咨询与建议

限定检索结果

文献类型

  • 637 篇 会议
  • 473 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,111 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 583 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 169 篇 信息与通信工程
    • 68 篇 控制科学与工程
    • 66 篇 生物工程
    • 58 篇 电气工程
    • 40 篇 电子科学与技术(可...
    • 38 篇 化学工程与技术
    • 35 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 18 篇 建筑学
    • 17 篇 光学工程
    • 17 篇 交通运输工程
    • 17 篇 航空宇航科学与技...
    • 14 篇 土木工程
  • 301 篇 理学
    • 183 篇 数学
    • 66 篇 生物学
    • 58 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 40 篇 化学
    • 23 篇 系统科学
  • 299 篇 管理学
    • 183 篇 图书情报与档案管...
    • 143 篇 管理科学与工程(可...
    • 46 篇 工商管理
  • 39 篇 法学
    • 33 篇 社会学
  • 30 篇 医学
    • 27 篇 临床医学
    • 20 篇 基础医学(可授医学...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 7 篇 教育学
  • 6 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 61 篇 semantics
  • 39 篇 knowledge engine...
  • 37 篇 data mining
  • 30 篇 training
  • 25 篇 feature extracti...
  • 23 篇 data engineering
  • 20 篇 xml
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 20 篇 information retr...
  • 19 篇 conferences
  • 19 篇 task analysis
  • 19 篇 big data
  • 18 篇 knowledge manage...
  • 18 篇 data models
  • 17 篇 visualization
  • 16 篇 databases
  • 15 篇 search engines
  • 15 篇 algorithm design...
  • 14 篇 query processing

机构

  • 194 篇 school of inform...
  • 104 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 33 篇 school of inform...
  • 32 篇 jiangxi key labo...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 28 篇 department of ma...
  • 25 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 24 篇 school of econom...
  • 23 篇 key laboratory o...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...

作者

  • 71 篇 du xiaoyong
  • 60 篇 chen hong
  • 38 篇 li cuiping
  • 37 篇 xiaoyong du
  • 34 篇 wu xindong
  • 33 篇 he jun
  • 33 篇 wang meng
  • 31 篇 liu hongyan
  • 30 篇 li xirong
  • 29 篇 hong chen
  • 29 篇 wang shan
  • 28 篇 zhang jing
  • 24 篇 xindong wu
  • 23 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 huang qingming
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 xu qianqian
  • 17 篇 meng wang

