咨询与建议

限定检索结果

文献类型

  • 1,644 篇 会议
  • 1,566 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,485 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 503 篇 信息与通信工程
    • 293 篇 生物工程
    • 276 篇 电气工程
    • 269 篇 控制科学与工程
    • 165 篇 电子科学与技术(可...
    • 159 篇 光学工程
    • 155 篇 生物医学工程(可授...
    • 139 篇 机械工程
    • 109 篇 化学工程与技术
    • 101 篇 交通运输工程
    • 88 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 网络空间安全
    • 65 篇 建筑学
  • 1,151 篇 理学
    • 628 篇 数学
    • 329 篇 生物学
    • 235 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 128 篇 化学
    • 96 篇 系统科学
  • 581 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 278 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 148 篇 医学
    • 127 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 102 篇 法学
    • 83 篇 社会学
  • 62 篇 农学
  • 46 篇 经济学
  • 38 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 131 篇 feature extracti...
  • 127 篇 semantics
  • 113 篇 training
  • 95 篇 deep learning
  • 67 篇 computational mo...
  • 63 篇 accuracy
  • 60 篇 predictive model...
  • 56 篇 machine learning
  • 55 篇 data models
  • 52 篇 convolution
  • 48 篇 neural networks
  • 48 篇 graph neural net...
  • 45 篇 contrastive lear...
  • 43 篇 object detection
  • 41 篇 reinforcement le...
  • 41 篇 data mining
  • 38 篇 task analysis
  • 36 篇 visualization
  • 36 篇 federated learni...
  • 35 篇 optimization

机构

  • 77 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 62 篇 college of compu...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 university of ch...
  • 52 篇 south china univ...
  • 51 篇 key laboratory o...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 43 篇 school of softwa...
  • 43 篇 national enginee...
  • 41 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 38 篇 school of cyber ...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 34 篇 guangdong key la...
  • 33 篇 chongqing key la...

作者

  • 38 篇 xu xiaolong
  • 35 篇 wang guoyin
  • 35 篇 tan mingkui
  • 30 篇 jin hai
  • 25 篇 huang qingming
  • 25 篇 xiaolong xu
  • 21 篇 chen yanping
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 20 篇 hongyan ma
  • 18 篇 hu shengshan
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 niyato dusit
  • 16 篇 chen huajun
  • 16 篇 li jianxin
  • 15 篇 xia shuyin
  • 15 篇 chen gang

