咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 66 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 242 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 162 篇 工学
    • 136 篇 计算机科学与技术...
    • 111 篇 软件工程
    • 40 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 14 篇 生物工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 6 篇 生物医学工程(可授...
    • 5 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 机械工程
    • 4 篇 光学工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 电气工程
    • 3 篇 交通运输工程
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 60 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 10 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 5 篇 化学
    • 4 篇 系统科学
  • 53 篇 管理学
    • 35 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 7 篇 法学
    • 6 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 11 篇 data engineering
  • 10 篇 laboratories
  • 10 篇 semantics
  • 9 篇 data mining
  • 8 篇 knowledge engine...
  • 8 篇 wireless sensor ...
  • 7 篇 query processing
  • 6 篇 search engines
  • 6 篇 costs
  • 6 篇 information retr...
  • 5 篇 xml
  • 5 篇 knowledge manage...
  • 4 篇 helium
  • 4 篇 indexes
  • 4 篇 graphics process...
  • 4 篇 signal encoding
  • 4 篇 ontologies
  • 4 篇 algorithm design...
  • 3 篇 text categorizat...
  • 3 篇 collaborative fi...

机构

  • 88 篇 school of inform...
  • 50 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 11 篇 key laboratory o...
  • 10 篇 gaoling school o...
  • 10 篇 engineering rese...
  • 10 篇 beijing key labo...
  • 9 篇 department of ma...
  • 8 篇 key lab of data ...
  • 7 篇 renmin universit...
  • 7 篇 key laboratory o...
  • 6 篇 key laboratory o...
  • 5 篇 moe key lab of d...
  • 5 篇 key laboratory o...
  • 5 篇 university of ch...
  • 5 篇 school of comput...
  • 4 篇 school of comput...
  • 4 篇 information scho...
  • 4 篇 college of compu...

作者

  • 35 篇 du xiaoyong
  • 32 篇 chen hong
  • 30 篇 li xirong
  • 22 篇 li cuiping
  • 20 篇 xiaoyong du
  • 15 篇 hong chen
  • 13 篇 he jun
  • 12 篇 yang gang
  • 11 篇 liu hongyan
  • 11 篇 wang shan
  • 9 篇 dou zhicheng
  • 8 篇 wen ji-rong
  • 8 篇 shan wang
  • 8 篇 cuiping li
  • 7 篇 zhao suyun
  • 7 篇 feng zhang
  • 7 篇 liu tao
  • 7 篇 chen jinchuan
  • 6 篇 cao juan
  • 6 篇 fan zhaoxin

