咨询与建议

限定检索结果

文献类型

  • 176 篇 会议
  • 111 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 288 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 213 篇 工学
    • 167 篇 计算机科学与技术...
    • 137 篇 软件工程
    • 54 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 24 篇 生物工程
    • 13 篇 光学工程
    • 11 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 10 篇 交通运输工程
    • 9 篇 化学工程与技术
    • 8 篇 生物医学工程(可授...
    • 7 篇 机械工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 6 篇 材料科学与工程(可...
    • 5 篇 网络空间安全
    • 4 篇 冶金工程
  • 93 篇 理学
    • 58 篇 数学
    • 25 篇 生物学
    • 22 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 12 篇 化学
    • 11 篇 系统科学
  • 64 篇 管理学
    • 46 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 10 篇 法学
    • 7 篇 社会学
  • 7 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 农学

主题

  • 10 篇 semantics
  • 10 篇 forecasting
  • 8 篇 data mining
  • 8 篇 feature extracti...
  • 6 篇 contrastive lear...
  • 5 篇 big data
  • 4 篇 object detection
  • 4 篇 deep neural netw...
  • 4 篇 xml
  • 4 篇 costs
  • 4 篇 embeddings
  • 4 篇 training
  • 4 篇 convolutional ne...
  • 3 篇 conferences
  • 3 篇 support vector m...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 zero-shot learni...
  • 3 篇 graphics process...
  • 3 篇 signal encoding

机构

  • 23 篇 school of inform...
  • 18 篇 key lab of data ...
  • 9 篇 key lab. of inte...
  • 8 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 key lab of data ...
  • 7 篇 university of ch...
  • 7 篇 school of comput...
  • 7 篇 school of cyber ...
  • 7 篇 key lab of big d...
  • 6 篇 school of comput...
  • 5 篇 institute of inf...
  • 5 篇 moe key lab of d...
  • 5 篇 school of econom...
  • 5 篇 college of infor...
  • 5 篇 alibaba group
  • 5 篇 school of cyber ...
  • 5 篇 college of engin...
  • 4 篇 big data institu...

作者

  • 30 篇 li xirong
  • 15 篇 chen hong
  • 13 篇 li cuiping
  • 12 篇 liu jun
  • 11 篇 yang gang
  • 8 篇 zhang lingling
  • 8 篇 huang qingming
  • 8 篇 xu qianqian
  • 7 篇 cao juan
  • 7 篇 cao xiaochun
  • 6 篇 hong chen
  • 6 篇 du xiaoyong
  • 6 篇 dong jianfeng
  • 6 篇 shi yong
  • 6 篇 liu jianxun
  • 6 篇 cuiping li
  • 5 篇 yu yong
  • 5 篇 yang zhiyong
  • 5 篇 qingming huang
  • 5 篇 xu jieping

