咨询与建议

限定检索结果

文献类型

  • 563 篇 会议
  • 471 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 662 篇 工学
    • 524 篇 计算机科学与技术...
    • 432 篇 软件工程
    • 148 篇 信息与通信工程
    • 70 篇 控制科学与工程
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 39 篇 化学工程与技术
    • 37 篇 机械工程
    • 35 篇 电子科学与技术(可...
    • 27 篇 生物医学工程(可授...
    • 23 篇 仪器科学与技术
    • 22 篇 动力工程及工程热...
    • 21 篇 建筑学
    • 21 篇 航空宇航科学与技...
    • 19 篇 交通运输工程
    • 18 篇 光学工程
    • 18 篇 网络空间安全
  • 279 篇 管理学
    • 169 篇 图书情报与档案管...
    • 141 篇 管理科学与工程(可...
    • 46 篇 工商管理
  • 277 篇 理学
    • 167 篇 数学
    • 65 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 47 篇 物理学
    • 36 篇 化学
    • 21 篇 系统科学
  • 41 篇 法学
    • 34 篇 社会学
  • 31 篇 医学
    • 25 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 7 篇 教育学
  • 7 篇 农学
  • 5 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 semantics
  • 36 篇 data mining
  • 33 篇 knowledge engine...
  • 30 篇 training
  • 25 篇 feature extracti...
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 19 篇 big data
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 conferences
  • 17 篇 task analysis
  • 17 篇 data engineering
  • 16 篇 xml
  • 16 篇 knowledge graph
  • 16 篇 visualization
  • 16 篇 databases
  • 14 篇 knowledge manage...
  • 14 篇 search engines
  • 14 篇 wireless sensor ...

机构

  • 153 篇 school of inform...
  • 104 篇 school of comput...
  • 54 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 35 篇 school of inform...
  • 32 篇 jiangxi key labo...
  • 31 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 26 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 23 篇 key laboratory o...
  • 20 篇 school of econom...
  • 20 篇 key laboratory o...
  • 19 篇 school of inform...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 14 篇 key laboratory o...

作者

  • 49 篇 chen hong
  • 37 篇 wu xindong
  • 34 篇 du xiaoyong
  • 32 篇 wang meng
  • 30 篇 li cuiping
  • 28 篇 xindong wu
  • 28 篇 zhang jing
  • 28 篇 xiaoyong du
  • 27 篇 wang shan
  • 26 篇 hong chen
  • 24 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 huang qingming
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 xu qianqian
  • 17 篇 meng wang
  • 17 篇 shan wang
  • 17 篇 wang yang
  • 17 篇 li jiahui

语言

  • 957 篇 英文
  • 55 篇 其他
  • 25 篇 中文
检索条件"机构=Jiangxi Key Laboratory of Data and Knowledge Engineering"
1037 条 记 录,以下是221-230 订阅
排序:
Minimizing XML Queries Using a Family of Constraints
Minimizing XML Queries Using a Family of Constraints
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: Xiping Liu Changxuan Wan School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
An effective way to optimize XML queries is to minimize XML queries. In this paper, we improve redundance elimination in XPath queries greatly by incorporating two novel kinds of constraints: parent constraint and sib... 详细信息
来源: 评论
Predictable recovery for replication real-time main memory databases using request logs
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1607-1614页
作者: Liao, Guoqiong Li, Jing School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
Reliable telecommunication applications in future need the supports from replication real-time main memory databases. In order to improve recovery performance and provide predictable recovery, this paper proposes a ne... 详细信息
来源: 评论
FindCredPg: A novel method to find credible pages based on trust web graph
收藏 引用
14th Asia Pacific Web Technology Conference, APWeb 2012
作者: Wang, Teng Zhu, Qing Wang, Shan Liang, Jingfan Key Laboratory of the Ministry of Education for Data Engineering and Knowledge Engineering Renmin University of China Beijing China School of Information Renmin University of China Beijing China
Finding credible pages is a challenging problem on the Web. Our key observation in this paper is that credible pages usually link to credible content-related pages, which is different from a normal page usually links ... 详细信息
来源: 评论
Tracer: Enforcing Mandatory Access Control in commodity OS with the support of light-weight intrusion detection and tracing  11
Tracer: Enforcing Mandatory Access Control in commodity OS w...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Key Laboratory of Data Engineering and Knowledge Engineering Renmin University MOE China Stony Brook University United States Industrial Technology Research Institute Taiwan
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p... 详细信息
来源: 评论
Can web news media sentiments improve stock trading signal prediction?  18
Can web news media sentiments improve stock trading signal p...
收藏 引用
18th Pacific Asia Conference on Information Systems, PACIS 2014
作者: Lin, Nana Xu, Wei Zhang, Xinwei Lv, Siqi School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China School of Information Beijing China
The technical analysis and machine learning have been integrated in stock trading signal forecasting. And it has been proved that there are some weaknesses in technical analysis because of the complex environment in t... 详细信息
来源: 评论
SGSH: Stimulate Large Language Models with Skeleton Heuristics for knowledge Base Question Generation
SGSH: Stimulate Large Language Models with Skeleton Heuristi...
收藏 引用
2024 Findings of the Association for Computational Linguistics: NAACL 2024
作者: Guo, Shasha Liao, Lizi Zhang, Jing Wang, Yanling Li, Cuiping Chen, Hong School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education China Singapore Management University Singapore Zhongguancun Laboratory China
knowledge base question generation (KBQG) aims to generate natural language questions from a set of triplet facts extracted from KB. Existing methods have significantly boosted the performance of KBQG via pre-trained ... 详细信息
来源: 评论
INK: A cloud-based system for efficient top-k interval keyword search  14
INK: A cloud-based system for efficient top-k interval keywo...
收藏 引用
23rd ACM International Conference on Information and knowledge Management, CIKM 2014
作者: Li, Rui Zhang, Xiao Zhou, Xin Wang, Shan Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China Beijing China School of Information Renmin University of China Beijing China
It is insufficient to search temporal text by only focusing on either time attribute or keywords today as we pay close attention to the evolution of event with time. Both temporal and textual constraints need to be co... 详细信息
来源: 评论
Summarizing large-scale database schema using community detection
Summarizing large-scale database schema using community dete...
收藏 引用
作者: Wang, Xue Zhou, Xuan Wang, Shan School of Information Renmin University of China Beijing 100872 China Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing 100872 China
Schema summarization on large-scale databases is a challenge. In a typical large database schema, a great proportion of the tables are closely connected through a few high degree tables. It is thus dificult to separat... 详细信息
来源: 评论
Commit processing of mobile distributed real-time transactions based on mobile agents
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1627-1634页
作者: Di, Guoqiang Liu, Yaoyao Liao, Guoqiong School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
In mobile computing environment, the features of limited resources, frequent disconnection and long transactions make the success rate of mobile distributed real-time transactions low. Through analyzing the factors im... 详细信息
来源: 评论
A temporal object-oriented RFID data model for object tracking and monitoring in supply chain
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1505-1513页
作者: Deng, Kun Liao, Guoqiong School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
With the significant advantages of RFID technologies, RFID is being gradually adopted and deployed in a wide area of applications, such as supply chain and logistics. Since RFID data has the characteristics including ... 详细信息
来源: 评论