咨询与建议

限定检索结果

文献类型

  • 251 篇 会议
  • 238 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 307 篇 工学
    • 247 篇 计算机科学与技术...
    • 209 篇 软件工程
    • 60 篇 信息与通信工程
    • 45 篇 生物工程
    • 37 篇 电气工程
    • 30 篇 控制科学与工程
    • 25 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 24 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 13 篇 建筑学
    • 10 篇 化学工程与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
    • 7 篇 安全科学与工程
    • 7 篇 网络空间安全
  • 167 篇 理学
    • 97 篇 数学
    • 51 篇 生物学
    • 33 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 10 篇 化学
  • 116 篇 管理学
    • 71 篇 图书情报与档案管...
    • 49 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 35 篇 医学
    • 31 篇 临床医学
    • 19 篇 基础医学(可授医学...
    • 11 篇 公共卫生与预防医...
    • 11 篇 药学(可授医学、理...
  • 13 篇 法学
    • 12 篇 社会学
  • 6 篇 经济学
  • 5 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 data mining
  • 19 篇 knowledge engine...
  • 18 篇 semantics
  • 16 篇 machine learning
  • 12 篇 artificial intel...
  • 11 篇 visualization
  • 11 篇 algorithm design...
  • 9 篇 deep learning
  • 9 篇 association rule...
  • 8 篇 magnetic resonan...
  • 8 篇 knowledge graph
  • 8 篇 training
  • 8 篇 ontology
  • 7 篇 neural networks
  • 7 篇 computational mo...
  • 7 篇 blockchain
  • 7 篇 accuracy
  • 7 篇 forecasting
  • 6 篇 big data
  • 6 篇 computers

机构

  • 49 篇 institute of dat...
  • 21 篇 school of comput...
  • 20 篇 school of inform...
  • 16 篇 school of cyber ...
  • 15 篇 college of compu...
  • 14 篇 data and knowled...
  • 13 篇 key laboratory o...
  • 12 篇 faculty of compu...
  • 12 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 key laboratory o...
  • 10 篇 key laboratory o...
  • 10 篇 key laboratory o...
  • 10 篇 center for behav...
  • 9 篇 german center fo...
  • 9 篇 institute for me...
  • 9 篇 biomedical magne...
  • 9 篇 university of ch...
  • 9 篇 key laboratory o...
  • 8 篇 institute of art...

作者

  • 25 篇 nürnberger andre...
  • 19 篇 huang qingming
  • 18 篇 chatterjee soumi...
  • 18 篇 xu qianqian
  • 17 篇 speck oliver
  • 13 篇 stumme gerd
  • 12 篇 meng wang
  • 12 篇 yang zhiyong
  • 12 篇 zhao zhang
  • 11 篇 cao xiaochun
  • 10 篇 shen xiajiong
  • 9 篇 rose georg
  • 9 篇 wang meng
  • 9 篇 hotho andreas
  • 9 篇 li xirong
  • 8 篇 zhang lei
  • 7 篇 haijun zhang
  • 7 篇 liu zhenguang
  • 7 篇 lei zhang
  • 7 篇 jiao yingying

