咨询与建议

限定检索结果

文献类型

  • 317 篇 期刊文献
  • 177 篇 会议

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 251 篇 计算机科学与技术...
    • 223 篇 软件工程
    • 63 篇 信息与通信工程
    • 37 篇 生物工程
    • 26 篇 控制科学与工程
    • 25 篇 电气工程
    • 23 篇 光学工程
    • 23 篇 电子科学与技术(可...
    • 16 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 11 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 9 篇 安全科学与工程
    • 8 篇 机械工程
    • 8 篇 环境科学与工程(可...
  • 176 篇 理学
    • 90 篇 数学
    • 60 篇 物理学
    • 41 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 14 篇 化学
    • 13 篇 地球物理学
    • 8 篇 系统科学
  • 134 篇 管理学
    • 104 篇 图书情报与档案管...
    • 35 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 14 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 12 篇 法学
    • 10 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 4 篇 文学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 16 篇 deep learning
  • 13 篇 information retr...
  • 12 篇 generative adver...
  • 12 篇 training
  • 11 篇 graph neural net...
  • 9 篇 convolution
  • 9 篇 knowledge graph
  • 9 篇 forecasting
  • 8 篇 feature extracti...
  • 7 篇 learning systems
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 image segmentati...
  • 6 篇 computational li...
  • 6 篇 natural language...
  • 5 篇 surveys
  • 5 篇 reinforcement le...
  • 5 篇 big data
  • 5 篇 prototypes

机构

  • 146 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 27 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 school of comput...
  • 20 篇 cas key lab of n...
  • 17 篇 data intelligenc...
  • 12 篇 institute for ai...
  • 11 篇 key lab. of inte...
  • 11 篇 school of comput...
  • 11 篇 baidu inc
  • 10 篇 cas key laborato...
  • 10 篇 peng cheng labor...
  • 10 篇 zhejiang lab
  • 9 篇 institute of com...
  • 9 篇 tianjin key labo...
  • 8 篇 haihe lab of ita...
  • 8 篇 linke lab school...
  • 7 篇 cas key laborato...

作者

  • 176 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 55 篇 zhang ruqing
  • 55 篇 fan yixing
  • 49 篇 lan yanyan
  • 43 篇 shen huawei
  • 30 篇 pang liang
  • 26 篇 jin xiaolong
  • 26 篇 bi keping
  • 22 篇 cao qi
  • 20 篇 de rijke maarten
  • 20 篇 xueqi cheng
  • 19 篇 xu jun
  • 18 篇 chen wei
  • 15 篇 li zixuan
  • 15 篇 guan saiping
  • 13 篇 sun xiaoming
  • 13 篇 bai long
  • 10 篇 xiaolong jin
  • 10 篇 huang qingming

