咨询与建议

限定检索结果

文献类型

  • 265 篇 会议
  • 259 篇 期刊文献
  • 11 册 图书

馆藏范围

  • 535 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 361 篇 工学
    • 287 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 84 篇 信息与通信工程
    • 59 篇 生物工程
    • 47 篇 电气工程
    • 35 篇 生物医学工程(可授...
    • 34 篇 控制科学与工程
    • 29 篇 光学工程
    • 22 篇 建筑学
    • 21 篇 电子科学与技术(可...
    • 20 篇 土木工程
    • 18 篇 化学工程与技术
    • 15 篇 机械工程
    • 12 篇 航空宇航科学与技...
    • 11 篇 动力工程及工程热...
  • 233 篇 理学
    • 147 篇 数学
    • 66 篇 统计学(可授理学、...
    • 62 篇 生物学
    • 53 篇 物理学
    • 25 篇 系统科学
    • 18 篇 化学
    • 15 篇 大气科学
  • 108 篇 管理学
    • 64 篇 图书情报与档案管...
    • 41 篇 管理科学与工程(可...
    • 20 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 22 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 14 篇 法学
    • 13 篇 社会学
  • 6 篇 农学
  • 5 篇 经济学
  • 3 篇 教育学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 17 篇 artificial intel...
  • 14 篇 data mining
  • 12 篇 computer science
  • 12 篇 training
  • 11 篇 semantics
  • 10 篇 knowledge engine...
  • 10 篇 knowledge manage...
  • 10 篇 data engineering
  • 10 篇 standards
  • 9 篇 convolution
  • 9 篇 feature extracti...
  • 8 篇 generative adver...
  • 8 篇 database managem...
  • 8 篇 electrocardiogra...
  • 8 篇 multiobjective o...
  • 7 篇 information syst...
  • 7 篇 magnetic resonan...
  • 7 篇 ontologies
  • 7 篇 machine learning
  • 7 篇 accuracy

机构

  • 56 篇 department of da...
  • 56 篇 department of da...
  • 27 篇 department of ma...
  • 21 篇 school of inform...
  • 21 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 college of compu...
  • 9 篇 college of compu...
  • 8 篇 key labs of data...
  • 8 篇 key laboratory o...
  • 7 篇 department of co...
  • 7 篇 maastricht unive...
  • 7 篇 key laboratory o...
  • 6 篇 genomics researc...
  • 6 篇 centre for behav...
  • 5 篇 university centr...
  • 5 篇 department of pu...
  • 5 篇 key laboratory o...
  • 5 篇 school of econom...
  • 5 篇 amity institute ...

作者

  • 24 篇 he jun
  • 23 篇 liu hongyan
  • 22 篇 du xiaoyong
  • 21 篇 spanakis gerasim...
  • 18 篇 sun geng
  • 18 篇 browne cameron
  • 18 篇 mehrkanoon siama...
  • 17 篇 soemers dennis j...
  • 17 篇 stephenson matth...
  • 17 篇 nürnberger andre...
  • 16 篇 niyato dusit
  • 14 篇 wang jiacheng
  • 13 篇 li jiahui
  • 13 篇 niehues jan
  • 12 篇 wu xindong
  • 12 篇 chatterjee soumi...
  • 12 篇 piette éric
  • 10 篇 speck oliver
  • 9 篇 bonizzi pietro
  • 8 篇 chen hong

