咨询与建议

限定检索结果

文献类型

  • 1,218 篇 会议
  • 1,105 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,331 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,564 篇 工学
    • 1,155 篇 计算机科学与技术...
    • 961 篇 软件工程
    • 346 篇 信息与通信工程
    • 181 篇 生物工程
    • 165 篇 控制科学与工程
    • 138 篇 电气工程
    • 112 篇 电子科学与技术(可...
    • 112 篇 化学工程与技术
    • 106 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 79 篇 机械工程
    • 50 篇 建筑学
    • 49 篇 仪器科学与技术
    • 49 篇 动力工程及工程热...
    • 44 篇 交通运输工程
    • 43 篇 材料科学与工程(可...
    • 39 篇 土木工程
  • 738 篇 理学
    • 375 篇 数学
    • 200 篇 生物学
    • 172 篇 物理学
    • 117 篇 统计学(可授理学、...
    • 92 篇 化学
    • 50 篇 系统科学
  • 502 篇 管理学
    • 284 篇 图书情报与档案管...
    • 253 篇 管理科学与工程(可...
    • 80 篇 工商管理
  • 92 篇 医学
    • 81 篇 临床医学
    • 60 篇 基础医学(可授医学...
    • 42 篇 药学(可授医学、理...
  • 71 篇 法学
    • 61 篇 社会学
  • 34 篇 经济学
  • 25 篇 农学
  • 21 篇 教育学
  • 7 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 96 篇 semantics
  • 60 篇 data mining
  • 56 篇 feature extracti...
  • 56 篇 training
  • 40 篇 knowledge engine...
  • 36 篇 deep learning
  • 35 篇 machine learning
  • 32 篇 conferences
  • 32 篇 task analysis
  • 32 篇 computational mo...
  • 32 篇 data models
  • 26 篇 forecasting
  • 25 篇 big data
  • 24 篇 object detection
  • 24 篇 data engineering
  • 24 篇 visualization
  • 23 篇 information retr...
  • 22 篇 xml
  • 21 篇 optimization
  • 20 篇 laboratories

机构

  • 196 篇 school of inform...
  • 105 篇 school of comput...
  • 52 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 41 篇 university of ch...
  • 40 篇 school of cyber ...
  • 38 篇 college of compu...
  • 35 篇 school of comput...
  • 32 篇 key laboratory o...
  • 31 篇 jiangxi key labo...
  • 31 篇 school of inform...
  • 30 篇 national enginee...
  • 29 篇 key laboratory o...
  • 28 篇 hubei key labora...
  • 28 篇 hubei engineerin...
  • 27 篇 key laboratory o...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 26 篇 department of ma...
  • 25 篇 school of econom...

作者

  • 70 篇 du xiaoyong
  • 57 篇 chen hong
  • 41 篇 li cuiping
  • 33 篇 wu xindong
  • 32 篇 he jun
  • 32 篇 wang meng
  • 31 篇 liu hongyan
  • 31 篇 liu jun
  • 31 篇 xiaoyong du
  • 30 篇 hong chen
  • 29 篇 xindong wu
  • 29 篇 jin hai
  • 28 篇 wang shan
  • 28 篇 li xirong
  • 27 篇 zhang jing
  • 24 篇 niyato dusit
  • 23 篇 sun geng
  • 21 篇 hai jin
  • 20 篇 hu shengshan
  • 19 篇 huang qingming