语言

  • 455 篇 英文
  • 36 篇 其他
  • 3 篇 中文
检索条件"机构=Cas Key Lab of Network Data Science and Technology"
494 条 记 录,以下是381-390 订阅
排序:
MFPR: A Personalized Ranking Recommendation with Multiple Feedback
收藏 引用
ACM Transactions on Social Computing 2018年 第2期1卷 1–22页
作者: Shi, Chuan Liu, Jian Zhang, Yiding Hu, Binbin Liu, Shenghua Yu, Philip S. Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications No. 10 Xi Tu Cheng Road Beijing China Cas Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences No.6 Kexueyuan South Road Zhongguancun Beijing China Department of Computer Science University of Illinois at Chicago 851 South Morgan Street Chicago United States
Recently, recommender systems have played an important role in improving web user experiences and increasing profits. Recommender systems exploit users' behavioral history (i.e., feedback on items) to build models... 详细信息
来源: 评论
Graph based Tensor Recovery for Accurate Internet Anomaly Detection
Graph based Tensor Recovery for Accurate Internet Anomaly De...
收藏 引用
2018 IEEE Conference on Computer Communications, INFOCOM 2018
作者: Xie, Kun Li, Xiaocan Wang, Xin Xie, Gaogang Wen, Jigang Zhang, Dafang College of Computer Science and Electronics Engineering Hunan University China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Department of Electrical and Computer Engineering State University of New York at Stony Brook United States Institute of Computing Technology Chinese Academy of Sciences China
Detecting anomalous traffic is a crucial task of managing networks. Many anomaly detection algorithms have been proposed recently. However, constrained by their matrix-based traffic data model, existing algorithms oft... 详细信息
来源: 评论
Fair electronic voting via bitcoin deposits  5th
Fair electronic voting via bitcoin deposits
收藏 引用
5th International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2017
作者: Wu, Xijuan Wei, Baodian Tian, Haibo Du, Yusong Ma, Xiao School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Chongqing Key Lab of Computer Network and Communication Technology Chongqing China
Bitcoin is the most popular decentralized digital currency now in use. Block chain is the basic technology of Bitcoin, providing a trustable ledger that can be publicly verified. Research on distributed applications b... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
Structured Information Extraction of Pathology Reports with Attention-based Graph Convolutional network
Structured Information Extraction of Pathology Reports with ...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jialun Wu Kaiwen Tang Haichuan Zhang Chunbao Wang Chen Li School of Computer Science and Technology Xi’an Jiaotong University Xi’an Shaanxi China National Engineering Lab for Big Data Analytics Xi’an Jiaotong University Xi’an Shaanxi China Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech.R&D Xi’an Jiaotong University Xi’an Shaanxi China School of Computer Science and Technology Qian Xuesen College Xi’an Jiaotong University Xi’an Shaanxi China the First Affiliated Hospital of Xi’an Jiaotong University Xi’an Shaanxi China
Electronic medical data contains biochemical, imaging, pathological information during diagnosis and treatment. The pathology report is a kind of highly liberalized unstructured textual data, which is the basis and go... 详细信息
来源: 评论
Sdgan: Improve Speech Enhancement Quality by Information Filter
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1871卷
作者: Xiaozhou Guo Yi Liu Wenyu Mao Jixing Li Wenchang Li Guoliang Gong Huaxiang Lu Institute of Semiconductors Chinese Academy of Sciences Beijing 100083 China University of Chinese Academy of Sciences Beijing 100089 China CAS Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences Beijing 200031 China Semiconductor Neural Network Intelligent Perception and Computing Technology Beijing Key Lab Beijing 100083 China
The speech denoising model based on adversarial generative network has achieved better results than the traditional machine learning model. In this paper, for the short cut connection in the generator, we discuss its ...
来源: 评论
PGGAN: Improve Password Cover Rate Using the Controller
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1856卷
作者: Xiaozhou Guo Yi Liu Kaijun Tan Min Jin Huaxiang Lu Institute of Semiconductors Chinese Academy of Sciences Beijing 100083 China University of Chinese Academy of Sciences Beijing 100089 China CAS Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences Beijing 200031 China Semiconductor Neural Network Intelligent Perception and Computing Technology Beijing Key Lab Beijing 100083 China
Password generation model based on generative adversarial network usually has the problem of high duplicate rate, which further leads to low cover rate. In this regard, we propose PGGAN model. It sets up an additional...
来源: 评论
An application of insurance mechanism in risk management for energy internet
收藏 引用
High technology Letters 2018年 第2期24卷 196-202页
作者: Yang Yunxue Zhang Qin Zhang Libo CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 P. R. China College of Economics and Management Nanjing University of Aeronautics and Astronautics Nanjing 210016 P. R. China Business College Yantai Nanshan University Yantai 265713 P. R. China
As a completely new residential distribution infrastructure,energy internet facilitates transactions of equipment,energy and services. However,there is security risk under all the *** paper proposes an electricity pri... 详细信息
来源: 评论
MQGrad: Reinforcement learning of gradient quantization in parameter server
arXiv
收藏 引用
arXiv 2018年
作者: Cui, Guoxin Xu, Jun Zeng, Wei Lan, Yanyan Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of ComputingTechnology Chinese Academy of Sciences Beijing100190 China
One of the most significant bottleneck in training large scale machine learning models on parameter server (PS) is the communication overhead, because it needs to frequently exchange the model gradients between the wo... 详细信息
来源: 评论
Dynamic-K recommendation with personalized decision boundary  23rd
Dynamic-K recommendation with personalized decision boundary
收藏 引用
23rd China conference on Information Retrieval, CCIR 2017
作者: Gao, Yan Guo, Jiafeng Lan, Yanyan Liao, Huaming CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
In this paper, we investigate the recommendation task in the most common scenario with implicit feedback (e.g., clicks, purchases). State-of-the-art methods in this direction usually cast the problem as to learn a per... 详细信息
来源: 评论