咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 289 篇 期刊文献

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 442 篇 工学
    • 348 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 127 篇 信息与通信工程
    • 44 篇 控制科学与工程
    • 38 篇 生物工程
    • 34 篇 电气工程
    • 29 篇 机械工程
    • 28 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 183 篇 理学
    • 124 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 contrastive lear...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 167 篇 school of comput...
  • 81 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 42 篇 school of cyber ...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 purple mountain ...
  • 15 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 8 篇 the key laborato...
  • 8 篇 southeast univer...

作者

  • 36 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 23 篇 min-ling zhang
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 16 篇 xiaoping li
  • 16 篇 he yulan
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 xiaoyan hu

语言

  • 544 篇 英文
  • 76 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
661 条 记 录,以下是111-120 订阅
排序:
Multi-label classification with unlabeled data: An inductive approach  5
Multi-label classification with unlabeled data: An inductive...
收藏 引用
5th Asian Conference on Machine Learning, ACML 2013
作者: Wu, Lei Zhang, Min-Ling MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing210096 China
The problem of multi-label classification has attracted great interests in the last decade. Multi-label classification refers to the problems where an example that is represented by a single instance can be assigned t... 详细信息
来源: 评论
Implementation and evaluation of a backtracking algorithm for finding all justifications in OWL 2 EL
Implementation and evaluation of a backtracking algorithm fo...
收藏 引用
7th Chinese Semantic Web Symposium and the 2nd Chinese Web ScienceConference, CSWS 2013
作者: Zhou, Zhangquan Qi, Guilin Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China
Finding justifications plays an important role in the development and maintenance of ontologies. It helps users or developers to understand the entailments by presenting the minimal subsets of the ontology which are r... 详细信息
来源: 评论
Disambiguation-free partial label learning  14
Disambiguation-free partial label learning
收藏 引用
14th SIAM International Conference on Data Mining, SDM 2014
作者: Zhang, Min-Ling School of Computer Science and Engineering MOE Key Laboratory of Computer Network and Information Integration Southeast University Nanjing210096 China
Partial label learning deals with the problem where each training example is associated with a set of candidate labels, among which only one is correct. The common strategy is to try to disambiguate their candidate la... 详细信息
来源: 评论
keyphrase generation algorithm based on co-occurrence graph
Keyphrase generation algorithm based on co-occurrence graph
收藏 引用
2022 International Conference on Applied Mathematics and Computional Mechanics, AMCM 2022
作者: Fang, Haisheng Yang, Peng School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In the keyphrase prediction task, it is usually difficult for a single corpus information to help the model learn enough core information, so this paper improves the current keyphrase generation method based on the co... 详细信息
来源: 评论
Conflict Resolution in Partially Ordered OWL DL Ontologies  21
Conflict Resolution in Partially Ordered OWL DL Ontologies
收藏 引用
21st European Conference on Artificial Intelligence (ECAI)
作者: Ji, Qiu Gao, Zhiqiang Huang, Zhisheng School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration China Department of Mathematics and Computer Science Vrije University Amsterdam Netherlands
Inconsistency handling in OWL DL ontologies is an important problem because an ontology can easily be inconsistent when it is generated or modified. Current approaches to dealing with inconsistent ontologies often ass... 详细信息
来源: 评论
A reputation-based trust model for P2P systems
A reputation-based trust model for P2P systems
收藏 引用
2009 International Conference on Computational Intelligence and Security, CIS 2009
作者: Wu, Peng Wu, Guoxin Key Laboratory of Computer Network and Information Integration Ministry of Education School of Computer Science and Engineering Southeast University Nanjing China
One of the fundamental challenges for Peer to Peer (P2P) systems is the ability to manage risks involved in interacting and collaborating with prior unknown and potentially malicious parties. Reputation-based trust ma... 详细信息
来源: 评论
ISS: An iterative scrubbing strategy for improving memory reliability against MBU  2nd
ISS: An iterative scrubbing strategy for improving memory re...
收藏 引用
2nd International Conference on Human Centered Computing, HCC 2016
作者: Wang, Hui Wang, Yun Key Laboratory of Computer Network and Information Integration MOE Department of Computer Science and Engineering Southeast University Nanjing210096 China
As technology scales, multiple bit upsets (MBUs) have shown prominent effect, thus affecting the reliability of memory to a great extent. In order to mitigate MBUs errors, interleaving schemes together with single err... 详细信息
来源: 评论
Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding
收藏 引用
Journal of computer Science & Technology 2017年 第2期32卷 329-339页
作者: Ji-Liang Zhang Wei-Zheng Wang Xing-Wei Wang Zhi-Hua Xia Software College Northeastern University Shenyang 110169 China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 China Department of Computer and Communication Engineering Changsha University of Science and Technology Changsha 410014 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
With the increasing use of field-programmable gate arrays (FPGAs) in embedded systems and many embedded applications, the failure to protect FPGA-based embedded systems from cloning attacks has brought serious losse... 详细信息
来源: 评论
Efficient iterated greedy algorithm to minimize makespan for the no-wait flowshop with sequence dependent setup times
Efficient iterated greedy algorithm to minimize makespan for...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Xu, Tao Zhu, Xia Li, Xiaoping School of Computer Science and Engineering Southeast University 211189 Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
In this paper, an efficient iterated greedy algorithm is proposed for the SDST (Sequence Dependent Setup Time) no-wait flowshop with makespan minimization, which is known to be NP-hard. By introducing effective operat... 详细信息
来源: 评论
Hybrid heuristic for total flowtime minimization in no-wait flow shops
Hybrid heuristic for total flowtime minimization in no-wait ...
收藏 引用
11th International Conference on computer Supported Cooperative Work in Design, CSCWD 2007
作者: Zhu, Xia Li, Xiaoping Wang, Qian School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PH1 (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co... 详细信息
来源: 评论