咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 94 篇 期刊文献

馆藏范围

  • 240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 150 篇 工学
    • 113 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 46 篇 信息与通信工程
    • 21 篇 电气工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 6 篇 training
  • 5 篇 sensors
  • 4 篇 power demand
  • 4 篇 telecommunicatio...
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 clustering algor...

机构

  • 58 篇 school of comput...
  • 40 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 college of compu...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 15 篇 liu bin
  • 10 篇 chen ke-jia
  • 10 篇 yang geng
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 zou zhiqiang
  • 7 篇 xu jia
  • 7 篇 lejun gong
  • 7 篇 dai hua
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 xu qianqian

语言

  • 233 篇 英文
  • 7 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data and Security and Intelligent Processing"
240 条 记 录,以下是81-90 订阅
Application and visualization of typical clustering algorithms in seismic data analysis
收藏 引用
Procedia Computer Science 2019年 151卷 171-178页
作者: Z. Fan X. Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing 210023 China
Earthquake brings enormous loss of lives and properties to human beings due to its suddenness, destructiveness and inscrutability. The new techniques for analyzing seismic data can reveal the distribution of earthquak... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for processing Large-scale datasets on Distributed Platforms  10
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Song, Hu Cheng, Xinyun Xu, Xiaolong Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
Identifying Outliers in Astronomical Images with Unsupervised Machine Learning
收藏 引用
Research in Astronomy and Astrophysics 2022年 第8期22卷 74-84页
作者: Yang Han Zhiqiang Zou Nan Li Yanli Chen School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Key Laboratory of Optical Astronomy National Astronomical ObservatoriesChinese Academy of SciencesBeijing 100101China University of Chinese Academy of Sciences Beijing 100049China
Astronomical outliers,such as unusual,rare or unknown types of astronomical objects or phenomena,constantly lead to the discovery of genuinely unforeseen knowledge in *** unpredictable outliers will be uncovered in pr... 详细信息
来源: 评论
A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud data  16th
A Parallel Multi-keyword Top-k Search Scheme over Encrypted ...
收藏 引用
16th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2019
作者: Yang, Maohu Dai, Hua Bao, Jingjing Yi, Xun Yang, Geng Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing210023 China Royal Melbourne Institute of Technology University Melbourne3001 Australia
With searchable encryptions in the cloud computing, users can outsource their sensitive data in ciphertext to the cloud that provides efficient and privacy-preserving multi-keyword top-k searches. However, most existi... 详细信息
来源: 评论
User Grouping for Sharing Services with Capacity Limit
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2021年 第2期14卷 614-627页
作者: Liu, Xiping Dou, Wanchun Wang, Xin Nanjing Univ Posts & Telecommun Jiangsu Key Lab Big Data Security& Intelligent Pr Sch Comp Sci Nanjing 210023 Jiangsu Peoples R China Nanjing Univ State Key Lab Novel Software Technol Dept Comp Sci & Technol Nanjing 210023 Jiangsu Peoples R China SUNY Stony Brook Wireless Networking & Syst Lab Dept Elect & Comp Engn Stony Brook NY 11794 USA
Sharing a service among multiple users could bring benefit to users by reducing their service price and also benefit service providers by allowing them to make more profit. Shared services usually have a capacity limi... 详细信息
来源: 评论
TFS-index-based Multi-keyword Ranked Search Scheme over Cloud Encrypted data  29
TFS-index-based Multi-keyword Ranked Search Scheme over Clou...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Deng, Yinfu Dai, Hua Liu, Yuanlong Li, Zhangchen Yang, Geng Yi, Xun Nanjing University of Post and Telecommunication Nanjing China Nanjing University of Post and Telecommunication Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing China Royal Melbourne Institute of Technology University Melbourne Australia
Traditional searchable encryption schemes for clouds are generally based on TF-IDF vector space model, but they ignore the high-dimensional sparse characteristic of encrypted vectors. It will lead to substantial compu... 详细信息
来源: 评论
Estimating Power Consumption of Containers and Virtual Machines in data Centers
Estimating Power Consumption of Containers and Virtual Machi...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Xusheng Zhang Ziyu Shen Bin Xia Zheng Liu Yun Li Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications
Virtualization technologies provide solutions of cloud computing. Virtual resource scheduling is a crucial task in data centers, and the power consumption of virtual resources is a critical foundation of virtualizatio... 详细信息
来源: 评论
A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews  5
A Lexical Updating Algorithm for Sentiment Analysis on Chine...
收藏 引用
5th International Conference on Advanced Cloud and big data, CBD 2017
作者: Song, Yiwei Gu, Kaiwen Li, Huakang Sun, Guozi Bell Honor School Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China
With the prevalence of Internet, sentiment analysis gets popularity among the world. Researchers have made use of kinds of online documents like commodities reivews and movie reviews as training samples to train their... 详细信息
来源: 评论
A survey on trust modeling from a bayesian perspective
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Bin School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security & Intelligent Processing
In this paper, we are concerned with trust modeling for agents in networked computing systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many attempts have been made to model... 详细信息
来源: 评论
Visco-acoustic Wave-equation Traveltime Inversion with Correct and Incorrect Attenuation Profiles  87
Visco-acoustic Wave-equation Traveltime Inversion with Corre...
收藏 引用
Society of Exploration Geophysicists International Exposition and 87th Annual Meeting, SEG 2017
作者: Yu, Han Chen, Yuqing Guo, Bowen Schuster, Gerard T. Division of Physical Sciences and Engineering King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia Jiangsu Key Lab of Big Data Security and Intelligent Processing School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210003 China
A visco-acoustic wave-equation traveltime inversion method is presented that inverts for a shallow subsurface velocity distribution with correct and incorrect attenuation profiles. Similar to the classical wave equati... 详细信息
来源: 评论