语言

  • 472 篇 英文
  • 17 篇 其他
  • 9 篇 中文
检索条件"机构=Institute of Data and Knowledge Engineering"
498 条 记 录,以下是1-10 订阅
排序:
Optimizing mechanical strength and thermal stability of sisal fiber-plastic composites by high-temperature treatment
收藏 引用
Interactions 2025年 第1期246卷 1-15页
作者: Mungle, Nischal P. Jadhav, Varsha D. Kulkarni, Sumant Khanderao D.S.Vijayan Saminathan, Rajasekaran Satishkumar, P. Department of Mechanical Engineering Yeshawantrao Chavan College of Engineering Maharashtra Wanadongari Nagpur India Department of Artificial Intelligence and Data Science Vishwakarma Institute of Technology Maharashtra Pune India School of Civil Engineering REVA University Rukmini Knowledge Park Karnataka Kattigenahalli Bengaluru India Tamilnadu Chennai India Department of Mechanical Engineering College of Engineering and Computer Science Jazan University Jazan Saudi Arabia Department of Mechanical Engineering Rathinam Technical Campus Tamilnadu Coimbatore India
In this experiment, high-temperature polyethylene terephthalate (PT) was mixed with epoxy resin (ER) that had been thinned with acetone. Sisal fibers were coated with the resulting product. Composites of Coated treate... 详细信息
来源: 评论
Enhancing Human Pose Estimation in the Internet of Things via Diffusion Generative Models
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 13556-13567页
作者: Wu, Sifan Zhang, Hongzhe Liu, Zhenguang Chen, Haipeng Jiao, Yingying Jilin University College of Computer Science and Technology the Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun130012 China School of discipline inspection and supervision China University of Political Science and Law Beijing100088 China Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Institute of Blockchain and Data Security Hangzhou310059 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou310014 China
With the ongoing development of public video surveillance technology, accurate human pose estimation is becoming increasingly important in urban administration and law enforcement. However, existing methods rely on la... 详细信息
来源: 评论
Fair Personalized Learner Modeling Without Sensitive Attributes  25
Fair Personalized Learner Modeling Without Sensitive Attribu...
收藏 引用
Proceedings of the ACM on Web Conference 2025
作者: Hefei Xu Min Hou Le Wu Fei Liu Yonghui Yang Haoyue Bai Richang Hong Meng Wang Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei Anhui China Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei Anhui China and Institute of Dataspace Hefei Comprehensive National Science Center Hefei Hefei Anhui China
Personalized learner modeling uses learners' historical behavior data to diagnose their cognitive abilities, a process known as Cognitive Diagnosis (CD). This is essential for web-based learning services such as l... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Cyber Science Research Institute Sichuan University China Ministry of Education Key Laboratory of Data Protection and Intelligent Management Sichuan University Chengdu610065 China Ministry of Education Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology China Hefei University of Technology School of Computer Science and Information Engineering China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei University of Technology China University of Padua Department of Mathematics HIT Center Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
HaWANet: Road Scene Understanding with Multi-modal Sensor data Using Height-Width-Driven Attention Network  23rd
HaWANet: Road Scene Understanding with Multi-modal Sensor D...
收藏 引用
23rd International Conference of the Italian Association for Artificial Intelligence, AIxIA 2024
作者: Chatterjee, Soumick Xu, Jiahua Kuzhipathalil, Adarsh Nürnberger, Andreas Faculty of Computer Science Otto von Guericke University Magdeburg Magdeburg Germany Data and Knowledge Engineering Group Otto von Guericke University Magdeburg Magdeburg Germany Genomics Research Centre Human Technopole Milan Italy Hertie Institute for Clinical Brain Research Tuebingen Germany XenomatiX NV Leuven Belgium
In recent years, the field of autonomous vehicles and driverless technology has seen remarkable advancements, driven by contributions from mainstream automotive manufacturers and open-source projects. This research ai... 详细信息
来源: 评论
Joint Double Auction-Based Channel Selection in Wireless Monitoring Networks
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Xia, Na Chen, Lei Li, Meng Yin, Yutao Zhang, Ke Ministry of Education School of Computer Science and Information Engineering Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data China State Grid Electric Power Research Institute Co. Ltd Hefei230088 China
In wireless networks, utilizing sniffers for fault analysis, traffic traceback, and resource optimization is a crucial task. However, existing centralized algorithms cannot be applied to high-density wireless networks... 详细信息
来源: 评论
AAV Virtual Antenna Array Deployment for Uplink Interference Mitigation in data Collection Networks
收藏 引用
IEEE Internet of Things Journal 2025年 第8期12卷 10834-10850页
作者: Li, Hongjuan Kang, Hui Sun, Geng Li, Jiahui Wang, Jiacheng Wang, Xue Niyato, Dusit Leung, Victor C. M. Jilin University College of Computer Science and Technology Changchun 130012 China Jilin University College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun 130012 China Nanyang Technological University College of Computing and Data Science Jurong West Singapore Jilin University Department of Communication Engineering Changchun 130012 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen 518115 China Shenzhen University College of Computer Science and Software Engineering Shenzhen 518060 China The University of British Columbia Department of Electrical and Computer Engineering Vancouver V6T 1Z4 BC Canada
Autonomous aerial vehicles (AAVs) have gained considerable attention as a platform for establishing aerial wireless networks and communications. However, the Line of Sight (LoS) dominance in air-to-ground (A2G) commun... 详细信息
来源: 评论
Dynamic Resource Allocation in Edge Computing via Deep Deterministic Policy Gradient Reinforcement Learning
Dynamic Resource Allocation in Edge Computing via Deep Deter...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Vidhya Gopal U Surendar A Bajulunisha M Tamilselvi V Sathiyapriya N Saranya Department of Computer Science and Engineering Sona College of Technology Salem India Department of Electronics and Communication Engineering SRM institute of Science and Technology Chennai India Department of Computer Science and Engineering Chennai Institute of Technology Kundrathur India Department of Computer Science and Engineering Roever Engineering College Perambalur India Department of Computer Science and Engineering Knowledge Institute of Technology Salem India Department of Artificial Intelligence and Data Science Karpagam College of Engineering Coimbatore India
The difficulty with dynamic and heterogeneous natured edge computing environments is resource provisioning. Reinforcement Learning (RL) can be promising to solve the problems of resource allocation under conditions of... 详细信息
来源: 评论
Offline Reinforcement Learning via Conservative Smoothing and Dynamics Controlling
Offline Reinforcement Learning via Conservative Smoothing an...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haihong Guo Fengxin Li Jiao Li Hongyan Liu School of Information Renmin University of China China Chinese Academy of Medical Sciences / Peking Union Medical College Institute of Medical Information / Medical Library China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education China School of Economics and Management Tsinghua University China
Offline Reinforcement Learning (RL) optimizes policy using pre-collected data instead of direct environment interaction, offering a safe and cost-effective solution for sequential decision-making in the real world. Ho... 详细信息
来源: 评论
KAN v.s. MLP for Offline Reinforcement Learning
KAN v.s. MLP for Offline Reinforcement Learning
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Guo, Haihong Li, Fengxin Li, Jiao Liu, Hongyan School of Information Renmin University of China China Institute of Medical Information Medical Library Chinese Academy of Medical Sciences Peking Union Medical College China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education China School of Economics and Management Tsinghua University China
Kolmogorov-Arnold Networks (KAN) is an emerging neural network architecture in machine learning. It has greatly interested the research community about whether KAN can be a promising alternative to the commonly used M... 详细信息
来源: 评论