语言

  • 1,037 篇 英文
  • 49 篇 其他
  • 25 篇 中文
检索条件"机构=Key Laboratories of Data Engineering and Knowledge Engineering"
1111 条 记 录,以下是981-990 订阅
排序:
Vulnerabilities Static Detection for Web Applications with False Positive Suppression
Vulnerabilities Static Detection for Web Applications with F...
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Bin Liang Qianqian Wang Jianjun Huang Jiagui Zhong Jingjing Cai Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) MOE Schoo School of Information Renmin University of China Beijing 100872 China Beijing Venustech Cybervision Co. Ltd Beijing 100094 China
Web applications become more and more important, and the corresponding security problems have been concerned about. This paper presents TASA, an ASP static analyzer, which employs a path-sensitive, inter-procedural an... 详细信息
来源: 评论
Two novel semantics of top-k queries processing in uncertain database
Two novel semantics of top-k queries processing in uncertain...
收藏 引用
10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Liu, Dexi Wan, Changxuan Xiong, N. Yang, Laurence T. Chen, Lei Jiangxi Key Laboratory of Data and Knowledge Engineering School of Information Technology Jiangxi University of Finance and Economics Nanchang China Department of Computer Science Georgia State University Atlanta GA United States Department of Computer Science St. Francis Xavier University Antigonish NS Canada Department of Computer Science HK University of Science and Technology Hong Kong Hong Kong
Top-k query is a powerful technique in uncertain databases because of the existence of exponential possible worlds, and it is necessary to combine score and confidence of tuples to derive top k answers. Different sema... 详细信息
来源: 评论
Study in retrieval visibility and optical thickness of fog with MODTRAN
Study in retrieval visibility and optical thickness of fog w...
收藏 引用
International Conference on Multimedia Technology
作者: Zhang, Wengang Wei, Ming Yu, Tao Wang, Gengke Lai, Jibao Wang, Yuqing Key Laboratory of Meteorological Disaster of Ministry of Education Earth System Remote Sensing Institute Nanjing University of Information Science and Technology Nanjing 210044 China Center for National Space-borne Demonstration Beijing 100101 China Institute of Data and Knowledge Engineering Henan University Kaifeng Henan 475001 China Binjiang College Nanjing University of Information Science and Technology Nanjing 210044 China
In recent years, many scientists have done some work in monitoring the fog, and achieved fruitful results. Now we want to conduct more in-depth study. In this paper, we utilize MODTRAN to simulate the relationship bet... 详细信息
来源: 评论
Global Top-k Aggregate Queries Based on X-tuple in Uncertain database
Global Top-k Aggregate Queries Based on X-tuple in Uncertain...
收藏 引用
International Conference on Advanced Information Networking and Applications Workshops (AINAW)
作者: Dexi Liu Changxuan Wan Naixue Xiong Jong Hyuk Park Sang-Soo Yeoe School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China Department of Computer Science Georgia State University Atlanta GA USA Department of Computer Science and Engineering Seoul National University of Technology Seoul South Korea Division of Computer Engineering Mokwon University Daejeon South Korea
A Top-k aggregate query, which is a powerful technique when dealing with large quantity of data, ranks groups of tuples by their aggregate values and returns k groups with the highest aggregate values. However, compar... 详细信息
来源: 评论
Studies and implementation of the trusted process mechanism in a secure operating system
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2010年 第SUPPL. 1期50卷 1547-1553页
作者: Zhang, Chongbin Li, Fengjuan Liang, Bin China Information Technology Security Evaluation Center Beijing 100085 China Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renming University of China Beijing 100872 China
The trusted process mechanism is an important part of the operating system security mechanism, but there is no uniform definition of the trusted process and there are some limitations in understanding its fundamental ... 详细信息
来源: 评论
Operating system mechanisms for TPM-based lifetime measurement of process integrity
Operating system mechanisms for TPM-based lifetime measureme...
收藏 引用
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09
作者: Xiao, Li Wenchang, Shi Zhaohui, Liang Bin, Liang Zhiyong, Shan Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University) Ministry of Education
Implementing runtime integrity measurement in an acceptable way is a big challenge. We tackle this challenge by developing a framework called Patos. This paper discusses the design and implementation concepts of our o... 详细信息
来源: 评论
Median query research in wireless sensor networks
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2010年 第2A期38卷 133-137页
作者: Wu, Zhong-Bo Zhang, Hui Chen, Hong Information School Renmin University of China Beijing 100872 China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing 100872 China School of Mathematics and Computer Science Xiangfan University Xiangfan Hubei 441053 China
Poor quality and harsh condition can result in faulty and outlier data in sampling data of sensor nodes. So we need median query to reflect average level of monitoring region. First, we put forward HMA algorithm. Seco... 详细信息
来源: 评论
Approximation algorithm for constructing data aggregation trees for wireless sensor networks
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第4期3卷 524-534页
作者: Deying LI Jiannong CAO Qinghua ZHU Key Laboratory of Data Engineering and Knowledge Engineering School of InformationRenmin University of ChinaBeijing 100872China Internet and Mobile Computing Lab Department of ComputingHong Kong Polytechnic UniversityHong KongChina
This paper considers the problem of constructing data aggregation trees in wireless sensor networks (WSNs)for a group of sensor nodes to send collected information to a single sink *** data aggregation tree contains t... 详细信息
来源: 评论
Two Novel Semantics of Top-k Queries Processing in Uncertain database
Two Novel Semantics of Top-k Queries Processing in Uncertain...
收藏 引用
International Conference on Computer and Information Technology (CIT)
作者: Dexi Liu Changxuan Wan N. Xiong Laurence T. Yang Lei Chen School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China Department of Computer Science Georgia State University Atlanta GA USA Department of Computer Science Saint Francis Xavier University Antigonish NS Canada Department of Computer Science HK University of Science and Technology Hong Kong China
Top-k query is a powerful technique in uncertain databases because of the existence of exponential possible worlds, and it is necessary to combine score and confidence of tuples to derive top k answers. Different sema... 详细信息
来源: 评论
A Review-Based Reputation Evaluation Approach for Web Services
收藏 引用
Journal of Computer Science & Technology 2009年 第5期24卷 893-900页
作者: 李海华 杜小勇 Member 田萱 Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China School of Information Science & Technology Beijing Forestry University Beijing 100083 China
Web services are commonly perceived as an environment of both offering opportunities and threats. In this environment, one way to minimize threats is to use reputation evaluation, which can be computed, for example, t... 详细信息
来源: 评论