咨询与建议

限定检索结果

文献类型

  • 359 篇 期刊文献
  • 324 篇 会议
  • 1 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 357 篇 计算机科学与技术...
    • 304 篇 软件工程
    • 97 篇 信息与通信工程
    • 50 篇 电气工程
    • 49 篇 控制科学与工程
    • 44 篇 生物工程
    • 39 篇 化学工程与技术
    • 30 篇 生物医学工程(可授...
    • 27 篇 电子科学与技术(可...
    • 24 篇 机械工程
    • 17 篇 光学工程
    • 17 篇 航空宇航科学与技...
    • 15 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 12 篇 土木工程
    • 11 篇 动力工程及工程热...
  • 202 篇 理学
    • 117 篇 数学
    • 50 篇 生物学
    • 44 篇 统计学(可授理学、...
    • 34 篇 物理学
    • 25 篇 化学
    • 15 篇 系统科学
  • 144 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 29 篇 医学
    • 24 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 12 篇 药学(可授医学、理...
  • 15 篇 法学
    • 13 篇 社会学
  • 10 篇 农学
  • 9 篇 经济学
  • 3 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学

主题

  • 35 篇 semantics
  • 22 篇 training
  • 21 篇 knowledge engine...
  • 20 篇 conferences
  • 20 篇 data mining
  • 18 篇 feature extracti...
  • 15 篇 task analysis
  • 14 篇 deep learning
  • 12 篇 data models
  • 11 篇 big data
  • 11 篇 machine learning
  • 10 篇 computational mo...
  • 10 篇 visualization
  • 9 篇 object detection
  • 9 篇 knowledge graph
  • 8 篇 computer science
  • 8 篇 knowledge manage...
  • 8 篇 convolution
  • 8 篇 contrastive lear...
  • 8 篇 predictive model...

机构

  • 89 篇 school of inform...
  • 87 篇 school of comput...
  • 37 篇 college of compu...
  • 31 篇 key laboratory o...
  • 28 篇 key laboratory o...
  • 24 篇 key laboratory o...
  • 22 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 15 篇 college of compu...
  • 14 篇 key labs of data...
  • 14 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 13 篇 pazhou lab
  • 13 篇 department of ma...
  • 12 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 11 篇 the state key la...
  • 11 篇 school of softwa...

作者

  • 31 篇 wu xindong
  • 29 篇 du xiaoyong
  • 28 篇 chen hong
  • 25 篇 xindong wu
  • 24 篇 sun geng
  • 21 篇 niyato dusit
  • 21 篇 li cuiping
  • 17 篇 wang meng
  • 17 篇 zhang jing
  • 17 篇 xiaoyong du
  • 16 篇 li jiahui
  • 16 篇 wang jiacheng
  • 15 篇 liu hongyan
  • 15 篇 xuegang hu
  • 15 篇 wang yang
  • 15 篇 chenyang bu
  • 14 篇 he jun
  • 13 篇 meng wang
  • 13 篇 hong chen
  • 13 篇 zhao zhang