语言

  • 1,923 篇 英文
  • 378 篇 其他
  • 32 篇 中文
检索条件"机构=Key Lab of Data Engineering and Knowledge Engineering"
2331 条 记 录,以下是2211-2220 订阅
Interference and power constrained Broadcasting and Multicasting in wireless ad hoc networks with directional antennas
Interference and power constrained Broadcasting and Multicas...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Zheng Li Deying Li Ming Liu Key Laboratory of Data Engineering and Knowledge Engineering MOE School of Information Renmin University of China China School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China
Broadcasting/Multicasting problems have been well studied in wireless ad hoc networks. However, only a few approaches take into account the low interference and energy efficiency as the optimization objective simultan... 详细信息
来源: 评论
A temporal object-oriented RFID data model for object tracking and monitoring in supply chain
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1505-1513页
作者: Deng, Kun Liao, Guoqiong School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
With the significant advantages of RFID technologies, RFID is being gradually adopted and deployed in a wide area of applications, such as supply chain and logistics. Since RFID data has the characteristics including ... 详细信息
来源: 评论
Assessing the influence probability between objects: A random walker approach
Assessing the influence probability between objects: A rando...
收藏 引用
IEEE Symposium on Computational Intelligence and data Mining (CIDM)
作者: Pei Li Zhixu Li Jun He Xiaoyong Du Hongyan Liu Key Laboratories of Data Engineering and Knowledge Engineering MOE China & School of Information Renmin University of China Beijing China Department of Management Science and Engineering Tsinghua University Beijing China
Influence between objects needs to be assessed in many applications. Lots of measures have been proposed, but a domain-independent method is still expected. In this paper, we give a probabilistic definition of influen... 详细信息
来源: 评论
Commit processing of mobile distributed real-time transactions based on mobile agents
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1627-1634页
作者: Di, Guoqiang Liu, Yaoyao Liao, Guoqiong School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
In mobile computing environment, the features of limited resources, frequent disconnection and long transactions make the success rate of mobile distributed real-time transactions low. Through analyzing the factors im... 详细信息
来源: 评论
DB Facade: A Web Cache with Improved data Freshness
DB Facade: A Web Cache with Improved Data Freshness
收藏 引用
International Symposium on Electronic Commerce and Security
作者: Xiongpai Qin Xiaoyun Zhou Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing China School of Information and Electrical Engineering China University of Mining and Technology Xuzhou Jiangsu China
Traditional Web database cache techniques have a major disadvantage, namely poor data freshness, because they employ an asynchronous data refresh strategy. A novel Web database cache, DB Facade, is proposed in this pa... 详细信息
来源: 评论
Against Code Injection with System Call Randomization
Against Code Injection with System Call Randomization
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Zhaohui Liang Bin Liang Luping Li Wei Chen Qingqing Kang Yingqin Gu Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing China Renmin University of China Beijing CN School of Information Renmin University of China China
The existing code injection attack defense methods have some deficiencies on performance overhead and effectiveness. In order to ensure the system performance, we propose a method that uses system call randomization t... 详细信息
来源: 评论
Malicious Web Pages Detection Based on Abnormal Visibility Recognition
Malicious Web Pages Detection Based on Abnormal Visibility R...
收藏 引用
International Conference on E-Business and Information System Security, EBISS
作者: Bin Liang Jianjun Huang Fang Liu Dawei Wang Daxiang Dong Zhaohui Liang Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China Beijing China School of Information Renmin University of China Beijing China Renmin University of China Beijing CN
In recent years, Web sites have already become the attackers' main target. When attackers embed malicious code in the Web pages, they generally change the display mode of the corresponding HTML tags to make the di... 详细信息
来源: 评论
Configurable ranking for XML vague retrieval
收藏 引用
Journal of Computational Information Systems 2009年 第2期5卷 683-692页
作者: Jiang, Tengjiao Wan, Changxuan Liu, Xiping School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 China
Ranking is one of the key factors for efficient and effective XML information retrieval. Compared with traditional IR, XML information retrieval has introduced many new challenges, one of which is that the traditional... 详细信息
来源: 评论
Efficient Algorithm for Computing Link-Based Similarity in Real World Networks
Efficient Algorithm for Computing Link-Based Similarity in R...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yuanzhe Cai Gao Cong Xu Jia Hongyan Liu Jun He Jiaheng Lu Xiaoyong Du Key Laboratories of Data Engineering and Knowledge Engineering Ministry of Education China Department of Computer Science Renmin University of China China Department of Computer Science University of Aalborg Denmark Department of Management Science and Engineering Tsinghua University China
Similarity calculation has many applications, such as information retrieval, and collaborative filtering, among many others. It has been shown that link-based similarity measure, such as SimRank, is very effective in ... 详细信息
来源: 评论
Rapid Resynchronization Method for Replication In-Memory databases Supporting Mobile Communication Applications
Rapid Resynchronization Method for Replication In-Memory Dat...
收藏 引用
Computer Science and Information engineering, CSIE, WRI World Congress on FLAGGED
作者: Guoqiong Liao Jing Li Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China School of Information Technology Jiangxi University of Finance and Economics Nanchang China
In this paper, a rapid resynchronization method using intent logs is suggested for replication in-memory databases supporting mobile communication applications. Both the identifiers of unsynchronized segments and the ... 详细信息
来源: 评论