咨询与建议

限定检索结果

文献类型

  • 598 篇 会议
  • 558 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 734 篇 工学
    • 578 篇 计算机科学与技术...
    • 471 篇 软件工程
    • 158 篇 信息与通信工程
    • 75 篇 生物工程
    • 72 篇 控制科学与工程
    • 67 篇 电气工程
    • 43 篇 化学工程与技术
    • 41 篇 机械工程
    • 41 篇 电子科学与技术(可...
    • 34 篇 生物医学工程(可授...
    • 25 篇 仪器科学与技术
    • 25 篇 动力工程及工程热...
    • 21 篇 光学工程
    • 21 篇 材料科学与工程(可...
    • 20 篇 交通运输工程
    • 19 篇 建筑学
    • 18 篇 航空宇航科学与技...
  • 338 篇 理学
    • 187 篇 数学
    • 84 篇 生物学
    • 72 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 40 篇 化学
    • 21 篇 系统科学
  • 298 篇 管理学
    • 181 篇 图书情报与档案管...
    • 148 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 40 篇 法学
    • 35 篇 社会学
  • 39 篇 医学
    • 32 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 10 篇 教育学
  • 7 篇 文学
  • 6 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 59 篇 semantics
  • 35 篇 knowledge engine...
  • 35 篇 data mining
  • 31 篇 training
  • 26 篇 feature extracti...
  • 21 篇 data models
  • 20 篇 data engineering
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 20 篇 machine learning
  • 19 篇 conferences
  • 19 篇 xml
  • 19 篇 big data
  • 19 篇 information retr...
  • 17 篇 task analysis
  • 17 篇 visualization
  • 16 篇 deep learning
  • 16 篇 knowledge graph
  • 16 篇 databases
  • 15 篇 knowledge manage...

机构

  • 167 篇 school of inform...
  • 104 篇 school of comput...
  • 54 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 42 篇 college of compu...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 31 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 26 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of inform...
  • 18 篇 key laboratory o...
  • 18 篇 school of econom...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 15 篇 school of comput...

作者

  • 54 篇 chen hong
  • 44 篇 du xiaoyong
  • 37 篇 wu xindong
  • 35 篇 li cuiping
  • 32 篇 hong chen
  • 32 篇 wang meng
  • 30 篇 xiaoyong du
  • 29 篇 wang shan
  • 28 篇 xindong wu
  • 28 篇 zhang jing
  • 24 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 liu jun
  • 18 篇 meng wang
  • 18 篇 huang qingming
  • 18 篇 hong richang
  • 17 篇 shan wang
  • 17 篇 wang yang
  • 17 篇 li jiahui
  • 17 篇 wang jiacheng

