咨询与建议

限定检索结果

文献类型

  • 455 篇 会议
  • 367 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 823 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 517 篇 工学
    • 424 篇 计算机科学与技术...
    • 356 篇 软件工程
    • 119 篇 信息与通信工程
    • 55 篇 控制科学与工程
    • 54 篇 生物工程
    • 40 篇 电气工程
    • 29 篇 机械工程
    • 29 篇 化学工程与技术
    • 28 篇 电子科学与技术(可...
    • 25 篇 生物医学工程(可授...
    • 19 篇 动力工程及工程热...
    • 17 篇 仪器科学与技术
    • 15 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 光学工程
    • 11 篇 材料科学与工程(可...
  • 230 篇 管理学
    • 139 篇 图书情报与档案管...
    • 116 篇 管理科学与工程(可...
    • 36 篇 工商管理
  • 213 篇 理学
    • 126 篇 数学
    • 53 篇 生物学
    • 36 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 31 篇 化学
    • 16 篇 系统科学
  • 34 篇 法学
    • 29 篇 社会学
  • 23 篇 医学
    • 20 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 12 篇 药学(可授医学、理...
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 6 篇 教育学
  • 5 篇 文学
  • 4 篇 农学
  • 1 篇 艺术学

主题

  • 41 篇 semantics
  • 28 篇 data mining
  • 25 篇 training
  • 22 篇 knowledge engine...
  • 16 篇 feature extracti...
  • 15 篇 conferences
  • 15 篇 big data
  • 15 篇 laboratories
  • 15 篇 computational mo...
  • 14 篇 task analysis
  • 14 篇 information retr...
  • 13 篇 xml
  • 13 篇 databases
  • 12 篇 knowledge graph
  • 12 篇 wireless sensor ...
  • 12 篇 visualization
  • 12 篇 data models
  • 11 篇 query processing
  • 11 篇 deep learning
  • 11 篇 search engines

机构

  • 153 篇 school of inform...
  • 104 篇 school of comput...
  • 44 篇 key laboratory o...
  • 40 篇 key laboratory o...
  • 32 篇 school of inform...
  • 29 篇 jiangxi key labo...
  • 29 篇 key laboratory o...
  • 27 篇 key laboratory o...
  • 23 篇 key laboratory o...
  • 19 篇 school of inform...
  • 19 篇 key laboratory o...
  • 19 篇 college of compu...
  • 18 篇 school of econom...
  • 18 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 16 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 school of inform...

作者

  • 43 篇 chen hong
  • 33 篇 du xiaoyong
  • 28 篇 zhang jing
  • 26 篇 li cuiping
  • 26 篇 wang meng
  • 25 篇 wu xindong
  • 25 篇 xiaoyong du
  • 24 篇 wang shan
  • 22 篇 xindong wu
  • 18 篇 liu jun
  • 18 篇 huang qingming
  • 17 篇 xu qianqian
  • 17 篇 wan changxuan
  • 16 篇 hong richang
  • 15 篇 meng wang
  • 15 篇 hong chen
  • 15 篇 wang yang
  • 15 篇 chenyang bu
  • 13 篇 xuegang hu
  • 13 篇 zhao zhang

语言

  • 769 篇 英文
  • 34 篇 其他
  • 20 篇 中文
检索条件"机构=In formation School and Key Laboratory of Data Engineering and Knowledge Engineering"
823 条 记 录,以下是661-670 订阅
排序:
Visual group identification method of technical competitors using LinLog graph clustering algorithm
Visual group identification method of technical competitors ...
收藏 引用
IEEE International Conference on Computer Science and Automation engineering
作者: Han, Hong-Qi An, Xiaomi Zhu, Donghua Wang, Xuefeng Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Management and Economics Beijing Institute of Technology Beijing 100872 China
Visualization technique is a powerful method used by science and technology intelligence analysis experts to identify technical competitor groups. Common visualization methods tend to create graphs meeting the aesthet... 详细信息
来源: 评论
Formal analysis of trusted computing: One case study
Formal analysis of trusted computing: One case study
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. W... 详细信息
来源: 评论
B-IRP: An improving integrity report protocol for remote attestation
B-IRP: An improving integrity report protocol for remote att...
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re... 详细信息
来源: 评论
Clustering XML search results based on content and structure similarity
Clustering XML search results based on content and structure...
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Min-Juan, Zhong Chang-Xuan, Wan De-Xi, Liu Xian-Pei, Jiao School of Information and Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
Clustering XML search results is an effective way to improve performance. However, the key problem is how to measure similarity between XML documents. In this paper, we propose a semantic similarity measure method com... 详细信息
来源: 评论
Effect factors on secondary structure of protein sequence pattern
Effect factors on secondary structure of protein sequence pa...
收藏 引用
International Workshop on Intelligent Systems and Applications
作者: Liu, Tao Li, Minghui Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
Discovering the relationship between protein sequence pattern and protein secondary structure is important for accurately predicting secondary structure of protein sequence. A protein secondary structure pattern dicti... 详细信息
来源: 评论
Selection of multimedia data source based on user feedback
Selection of multimedia data source based on user feedback
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Deng, Song Wan, Changxuan Liu, Xiping School of Information Technology Jiangxi University of Finance and Ecomomics Nanchang China School of Software Jiangxi Agricultural University Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
There are hundreds or thousands of web data sources providing data of relevance to a particular domain on the Web, so how to find a suitable set of sources quickly to integrate from a number of sources is becoming mor... 详细信息
来源: 评论
Sentiment classification via L2-norm deep belief network  11
Sentiment classification via L2-norm deep belief network
收藏 引用
20th ACM Conference on Information and knowledge Management, CIKM'11
作者: Liu, Tao Li, Minghui Zhou, Shusen Du, Xiaoyong Key Laboratory of Data Engineering and Knowledge Engineering MOE 100872 Beijing China School of Information Renmin University of China 100872 Beijing China Microsoft Asian Research and Development Group 100080 Beijing China Shenzhen Graduate School Harbin Institute of Technology 518055 Shenzhen China
Automatic analysis of sentiments expressed in large scale online reviews is very important for intelligent business applications. Sentiment classification is the most popular task of sentiment analysis, which is more ... 详细信息
来源: 评论
A practice probability frequent pattern mining method over transactional uncertain data streams
A practice probability frequent pattern mining method over t...
收藏 引用
Lecture Notes in Computer Science
作者: Liao, Guoqiong Wu, Linqing Wan, Changxuan Xiong, Naixue School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China Department of Computer Science Georgia State University United States
In recent years, large amounts of uncertain data are emerged with the widespread employment of the new technologies, such as wireless sensor networks, RFID and privacy protection. According to the features of the unce... 详细信息
来源: 评论
K-nearest neighbors in uncertain graph
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第10期48卷 1850-1858页
作者: Zhang, Yinglong Li, Cuiping Chen, Hong Du, Lingxia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Computer and Information Engineer Jiangxi Agriculture University Nanchang 330045 China
In many areas, a lot of data have been modeled by graphs which are subject to uncertainties, such as molecular compounds and protein interaction networks. While many real applications, for example, collaborative filte... 详细信息
来源: 评论
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study
On Mutual Support of Modern and Traditional Access Control M...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Hui Feng Wenchang Shi Zhaohui Liang Bin Liang School of Information Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Renmin University of China Beijing China
Access control is essential to computer security, especially in an open, distributed, networked communication environment. Modern access control model such as UCON aims at accommodating general requirements. Tradition... 详细信息
来源: 评论