咨询与建议

限定检索结果

文献类型

  • 186 篇 会议
  • 107 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 162 篇 计算机科学与技术...
    • 138 篇 软件工程
    • 48 篇 信息与通信工程
    • 21 篇 生物工程
    • 12 篇 生物医学工程(可授...
    • 11 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 光学工程
    • 8 篇 仪器科学与技术
    • 8 篇 化学工程与技术
    • 7 篇 动力工程及工程热...
    • 6 篇 机械工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 电气工程
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 49 篇 数学
    • 25 篇 生物学
    • 20 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 7 篇 化学
    • 5 篇 系统科学
  • 66 篇 管理学
    • 44 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 9 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 8 篇 法学
    • 7 篇 社会学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学

主题

  • 14 篇 semantics
  • 11 篇 data engineering
  • 10 篇 laboratories
  • 9 篇 data mining
  • 8 篇 knowledge engine...
  • 8 篇 wireless sensor ...
  • 6 篇 query processing
  • 6 篇 knowledge manage...
  • 6 篇 search engines
  • 6 篇 costs
  • 6 篇 machine learning
  • 6 篇 information retr...
  • 5 篇 xml
  • 4 篇 helium
  • 4 篇 collaborative fi...
  • 4 篇 indexes
  • 4 篇 graphics process...
  • 4 篇 signal encoding
  • 4 篇 ontologies
  • 4 篇 computational mo...

机构

  • 91 篇 school of inform...
  • 49 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 11 篇 gaoling school o...
  • 11 篇 key laboratory o...
  • 11 篇 beijing key labo...
  • 9 篇 engineering rese...
  • 9 篇 department of ma...
  • 7 篇 renmin universit...
  • 7 篇 key laboratory o...
  • 7 篇 key lab of data ...
  • 6 篇 key laboratory o...
  • 6 篇 shenzhen researc...
  • 5 篇 moe key lab of d...
  • 5 篇 key laboratory o...
  • 5 篇 moe key lab of a...
  • 5 篇 university of ch...
  • 5 篇 school of comput...
  • 5 篇 college of compu...

作者

  • 35 篇 du xiaoyong
  • 33 篇 chen hong
  • 33 篇 li xirong
  • 20 篇 li cuiping
  • 20 篇 xiaoyong du
  • 15 篇 hong chen
  • 13 篇 he jun
  • 11 篇 liu hongyan
  • 11 篇 yang gang
  • 11 篇 wang shan
  • 10 篇 dou zhicheng
  • 9 篇 wang shuai
  • 8 篇 wen ji-rong
  • 8 篇 cuiping li
  • 7 篇 shan wang
  • 7 篇 cao juan
  • 7 篇 dong jianfeng
  • 7 篇 liu tao
  • 7 篇 chen jinchuan
  • 6 篇 zhao suyun

