咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 90 篇 期刊文献

馆藏范围

  • 236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 111 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 生物工程
    • 19 篇 电气工程
    • 19 篇 控制科学与工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 75 篇 理学
    • 48 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 13 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 14 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 7 篇 training
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 sensors
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 57 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...

作者

  • 36 篇 xu xiaolong
  • 28 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 9 篇 yang geng
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 lejun gong
  • 6 篇 dai hua
  • 6 篇 xu qianqian

语言

  • 232 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data and Security and Intelligent Processing"
236 条 记 录,以下是201-210 订阅
排序:
TSAR-based Expert Recommendation Mechanism for Community Question Answering
TSAR-based Expert Recommendation Mechanism for Community Que...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Jian Song Xiaolong Xu Xinheng Wang Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computing and Engineering University of West London London UK
Community Question Answering (CQA) provides a platform to share knowledge for users. With the increasing number of users and questions, askers have to wait a long time for an answer with high quality while responders ... 详细信息
来源: 评论
REPDL: Research-oriented e-learning platform based on digital library
REPDL: Research-oriented e-learning platform based on digita...
收藏 引用
IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE)
作者: Xiaolong Xu Kun Wang Yan Deng Tao Li School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Graduate School Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
In accordance with the researchers, students, and faculty' need to use the digital library for efficient literature investigation and knowledge learning, this paper proposes REPDL, a research-oriented e-learning p... 详细信息
来源: 评论
Enhanced Particle Swarm Optimization for Workflow Scheduling in Clouds
Enhanced Particle Swarm Optimization for Workflow Scheduling...
收藏 引用
Symposium of Image, Signal processing, and Artificial Vision (STSIVA)
作者: Chang Lu Dayu Feng Jie Zhu Haiping Huang Nanjing University of Posts & Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China
As a NP-hard problem, it is always baffling to figure out a scheduling strategy to arrange the interconnected tasks of a workflow on the infinite number of resources in the cloud environment so that the workflow can b... 详细信息
来源: 评论
Multi-objective optimization for fuzzy workflow scheduling
Multi-objective optimization for fuzzy workflow scheduling
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jie Zhu Jing Zhang Chang Lu Haiping Huang Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China Nanjing University of Posts & Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
A fuzzy workflow scheduling problem is investigated with fuzzy temporal parameters, such as the fuzzy task processing times, fuzzy data transmission times and the fuzzy due dates. In the considered problem, the resour... 详细信息
来源: 评论
Dlr: Adversarial Examples Detection and label Recovery for Deep Neural Networks
SSRN
收藏 引用
SSRN 2024年
作者: Han, Keji Li, Yun Ge, Yao Wang, Ruchuan Nanjing University of Posts and Telecommunications Wenyuan Road 9 Nanjing210046 China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Wenyuan Road 9 Nanjing210046 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Wenyuan Road 9 Nanjing210046 China
Deep neural networks (DNNs) are demonstrated to be vulnerable to the adversarial example crafted by the adversary to fool the target model. Adversarial training and adversarial example detection are two popular method... 详细信息
来源: 评论
DUE Distribution and Pairing in D2D Communication
DUE Distribution and Pairing in D2D Communication
收藏 引用
International Conference on Computer Communications and Networks (ICCCN)
作者: Weifeng Lu Xiaoqiang Ren Jia Xu Siguang Chen Lijun Yang Jian Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China College of IoT Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
The D2D (Device-to-Device) communication has been very popular as it is a promising and low-cost solution to reduce the burden on the cellular network. However, there are rare concerns about the distribution and pairi... 详细信息
来源: 评论
SinCWIm: An imputation method for single-cell RNA sequence dropouts using weighted alternating least squares
收藏 引用
Computers in Biology and Medicine 2024年 171卷 108225-108225页
作者: Gong, Lejun Cui, Xiong Liu, Yang Lin, Cai Gao, Zhihong Jiangsu Key Lab of Big Data Security & Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Department of Burn Wound Repair and Regenerative Medicine Center The First Affiliated Hospital of Wenzhou Medical University Zhejiang Wenzhou325000 China Zhejiang Engineering Research Center of Intelligent Medicine The First Affiliated Hospital of Wenzhou Medical University Wenzhou325000 China
Background and objectives: Single-cell RNA sequencing (scRNA-seq) provides a powerful tool for exploring cellular heterogeneity, discovering novel or rare cell types, distinguishing between tissue-specific cellular co... 详细信息
来源: 评论
Throughput Maximization for UAV-Enabled data Collection
Throughput Maximization for UAV-Enabled Data Collection
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Junchao Gong Xiaojun Zhu Lijie Xu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China
In this paper, we consider a scenario where an unmanned aerial vehicle (UAV) collects data from a set of nodes placed on a two-dimensional (2-D) plane. The UAV flies along a given line to collect data. To prevent tran... 详细信息
来源: 评论
Dual-Correction Adaptation Network for Noisy Knowledge Transfer
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Yunyun Zheng, Weiwen Chen, Songcan The Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Computer Science and Engineering Nanjing University of Posts & Telecommunications Nanjing210046 China The MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Computer Science & Technology/AI Nanjing University of Aeronautics & Astronautics Nanjing210023 China
Previous unsupervised domain adaptation (UDA) methods aim to promote target learning via a single-directional knowledge transfer from label-rich source domain to unlabeled target domain, while its reverse adaption fro... 详细信息
来源: 评论
Pptcdr: Personalized Preference Transfer Cross-Domain Recommendation Based on Heterogeneous Graph Neural Networks
SSRN
收藏 引用
SSRN 2023年
作者: Zhu, Fan Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China School of Computer Science Nanjing University of Posts and Telecommunications No. 9 Wenyuan Road Nanjing210023 China
Cross-domain recommendation methods aim to solve the problems of data sparsity and cold start by leveraging rich information from the source domain to enhance the recommendation accuracy of the target domain. Many met... 详细信息
来源: 评论