咨询与建议

限定检索结果

文献类型

  • 645 篇 会议
  • 187 册 图书
  • 8 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 841 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 450 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 42 篇 电气工程
    • 39 篇 信息与通信工程
    • 21 篇 控制科学与工程
    • 19 篇 生物医学工程(可授...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 8 篇 仪器科学与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 电子科学与技术(可...
    • 6 篇 交通运输工程
    • 5 篇 土木工程
    • 5 篇 航空宇航科学与技...
    • 4 篇 光学工程
  • 188 篇 理学
    • 117 篇 数学
    • 62 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 24 篇 系统科学
    • 15 篇 生物学
  • 107 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 52 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 22 篇 医学
    • 18 篇 临床医学
    • 15 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
    • 6 篇 药学(可授医学、理...
  • 5 篇 法学
    • 5 篇 社会学
  • 5 篇 教育学
    • 5 篇 教育学
  • 4 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 328 篇 data mining
  • 152 篇 data mining and ...
  • 121 篇 artificial intel...
  • 69 篇 information syst...
  • 64 篇 knowledge discov...
  • 63 篇 information stor...
  • 53 篇 pattern recognit...
  • 51 篇 database managem...
  • 43 篇 computer communi...
  • 41 篇 databases
  • 37 篇 computer applica...
  • 36 篇 set theory
  • 36 篇 machine learning
  • 33 篇 data structures ...
  • 31 篇 rough sets
  • 29 篇 rough set theory
  • 24 篇 theory of comput...
  • 24 篇 fuzzy systems
  • 24 篇 data analysis
  • 23 篇 computer science

机构

  • 11 篇 institute of aut...
  • 9 篇 institute of cyb...
  • 9 篇 school of automa...
  • 8 篇 school of electr...
  • 8 篇 chinese academy ...
  • 7 篇 indian institute...
  • 7 篇 school of automa...
  • 7 篇 zhejiang univers...
  • 7 篇 tongji universit...
  • 7 篇 unsw sydney
  • 6 篇 guangdong univer...
  • 6 篇 shimane med univ...
  • 6 篇 lovely professio...
  • 6 篇 central south un...
  • 5 篇 indian institute...
  • 5 篇 indian statistic...
  • 5 篇 university of in...
  • 5 篇 san jose state u...
  • 5 篇 kobe university ...
  • 5 篇 university of so...

作者

  • 15 篇 zheng-guang wu
  • 15 篇 hongyi li
  • 15 篇 chaojie li
  • 15 篇 biao luo
  • 15 篇 long cheng
  • 8 篇 tsumoto s
  • 6 篇 sonali agarwal
  • 6 篇 kanubhai k. pate...
  • 6 篇 ngoc thanh nguye...
  • 6 篇 atul patel
  • 6 篇 zhang yq
  • 5 篇 seiichi ozawa
  • 5 篇 ashish ghosh
  • 5 篇 lin ty
  • 5 篇 mohammad tanveer
  • 5 篇 asif ekbal
  • 5 篇 wang gy
  • 5 篇 adam jatowt
  • 5 篇 faloutsos christ...
  • 5 篇 leung carson k.

