咨询与建议

限定检索结果

文献类型

  • 75 篇 期刊文献
  • 60 篇 会议

馆藏范围

  • 135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 67 篇 计算机科学与技术...
    • 55 篇 软件工程
    • 15 篇 生物工程
    • 13 篇 信息与通信工程
    • 9 篇 控制科学与工程
    • 8 篇 电气工程
    • 4 篇 机械工程
    • 4 篇 光学工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 化学工程与技术
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
  • 40 篇 理学
    • 23 篇 数学
    • 15 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 7 篇 物理学
    • 5 篇 化学
    • 3 篇 系统科学
  • 29 篇 管理学
    • 19 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 6 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 12 篇 semantics
  • 8 篇 data mining
  • 6 篇 blockchain
  • 5 篇 visualization
  • 5 篇 machine learning
  • 4 篇 conferences
  • 4 篇 big data
  • 4 篇 feature extracti...
  • 4 篇 training
  • 3 篇 object detection
  • 3 篇 deep learning
  • 3 篇 knowledge graph
  • 2 篇 surveys
  • 2 篇 knowledge engine...
  • 2 篇 fault diagnosis
  • 2 篇 smart contracts
  • 2 篇 task analysis
  • 2 篇 recommender syst...
  • 2 篇 anomaly detectio...
  • 2 篇 dictionaries

机构

  • 23 篇 school of comput...
  • 16 篇 school of cyber ...
  • 12 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 11 篇 school of comput...
  • 9 篇 key lab. of inte...
  • 8 篇 school of comput...
  • 8 篇 institute of art...
  • 8 篇 key laboratory o...
  • 8 篇 peng cheng labor...
  • 7 篇 key laboratory o...
  • 7 篇 key laboratory o...
  • 6 篇 institute of big...
  • 6 篇 institute of inf...
  • 6 篇 state key labora...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 big data and kno...
  • 5 篇 key laboratory o...
  • 5 篇 school of comput...

作者

  • 19 篇 huang qingming
  • 18 篇 xu qianqian
  • 12 篇 yang zhiyong
  • 12 篇 zhao zhang
  • 11 篇 meng wang
  • 11 篇 cao xiaochun
  • 10 篇 wang meng
  • 7 篇 haijun zhang
  • 6 篇 wu xindong
  • 6 篇 xindong wu
  • 6 篇 qingming huang
  • 6 篇 lei zhang
  • 6 篇 bao shilong
  • 5 篇 zhu lei
  • 5 篇 wang zitai
  • 5 篇 qianqian xu
  • 5 篇 hong richang
  • 5 篇 wu le
  • 5 篇 zhang chengyuan
  • 4 篇 xiaochun cao

