咨询与建议

限定检索结果

文献类型

  • 170 篇 会议
  • 65 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 237 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 158 篇 工学
    • 132 篇 计算机科学与技术...
    • 110 篇 软件工程
    • 40 篇 信息与通信工程
    • 14 篇 生物工程
    • 11 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 6 篇 生物医学工程(可授...
    • 5 篇 动力工程及工程热...
    • 5 篇 化学工程与技术
    • 4 篇 机械工程
    • 4 篇 光学工程
    • 3 篇 力学(可授工学、理...
    • 3 篇 电气工程
    • 3 篇 交通运输工程
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 60 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 10 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 5 篇 化学
    • 4 篇 系统科学
  • 53 篇 管理学
    • 35 篇 图书情报与档案管...
    • 21 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 7 篇 法学
    • 6 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 11 篇 data engineering
  • 10 篇 laboratories
  • 10 篇 semantics
  • 9 篇 data mining
  • 8 篇 knowledge engine...
  • 8 篇 wireless sensor ...
  • 7 篇 query processing
  • 6 篇 search engines
  • 6 篇 costs
  • 6 篇 information retr...
  • 5 篇 xml
  • 5 篇 knowledge manage...
  • 4 篇 helium
  • 4 篇 indexes
  • 4 篇 graphics process...
  • 4 篇 signal encoding
  • 4 篇 ontologies
  • 4 篇 algorithm design...
  • 3 篇 text categorizat...
  • 3 篇 collaborative fi...

机构

  • 86 篇 school of inform...
  • 49 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 11 篇 key laboratory o...
  • 10 篇 gaoling school o...
  • 10 篇 beijing key labo...
  • 9 篇 engineering rese...
  • 9 篇 department of ma...
  • 7 篇 renmin universit...
  • 7 篇 key laboratory o...
  • 7 篇 key lab of data ...
  • 6 篇 key laboratory o...
  • 5 篇 moe key lab of d...
  • 5 篇 key laboratory o...
  • 5 篇 university of ch...
  • 5 篇 school of comput...
  • 4 篇 school of comput...
  • 4 篇 information scho...
  • 4 篇 college of compu...

作者

  • 35 篇 du xiaoyong
  • 30 篇 chen hong
  • 30 篇 li xirong
  • 20 篇 li cuiping
  • 20 篇 xiaoyong du
  • 15 篇 hong chen
  • 13 篇 he jun
  • 12 篇 yang gang
  • 11 篇 liu hongyan
  • 11 篇 wang shan
  • 9 篇 dou zhicheng
  • 8 篇 wen ji-rong
  • 8 篇 shan wang
  • 8 篇 cuiping li
  • 7 篇 liu tao
  • 7 篇 chen jinchuan
  • 6 篇 zhao suyun
  • 6 篇 cao juan
  • 6 篇 feng zhang
  • 6 篇 fan zhaoxin

