • 14 篇 wen ji-rong
  • 12 篇 de rijke maarten
  • 12 篇 han jiawei
  • 11 篇 white ryen w.
  • 10 篇 cheng xueqi
  • 9 篇 serdyukov pavel
  • 9 篇 chen zheng
  • 9 篇 liu huan
  • 9 篇 agichtein eugene
  • 9 篇 yu philip s.
  • 9 篇 bennett paul n.
  • 8 篇 guo jiafeng
  • 8 篇 li zhixu
  • 8 篇 najork marc
  • 7 篇 blanco roi

语言

  • 1,849 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 2 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 乌克兰文
检索条件"任意字段=11th ACM International Conference on Web Search and Data Mining"
1885 条 记 录,以下是1841-1850 订阅
排序:
Spectral Bloom Filters for Client Side search
Spectral Bloom Filters for Client Side Search
收藏 引用
international conference and Workshop on Computing and Communication (IEMCON)
作者: Parth Parikh Mrunank Mistry Dhruvam Kothari Sunil Khachane Rajiv Gandhi Institute of Technology Mumbai India
the following topics are dealt with: learning (artificial intelligence); Internet of things; convolutional neural nets; feature extraction; object detection; Internet; data mining; cloud computing; pattern classificat... 详细信息
来源: 评论
To Recognize Families In the Wild: A Machine Vision Tutorial  18
To Recognize Families In the Wild: A Machine Vision Tutorial
收藏 引用
26th acm Multimedia conference (MM)
作者: Robinson, Joseph P. Shao, Ming Fu, Yun Northeastern Univ Boston MA 02115 USA UMass Dartmouth Dartmouth MA 02747 USA
Automatic kinship recognition has relevance in an abundance of applications. For starters, aiding forensic investigations, as kinship is a powerful cue that could narrow the search space (e.g., knowledge that the &quo... 详细信息
来源: 评论
Malware detection based on directed multi-edge dataflow graph representation and convolutional neural network
Malware detection based on directed multi-edge dataflow grap...
收藏 引用
international conference on Knowledge and Systems Engineering
作者: Nguyen Viet Hung Vu Dinh Phai Pham Ngoc Dung Qi Shi Tran Nguyen Ngoc Faculty of Information Technology Le Quy Don Techincal University Hanoi Viet Nam Faculty of Engineering and Technology Liverpool John Moore University Liverpool England
In recent years, malware has grown constantly in both quantity and complexity. Traditional malware detection methods such as string search, hash code comparison, etc. have to face the challenging appearance of more an... 详细信息
来源: 评论
Flint: Google-basing the web  08
Flint: Google-basing the Web
收藏 引用
Proceedings of the 11th international conference on Extending database technology: Advances in database technology
作者: Lorenzo Blanco Valter Crescenzi Paolo Merialdo Paolo Papotti Roma Tre University - Italy
Several web sites deliver a large number of pages, each publishing data about one instance of some real world entity, such as an athlete, a stock quote, a book. Even though it is easy for a human reader to recognize t...
来源: 评论
that's 'é' not 'þ' '?' or '◓': a user-driven context-aware approach to erroneous metadata in digital libraries  11
That's 'é' not 'þ' '?' or '◓': a user-driven context-awar...
收藏 引用
Proceedings of the 11th annual international acm/IEEE joint conference on Digital libraries
作者: David Bainbridge Michael B. Twidale David M. Nichols University of Waikato Hamilton New Zealand University of Illinois Urbana-Champaign USA
In this paper we present a novel system for user-driven integration of name variants when interacting with web-based information systems. the growth and diversity of online information means that many users experience... 详细信息
来源: 评论
mining Performance Regression Inducing Code Changes in Evolving Software
Mining Performance Regression Inducing Code Changes in Evolv...
收藏 引用
international mining Software Repositories, MSR
作者: Qi Luo Denys Poshyvanyk Mark Grechanik College of William and Mary University of Illinois at Chicago
During software evolution, the source code of a system frequently changes due to bug fixes or new feature requests. Some of these changes may accidentally degrade performance of a newly released software version. A no... 详细信息
来源: 评论
Intrusion classification using ECLAT and Fuzzy Logic
Intrusion classification using ECLAT and Fuzzy Logic
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Asif Ahamad P. S. Jeevaraj ABV-IIITM Gwalior India
In today's world with the increase in internet usage, every digital gadget is getting connected to the internet. Due to the open connectivity of the internet, devices connected to the internet are exposed to the d... 详细信息
来源: 评论
Development of Creative thinking Support Method through Text mining for Inspiration
Development of Creative Thinking Support Method through Text...
收藏 引用
international Symposium on Soft Computing and Intelligent Systems (SCIS)
作者: Koji Okuhara Takeshi Matsui Yuki Yamamoto Toyama Prefectural University Imizu Toyama Japan Faculty of Social and Information Studies Gunma University Maebashi Gunma Japan
In this study, for multiple keywords, we collect text data on those keywords from cyberspace by crawling and scraping. then, natural language processing is used to reduce the text data to word groups of nouns that are... 详细信息
来源: 评论
Time Series data mining: A Unifying View
Time Series Data Mining: A Unifying View
收藏 引用
international conference on data Science and Advanced Analytics (DSAA)
作者: Eamonn Keogh University of California Riverside Riverside California USA
Time series data are ubiquitous; large volumes of such data are routinely created in scientific, industrial, entertainment, medical and biological domains. Examples include ECG data, gait analysis, stock market quotes... 详细信息
来源: 评论
Correspondence from color shading
Correspondence from color shading
收藏 引用
international conference on Pattern Recognition
作者: H.H. Nguyen P. Cohen Perception and Robotics Laboratory Ecole Polytechnique Montreal QUE Canada
Presents a region-based matching algorithm, working on the color shading information (red, green and blue) contained in an image pair. In each color image, the regions are defined as connected areas within which the s... 详细信息
来源: 评论