语言

  • 616 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Key Lab of Data Engineering and Knowledge Engineering of Ministry of Education"
684 条 记 录,以下是611-620 订阅
Formal analysis of trusted computing: One case study
Formal analysis of trusted computing: One case study
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. W... 详细信息
来源: 评论
Discovering Chinese compound term using termhood and unithood measures
Proceedings - 2011 6th Annual ChinaGrid Conference, ChinaGri...
收藏 引用
Proceedings - 2011 6th Annual ChinaGrid Conference, ChinaGrid 2011 2011年 60-67页
作者: Kang, Jingjing Liu, Tao Hu, He Du, Xiaoyong Key Labs. of Data Engineering and Knowledge Engineering Ministry of Education China School of Information Renmin University of China Beijing China
Domain terms play a crucial role in many research areas, which has led to a rise in demand for automatic domain terms extraction. In this paper, we present a two-level evaluation approach based on term hood and unit h... 详细信息
来源: 评论
K-nearest neighbors in uncertain graph
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第10期48卷 1850-1858页
作者: Zhang, Yinglong Li, Cuiping Chen, Hong Du, Lingxia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Computer and Information Engineer Jiangxi Agriculture University Nanchang 330045 China
In many areas, a lot of data have been modeled by graphs which are subject to uncertainties, such as molecular compounds and protein interaction networks. While many real applications, for example, collaborative filte... 详细信息
来源: 评论
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study
On Mutual Support of Modern and Traditional Access Control M...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Hui Feng Wenchang Shi Zhaohui Liang Bin Liang School of Information Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Renmin University of China Beijing China
Access control is essential to computer security, especially in an open, distributed, networked communication environment. Modern access control model such as UCON aims at accommodating general requirements. Tradition... 详细信息
来源: 评论
MyBUD自适应分布式存储管理的设计与实现
MyBUD自适应分布式存储管理的设计与实现
收藏 引用
第29届中国数据库学术会议
作者: ZHOU Ningnan 周宁南 ZHANG Xiao 张孝 SUN Xinyun 孙新云 JU Xingxing 琚星星 LIU Kuicheng 刘奎呈 DU Xiaoyong 杜小勇 WANG Shan 王珊 Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Renmin Universi 中国人民大学数据工程与知识工程教育部重点实验室 北京100872 中国人民大学信息学院 北京100872
面对日益增长的非结构化数据管理需求,实现了基于“自由表”数据模型和BUD参考体系模型的非结构化数据管理平台MyBUD系统。提出了一种能够根据非结构化数据的类型和访问特点自适应地选择分布式存储子系统的方法,同时也对MyBUD进行了T... 详细信息
来源: 评论
Discovering Chinese Compound Term Using Termhood and Unithood Measures
Discovering Chinese Compound Term Using Termhood and Unithoo...
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Jingjing Kang Tao Liu He Hu Xiaoyong Du Key Laboratories of Data Engineering and Knowledge Engineering Ministry of Education China School of Information Renmin University of China Beijing China
Domain terms play a crucial role in many research areas, which has led to a rise in demand for automatic domain terms extraction. In this paper, we present a two-level evaluation approach based on term hood and unit h... 详细信息
来源: 评论
Parallel Aggregation Queries over Star Schema: A Hierarchical Encoding Scheme and Efficient Percentile Computing as a Case
Parallel Aggregation Queries over Star Schema: A Hierarchica...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Xiongpai Qin Huiju Wang Xiaoyong Du Shan Wang Ministry of Education Key Laboratory of Data Engineering and Knowledge Engineering RUC Beijing China School of Information Renmin University of China Beijing China
Big data analysis is a main challenge we meet recently. Cloud computing is attracting more and more big data analysis applications, due to its well scalability and fault-tolerance. Some aggregation functions, like SUM... 详细信息
来源: 评论
Revisit the logical difference of description logic terminologies
收藏 引用
Journal of Convergence Information Technology 2011年 第4期6卷 240-245页
作者: Feng, Shasha Ouyang, Dantong Liu, Jie College of Computer Science and Technology Jilin University Key Lab of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun China
The logical difference is important to ontology engineers in capturing and understanding the difference between different versions of given ontology. For acyclic EL terminologies, in which the well applied medical ont... 详细信息
来源: 评论
Identifying shopping center attractiveness using taxi trajectory data
Identifying shopping center attractiveness using taxi trajec...
收藏 引用
2011 International Workshop on Trajectory data Mining and Analysis, TDMA'11, Co-located with UbiComp 2011
作者: Yue, Yang Wang, Han Dong Hu, Bo Li, Qing Quan Transportation Research Center Wuhan University China State Key Lab. of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University China School of Geodesy and Geomatics Wuhan University China Engineering Research Center for Smart Acquisition and Applications of Spatiotemporal Data Ministry of Education Wuhan University China
Intensive research has demonstrated that shopping center attractiveness analysis, such as identifying catchment area, attracted trips, and attractiveness factors, can benefit not only market analysis, but also traffic... 详细信息
来源: 评论
Formal Analysis of Trusted Computing: One Case Study
Formal Analysis of Trusted Computing: One Case Study
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system.... 详细信息
来源: 评论