咨询与建议

限定检索结果

文献类型

  • 486 篇 期刊文献
  • 425 篇 会议
  • 1 册 图书

馆藏范围

  • 912 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 425 篇 计算机科学与技术...
    • 348 篇 软件工程
    • 162 篇 信息与通信工程
    • 75 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 65 篇 控制科学与工程
    • 54 篇 光学工程
    • 53 篇 电气工程
    • 41 篇 机械工程
    • 30 篇 网络空间安全
    • 28 篇 仪器科学与技术
    • 27 篇 生物医学工程(可授...
    • 23 篇 化学工程与技术
    • 20 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 366 篇 理学
    • 182 篇 数学
    • 120 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 25 篇 化学
  • 181 篇 管理学
    • 99 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 34 篇 医学
    • 26 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 19 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 27 篇 deep learning
  • 15 篇 wireless sensor ...
  • 13 篇 feature extracti...
  • 12 篇 information retr...
  • 12 篇 training
  • 11 篇 authentication
  • 10 篇 reinforcement le...
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 federated learni...
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 8 篇 learning systems
  • 8 篇 big data

机构

  • 90 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 27 篇 cas key lab of n...
  • 21 篇 cas key lab of n...
  • 21 篇 beijing electron...
  • 20 篇 university of am...
  • 19 篇 key lab of broad...
  • 18 篇 institute of qua...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 11 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 114 篇 guo jiafeng
  • 108 篇 cheng xueqi
  • 51 篇 zhang ruqing
  • 50 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 19 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.
  • 9 篇 wang h.

语言

  • 848 篇 英文
  • 45 篇 其他
  • 19 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
912 条 记 录,以下是91-100 订阅
排序:
ICTNET at TREC 2019 News Track  28
ICTNET at TREC 2019 News Track
收藏 引用
28th Text REtrieval Conference, TREC 2019
作者: Ding, Yuyang Lian, Xiaoying Zhou, Houquan Liu, Zhaoge Ding, Hanxing Hou, Zhongni University of Chinese Academy of Sciences Beijing China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology China
This paper describes our work in the background linking task and entity ranking task in TREC 2018 News Track. We explore four methods in background linking task and two methods in entity ranking task. All of our metho...
来源: 评论
ICTNET at Trec 2019 Incident Streams Track  28
ICTNET at Trec 2019 Incident Streams Track
收藏 引用
28th Text REtrieval Conference, TREC 2019
作者: Guangsheng, Kuang Kun, Zhang Jiabao, Zhang Xin, Zheng University of Chinese Academy of Sciences Beijing China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology China
Social medial become our public ways to share our information in our lives. Crisis management via social medial is becoming indispensable for its tremendous information. While deep learning shows surprising outcome in... 详细信息
来源: 评论
Sparse Word Embeddings Using 1 Regularized Online Learning
Sparse Word Embeddings Using 1 Regularized Online Learning
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Sun, Fei Guo, Jiafeng Lan, Yanyan Xu, Jun Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Recently, Word2Vec tool has attracted a lot of interest for its promising performances in a variety of natural language processing (NLP) tasks. However, a critical issue is that the dense word representations learned ... 详细信息
来源: 评论
An efficient automated trust negotiation framework supporting adaptive policies
An efficient automated trust negotiation framework supportin...
收藏 引用
2nd International Workshop on Education technology and Computer science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev... 详细信息
来源: 评论
A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor networks
收藏 引用
China Communications 2015年 第5期12卷 162-180页
作者: XU Jian YANG Geng CHEN Zhengyu WANG Qianqian Jiangsu High Technology Research Key Lab for WSNs College of Computer Science & TechnologyNanjing University of Posts & Telecommunications Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts & Telecommunications School of Electrical & Information Engineering Jinling Institute of Technology School of Software Engineering Jinling Institute of Technology
Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication *** aggregation is a very important technique,which is designed to substantially r... 详细信息
来源: 评论
Community discovery method based on complex network of data fusion based on the super network perspective
收藏 引用
International Journal of Computers and Applications 2021年 第4期43卷 383-390页
作者: Pei, Li School of Computer Science & Technology Xi‘an University of Posts and Telecommunications Xi‘an China Shaanxi Key Laboratory of Network Data Intelligent Processing Xi‘an University of Posts and Telecommunications Xi‘an China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi‘an Jiaotong University Xi‘an China
To enhance the computational efficiency and precision of community discovery, a community discovery algorithm with the mixed label based on the minimum description length (MDI) of information compression is proposed i... 详细信息
来源: 评论
Nested Event Extraction upon Pivot Element Recognition  30
Nested Event Extraction upon Pivot Element Recognition
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Ren, Weicheng Li, Zixuan Jin, Xiaolong Bai, Long Su, Miao Liu, Yantao Guan, Saiping Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences China Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Nested Event Extraction (NEE) aims to extract complex event structures where an event contains other events as its arguments recursively. Nested events involve a kind of Pivot Elements (PEs) that simultaneously act as... 详细信息
来源: 评论
A Contrastive Pre-training Approach to Discriminative Autoencoder for Dense Retrieval  22
A Contrastive Pre-training Approach to Discriminative Autoen...
收藏 引用
31st ACM International Conference on Information and Knowledge Management, CIKM 2022
作者: Ma, Xinyu Zhang, Ruqing Guo, Jiafeng Fan, Yixing Cheng, Xueqi Cas Key Lab of Network Data Science and Technology Ict Cas University of Chinese Academy of Sciences Beijing China
Dense retrieval (DR) has shown promising results in information retrieval. In essence, DR requires high-quality text representations to support effective search in the representation space. Recent studies have shown t... 详细信息
来源: 评论
Application of D-S Evidence theory to uncertainty of assessment result in E-government
Application of D-S Evidence theory to uncertainty of assessm...
收藏 引用
7th Web Information Systems and Applications Conference, WISA 2010, 5th Workshop on Semantic Web and Ontology, SWON 2010, 4th Workshop on Electronic Government technology and Application, EGTA 2010
作者: Xia, Bing Pan, Heng Zheng, Qiusheng Miao, Fengjun School of Computer Science Zhongyuan University of Technology Zhengzhou Key Lab of Computer Network Security Assessment Zhengzhou China
How to solve uncertainty of assessment result is an important issue in E-government. Current qualitative assessment are based on subjective qualitative evaluation and the rigid division of the quantitative data, howev... 详细信息
来源: 评论
Spam filtering by stages
Spam filtering by stages
收藏 引用
2nd International Conference on Convergent Information technology, ICCIT 07
作者: Liu, Ming Li, Yunchun Li, Wei Network Technology Key Lab. of Beijing School of Computer Science and Engineering Beihang University Beijing 100083 China
At the present time, the typical spam filtering technique is content filtering, but the content filtering belongs to after the event precaution, and cannot avoid network resources waste due to spam. Therefore, this pa... 详细信息
来源: 评论