语言

  • 272 篇 英文
  • 14 篇 其他
  • 2 篇 中文
检索条件"机构=Key Lab. of Data Engineering and Knowledge Engineering"
288 条 记 录,以下是261-270 订阅
Discovering batch processing area from workflow logs
Discovering batch processing area from workflow logs
收藏 引用
International Conference on Computational Science and engineering
作者: Wen, Yiping Liu, Jianxun Chen, Zhigang Key Lab. of Knowledge Processing and Networked Manufacturing Hunan University of Science and Technology Hunan China School of Information Science and Engineering Central South University Changsha China
Our previous work has preliminarily investigated the batch processing model and its implementation. To solve the problem of setting batch processing areas for the applications of batch processing in workflow, this pap... 详细信息
来源: 评论
Ubiquitous data
Ubiquitous data
收藏 引用
作者: Hotho, Andreas Pedersen, Rasmus Ulslev Wurst, Michael University Kassel Depart. of Electrical Engineering/Computer Science Knowledge and Data Engineering Group Germany Copenhagen Business School Dept. of Informatics Embedded Software Lab. Copenhagen Denmark Technical University Dortmund Computer Science LS8 44221 Dortmund Germany
Ubiquitous knowledge discovery systems must be captured from many different perspectives. In earlier chapters, aspects like machine learning, underlying network technologies etc. were described. An essential component... 详细信息
来源: 评论
Hierarchical certificateless signatures
Hierarchical certificateless signatures
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Zhang, Lei Wu, Qianhong Domingo-Ferrer, Josep Qin, Bo UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain Wuhan University School of Computer Key Lab. of Aerospace Information Security and Trusted Computing China Xi'an University of Technology School of Science Department of Maths China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
Approximation algorithm for constructing data aggregation trees for wireless sensor networks
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第4期3卷 524-534页
作者: Deying LI Jiannong CAO Qinghua ZHU Key Laboratory of Data Engineering and Knowledge Engineering School of InformationRenmin University of ChinaBeijing 100872China Internet and Mobile Computing Lab Department of ComputingHong Kong Polytechnic UniversityHong KongChina
This paper considers the problem of constructing data aggregation trees in wireless sensor networks (WSNs)for a group of sensor nodes to send collected information to a single sink *** data aggregation tree contains t... 详细信息
来源: 评论
Region extreme value query in sensor networks
Region extreme value query in sensor networks
收藏 引用
6th International Conference on Fuzzy Systems and knowledge Discovery, FSKD 2009
作者: Wu, Zhongbo Chen, Hong School of Information Renmin University of China Beijing 100872 China MOE Key Lab. of Data Engineering and Knowledge Engineering Beijing 100872 China
Existing research on extreme value query in wireless sensor networks is mainly focus on finding out sensors with highest metric. Yet in most actually scenarios, people cares more about special network regions than det... 详细信息
来源: 评论
Efficient Computation of Reverse Skyline on data Stream
Efficient Computation of Reverse Skyline on Data Stream
收藏 引用
The Second International Joint Conference on Computational Science and Optimization(CSO 2009)(2009 国际计算科学与优化会议)
作者: Ling Zhu Cuiping Li Hong Chen School of Information Renmin University of China Key Lab of Data Engineering and Knowledge Engineering of MOE
Reverse Skyline Queries have been proved very useful in business location, environmental monitoring and some other applications. In this paper, we consider reverse skyline queries processing on data stream, which prov... 详细信息
来源: 评论
Asymmetric group key agreement
Asymmetric group key agreement
收藏 引用
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
作者: Qianhong, Wu Yi, Mu Susilo, Willy Bo, Qin Domingo-Ferrer, Josep Universitat Rovira i Virgili Dept. of Comp. Eng. and Maths UNESCO Department of Data Privacy Tarragona Catalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Dept. of Maths School of Science Xi'an University of Technology China
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m... 详细信息
来源: 评论
Behavior Informatics and Analytics: Let behavior talk
Behavior Informatics and Analytics: Let behavior talk
收藏 引用
IEEE International Conference on data Mining Workshops, ICDM Workshops 2008
作者: Cao, Longbing Data Sciences and Knowledge Discovery Lab. Faculty of Engineering and Information Technology University of Technology Sydney Australia
Behavior is increasingly recognized as a key component in business intelligence and problem-solving. Different from traditional behavior analysis, which mainly focus on implicit behavior and explicit business appearan... 详细信息
来源: 评论
Domain Driven data Mining (D3 M)
Domain Driven Data Mining (D3 M)
收藏 引用
IEEE International Conference on data Mining Workshops, ICDM Workshops 2008
作者: Cao, Longbing Data Sciences and Knowledge Discovery Lab. Faculty of Engineering and Information Technology University of Technology Sydney Australia
In deploying data mining into the real-world business, we have to cater for business scenarios, organizational factors, user preferences and business needs. However, the current data mining algorithms and tools often ... 详细信息
来源: 评论
F-trade 3.0: An agent-based integrated framework for data mining experiments
F-trade 3.0: An agent-based integrated framework for Data mi...
收藏 引用
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Workshops, WI-IAT Workshops 2008
作者: Moemeng, Peerapol Cao, Longbing Zhang, Chengqi Data Sciences and Knowledge Discovery Research Lab. Faculty of Engineering and Information Technology University of Technology Sydney Australia
data mining researches focus on algorithms that mine valuable patterns from particular domain. Apart from the theoretical research, experiments take a vast amount of effort to build. In this paper, we propose an integ... 详细信息
来源: 评论