语言

  • 832 篇 英文
  • 7 篇 中文
  • 2 篇 其他
  • 1 篇 法文
检索条件"任意字段=Conference on Data Mining and Knowledge Discovery - Theory, Tools, and Technology II"
841 条 记 录,以下是61-70 订阅
排序:
Attackability Characterization of Adversarial Evasion Attack on Discrete data  20
Attackability Characterization of Adversarial Evasion Attack...
收藏 引用
26th ACM SIGKDD International conference on knowledge discovery and data mining (KDD)
作者: Wang, Yutong Han, Yufei Bao, Hongyan Shen, Yun Ma, Fenglong Li, Jin Zhang, Xiangliang King Abdullah Univ Sci & Technol Thuwal Saudi Arabia Nortonlifelock Res Grp Sophia Antipolis France Nortonlifelock Res Grp Reading Berks England Penn State Univ State Coll PA USA Guangzhou Univ Guangzhou Peoples R China
Evasion attack on discrete data is a challenging, while practically interesting research topic. It is intrinsically an NP-hard combinatorial optimization problem. Characterizing the conditions guaranteeing the solvabi... 详细信息
来源: 评论
Construction of Radio Transmission Equipment Type Approval knowledge Graph and its Application
Construction of Radio Transmission Equipment Type Approval K...
收藏 引用
Big data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), International conference on
作者: Chun Xin Li Qian Nan Lu Ming Huang Jing Jing Yang Li Qin Chen School of Information Science and Engineering Yunnan University Kunming P.R. China Nujiang Prefecture Bureau of Industry and Information Technology Liuku Nujiang P.R. Chian
Domain knowledge graph has become a research focus in the era of artificial intelligence. Radio transmission equipment type approval is the core function of radio equipment management. This paper introduces constructi... 详细信息
来源: 评论
Secure Outsourced kNN data Classification over Encrypted data Using Secure Chain Distance Matrices  10th
Secure Outsourced kNN Data Classification over Encrypted Dat...
收藏 引用
10th International Joint conference on knowledge discovery, knowledge Engineering and knowledge Management, IC3K 2018
作者: Almutairi, Nawal Coenen, Frans Dures, Keith Department of Computer Science University of Liverpool Liverpool United Kingdom Information Technology Department College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
The paper introduces the Secure kNN (SkNN) approach to data classification and querying. The approach is founded on the concept of Secure Chain Distance Matrices (SCDMs) whereby the classification and querying is enti... 详细信息
来源: 评论
An approach for the conceptual modeling of clustering mining in the kdd process
An approach for the conceptual modeling of clustering mining...
收藏 引用
2007 IADIS European conference on data mining, DM 2007, part of the 1st IADIS Multi conference on Computer Science and Information Systems, MCCSIS 2007
作者: Zubcoff, Jose Trujillo, Juan Departamento de Ciencias del Mar y Biología Aplicada Universidad de Alicante Spain Departamento de Lenguajes y Sistemas Informáticos Universidad de Alicante Spain
Clustering analysis is usually applied as an isolated method to not easily understandable flat files. This approach carries out three main drawbacks: (i) the pre-processing stage is not reusable between different data... 详细信息
来源: 评论
Introducing DASC-PM: A data Science Process Model  31
Introducing DASC-PM: A Data Science Process Model
收藏 引用
31st Australasian conference on Information Systems, ACIS 2019
作者: Schulz, Michael Neuhaus, Uwe Kaufmann, Jens Badura, Daniel Kuehnel, Stephan Badewitz, Wolfgang Dann, David Kloker, Simon Alekozai, Emal M. Lanquillon, Carsten NORDAKADEMIE University of Applied Sciences Elmshorn Germany Hochschule Niederrhein University of Applied Sciences Mönchengladbach Germany Valantic Business Analytics GmbH Hamburg Germany Germany Karlsruhe Institute of Technology Karlsruhe Germany Robert Bosch GmbH Stuttgart Germany Heilbronn University of Applied Sciences Heilbronn Germany
data-driven disciplines like data mining and knowledge management already provide process-based frameworks for data analysis projects, such as the well-known cross-industry standard process for data mining (CRISP-DM) ... 详细信息
来源: 评论
Intrusion Detection in Wi-Fi Networks by Modular and Optimized Ensemble of Classifiers  12th
Intrusion Detection in Wi-Fi Networks by Modular and Optimiz...
收藏 引用
12th International Joint conference on Computational Intelligence (IJCCI) / 12th International conference on Evolutionary Computation theory and Applications (ECTA)
作者: Granato, Giuseppe Martino, Alessio Baldini, Luca Rizzi, Antonello Univ Roma La Sapienza Dept Informat Engn Elect & Telecommun Via Eudossiana 18 I-00184 Rome Italy
With the breakthrough of pervasive advanced networking infrastructures and paradigms such as 5G and IoT, cybersecurity became an active and crucial field in the last years. Furthermore, machine learning techniques are... 详细信息
来源: 评论
A Proposed data Preprocessing Method for an Industrial Prediction Process
A Proposed Data Preprocessing Method for an Industrial Predi...
收藏 引用
International conference on Information Science and technology (ICIST)
作者: Ilham Battas Ridouane Oulhiq Hicham Behja Laurent Deshayes Innovation Lab for Operations Mohammed VI Polytechnic University Benguerir Morocco Modeling System Architecture and modeling Team (EASM) Engineering research laboratory (LRI) National and high school of electricity and mechanic (ENSEM) Hassan II University Casablanca Morocco
The studied mining production chain generally divided into three principal units: Destoning, screening and loading. The role of the screening unit is to screen the phosphate produced by the destoning unit before the l... 详细信息
来源: 评论
Machine learning for discovery analytics to support criminal investigations  2
Machine learning for discovery analytics to support criminal...
收藏 引用
conference on Big data ii - Learning, Analytics, and Applications
作者: Muller, Wilmuth Pallmer, Dirk Muhlenberg, Dirk Loumiotis, Ioannis Remoundou, Konstantina Kosmides, Pavlos Demestichas, Konstantinos Fraunhofer Inst Optron Syst Technol & Image Expl Karlsruhe Germany Inst Commun & Comp Syst ICCS Athina Greece Natl Technol Univ Athens Athens Greece
Over the last decades, criminal activities have progressively expanded into the information technology (IT) world, adding to the "traditional" criminal activities, ignoring political boundaries and legal jur... 详细信息
来源: 评论
Open Science Graphs Must Interoperate!  24th
Open Science Graphs Must Interoperate!
收藏 引用
24th East-European conference on Advances in databases and Information Systems/24th International conference on theory and Practice of Digital Libraries/16th Workshop on Business Intelligence and Big data (ADBIS/TPDL/EDA)
作者: Aryani, Amir Fenner, Martin Manghi, Paolo Mannocci, Andrea Stocker, Markus Swinburne Univ Technol Hawthorn Vic Australia DataCite eV Hannover Germany CNR Inst Informat Sci & Technol Pisa Italy TIB Leibniz Informat Ctr Sci & Technol Hannover Germany MARUM Ctr Marine Environm Sci PANGAEA Data Publisher Earth & Environm Sci Bremen Germany
Open Science Graphs (OSGs) are Scientific knowledge Graphs whose intent is to improve the overall FAIRness of science, by enabling open access to graph representations of metadata about people, artefacts, institutions... 详细信息
来源: 评论
On the Nature of data Science  21
On the Nature of Data Science
收藏 引用
Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining
作者: Jeffrey Ullman Stanford University Stanford CA USA
One can hear "data Science" defined as a synonym for machine learning or as a branch of Statistics. I shall argue that it is far more than that; it is the natural evolution of the technology of very large-sc... 详细信息
来源: 评论