咨询与建议

限定检索结果

文献类型

  • 907 篇 期刊文献
  • 659 篇 会议
  • 1 册 图书

馆藏范围

  • 1,567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,065 篇 工学
    • 762 篇 计算机科学与技术...
    • 650 篇 软件工程
    • 286 篇 信息与通信工程
    • 185 篇 电气工程
    • 153 篇 生物工程
    • 114 篇 控制科学与工程
    • 108 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 95 篇 电子科学与技术(可...
    • 60 篇 机械工程
    • 50 篇 化学工程与技术
    • 45 篇 交通运输工程
    • 44 篇 仪器科学与技术
    • 35 篇 网络空间安全
    • 30 篇 建筑学
    • 30 篇 安全科学与工程
    • 29 篇 土木工程
  • 579 篇 理学
    • 315 篇 数学
    • 170 篇 生物学
    • 119 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 55 篇 化学
    • 46 篇 系统科学
  • 298 篇 管理学
    • 171 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 70 篇 工商管理
  • 99 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 41 篇 法学
    • 34 篇 社会学
  • 23 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 80 篇 semantics
  • 61 篇 feature extracti...
  • 45 篇 training
  • 43 篇 deep learning
  • 32 篇 computational mo...
  • 32 篇 data models
  • 30 篇 accuracy
  • 28 篇 convolution
  • 28 篇 federated learni...
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 23 篇 data mining
  • 22 篇 contrastive lear...
  • 21 篇 deep neural netw...
  • 20 篇 image segmentati...
  • 20 篇 neural networks
  • 19 篇 graph neural net...
  • 19 篇 visualization
  • 18 篇 robustness
  • 17 篇 codes

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 college of compu...
  • 41 篇 national enginee...
  • 39 篇 beijing advanced...
  • 37 篇 school of cyber ...
  • 36 篇 college of compu...
  • 35 篇 school of comput...
  • 33 篇 nanyang technolo...
  • 33 篇 university of ch...
  • 28 篇 school of big da...
  • 27 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...
  • 25 篇 hubei engineerin...
  • 24 篇 school of comput...
  • 23 篇 services computi...
  • 23 篇 cluster and grid...
  • 21 篇 college of compu...

作者

  • 68 篇 niyato dusit
  • 30 篇 jin hai
  • 22 篇 sun geng
  • 21 篇 hai jin
  • 19 篇 shen linlin
  • 18 篇 hu shengshan
  • 18 篇 wang jiacheng
  • 17 篇 huang qingming
  • 16 篇 liu ya-feng
  • 16 篇 xu qianqian
  • 15 篇 li jiahui
  • 15 篇 liu bin
  • 14 篇 huang sheng
  • 14 篇 zhang leo yu
  • 13 篇 cao xiaochun
  • 13 篇 li minghui
  • 12 篇 yang yang
  • 12 篇 zhou ziqi
  • 12 篇 wang lihui
  • 12 篇 mingzhe chen

