咨询与建议

限定检索结果

文献类型

  • 637 篇 会议
  • 473 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,111 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 583 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 169 篇 信息与通信工程
    • 68 篇 控制科学与工程
    • 66 篇 生物工程
    • 58 篇 电气工程
    • 40 篇 电子科学与技术(可...
    • 38 篇 化学工程与技术
    • 35 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 18 篇 建筑学
    • 17 篇 光学工程
    • 17 篇 交通运输工程
    • 17 篇 航空宇航科学与技...
    • 14 篇 土木工程
  • 301 篇 理学
    • 183 篇 数学
    • 66 篇 生物学
    • 58 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 40 篇 化学
    • 23 篇 系统科学
  • 299 篇 管理学
    • 183 篇 图书情报与档案管...
    • 143 篇 管理科学与工程(可...
    • 46 篇 工商管理
  • 39 篇 法学
    • 33 篇 社会学
  • 30 篇 医学
    • 27 篇 临床医学
    • 20 篇 基础医学(可授医学...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 7 篇 教育学
  • 6 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 61 篇 semantics
  • 39 篇 knowledge engine...
  • 37 篇 data mining
  • 30 篇 training
  • 25 篇 feature extracti...
  • 23 篇 data engineering
  • 20 篇 xml
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 20 篇 information retr...
  • 19 篇 conferences
  • 19 篇 task analysis
  • 19 篇 big data
  • 18 篇 knowledge manage...
  • 18 篇 data models
  • 17 篇 visualization
  • 16 篇 databases
  • 15 篇 search engines
  • 15 篇 algorithm design...
  • 14 篇 query processing

机构

  • 194 篇 school of inform...
  • 104 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 33 篇 school of inform...
  • 32 篇 jiangxi key labo...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 28 篇 department of ma...
  • 25 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 24 篇 school of econom...
  • 23 篇 key laboratory o...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...

作者

  • 71 篇 du xiaoyong
  • 60 篇 chen hong
  • 38 篇 li cuiping
  • 37 篇 xiaoyong du
  • 34 篇 wu xindong
  • 33 篇 he jun
  • 33 篇 wang meng
  • 31 篇 liu hongyan
  • 30 篇 li xirong
  • 29 篇 hong chen
  • 29 篇 wang shan
  • 28 篇 zhang jing
  • 24 篇 xindong wu
  • 23 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 huang qingming
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 xu qianqian
  • 17 篇 meng wang

语言

  • 1,037 篇 英文
  • 49 篇 其他
  • 25 篇 中文
检索条件"机构=Key Laboratories of Data Engineering and Knowledge Engineering"
1111 条 记 录,以下是1021-1030 订阅
排序:
Generating multi-page mirror site from ajax interfaces
收藏 引用
Journal of Information and Computational Science 2009年 第2期6卷 985-991页
作者: Xia, Tian Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing 100872 China School of Information Resource Management Renmin University of China Beijing 100872 China
Ajax is an important approach for improving rich interactivity between web server and end users during Web 2.0 eras. At the same time, AJAX web pages can not be indexed by search engines due to its asynchronous loadin... 详细信息
来源: 评论
The tradeoff of delta table merging and re-writing algorithms in what-if analysis application
The tradeoff of delta table merging and re-writing algorithm...
收藏 引用
Joint International Conference on Advances in data and Web Management, APWeb/WAIM 2009
作者: Zhang, Yansong Zhang, Yu Xiao, Yanqin Wang, Shan Chen, Hong Key Laboratory of the Ministry of Education for Data Engineering and Knowledge Engineering Renmin University of China Beijing 100872 China School of Information Renmin University of China Beijing 100872 China Department of Computer Science Harbin Finance College Harbin 150030 China Computer Center Hebei University Baoding Hebei 071002 China
What-if analysis can provide more meaningful information than classical OLAP. Multi-scenario hypothesis based on historical data needs efficient what-if data view support. In general, delta table for what-if analysis ... 详细信息
来源: 评论
Predictable recovery for replication real-time main memory databases using request logs
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1607-1614页
作者: Liao, Guoqiong Li, Jing School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
Reliable telecommunication applications in future need the supports from replication real-time main memory databases. In order to improve recovery performance and provide predictable recovery, this paper proposes a ne... 详细信息
来源: 评论
Dynamic programming based top-k aggregate queries in uncertain database
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1589-1596页
作者: Liu, Dexi School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
A Top-k aggregate query ranks groups of tuples by their aggregate values, sum or average for example, and returns k groups with the highest aggregate values. We propose a dynamic programming based method to process un... 详细信息
来源: 评论
Managing data provenance in database
收藏 引用
Journal of Information and Computational Science 2009年 第1期6卷 423-431页
作者: Liu, Xiping Wan, Changxuan Jiang, Tengjiao School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
The paper studies the management problem of data provenance. Firstly, two data models, which enhance the traditional relational model and tree model, are proposed to reveal the basic nature of data provenance. To answ... 详细信息
来源: 评论
Interference and power constrained Broadcasting and Multicasting in wireless ad hoc networks with directional antennas
Interference and power constrained Broadcasting and Multicas...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Zheng Li Deying Li Ming Liu Key Laboratory of Data Engineering and Knowledge Engineering MOE School of Information Renmin University of China China School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China
Broadcasting/Multicasting problems have been well studied in wireless ad hoc networks. However, only a few approaches take into account the low interference and energy efficiency as the optimization objective simultan... 详细信息
来源: 评论
A temporal object-oriented RFID data model for object tracking and monitoring in supply chain
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1505-1513页
作者: Deng, Kun Liao, Guoqiong School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
With the significant advantages of RFID technologies, RFID is being gradually adopted and deployed in a wide area of applications, such as supply chain and logistics. Since RFID data has the characteristics including ... 详细信息
来源: 评论
Commit processing of mobile distributed real-time transactions based on mobile agents
收藏 引用
Journal of Information and Computational Science 2009年 第3期6卷 1627-1634页
作者: Di, Guoqiang Liu, Yaoyao Liao, Guoqiong School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China
In mobile computing environment, the features of limited resources, frequent disconnection and long transactions make the success rate of mobile distributed real-time transactions low. Through analyzing the factors im... 详细信息
来源: 评论
DB Facade: A Web Cache with Improved data Freshness
DB Facade: A Web Cache with Improved Data Freshness
收藏 引用
International Symposium on Electronic Commerce and Security
作者: Xiongpai Qin Xiaoyun Zhou Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing China School of Information and Electrical Engineering China University of Mining and Technology Xuzhou Jiangsu China
Traditional Web database cache techniques have a major disadvantage, namely poor data freshness, because they employ an asynchronous data refresh strategy. A novel Web database cache, DB Facade, is proposed in this pa... 详细信息
来源: 评论
Against Code Injection with System Call Randomization
Against Code Injection with System Call Randomization
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Zhaohui Liang Bin Liang Luping Li Wei Chen Qingqing Kang Yingqin Gu Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing China Renmin University of China Beijing CN School of Information Renmin University of China China
The existing code injection attack defense methods have some deficiencies on performance overhead and effectiveness. In order to ensure the system performance, we propose a method that uses system call randomization t... 详细信息
来源: 评论