语言

  • 517 篇 英文
  • 14 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Data Science and Knowledge Engineering"
535 条 记 录,以下是111-120 订阅
排序:
Avoiding "big brother" anxiety with progressive self-management of ubiquitous computing services  5
Avoiding "big brother" anxiety with progressive self-managem...
收藏 引用
5th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2008
作者: Feeney, Kevin Lewis, Dave McGlinn, Kris O'Sullivan, Declan Holohan, Anne Knowledge and Data Engineering Group School of Computer Science and Statistics Trinity College Dublin Ireland Department of Sociology Trinity College Dublin Ireland
Despite the significant research over the last ten years, commercial ubiquitous computing environments and pervasive applications remain thin on the ground. This paper looks at the explosion in application creativity ... 详细信息
来源: 评论
Depth-first algorithm of finding all association rules generated by a frequent itemset
收藏 引用
Journal of Donghua University (English Edition) 2006年 第6期23卷 1-4+9页
作者: Wu, Kun Jiang, Bao-Qing Wei, Qing Institute of Data and Knowledge Engineering Henan University Kaifeng 475001 China Personnel Department Zhengzhou Institute of Aeronautical Industry Management Zhengzhou 450000 China Computer Science Department Henan University of Finance and Economics Zhengzhou 450000 China
The classical algorithm of finding association rules generated by a frequent itemset has to generate all nonempty subsets of the frequent itemset as candidate set of consequents. Xiongfei Li aimed at this and proposed... 详细信息
来源: 评论
Mining user interests from information sharing behaviors in social media
收藏 引用
17th Pacific-Asia Conference on knowledge Discovery and data Mining, PAKDD 2013
作者: Wang, Tingting Liu, Hongyan He, Jun Du, Xiaoyong Key Labs. of Data Engineering and Knowledge Engineering China School of Information Renmin University of China 100872 China Department of Management Science and Engineering Tsinghua University 100084 China
Mining user interests and preference plays an important role for many applications such as information retrieval and recommender systems. This paper intends to study how to infer interests for new users and inactive u... 详细信息
来源: 评论
Combining spatial cloaking and dummy generation for location privacy preserving
Combining spatial cloaking and dummy generation for location...
收藏 引用
8th International Conference on Advanced data Mining and Applications, ADMA 2012
作者: Xu, Nana Zhu, Dan Liu, Hongyan He, Jun Du, Xiaoyong Liu, Tao Key Labs. of Data Engineering and Knowledge Engineering Ministry of Education China School of Information Renmin University of China China Department of Management Science and Engineering Tsinghua University China
Location privacy preserving is attracting more and more attentions with the wide use of accurate positioning devices. Two kinds of methods based on k-anonymity have been proposed for location privacy preserving. One i... 详细信息
来源: 评论
VID Join: Mapping Trajectories to Points of Interest to Support Location-Based Services
收藏 引用
Journal of Computer science & Technology 2015年 第4期30卷 725-744页
作者: 商烁 谢珂心 郑凯 刘家俊 文继荣 Department of Computer Science China University of Petroleum Beijing 102249 China School of Information Technology and Electrical Engineering The University of Queensland Brisbane QLD 4072 Australia School of Computer Science and Technology Soochow University Suzhou 215006 China Commonwealth Scientific and Industrial Research Organisation Kenmore QLD 4069 Australia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing 100080 China
Variable influence duration (VID) join is a novel spatio-temporal join operation between a set T of trajectories and a set P of spatial points. Here, trajectories are traveling histories of moving objects (e.g., tr... 详细信息
来源: 评论
Detecting Hot Events from Web Search Logs
Detecting Hot Events from Web Search Logs
收藏 引用
11th International Conference on Web-Age Information Management (WAIM 2010)
作者: Gu, Yingqin Cui, Jianwei Liu, Hongyan Jiang, Xuan He, Jun Du, Xiaoyong Li, Zhixu Key Labs. of Data Engineering and Knowledge Engineering Ministry of Education China School of Information Renmin University of China Beijing 100872 China Department of Management Science and Engineering Tsinghua University Beijing 100084 China
Detecting events from web resources is a challenging task, attracting many attentions in recent years. Web search log is an important data source for event detection because the information it contains reflects users&... 详细信息
来源: 评论
Effectively grouping named entities from clickthrough data into clusters of generated keywords  16
Effectively grouping named entities from clickthrough data i...
收藏 引用
16th Pacific Asia Conference on Information Systems, PACIS 2012
作者: Jiang, Xuan Liu, Hongyan He, Jun Zhu, Rui Du, Xiaoyong Key Labs of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China Beijing China Department of Management Science and Engineering Tsinghua University Beijing China
Many studies show that named entities are closely related to users' search behaviors, which brings increasing interest in studying named entities in search logs recently. This paper addresses the problem of formin... 详细信息
来源: 评论
Detecting event rumors on Sina Weibo automatically
Detecting event rumors on Sina Weibo automatically
收藏 引用
15th Asia-Pacific Web Conference on Web Technologies and Applications, APWeb 2013
作者: Sun, Shengyun Liu, Hongyan He, Jun Du, Xiaoyong Key Labs. of Data Engineering and Knowledge Engineering China School of Information Renmin University of China 100872 China Department of Management Science and Engineering Tsinghua University 100084 China
Sina Weibo has become one of the most popular social networks in China. In the meantime, it also becomes a good place to spread various spams. Unlike previous studies on detecting spams such as ads, pornographic messa... 详细信息
来源: 评论
A framework for specification and performance evaluation of service discovery protocols in mobile ad-hoc networks
收藏 引用
Ad Hoc Networks 2006年 第1期4卷 1-23页
作者: Shenoi, Avinash Yesha, Yelena Yesha, Yaacov Joshi, Anupam Department of Computer Science and Electrical Engineering University of Maryland Baltimore County 1000 Hilltop Circle Baltimore MD 21250 United States Ebiquity Research Group Department of Computer Science and Electrical Engineering University of Maryland Baltimore County IEEE Transaction on Knowledge and Data Engineering IEEE ACM UMBC IEEE Transactions of Fuzzy Systems IEEE IEEE-CS ACM
Service discovery protocols are extremely important for developing distributed applications in ad-hoc environments. However to perform Service Discovery in mobile ad-hoc networks requires the design and development of... 详细信息
来源: 评论
Acute MI Detection Derived from ECG Parameters Distribution
Acute MI Detection Derived from ECG Parameters Distribution
收藏 引用
2019 Computing in Cardiology, CinC 2019
作者: Aranda, Alfonso Karel, Joël Bonizzi, Pietro Peeters, Ralf Maastricht University Department of Data Science and Knowledge Engineering Netherlands Medtronic Bakken Research Center Endepolsdomein 5 Maastricht6229GW Netherlands
Several studies in the past have evaluated the use of different ECG-based features to diagnose acute myocardial infarction (AMI). This was generally done by looking at how well a feature reflects differences between b... 详细信息
来源: 评论