语言

  • 1,420 篇 英文
  • 125 篇 其他
  • 35 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Visual Computing"
1567 条 记 录,以下是1541-1550 订阅
Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance
Clonepedia: Summarizing Code Clones by Common Syntactic Cont...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Yun Lin Zhenchang Xing Xin Peng Yang Liu Jun Sun Wenyun Zhao Jinsong Dong Shanghai Key Laboratory of Data Science Fudan University Shanghai China School of Computer Engineering Nanyang Technological University Singapore Singapore University of Technology and Design Singapore School of Computing National University of Singapore Singapore
Code clones have to be made explicit and be managed in software maintenance. Researchers have developed many clone detection tools to detect and analyze code clones in software systems. These tools report code clones ... 详细信息
来源: 评论
Appearance-order-based schema matching
收藏 引用
Journal of computing Science and engineering 2014年 第2期8卷 94-106页
作者: Ding, Guohui Cao, keyan Wang, Guoren Han, Dong Department of Computer Science Shenyang Aerospace University Shenyang China Key Laboratory of Medical Image Computing Ministry of Education Northeastern University Shenyang China College of Information Science and Engineering Northeastern University Shenyang China National Marine Data and Information Service Tianjin China
Schema matching is widely used in many applications, such as data integration, ontology merging, data warehouse and dataspaces. In this paper, we propose a novel matching technique that is based on the order of attrib... 详细信息
来源: 评论
Design of a high-performance full-system instrumentation
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2014年 35卷 129-134页
作者: Min, Qing-Hao Zhang, Zheng Wang, Hao-Jun Zhang, Wei-Hua Software School Fudan University Shanghai201203 China Shanghai Key Laboratory of Data Science Fudan University Shanghai201203 China Parallel Processing Institute Fudan University Shanghai201203 China State Key Laboratory of Mathematic Engineering and Advanced Computing PLA Information Engineering University Zhengzhou450001 China
Instrumentation is an important mechanism to collect run-time information of applications for further analysis like bottleneck analysis, hotspot analysis and even bug detection and revision. Currently there are lots o... 详细信息
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论
A blocked statistics method based on directional derivative
A blocked statistics method based on directional derivative
收藏 引用
2012 International Conference on Web Information Systems and Mining, WISM 2012
作者: Li, Junli Chu, Chengxi Li, Gang Lou, Yang Visual Computing and Virtual Reality Key Laboratory of Sichuan Province Sichuan Normal University Chengdu 610066 China Information Science and Engineering College Ningbo University Ningbo 315211 China
The basic idea of identifying the motion blurred direction using the directional derivative is that the original image be an isotropic first-order Markov random process. However, the real effect of this method is not ... 详细信息
来源: 评论
Efficient approximation of the maximal preference scores by lightweight cubic views
Efficient approximation of the maximal preference scores by ...
收藏 引用
15th International Conference on Extending database Technology, EDBT 2012
作者: Chen, Yueguo Cui, Bin Du, Xiaoyong Tung, Anthony K. H. Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE China Department of Computer Science Peking University Beijing China School of Information Renmin University of China Beijing China School of Computing National University of Singapore Singapore Singapore
Given a multi-features data set, a best preference query (BPQ) computes the maximal preference score (MPS) that the tuples in the data set can achieve with respect to a preference function. BPQs are very useful in app... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
LotusX: A Position-Aware XML Graphical Search System with Auto-Completion
LotusX: A Position-Aware XML Graphical Search System with Au...
收藏 引用
International Conference on data engineering
作者: Chunbin Lin Jiaheng Lu Tok Wang Ling Bogdan Cautis Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China School of Computing National University of Singapore Singapore Télécom Paris Technology France
The existing query languages for XML (e.g., XQuery) require professional programming skills to be formulated, however, such complex query languages burden the query processing. In addition, when issuing an XML query, ... 详细信息
来源: 评论
Single attribute Join Queries within latest sampling periods in sensor networks
Single attribute Join Queries within latest sampling periods...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Shangfeng Mo Hong Chen Yinglong Li School of Math and Computing Science Hunan University of Science and Technology Xiangtan China Key Laboratory of Data Engineering and Knowledge Engineering of MOE School of Information Renmin University of China Beijing China
Join processing in wireless sensor networks is a challenging problem. Current solutions are not involved in the join operation among tuples of the latest sampling periods. In this article, we proposed a continuous Sin... 详细信息
来源: 评论
Corrigendum: “Provably-secure electronic cash based on certicateless partially-blind signatures”
收藏 引用
Electronic Commerce Research and Applications 2013年 第1期12卷 60-60页
作者: Lei Zhang Futai Zhang Bo Qin Shubo Liu East China Normal University Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing Shanghai China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Chair in Data Privacy Tarragona Catalonia Spain Nanjing Normal University School of Computer Science and Technology China Xi’an University of Technology School of Science Department of Maths China Wuhan University School of Computer Science Wuhan China
来源: 评论