语言

  • 225 篇 英文
  • 13 篇 其他
  • 4 篇 中文
检索条件"机构=Key Lab of Data Engineering and Knowledge Engineering of MOE Renmin"
242 条 记 录,以下是151-160 订阅
排序:
Interval valued fuzzy rough classifier and its application on privacy protection
Interval valued fuzzy rough classifier and its application o...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Su-Yun Zhao Si Lin Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China Beijing China College of Science Beijing Forestry University Beijing China
Currently, most works on interval valued problems mainly focus on attribute reduction (i.e., feature selection) by using rough set technologies. However, less research work on classifier building on interval-valued pr... 详细信息
来源: 评论
Generalized Unique Game Problem
Generalized Unique Game Problem
收藏 引用
2012年全国理论计算机科学学术年会(NCTCS2012)
作者: Peng Cui Key Laboratory of Data Engineering and Knowledge Engineering MOE School of Information Resource Management Renmin University of China Beijing 100872 P.R.China
this paper,the author defines Generalized Unique Game Problem (GUGP),where weights of the edges are allowed to be *** special types of GUGP are illuminated,GUGP-NWA,where the weights of all edges are negative,and GUGP...
来源: 评论
LotusX: A Position-Aware XML Graphical Search System with Auto-Completion
LotusX: A Position-Aware XML Graphical Search System with Au...
收藏 引用
International Conference on data engineering
作者: Chunbin Lin Jiaheng Lu Tok Wang Ling Bogdan Cautis Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China School of Computing National University of Singapore Singapore Télécom Paris Technology France
The existing query languages for XML (e.g., XQuery) require professional programming skills to be formulated, however, such complex query languages burden the query processing. In addition, when issuing an XML query, ... 详细信息
来源: 评论
Single attribute Join Queries within latest sampling periods in sensor networks
Single attribute Join Queries within latest sampling periods...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Shangfeng Mo Hong Chen Yinglong Li School of Math and Computing Science Hunan University of Science and Technology Xiangtan China Key Laboratory of Data Engineering and Knowledge Engineering of MOE School of Information Renmin University of China Beijing China
Join processing in wireless sensor networks is a challenging problem. Current solutions are not involved in the join operation among tuples of the latest sampling periods. In this article, we proposed a continuous Sin... 详细信息
来源: 评论
Drivers for strategic choice of cloud computing as online service in SMEs
Drivers for strategic choice of cloud computing as online se...
收藏 引用
International Conference on Information Systems, ICIS 2012
作者: Li, Min Yu, Yan Zhao, J. Leon Li, Xin University of Science and Technology China-City University of Hong Kong Joint Advanced Research Center 166 Renai Road Dushu Lake Higher Education Town Suzhou China Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China 59 Zhongguancun Street Haidian District Beijing China Department of Information Systems City University of Hong Kong Tat Chee Avenue Kowloon Hong Kong
Cloud Computing Service (CCS) paradigm is changing IT strategy of organizations in the digital world. CCS that requires few upfront investments and uses lease-based pricing is especially relevant to the Small and Medi... 详细信息
来源: 评论
Lawyer information integration and recommendation by multi-source information validation
Lawyer information integration and recommendation by multi-s...
收藏 引用
2011 International Conference on Machine Learning and Cybernetics, ICMLC 2011
作者: Liu, Tao Fan, Biao Hu, He Du, Xiao-Yong Key Laboratory of Data Engineering and Knowledge Engineering MOE School of Information Renmin University of China Beijing 100872 China
On the internet, all-round lawyer information is located at separated information sources, which prevent web users from effective information acquisition. In order to build a unified view of separated, heterogeneous, ... 详细信息
来源: 评论
Virtualizing system and ordinary services in Windows-based OS-level virtual machines  11
Virtualizing system and ordinary services in Windows-based O...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied Computing
作者: Shan, Zhiyong Chiueh, Tzi-Cker Wang, Xin Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China Stony Brook University United States
OS-level virtualization incurs smaller start-up and run-time overhead than HAL-based virtualization and thus forms an important building block for developing fault-tolerant and intrusion-tolerant applications. A compl... 详细信息
来源: 评论
Efficient Duplicate Detection on Cloud Using a New Signature Scheme
Efficient Duplicate Detection on Cloud Using a New Signature...
收藏 引用
12th International Conference on Web-Age Information Management
作者: Rong, Chuitian Lu, Wei Du, Xiaoyong Zhang, Xiao Key Labs. of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China China Shanghai Key Laboratory of Intelligent Information Processing China
Duplicate detection has been well recognized as a crucial task to improve the quality of data. Related work on this problem mainly aims to propose efficient approaches over a single machine. However, with increasing v... 详细信息
来源: 评论
Detecting stealthy malware with inter-structure and imported signatures  11
Detecting stealthy malware with inter-structure and imported...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Liang, Bin You, Wei Shi, Wenchang Liang, Zhaohui Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Recent years have witnessed an increasing threat from kernel rootkits. A common feature of such attack is hiding malicious objects to conceal their presence, including processes, sockets, and kernel modules. Scanning ... 详细信息
来源: 评论
Tracer: Enforcing Mandatory Access Control in commodity OS with the support of light-weight intrusion detection and tracing  11
Tracer: Enforcing Mandatory Access Control in commodity OS w...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Key Laboratory of Data Engineering and Knowledge Engineering Renmin University MOE China Stony Brook University United States Industrial Technology Research Institute Taiwan
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p... 详细信息
来源: 评论