语言

  • 116 篇 英文
  • 18 篇 其他
  • 1 篇 中文
检索条件"机构=Big Data and Knowledge Engineering Institute"
135 条 记 录,以下是41-50 订阅
排序:
Research on Penetration Strategy of UAV
Research on Penetration Strategy of UAV
收藏 引用
2020 International Conference on Cyberspace Innovation of Advanced Technologies, CIAT 2020
作者: Han, Daojun Xiang, Hongzhen Chen, Haolin Xie, Yi Institute of Data and Knowledge Engineering Henan University Kaifeng China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China
Taking a military operation as an example, this paper makes an in-depth study of what tactics a single UAV should adopt when facing the interception of multiple enemy UAV groups. According to the analysis of the impac... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection  41
Size-Invariance Matters: Rethinking Metrics and Losses for I...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
Feature Aggregating Network with Inter-Frame Interaction for Efficient Video Super-Resolution
Feature Aggregating Network with Inter-Frame Interaction for...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yawei Li Zhao Zhang Suiyi Zhao Jicong Fan Haijun Zhang Mingliang Xu School of Computer Science and Information Engineering Hefei University of Technology Hefei China Key Laboratory of Knowledge Engineering with Big Data (Ministry of Education) & Intelligent Interconnected Systems Laboratory of Anhui Province Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Kunming China Shenzhen Research Institute of Big Data Shenzhen China School of Data Science The Chinese University of Hong Kong Shenzhen China Department of Computer Science Harbin Institute of Technology Shenzhen China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou China
Video super-resolution (VSR) on mobile devices aims to restore high-resolution frames from their low-resolution counterparts, satisfying the requirements of performance, FLOPs and latency. On one hand, partial feature...
来源: 评论
Reference-Based Iterative Interaction With P2-Matching for Stereo Image Super-Resolution
收藏 引用
IEEE transactions on image processing : a publication of the IEEE Signal Processing Society 2025年 34卷 3779-3789页
作者: Runmin Cong Rongxin Liao Feng Li Ronghui Sheng Huihui Bai Renjie Wan Sam Kwong Wei Zhang School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Knowledge Engineering with Big Data Ministry of Education of China Hefei China School of Computer Science and Engineering Hefei University of Technology Hefei China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing China Institute of Information Science Beijing Jiaotong University Beijing China Department of Computer Science Hong Kong Baptist University Hong Kong China School of Data Science Lingnan University Hong Kong China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China
Stereo Image Super-Resolution (SSR) holds great promise in improving the quality of stereo images by exploiting the complementary information between left and right views. Most SSR methods primarily focus on the inter... 详细信息
来源: 评论
Dynamic Tracking with Fuzzy Rules for Evolutionary Dynamic Constrained Optimization
Dynamic Tracking with Fuzzy Rules for Evolutionary Dynamic C...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Chenyang Bu Yuxin Liu Lizhong Zhang Tao Zhu Wenjian Luo Ministry of Education Key Laboratory of Knowledge Engineering with Big Data School of Computer Science and Information Engineering Hefei University of Technology Hefei Anhui China School of Computer Science and Information Engineering University of South China Hengyang Hunan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Guangdong China
Nature-inspired population-based stochastic search algorithms (SSA) have demonstrated effectiveness in solving many real-world dynamic optimization problems (DOPs), such as dynamic optimal power flow (DOPF) problems. ...
来源: 评论
Chinese Emergency Event Extraction Based on Contrastive Learning with Event Semantic Features
Chinese Emergency Event Extraction Based on Contrastive Lear...
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: Xinyi Sheng Jinguang Gu Youcheng Yan Fangfang Xu College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Institute of Big Data Science and Engineering Wuhan University of Science and Technology Wuhan China The Key Laboratory of Rich-Media Knowledge Organization and Service of Digital Publishing Content Institute of Scientific and Technical Information of China Beijing China
Extracting emergency events from a large amount of unstructured information is essential for improving early warning and emergency response. Existing event extraction methods for specialist fields often rely on well-d...
来源: 评论
Improved Dota2 Lineup Recommendation Model Based on a Bidirectional LSTM
收藏 引用
Tsinghua Science and Technology 2020年 第6期25卷 712-720页
作者: Lei Zhang Chenbo Xu Yihua Gao Yi Han Xiaojiang Du Zhihong Tian Henan Key Laboratory of Big Data Analysis and Processing Kaifeng 457004China Institute of Data and Knowledge Engineering Henan UniversityKaifeng 475004.China National Internet Emergency Center Zhengzhou 450000China Department of Computer and Information Sciences Temple UniversityPhiladelphiaPA 19122-6008USA Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou 510006China
In recent years,e-sports has rapidly developed,and the industry has produced large amounts of data with specifications,and these data are easily to be *** to the above characteristics,data mining and deep learning met... 详细信息
来源: 评论
Machine Reading Comprehension Based on Hybrid Attention and Controlled Generation  19th
Machine Reading Comprehension Based on Hybrid Attention and ...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Gao, Feng Yang, Zihang Gu, Jinguang Cheng, Junjun School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan430065 China Laboratory of Content Organization and Knowledge Service for Rich Media Digital Publishing Wuhan University of Science and Technology Wuhan430065 China China Information Security Evaluation Center Beijing100083 China
With the development of natural language processing technology, machine reading comprehension has been widely used in various fields such as QA systems and Intelligence engineering. However, despite numerous models ar... 详细信息
来源: 评论
Access control of blockchain based on dual-policy attribute-based encryption  22
Access control of blockchain based on dual-policy attribute-...
收藏 引用
22nd IEEE International Conference on High Performance Computing and Communications, 18th IEEE International Conference on Smart City and 6th IEEE International Conference on data Science and Systems, HPCC-SmartCity-DSS 2020
作者: Han, Daojun Chen, Jinyu Zhang, Lei Shen, Yatian Wang, Xueheng Gao, Yihua Institute of Data and Knowledge Engineering School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing School of Computer and Information Engineering Kaifeng China
In scenarios where multiple parties such as the Internet of Things and Supply Chains participate in data sharing and computing, when accessing data, users not only need to accept the forward access control of the data... 详细信息
来源: 评论
Disentangled Cascaded Graph Convolution Networks for Multi-Behavior Recommendation
收藏 引用
ACM Transactions on Recommender Systems 2024年 第4期2卷 1-27页
作者: Zhiyong Cheng Jianhua Dong Fan Liu Lei Zhu Xun Yang Meng Wang School of Computer Science and Information Engineering Hefei University of Technology Hefei China Shandong Artificial Intelligence Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computing National University of Singapore Singapore Singapore School of Electronic and Information Engineering Tongji University Shanghai China School of Information Science and Technology University of Science and Technology of China Hefei China Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei China and Hefei Comprehensive National Science Center Hefei China
Multi-behavioral recommender systems have emerged as a solution to address data sparsity and cold-start issues by incorporating auxiliary behaviors alongside target behaviors. However, existing models struggle to accu... 详细信息
来源: 评论