咨询与建议

限定检索结果

文献类型

  • 453 篇 会议
  • 364 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 818 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 515 篇 工学
    • 423 篇 计算机科学与技术...
    • 356 篇 软件工程
    • 119 篇 信息与通信工程
    • 55 篇 控制科学与工程
    • 54 篇 生物工程
    • 40 篇 电气工程
    • 29 篇 机械工程
    • 29 篇 化学工程与技术
    • 28 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 动力工程及工程热...
    • 17 篇 仪器科学与技术
    • 15 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 光学工程
    • 11 篇 材料科学与工程(可...
  • 230 篇 管理学
    • 139 篇 图书情报与档案管...
    • 116 篇 管理科学与工程(可...
    • 36 篇 工商管理
  • 212 篇 理学
    • 126 篇 数学
    • 53 篇 生物学
    • 36 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 31 篇 化学
    • 15 篇 系统科学
  • 34 篇 法学
    • 29 篇 社会学
  • 22 篇 医学
    • 20 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 12 篇 药学(可授医学、理...
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 6 篇 教育学
  • 5 篇 文学
  • 4 篇 农学
  • 1 篇 艺术学

主题

  • 41 篇 semantics
  • 28 篇 data mining
  • 25 篇 training
  • 22 篇 knowledge engine...
  • 16 篇 feature extracti...
  • 15 篇 conferences
  • 15 篇 big data
  • 15 篇 laboratories
  • 15 篇 computational mo...
  • 14 篇 task analysis
  • 14 篇 information retr...
  • 13 篇 xml
  • 13 篇 databases
  • 12 篇 knowledge graph
  • 12 篇 wireless sensor ...
  • 12 篇 visualization
  • 12 篇 data models
  • 11 篇 query processing
  • 11 篇 deep learning
  • 11 篇 search engines

机构

  • 153 篇 school of inform...
  • 104 篇 school of comput...
  • 44 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 32 篇 school of inform...
  • 29 篇 jiangxi key labo...
  • 29 篇 key laboratory o...
  • 27 篇 key laboratory o...
  • 23 篇 key laboratory o...
  • 19 篇 school of inform...
  • 19 篇 key laboratory o...
  • 19 篇 college of compu...
  • 18 篇 school of econom...
  • 18 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 16 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 school of inform...

作者

  • 43 篇 chen hong
  • 33 篇 du xiaoyong
  • 28 篇 zhang jing
  • 26 篇 li cuiping
  • 26 篇 wang meng
  • 25 篇 wu xindong
  • 25 篇 xiaoyong du
  • 24 篇 wang shan
  • 22 篇 xindong wu
  • 18 篇 liu jun
  • 18 篇 huang qingming
  • 17 篇 xu qianqian
  • 17 篇 wan changxuan
  • 16 篇 hong richang
  • 15 篇 meng wang
  • 15 篇 hong chen
  • 15 篇 wang yang
  • 15 篇 chenyang bu
  • 13 篇 xuegang hu
  • 13 篇 zhao zhang

语言

  • 764 篇 英文
  • 34 篇 其他
  • 20 篇 中文
检索条件"机构=In formation School and Key Laboratory of Data Engineering and Knowledge Engineering"
818 条 记 录,以下是531-540 订阅
排序:
Automatic Life Event Tree Generation for Older Adults  1
收藏 引用
24th International Conference on Human-Computer Interaction, HCII 2022
作者: Gui, Fang Wu, Xi Hu, Min Yang, Jiaoyun School of Computer Science and Information Engineering Hefei University of Technology Hefei China Key Laboratory of Knowledge Engineering with Big Data of Ministry of Education Hefei University of Technology Hefei China National Smart Eldercare International S&T Cooperation Base Hefei University of Technology Hefei China Laboratory of Affective Computing and Advanced Intelligent Machine Hefei University of Technology Hefei China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei University of Technology Hefei China
Studies have shown that learning personal stories could help provide individualized eldercare services. However, personal stories are often disordered because of the scattered collection, including informal interviews... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
An Edit Distance Algorithm with Block Swap
An Edit Distance Algorithm with Block Swap
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Tian Xia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Resource Management Renmin University of China. Beijing 100872 China
The edit distance between two given strings X and Y is the minimum number of edit operations that transform X into Y. In ordinary course, string editing is based on character insert, delete, and substitute operations.... 详细信息
来源: 评论
Iterative context-aware graph inference for visual dialog
arXiv
收藏 引用
arXiv 2020年
作者: Guo, Dan Wang, Hui Zhang, Hanwang Zha, Zheng-Jun Wang, Meng Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology School of Computer Science and Information Engineering Hefei University of Technology Nanyang Technological University University of Science and Technology of China
Visual dialog is a challenging task that requires the comprehension of the semantic dependencies among implicit visual and textual contexts. This task can refer to the relation inference in a graphical model with spar... 详细信息
来源: 评论
NUITS: a novel user interface for efficient keyword search over databases  06
NUITS: a novel user interface for efficient keyword search o...
收藏 引用
Proceedings of the 32nd international conference on Very large data bases
作者: Shan Wang Zhaohui Peng Jun Zhang Lu Qin Sheng Wang Jeffrey Xu Yu Bolin Ding School of Information Renmin Univ. of China Key Laboratory of Data Engineering and Knowledge Engineering MOE of China Beijing China Department of Systems Engineering and Engineering Management The Chinese Univ. of Hong Kong Hong Kong China
The integration of database and information retrieval techniques provides users with a wide range of high quality services. We present a prototype system, called NUITS, for efficiently processing keyword queries on to...
来源: 评论
Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge Attention
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Da Feng, Lin Fan, Yuqi Shang, Siyuan Wei, Zhenchun The Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Ministry of Education China School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei230009 China
It is imperative to assure the security of smart contracts via intelligent vulnerability detection tools before deploying smart contracts on blockchains. The existing deep learning-based approaches fail to effectively... 详细信息
来源: 评论
Deep Semantic-Enhanced Event Detection via Symmetric Graph Convolutional Network
Deep Semantic-Enhanced Event Detection via Symmetric Graph C...
收藏 引用
IEEE International Conference on Big knowledge (ICBK)
作者: Chenchen Sun Xingrui Zhuo Zhenya Lu Chenyang Bu Gongqing Wu Key Laboratory of Knowledge Engineering with Big Data (the Ministry of Education of China) Hefei University of Technology Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Event detection, an important research topic of information extraction, aims to automatically identify and classify event instances from the text. Previous studies have introduced methods combining syntactic informati... 详细信息
来源: 评论
Malicious Web Pages Detection Based on Abnormal Visibility Recognition
Malicious Web Pages Detection Based on Abnormal Visibility R...
收藏 引用
International Conference on E-Business and Information System Security, EBISS
作者: Bin Liang Jianjun Huang Fang Liu Dawei Wang Daxiang Dong Zhaohui Liang Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China Beijing China School of Information Renmin University of China Beijing China Renmin University of China Beijing CN
In recent years, Web sites have already become the attackers' main target. When attackers embed malicious code in the Web pages, they generally change the display mode of the corresponding HTML tags to make the di... 详细信息
来源: 评论
Performance study on logging to another main memory database
Performance study on logging to another main memory database
收藏 引用
International Conference on New Trends in Information and Service Science, NISS
作者: Xiongpai Qin Xiaoyun Zhou Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing 100872 China Department of Computer Science and Technology Xuzhou Normal University Jiangsu 221008 China
In update intensive main memory database applications, huge volume of log records is generated, to maintain the ACID properties of the database system, the log records should be persistent efficiently. Delegating logg... 详细信息
来源: 评论