咨询与建议

限定检索结果

文献类型

  • 100 篇 会议
  • 88 篇 期刊文献

馆藏范围

  • 188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 116 篇 工学
    • 88 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 36 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电气工程
    • 14 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 6 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 建筑学
  • 70 篇 理学
    • 49 篇 数学
    • 27 篇 统计学(可授理学、...
    • 18 篇 生物学
    • 13 篇 物理学
    • 7 篇 化学
    • 7 篇 系统科学
    • 3 篇 地球物理学
  • 35 篇 管理学
    • 24 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 4 篇 法学
    • 4 篇 社会学
  • 2 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 9 篇 feature extracti...
  • 7 篇 semantics
  • 5 篇 deep learning
  • 5 篇 machine learning
  • 5 篇 privacy
  • 5 篇 training
  • 4 篇 task analysis
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 forecasting
  • 4 篇 monte carlo meth...
  • 3 篇 internet of thin...
  • 3 篇 aggregates
  • 3 篇 conferences
  • 3 篇 reinforcement le...
  • 3 篇 anomaly detectio...
  • 3 篇 quality of servi...
  • 3 篇 data mining
  • 3 篇 contrastive lear...
  • 3 篇 knowledge discov...

机构

  • 59 篇 school of comput...
  • 26 篇 jiangsu key labo...
  • 23 篇 jiangsu key labo...
  • 19 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 jiangsu key labo...
  • 11 篇 school of comput...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 key laboratory o...
  • 5 篇 institute of inf...

作者

  • 25 篇 xu xiaolong
  • 21 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 15 篇 liu bin
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 chen ke-jia
  • 6 篇 lei wang
  • 6 篇 bao shilong
  • 6 篇 bin liu
  • 5 篇 jia xu
  • 5 篇 wang zitai
  • 5 篇 tao li
  • 5 篇 yun li
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin
  • 4 篇 chen yiping
  • 4 篇 xu jia

语言

  • 179 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Big Data Security&Intelligent Processing School of Computer Science"
188 条 记 录,以下是101-110 订阅
排序:
BLRGCN: A dynamic traffic flow prediction model based on spatiotemporal graph convolutional network
BLRGCN: A dynamic traffic flow prediction model based on spa...
收藏 引用
IEEE International Conference on data Mining Workshops (ICDM Workshops)
作者: Qiuhao Shi Xiaolong Xu Xuanyan Liu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Because of the complex topology of urban road and the dynamic changes of traffic information over time, how to accurately and efficiently predict traffic flow has become a difficult problem. In order to capture spatio...
来源: 评论
ConvTrans-TPS: A Convolutional Transformer Model for Disk Failure Prediction in Large-Scale Network Storage Systems
ConvTrans-TPS: A Convolutional Transformer Model for Disk Fa...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Shicheng Xu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Disk failure is one of the most important reliability problems in large-scale network storage systems. Disk failure may lead to serious data loss and even disastrous consequences if the missing data cannot be recovere...
来源: 评论
FP-WDDQN: An improved deep reinforcement learning algorithm for adaptive traffic signal control
FP-WDDQN: An improved deep reinforcement learning algorithm ...
收藏 引用
IEEE International Conference on data Mining Workshops (ICDM Workshops)
作者: Xiao Zhang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Current adaptive traffic signal control methods based on centralized deep reinforcement learning are not applicable in large-scale adaptive traffic control environment. The scalability problem is overcome by assigning...
来源: 评论
Lightweight EEG Classification Model Based on EEG-sensor with Few Channels
Lightweight EEG Classification Model Based on EEG-sensor wit...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Haoyan Xu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In the traditional work, based on EEG Sensors monitoring the physiological and emotional state of humans, the time-frequency analysis method is usually used to extract the characteristics of the signal, and then analy... 详细信息
来源: 评论
Lgccn: A Label-Guided Contrastive Capsule Network for Few-Shot Text Classification
SSRN
收藏 引用
SSRN 2023年
作者: Xu, Yang Xu, Xiaolong Xiao, Fu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Few-shot text classification aims to learn transferable knowledge from a limited dataset to perform classification tasks in unseen domains. Recently, metric-based meta-learning methods have demonstrated their advantag... 详细信息
来源: 评论
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
TSC-ECFA:A Trusted Service Composition Scheme for Edge Cloud
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yu Jiang Xiaolong Xu Kunda Lin Weihua Duan Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
In order to select a composition scheme that meets user's needs and high performance from large-scale web services in the edge cloud, this paper proposes a trusted service composition optimization scheme called TS... 详细信息
来源: 评论
RPSBPT: A Route Planning Scheme with Best Profit for Taxi
RPSBPT: A Route Planning Scheme with Best Profit for Taxi
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Yuhua Qiu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Reasonable route planning for taxi can not only improve quality of customer experience, but also maximize the benefit of taxi drivers. Most current taxi planning schemes are designed to achieve the shortest route or t... 详细信息
来源: 评论
Comparison and Analysis on Typical Network Representation Learning Algorithms
Comparison and Analysis on Typical Network Representation Le...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Yang Wang Xiaolong Xu Yun Li Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Large-scale complex networks show complex nonlinear relationships among objects, such as the social relationships in the real world, the citation relationship among papers and the interactions among proteins in biolog... 详细信息
来源: 评论
Model-based Offline Policy Optimization with Adversarial Network
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Junming Chen, Xingguo Wang, Shengyuan Zhang, Bolei Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China School of Computer Science Nanjing University of Posts and Telecommunications China School of Modern Posts Nanjing University of Posts and Telecommunications China
Model-based offline reinforcement learning (RL), which builds a supervised transition model with logging dataset to avoid costly interactions with the online environment, has been a promising approach for offline poli... 详细信息
来源: 评论
Joint Spatial-Temporal Trajectory Clustering Method for Mobile Social Networks
Joint Spatial-Temporal Trajectory Clustering Method for Mobi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ji Tang Linfeng Liu Jiagao Wu Jian Zhou Yang Xiang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important issue in the trajectory mining task, the trajectory clustering technique has attracted lots of the attention in the field of data mining. Trajectory clustering technique identifies the similar trajecto... 详细信息
来源: 评论