语言

  • 227 篇 英文
  • 6 篇 其他
  • 4 篇 中文
检索条件"机构=Key Lab of Data Engineering and Knowledge Engineering of MOE Renmin"
237 条 记 录,以下是61-70 订阅
ASAWA: An automatic partition key selection strategy
ASAWA: An automatic partition key selection strategy
收藏 引用
15th Asia-Pacific Web Conference on Web Technologies and Applications, APWeb 2013
作者: Wang, Xiaoyan Chen, Jinchuan Du, Xiaoyong School of Information Renmin University of China China School of Information and Electrical Engineering Ludong University China Key Laboratory of Data Engineering and Knowledge Engineering MOE China
With the rapid increase of data volume, more and more applications have to be implemented in a distributed environment. In order to obtain high performance, we need to carefully divide the whole dataset into multiple ... 详细信息
来源: 评论
Extracting multi-records from web pages
Extracting multi-records from web pages
收藏 引用
4th International Conference on Semantics, knowledge, and Grid, SKG 2008
作者: Tian, Xia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Resource Management Renmin University of China Beijing 100872 China
Extracting multi-records from web pages is useful, it allows us to integrate information from multiple sources to provide value-added services. Existing techniques still have some limitations because of their several ... 详细信息
来源: 评论
Efficient querying of correlated uncertain data with cached results
Efficient querying of correlated uncertain data with cached ...
收藏 引用
18th International Conference on database Systems for Advanced Applications, DASFAA 2013
作者: Chen, Jinchuan Zhang, Min Xie, Xike Du, Xiaoyong Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE China School of Information Renmin University of China China Department of Computer Science Aalborg University Denmark
Although there have been many efforts for management of uncertain data, evaluating probabilistic inference queries, a known NP-hard problem, is still a big challenge, especially for querying data with highly correlati... 详细信息
来源: 评论
Implementation and performance of VoIP interception based on SIP session border controller
Implementation and performance of VoIP interception based on...
收藏 引用
作者: Yang, Menghui Liu, Hua Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Resources Management Renmin University of China Beijing 100872 China
In an effort to provide lawful interception for session initiation protocol (SIP) voice over Internet protocol (VoIP), an interception architecture using session border controller (SBC) is proposed. Moreover, a protot... 详细信息
来源: 评论
Location selection for utility maximization with capacity constraints  12
Location selection for utility maximization with capacity co...
收藏 引用
21st ACM International Conference on Information and knowledge Management, CIKM 2012
作者: Sun, Yu Huang, Jin Chen, Yueguo Zhang, Rui Du, Xiaoyong School of Information Renmin University of China Beijing China University of Melbourne Melbourne VIC Australia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE China
Given a set of client locations, a set of facility locations where each facility has a service capacity, and the assumptions that: (i) a client seeks service from its nearest facility;(ii) a facility provides service ... 详细信息
来源: 评论
Classifying tag relevance with relevant positive and negative examples  13
Classifying tag relevance with relevant positive and negativ...
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Li, Xirong Snoek, Cees G. M. Key Lab of Data Engineering and Knowledge Engineering Renmin University of China China Intelligent Systems Lab Amsterdam University of Amsterdam Netherlands
Image tag relevance estimation aims to automatically deter- mine what people label about images is factually present in the pictorial content. Different from previous works, which either use only positive examples of ... 详细信息
来源: 评论
Distance-based feature selection from probabilistic data
Distance-based feature selection from probabilistic data
收藏 引用
14th International Conference on Web-Age Information Management, WAIM 2013
作者: Zhao, Tingting Pei, Bin Zhao, Suyun Chen, Hong Li, Cuiping Key Lab of Data Engineering and Knowledge Engineering Ministry of Education China Department of Computer Science Renmin University of China China
Feature selection is a powerful tool of dimension reduction from datasets. In the last decade, more and more researchers have paid attentions on feature selection. Further, some researchers begin to focus on feature s... 详细信息
来源: 评论
Towards structured semantic embedding of multimedia  15
Towards structured semantic embedding of multimedia
收藏 引用
7th International Conference on Internet Multimedia Computing and Service, ICIMCS 2015
作者: Li, Xirong Huo, Yujia Lan, Weiyu He, Xixi Liao, Shuai Key Lab of Data Engineering and Knowledge Engineering Renmin University of China 100872 China Multimedia Computing Lab School of Information Renmin University of China 100872 China
This abstract paper sketches our research towards Struc-tured Semantic Embedding of multimedia data. Though a tag may have multiple senses with completely different visual imagery, current semantic embedding methods r... 详细信息
来源: 评论
Dynamic balanced storage in wireless sensor networks  07
Dynamic balanced storage in wireless sensor networks
收藏 引用
DMSN '07: 4th Workshop on data Management for Sensor Networks
作者: Lai, Yongxuan Chen, Hong Wang, Yufeng School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering MOE No.59 Zhongguancun Street Haidian District Beijing China
data-centric storage is an effective and important technique in the wireless sensor networks. It stores the sensing data according to their values by mapping them to some point in the network in order to avoid routing... 详细信息
来源: 评论
Tracer: Enforcing Mandatory Access Control in commodity OS with the support of light-weight intrusion detection and tracing  11
Tracer: Enforcing Mandatory Access Control in commodity OS w...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Key Laboratory of Data Engineering and Knowledge Engineering Renmin University MOE China Stony Brook University United States Industrial Technology Research Institute Taiwan
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p... 详细信息
来源: 评论