咨询与建议

限定检索结果

文献类型

  • 916 篇 会议
  • 544 篇 期刊文献
  • 61 册 图书

馆藏范围

  • 1,521 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 964 篇 工学
    • 781 篇 计算机科学与技术...
    • 651 篇 软件工程
    • 191 篇 信息与通信工程
    • 136 篇 控制科学与工程
    • 107 篇 生物工程
    • 95 篇 电气工程
    • 82 篇 生物医学工程(可授...
    • 68 篇 电子科学与技术(可...
    • 63 篇 化学工程与技术
    • 61 篇 光学工程
    • 49 篇 机械工程
    • 45 篇 动力工程及工程热...
    • 44 篇 建筑学
    • 38 篇 土木工程
    • 32 篇 材料科学与工程(可...
    • 29 篇 仪器科学与技术
  • 498 篇 理学
    • 288 篇 数学
    • 121 篇 生物学
    • 91 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 58 篇 化学
    • 55 篇 系统科学
  • 341 篇 管理学
    • 195 篇 图书情报与档案管...
    • 157 篇 管理科学与工程(可...
    • 68 篇 工商管理
  • 101 篇 医学
    • 82 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 43 篇 药学(可授医学、理...
    • 33 篇 公共卫生与预防医...
  • 35 篇 法学
    • 30 篇 社会学
  • 20 篇 教育学
  • 20 篇 农学
  • 17 篇 经济学
  • 7 篇 文学
  • 3 篇 哲学
  • 2 篇 历史学
  • 1 篇 军事学

主题

  • 67 篇 artificial intel...
  • 60 篇 computer science
  • 59 篇 knowledge engine...
  • 42 篇 data mining
  • 42 篇 semantics
  • 32 篇 deep learning
  • 29 篇 computational mo...
  • 29 篇 machine learning
  • 29 篇 accuracy
  • 28 篇 training
  • 27 篇 ontologies
  • 25 篇 feature extracti...
  • 25 篇 information stor...
  • 21 篇 information syst...
  • 21 篇 support vector m...
  • 21 篇 knowledge manage...
  • 21 篇 technological in...
  • 20 篇 computational in...
  • 20 篇 educational inst...
  • 19 篇 database managem...

机构

  • 86 篇 college of compu...
  • 73 篇 lovely professio...
  • 41 篇 key laboratory o...
  • 30 篇 institute of aer...
  • 27 篇 beijing key labo...
  • 25 篇 lloyd institute ...
  • 22 篇 institute of aer...
  • 21 篇 school of comput...
  • 17 篇 department of co...
  • 17 篇 global knowledge...
  • 16 篇 school of comput...
  • 15 篇 lloyd institute ...
  • 15 篇 department of da...
  • 13 篇 school of inform...
  • 13 篇 school of artifi...
  • 13 篇 department of co...
  • 12 篇 key laboratory o...
  • 12 篇 department of co...
  • 12 篇 lloyd law colleg...
  • 12 篇 department of ma...

作者

  • 21 篇 sun geng
  • 19 篇 niyato dusit
  • 17 篇 olfa nasraoui
  • 17 篇 nürnberger andre...
  • 16 篇 amit joshi
  • 16 篇 nasraoui olfa
  • 15 篇 praveen
  • 15 篇 li jiahui
  • 13 篇 liang yanchun
  • 13 篇 wang jiacheng
  • 12 篇 chang yi
  • 12 篇 wu xindong
  • 12 篇 chatterjee soumi...
  • 12 篇 nilanjan dey
  • 11 篇 he jun
  • 11 篇 nijhawan ginni
  • 11 篇 du xiaoyong
  • 11 篇 asha v.
  • 11 篇 ginni nijhawan
  • 11 篇 fürnkranz johann...