语言

  • 3,007 篇 英文
  • 169 篇 其他
  • 52 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing"
3211 条 记 录,以下是3131-3140 订阅
排序:
An attribute reduction framework for inconsistent decision tables from view of the boundary region
An attribute reduction framework for inconsistent decision t...
收藏 引用
2016 International Conference on Machine Learning and Cybernetics, ICMLC 2016
作者: Qian, Jin Chang, Yu-Hui Lv, Ping Key Laboratory of Cloud Computing and Intelligent Information Processing of Changzhou City Jiangsu University of Technology Changzhou213015 China Jiangsu Key Laboratory of Big Data Analysis Technology/B-DAT Nanjing University of Information Science and Technology Nanjing China
Attribute reduction is one of the key issues for data preprocess in data mining. Many heuristic attribute reduction algorithms based on discernibility matrix have been proposed for inconsistent decision tables. Howeve... 详细信息
来源: 评论
Android multi-level system permission management approach
arXiv
收藏 引用
arXiv 2017年
作者: Luo, Yang Zhang, Qi-Xun Shen, Qing-Ni Liu, Hong-Zhi Wu, Zhong-Hai School of Software and Microelectronics Peking University Beijing100871 China MoE Key Laboratory of Network and Software Assurance Peking University Beijing100871 China Research Laboratory of Service Computing and Big Data Technology Peking University Beijing100871 China
With the expansion of the market share occupied by the Android platform, security issues (especially application security) have become attention focus of researchers. In fact, the existing methods lack the capabilitie... 详细信息
来源: 评论
Analysis of SET pulses propagation probabilities in sequential circuits
收藏 引用
IOP Conference Series: Materials Science and Engineering 2018年 第1期351卷
作者: Shuo Cai Fei Yu Yiqun Yang School of Computer and Communication Engineering Changsha University of Science and Technology Changsha 410114 China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha 410114 China
As the feature size of CMOS transistors scales down, single event transient (SET) has been an important consideration in designing logic circuits. Many researches have been done in analyzing the impact of SET. However...
来源: 评论
Trajectory data privacy protection based on differential privacy mechanism
收藏 引用
IOP Conference Series: Materials Science and Engineering 2018年 第1期351卷
作者: Ke Gu Lihao Yang Yongzhi Liu Niandong Liao School of Computer and Communication Engineering Changsha University of Science and Technology Changsha 410114 China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha 410114 China
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory da...
来源: 评论
Random asynchronous iterations in distributed coordination algorithms
arXiv
收藏 引用
arXiv 2018年
作者: Chen, Yao Xia, Weiguo Cao, Ming Lü, Jinhu Department of Computer Science Southwestern University of Finance and Economics Chengdu611130 China School of Control Science and Engineering Dalian University of Technology Dalian116024 China Faculty of Science and Engineering ENTEG University of Groningen Groningen9747 AG Netherlands School of Automation Science and Electrical Engineering State Key Laboratory of Software Development Environment Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China
Distributed coordination algorithms (DCA) carry out information processing processes among a group of networked agents without centralized information fusion. Though it is well known that DCA characterized by an SIA (... 详细信息
来源: 评论
Exploring the node importance based on von Neumann entropy
arXiv
收藏 引用
arXiv 2017年
作者: Feng, Xiangnan Wei, Wei Wang, Jiannan Shi, Ying Zheng, Zhiming School of Mathematics and Systems Science Beihang University Beijing China Key Laboratory of Mathematics Informatics Behavioral Semantics Ministry of Education China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China
When analyzing the statistical and topological characteristics of complex networks, an effective and convenient way is to compute the centralities for recognizing influential and significant nodes or structures, yet m... 详细信息
来源: 评论
Incentivizing the Biased Requesters: Truthful Task Assignment Mechanisms in Crowdsourcing
Incentivizing the Biased Requesters: Truthful Task Assignmen...
收藏 引用
IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON)
作者: Jia Xu Hui Li Yanxu Li Dejun Yang Tao Li Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing Jiangsu China School of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu China Department of Computer Science Colorado School of Mines Golden CO USA
Crowdsourcing has become an effective tool to utilize human intelligence to perform tasks that are challenging for machines. In the integrated crowdsourcing systems, the requesters are non- monopolistic and may show p... 详细信息
来源: 评论
Software Defined Networking Based On-Demand Routing Protocol in Vehicle Ad Hoc Networks  12
Software Defined Networking Based On-Demand Routing Protocol...
收藏 引用
12th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2016
作者: Dong, Baihong Wu, Weigang Yang, Zhiwei Li, Junjie School of Data and Computer Science Sun Yat-Sen University China Guangdong Key Lab of Big Data Analysis and Processing China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China
This paper comes up with a SDN based On-Demand Routing Protocol, SVAO, which separates data forwarding layer and network control layer, as in SDN, to enhance the data transmission efficiency within VANETs. The Roadsid... 详细信息
来源: 评论
Tri-level combination for image representation  17th
Tri-level combination for image representation
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Li, Ruiying Zhang, Chunjie Huang, Qingming School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
The context of objects can provide auxiliary discrimination beyond objects. However, this effective information has not been fully explored. In this paper, we propose Tri-level Combination for Image Representation (Tr... 详细信息
来源: 评论
Metric All-k-Nearest-Neighbor Search
Metric All-k-Nearest-Neighbor Search
收藏 引用
作者: Chen, Lu Gao, Yunjun Chen, Gang Zhang, Haida College of Computer Science Zhejiang University 38 Zheda Road Hangzhou310027 China Key Lab of Big Data Intelligent Computing of Zhejiang Province Zhejiang University Hangzhou China
An all-k-nearest-neighbor (AkNN) query finds from a given object set O, k nearest neighbors for each object in a specified query set Q. This operation is common in many applications such as GIS, data mining, and image... 详细信息
来源: 评论