语言

  • 285 篇 英文
  • 7 篇 其他
  • 3 篇 中文
检索条件"机构=Key Lab of Data Engineering and Knowledge Engineering of MOE Renmin University of China"
295 条 记 录,以下是41-50 订阅
排序:
Efficient Duplicate Detection on Cloud Using a New Signature Scheme
Efficient Duplicate Detection on Cloud Using a New Signature...
收藏 引用
12th International Conference on Web-Age Information Management
作者: Rong, Chuitian Lu, Wei Du, Xiaoyong Zhang, Xiao Key Labs. of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China China Shanghai Key Laboratory of Intelligent Information Processing China
Duplicate detection has been well recognized as a crucial task to improve the quality of data. Related work on this problem mainly aims to propose efficient approaches over a single machine. However, with increasing v... 详细信息
来源: 评论
Clustering moving objects in spatial networks
收藏 引用
12th International Conference on database Systems for Advanced Applications
作者: Chen, Jidong Lai, Caifeng Meng, Xiaofeng Xu, Jianliang Hu, Haibo School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering MOE Department of Computer Science Hong Kong Baptist University
Advances in wireless networks and positioning technologies (e.g., CPS) have enabled new data management applications that monitor moving objects. In such new applications, realtime data analysis such as clustering ana... 详细信息
来源: 评论
Rucmm at MediaEval 2015 Affective impact of movies task: Fusion of audio and visual cues
Rucmm at MediaEval 2015 Affective impact of movies task: Fus...
收藏 引用
Multimedia Benchmark Workshop, MediaEval 2015
作者: Jin, Qin Li, Xirong Cao, Haibing Huo, Yujia Liao, Shuai Yang, Gang Xu, Jieping Multimedia Computing Lab School of Information Renmin University of China Key Lab of Data Engineering and Knowledge Engineering Renmin University of China China
This paper summarizes our efforts for the first time participation in the Violent Scene Detection subtask of the MediaEval 2015 Affective Impact of Movies Task. We build violent scene detectors using both audio and vi...
来源: 评论
Assessing the Influence Probability between Objects: A Random Walker Approach
Assessing the Influence Probability between Objects: A Rando...
收藏 引用
IEEE Symposium on Computational Intelligence and data Mining
作者: Li, Pei Li, Zhixu He, Jun Du, Xiaoyong Liu, Hongyan Key Labs of Data Engineering and Knowledge Engineering MOE China and School of Information Renmin University of China Beijing China Department of Management Science and Engineering Tsinghua University Beijing China
Influence between objects needs to be assessed in many applications. Lots of measures have been proposed, but a domain-independent method is still expected. In this paper, we give a probabilistic definition of influen... 详细信息
来源: 评论
Using ontology to enhance collaborative recommendation based on community
Using ontology to enhance collaborative recommendation based...
收藏 引用
9th International Conference on Web-Age Information Management, WAIM 2008
作者: Yu, Li School of Information Renmin University of China Beijing 100872 China Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China
Collaborative filtering is an important personalized recommendation technique applied widely in E-commerce. It is not adapted to multi-interest or title recommendation for the 'general neighbourhood' problem w... 详细信息
来源: 评论
XRCJ: Supporting keyword search in XML and relation co-occurrence
XRCJ: Supporting keyword search in XML and relation co-occur...
收藏 引用
1st International Workshop on Graph database, IWGD 2010, 1st International Workshop on Advanced Techniques on XML data Management, XMLDM 2010, 2nd International Workshop on WCMT 2010, Held in Conj. with WAIM 2010
作者: Zhang, Song Du, Xiaoyong Key Lab. of Data Engineering and Knowledge Engineering School of Information Renmin University of China China
keyword search is a proven, user-friendly way to query html documents in the World Wide Web. With the trend of integrating IR technologies into DB community, state-of-the-art studies have introduced keyword search int... 详细信息
来源: 评论
Improve top-K recommendation by extending review analysis
收藏 引用
14th Asia Pacific Web Technology Conference, APWeb 2012
作者: Zhu, Qing Xing, Zhe Liang, Jingfan School of Information Renmin University of China Beijing 100872 China Key Laboratory for Data Engineering and Knowledge Engineering MOE Renmin University of China Beijing 100872 China
The Web has become the popular place for people to purchase product and acquire services, so collaborative filtering is one of the most important algorithms applied in e-commerce recommendation systems. Unfortunately,... 详细信息
来源: 评论
COCA: More accurate multi-dimensional histograms out of more accurate correlations detection
COCA: More accurate multi-dimensional histograms out of more...
收藏 引用
9th International Conference on Web-Age Information Management, WAIM 2008
作者: Wei, Cao Xiongpai, Qin Wang, Shan Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Detecting and exploiting correlations among columns in relational databases are of great value for query optimizers to generate better query execution plans (QEPs). We propose a more robust and informative metric, nam... 详细信息
来源: 评论
Top-k neighborhood dominating query
Top-k neighborhood dominating query
收藏 引用
18th International Conference on database Systems for Advanced Applications, DASFAA 2013
作者: Xie, Xike Lu, Hua Chen, Jinchuan Shang, Shuo Department of Computer Science Aalborg University Denmark Key Labs of Data Engineering and Knowledge Engineering MOE Renmin University of China China
In many real-life applications, spatial objects are associated with multiple non-spatial attributes. For example, a hotel may have price and rating in addition to its geographic location. In traditional spatial databa... 详细信息
来源: 评论
Detecting stealthy malware with inter-structure and imported signatures  11
Detecting stealthy malware with inter-structure and imported...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Liang, Bin You, Wei Shi, Wenchang Liang, Zhaohui Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Recent years have witnessed an increasing threat from kernel rootkits. A common feature of such attack is hiding malicious objects to conceal their presence, including processes, sockets, and kernel modules. Scanning ... 详细信息
来源: 评论