咨询与建议

限定检索结果

文献类型

  • 119 篇 会议
  • 66 篇 期刊文献

馆藏范围

  • 185 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 112 篇 工学
    • 86 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 30 篇 信息与通信工程
    • 16 篇 生物工程
    • 13 篇 控制科学与工程
    • 11 篇 电气工程
    • 8 篇 机械工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 交通运输工程
    • 6 篇 网络空间安全
    • 5 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 2 篇 建筑学
  • 55 篇 理学
    • 33 篇 数学
    • 17 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 7 篇 系统科学
    • 3 篇 化学
    • 3 篇 地球物理学
    • 2 篇 天文学
  • 35 篇 管理学
    • 20 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 医学
  • 1 篇 军事学

主题

  • 13 篇 feature extracti...
  • 8 篇 task analysis
  • 8 篇 semantics
  • 7 篇 training
  • 6 篇 conferences
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 privacy
  • 5 篇 telecommunicatio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 machine learning
  • 5 篇 forecasting
  • 4 篇 schedules
  • 4 篇 computational mo...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 accuracy
  • 4 篇 sensors
  • 3 篇 power demand

机构

  • 53 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 school of comput...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...
  • 4 篇 university of ch...
  • 4 篇 key laboratory o...
  • 4 篇 college of compu...
  • 3 篇 college of compu...
  • 3 篇 institute of big...
  • 3 篇 school of comput...

作者

  • 36 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 5 篇 xu lijie
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng
  • 5 篇 tao li
  • 5 篇 yang geng
  • 5 篇 zhang wei
  • 4 篇 wang lei
  • 4 篇 jinling he
  • 4 篇 jun yin

语言

  • 183 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Dig Data Security and Intelligent Processing"
185 条 记 录,以下是131-140 订阅
排序:
RPSBPT: A Route Planning Scheme with Best Profit for Taxi
RPSBPT: A Route Planning Scheme with Best Profit for Taxi
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Yuhua Qiu Xiaolong Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Reasonable route planning for taxi can not only improve quality of customer experience, but also maximize the benefit of taxi drivers. Most current taxi planning schemes are designed to achieve the shortest route or t... 详细信息
来源: 评论
Comparison and Analysis on Typical Network Representation Learning Algorithms
Comparison and Analysis on Typical Network Representation Le...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Yang Wang Xiaolong Xu Yun Li Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
Large-scale complex networks show complex nonlinear relationships among objects, such as the social relationships in the real world, the citation relationship among papers and the interactions among proteins in biolog... 详细信息
来源: 评论
Incentivizing the Biased Requesters: Truthful Task Assignment Mechanisms in Crowdsourcing
Incentivizing the Biased Requesters: Truthful Task Assignmen...
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: Jia Xu Hui Li Yanxu Li Dejun Yang Tao Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing Jiangsu China School of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Department of Computer Science Colorado School of Mines Golden CO USA
Crowdsourcing has become an effective tool to utilize human intelligence to perform tasks that are challenging for machines. In the integrated crowdsourcing systems, the requesters are non- monopolistic and may show p... 详细信息
来源: 评论
Incentivizing the workers for truth discovery in crowdsourcing with copiers
arXiv
收藏 引用
arXiv 2019年
作者: Jiang, Lingyun Niu, Xiaofu Xu, Jia Yang, Dejun Xu, Lijie Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu210023 China Department of Computer Science Colorado School of Mines GoldenCO80401 United States
Crowdsourcing has become an efficient paradigm for performing large scale tasks. Truth discovery and incentive mechanism are fundamentally important for the crowdsourcing system. Many truth discovery methods and incen... 详细信息
来源: 评论
Sybil-Proof Online Incentive Mechanisms for Crowdsensing
Sybil-Proof Online Incentive Mechanisms for Crowdsensing
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Jian Lin Ming Li Dejun Yang Guoliang Xue Colorado School of Mines Golden CO USA Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Arizona State University Tempe AZ USA
Crowdsensing leverages the rapid growth of sensor-embedded smartphones and human mobility for pervasive information collection. To incentivize smartphone users to participate in crowdsensing, many auction-based incent... 详细信息
来源: 评论
Joint Spatial-Temporal Trajectory Clustering Method for Mobile Social Networks
Joint Spatial-Temporal Trajectory Clustering Method for Mobi...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ji Tang Linfeng Liu Jiagao Wu Jian Zhou Yang Xiang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
As an important issue in the trajectory mining task, the trajectory clustering technique has attracted lots of the attention in the field of data mining. Trajectory clustering technique identifies the similar trajecto... 详细信息
来源: 评论
Multi-Dimension Training Scheme to Improve the Innovation Capacity of Postgraduate and Undergraduate Students Collaboratively
Multi-Dimension Training Scheme to Improve the Innovation Ca...
收藏 引用
Frontiers in Education (FIE) Conference
作者: Xiaolong Xu Jianhua Shen Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing China
This Innovative Practice Work in Progress Paper presents a multi-dimension training scheme to improve the innovation capacity of postgraduate and undergraduate students collaboratively. The current training of postgra... 详细信息
来源: 评论
A Privacy Leak Detection Mechanism based on Service Binding
A Privacy Leak Detection Mechanism based on Service Binding
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Boyang Wang Jinling He Yuanhan Du Ming Tang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of mobile technology, users gradually store financial information and personal privacy data on mobile terminals, which makes mobile security particularly important. In order to effectively improve... 详细信息
来源: 评论
FBOD: An Outlier Detection Algorithm based on data Features Suitable for processing Large-scale datasets on Distributed Platforms
FBOD: An Outlier Detection Algorithm based on Data Features ...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Hu Song Xinyun Cheng Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
The primary objective of outlier detection is to identify values that are significantly different from other data in the dataset. However, most of the current algorithms are effective for small-scale data and their pe... 详细信息
来源: 评论
Overdue Prediction of Bank Loans Based on Deep Neural Network
Overdue Prediction of Bank Loans Based on Deep Neural Networ...
收藏 引用
2017 International Symposium on Computer Science and Artificial Intelligence(ISCSAI 2017)
作者: Li Xin Sun Guozi Li Huakang Jiangsu Key Lab of Big Data and Security and Intelligent Processing Nanjing University of Posts and Telecommunications Collaborative Innovation Center for Economics crime investigation and prevention technology State Key Laboratory of Mathematical Engineering and Advanced Computing
With the development of information technology, the application of big data in financial aspects becomes more and more deepening. However, in the aspect of bank loans, the accuracy of traditional user loan risk predic... 详细信息
来源: 评论