语言

  • 1,412 篇 英文
  • 93 篇 其他
  • 15 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Knowledge Engineering and Computer Science"
1521 条 记 录,以下是1041-1050 订阅
排序:
Web of data and web of entities: Identity and reference in interlinked data in the semantic web
收藏 引用
Philosophy and Technology 2012年 第1期25卷 5-26页
作者: Bouquet, Paolo Stoermer, Heiko Vignolo, Massimiliano Department of Information Engineering and Computer Science University of Trento Trento Italy Fondazione Bruno Kessler Data Knowledge Management Unit Trento Trento Italy
Using web standards, such as uniform resource identifiers (URIs), XML and HTTP, for naming and describing resources which are not information objects is the key difference between the Web as we know it today and the S... 详细信息
来源: 评论
POSTER: Privacy preserving boosting in the cloud with secure half-space queries
POSTER: Privacy preserving boosting in the cloud with secure...
收藏 引用
2012 ACM Conference on computer and Communications Security, CCS 2012
作者: Guo, Shumin Chen, Keke Ohio Center of Excellence in Knowledge Enabled Computing Department of Computer Science and Engineering Wright State University Dayton OH 45435 United States
This poster presents a preliminary study on the PerturBoost approach that aims to provide efficient and secure classifier learning in the cloud with both data and model privacy preserved.
来源: 评论
N-Grams and the Last-Good-Reply Policy applied in General Game Playing
N-Grams and the Last-Good-Reply Policy applied in General Ga...
收藏 引用
24th Benelux Conference on Artificial Intelligence, BNAIC 2012
作者: Tak, Mandy J.W. Winands, Mark H.M. Björnsson, Yngvi Games and AI Group Department of Knowledge Engineering Maastricht University Maastricht Netherlands School of Computer Science Reykjavík University Reykjavík Iceland
来源: 评论
A machine learning approach for instance matching based on similarity metrics
A machine learning approach for instance matching based on s...
收藏 引用
11th International Semantic Web Conference, ISWC 2012
作者: Rong, Shu Niu, Xing Xiang, Evan Wei Wang, Haofen Yang, Qiang Yu, Yong APEX Data and Knowledge Management Lab Shanghai Jiao Tong University China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong
The Linking Open Data (LOD) project is an ongoing effort to construct a global data space, i.e. the Web of Data. One important part of this project is to establish owl:sameAs links among structured data sources. Such ... 详细信息
来源: 评论
An open source tool for heart rate variability wavelet-based spectral analysis
An open source tool for heart rate variability wavelet-based...
收藏 引用
International Conference on Bio-inspired Systems and Signal Processing, BIOSIGNALS 2012
作者: García, Constantino A. Otero, Abraham Vila, Xosé Lado, María J. Department of Software and Knowledge Engineering University San Pablo CEU 28668 Madrid Spain Department of Computer Science University of Vigo Campus As Lagoas s/n 32004 Ourense Spain
Heart rate variability (HRV) power spectrum analysis is a well-known technique used to study the activity of the autonomic nervous system. It is performed by calculating the spectral power of certain bands of the RR t... 详细信息
来源: 评论
Evaluating SPAN incremental learning for handwritten digit recognition
Evaluating SPAN incremental learning for handwritten digit r...
收藏 引用
19th International Conference on Neural Information Processing, ICONIP 2012
作者: Mohemmed, Ammar Lu, Guoyu Kasabov, Nikola Knowledge Engineering Discovery Research Institute Auckland University of Technology New Zealand Institute for Neuroinformatics ETH University of Zurich Switzerland Department of Information Engineering and Computer Science University of Trento Italy
In a previous work [12, 11], the authors proposed SPAN: a learning algorithm based on temporal coding for Spiking Neural Network (SNN). The algorithm trains a neuron to associate target spike patterns to input spatio-... 详细信息
来源: 评论
Proximity-based rocchio's model for pseudo relevance  12
Proximity-based rocchio's model for pseudo relevance
收藏 引用
35th Annual ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2012
作者: Miao, Jun Huang, Jimmy Xiangji Ye, Zheng Information Retrieval and Knowledge Management Research Lab. Department of Computer Science and Engineering York University Toronto ON Canada Information Retrieval and Knowledge Management Research Lab. School of Information Technology York University Toronto ON Canada
Rocchio's relevance feedback model is a classic query expansion method and it has been shown to be effective in boosting information retrieval performance. The selection of expansion terms in this method, however,... 详细信息
来源: 评论
York University at TREC 2012: CrowdSourcing Track  21
York University at TREC 2012: CrowdSourcing Track
收藏 引用
21st Text REtrieval Conference, TREC 2012
作者: Hu, Qinmin Xu, Zhi Huang, Xiangji Ye, Zheng Information Retrieval and Knowledge Managment Lab York University Toronto Canada Department of Computer Science & Engineering York University Toronto Canada School of Information Technology York University Toronto Canada
The objective of this work is to address the challenges in managing and analyzing crowdsourcing in the information retrieval field. In particular, we would like to answer the following questions: (1) how to control th... 详细信息
来源: 评论
Design and Realization of Competence Profiling Tool for Effective Selection of Professionals in Maintenance Management
Design and Realization of Competence Profiling Tool for Effe...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Mahdi Bohlouli Fazel Ansari Madjid Fathi Institute of Knowledge Based Systems and Knowledge Management (KBS & KM) Department of Electrical Engineering and Computer Science University of Siegen
Enterprises and industrial companies strive to improve their functional performance by identification of core competencies in order to utilize human resources and optimise the knowledge integration processes of the co... 详细信息
来源: 评论
A novel based-node level security strategy in wireless sensor network
A novel based-node level security strategy in wireless senso...
收藏 引用
2012 International Conference on Information Management, Innovation Management and Industrial engineering, ICIII 2012
作者: Zheng, Yue-Feng Chen, Zhuo-Ran Han, Jia-Yu Li, Zheng BoDa College Jilin Normal University Si Ping China College of Computer Science and Technology Jilin University Key Laboratory of SymComputation and Knowledge Engineering Chang Chun China Computer Department BoDa College Jilin Normal University Si Ping China
In Wireless Sensor Networks,Security is very important, especially in the networks which require high security. This paper raises a method to establish key distribution scheme, based on node layer security system, whi... 详细信息
来源: 评论