语言

  • 1,070 篇 英文
  • 58 篇 其他
  • 31 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Knowledge Engineering of MOE"
1159 条 记 录,以下是701-710 订阅
排序:
Machine Memory Intelligence: Inspired by Human Memory Mechanisms
收藏 引用
engineering 2025年
作者: Qinghua Zheng Huan Liu Xiaoqing Zhang Caixia Yan Xiangyong Cao Tieliang Gong Yong-Jin Liu Bin Shi Zhen Peng Xiaocen Fan Ying Cai Jun Liu School of Computer Science and Technology Xi’an Jiaotong University Xi’an 710049 China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an 710049 China Translational Research Institute of Brain and Brain-Like Intelligence Shanghai Fourth People’s Hospital Shanghai 200434 China School of Medicine Tongji University Shanghai 200092 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Department of Computer Science Iowa State University Ames IA 50011 USA
Large models, exemplified by ChatGPT, have reached the pinnacle of contemporary artificial intelligence (AI). However, they are plagued by three inherent drawbacks: excessive training data and computing power consumpt... 详细信息
来源: 评论
The Integrated Use of Business Continuity Management Systems, Records Management Systems and knowledge Management Systems
The Integrated Use of Business Continuity Management Systems...
收藏 引用
International Conference on Management and Service Science, MASS
作者: Xiaomi An Wang Wang Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Renmin University of China Beijing China School of Information Resource Management Renmin University of China Beijing China
Much research has been done on integrated use of ISO management system standards. Integrated use of management systems is identified to have shared values of varied integration impacts on resources efficiency building... 详细信息
来源: 评论
TABLELLM: Enabling Tabular data Manipulation by LLMs in Real Office Usage Scenarios
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xiaokang Luo, Sijia Zhang, Bohan Ma, Zeyao Zhang, Jing Li, Yang Li, Guanlin Yao, Zijun Xu, Kangli Zhou, Jinchang Zhang-Li, Daniel Yu, Jifan Zhao, Shu Li, Juanzi Tang, Jie School of Information Renmin University of China China Tsinghua University China Key Laboratory of Data Engineering and Knowledge Engineering Beijing China Computer Science Anhui University China
We introduce TABLELLM, a robust large language model (LLM) with 8 billion parameters, purpose-built for proficiently handling tabular data manipulation tasks, whether they are embedded within documents or spreadsheets... 详细信息
来源: 评论
Against Code Injection with System Call Randomization
Against Code Injection with System Call Randomization
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Zhaohui Liang Bin Liang Luping Li Wei Chen Qingqing Kang Yingqin Gu Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing China Renmin University of China Beijing CN School of Information Renmin University of China China
The existing code injection attack defense methods have some deficiencies on performance overhead and effectiveness. In order to ensure the system performance, we propose a method that uses system call randomization t... 详细信息
来源: 评论
A decomposition method to solve the large-scale scheduling problems based on cellular manufacturing technology
A decomposition method to solve the large-scale scheduling p...
收藏 引用
2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce, AIMSEC 2011
作者: Niu, Li Han, Xiaoting Data Engineering and Knowledge Engineering Key Laboratory School of Information Resource Management Renmin University of China Beijing China School of Economics and Management Beihang University Beijing China
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on largescale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems,... 详细信息
来源: 评论
DAGKT: Difficulty and Attempts Boosted Graph-based knowledge Tracing
arXiv
收藏 引用
arXiv 2022年
作者: Luo, Rui Liu, Fei Liang, Wenhao Zhang, Yuhong Bu, Chenyang Hu, Xuegang Key Laboratory of Knowledge Engineering with Big Data The Ministry of Education of China School of Computer Science and Information Engineering Hefei University of Technology China Jianzai Tech Hefei China
In the field of intelligent education, knowledge tracing (KT) has attracted increasing attention, which estimates and traces students’ mastery of knowledge concepts to provide high-quality education. In KT, there are... 详细信息
来源: 评论
Enabling Efficient Random Access to Hierarchically-Compressed data
Enabling Efficient Random Access to Hierarchically-Compresse...
收藏 引用
International Conference on data engineering
作者: Feng Zhang Jidong Zhai Xipeng Shen Onur Mutlu Xiaoyong Du Key Laboratory of Data Engineering and Knowledge Engineering (MOE) and School of Information Renmin University of China Department of Computer Science and Technology Tsinghua University BNRist Computer Science Department North Carolina State University Department of Computer Science ETH Zürich
Recent studies have shown the promise of direct data processing on hierarchically-compressed text documents. By removing the need for decompressing data, the direct data processing technique brings large savings in bo... 详细信息
来源: 评论
Quantifying Interactions between Layers in Duplex Networks Using Interactive Entropy
收藏 引用
Journal of Library & Information Studies 2020年 第2期18卷 31-41页
作者: Zhang, Ronda J. Ye, Fred Y. International Joint Informatics Laboratory (IJIL) Nanjing University - University of Illinois Nanjing-Champaign Nanjing China Jiangsu Key Laboratory of Data Engineering and Knowledge Service School of Information Management Nanjing University Nanjing China
The multiplex network has attracted wide attention because it can better describe the various relationships in the real world, and the duplex network is a special two-layer form of it. The purpose of this research foc... 详细信息
来源: 评论
Sampling Topic Representative Users by Integrating Node Degree and Edge Weight
Sampling Topic Representative Users by Integrating Node Degr...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Jiangwen Wang Zhijie Ban Inner Mongolia A.R. Key Laboratory of Data Mining and Knowledge Engineering College of Computer Science Inner Mongolia University Huhhot China
Finding a subset of users to statistically represent the original social network in terms of attributes has received a lot of attention recently. The existing literature had proved that the problem is NP-Hard and prop...
来源: 评论
Static vulnerabilities detection method based on security state tracing and checking
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第5期32卷 899-909页
作者: Liang, Bin Hou, Kan-Kan Shi, Wen-Chang Liang, Zhao-Hui School of Information Renming University of China Beijing 100872 China MOE Key Laboratory of Data Engineering and Knowledge Engineering Beijing 100872 China
The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates. One main reason is lack of accurate and effective identification an... 详细信息
来源: 评论