咨询与建议

限定检索结果

文献类型

  • 924 篇 会议
  • 880 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,809 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,172 篇 工学
    • 864 篇 计算机科学与技术...
    • 710 篇 软件工程
    • 277 篇 信息与通信工程
    • 136 篇 电气工程
    • 133 篇 控制科学与工程
    • 121 篇 生物工程
    • 81 篇 机械工程
    • 69 篇 化学工程与技术
    • 67 篇 电子科学与技术(可...
    • 56 篇 动力工程及工程热...
    • 51 篇 生物医学工程(可授...
    • 50 篇 交通运输工程
    • 49 篇 仪器科学与技术
    • 37 篇 光学工程
    • 37 篇 建筑学
    • 31 篇 安全科学与工程
    • 30 篇 土木工程
  • 593 篇 理学
    • 346 篇 数学
    • 135 篇 生物学
    • 112 篇 统计学(可授理学、...
    • 108 篇 物理学
    • 72 篇 化学
    • 42 篇 系统科学
  • 441 篇 管理学
    • 244 篇 管理科学与工程(可...
    • 227 篇 图书情报与档案管...
    • 91 篇 工商管理
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 52 篇 医学
    • 45 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 50 篇 法学
    • 43 篇 社会学
  • 35 篇 农学
  • 13 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 62 篇 semantics
  • 54 篇 data mining
  • 42 篇 training
  • 35 篇 feature extracti...
  • 34 篇 knowledge engine...
  • 31 篇 big data
  • 29 篇 deep learning
  • 25 篇 computational mo...
  • 23 篇 data models
  • 22 篇 visualization
  • 21 篇 conferences
  • 21 篇 task analysis
  • 21 篇 laboratories
  • 21 篇 machine learning
  • 20 篇 data engineering
  • 20 篇 information retr...
  • 19 篇 knowledge graph
  • 19 篇 databases
  • 18 篇 object detection
  • 18 篇 ontology

机构

  • 157 篇 key laboratory o...
  • 154 篇 school of inform...
  • 134 篇 school of econom...
  • 104 篇 school of comput...
  • 99 篇 fujian provincia...
  • 83 篇 research center ...
  • 54 篇 key laboratory o...
  • 49 篇 school of inform...
  • 49 篇 key laboratory o...
  • 47 篇 school of inform...
  • 34 篇 school of inform...
  • 33 篇 school of comput...
  • 32 篇 school of mathem...
  • 32 篇 jiangxi key labo...
  • 31 篇 key laboratory o...
  • 31 篇 research center ...
  • 29 篇 institute of env...
  • 29 篇 college of compu...
  • 28 篇 college of mecha...
  • 26 篇 key laboratory o...

作者

  • 50 篇 shi yong
  • 48 篇 chen hong
  • 46 篇 chang kuo-chi
  • 45 篇 pan jeng-shyang
  • 41 篇 yong shi
  • 39 篇 zhang jing
  • 37 篇 wu xindong
  • 34 篇 du xiaoyong
  • 33 篇 xue xingsi
  • 32 篇 wang meng
  • 29 篇 li cuiping
  • 29 篇 chu kai-chun
  • 28 篇 huang qingming
  • 28 篇 xindong wu
  • 28 篇 xiaoyong du
  • 27 篇 wang shan
  • 26 篇 hong chen
  • 24 篇 sun geng
  • 24 篇 tian yingjie
  • 22 篇 xu qianqian

语言

  • 1,705 篇 英文
  • 78 篇 其他
  • 25 篇 中文
检索条件"机构=Key Laboratory of Data Mining and Knowledge Engineering"
1809 条 记 录,以下是1551-1560 订阅
排序:
Overview of Essential Components in deep learning reference-based super resolution methods
收藏 引用
Procedia Computer Science 2024年 242卷 1243-1248页
作者: Jiayu Xue Junjie Liu Yong Shi School of Computer Science and Technology University of Chinese Academy of Sciences Beijing 101408 China Research Center on Fictitious Economy & Data Science Chinese Academy of Sciences Beijing 100190 China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing 100190 China Sino-Danish College University of Chinese Academy of Sciences Beijing 100049 China School of Economics and Management University of Chinese Academy of Sciences Beijing 100190 China College of Information Science and Technology University of Nebraska at Omaha Omaha NE 68182 USA
Reference-based super resolution (RefSR) aims to recover the lost details in a low-resolution image and generate a high-resolution result, guided by a high-resolution reference image with similar contents or textures.... 详细信息
来源: 评论
An ES-based model with contemporaneous and temporal aggregation for forecasting intermittent and lumpy retail demand
收藏 引用
Procedia Computer Science 2024年 242卷 264-271页
作者: Erjiang E Xin Tian Ye Tao Huiqiang Sun School of Management Guangxi Minzu University Nanning 530006 China Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences Beijing 100190 China School of Economics and Management University of Chinese Academy of Sciences Beijing 100190 China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy Sciences Beijing 100190 China Beijing Haolinju CVS Co. Ltd. Beijing 100018 China Shenghe (Beijing) Technology Development Co. Ltd. Beijing 101399 China
The demand for products in the retail industry is often characterized by intermittent and volatile patterns. Specifically, at the SKU level, the demand exhibits intermittent and lumpy behavior, which presents challeng... 详细信息
来源: 评论
A Routing Optimization in Wireless Sensor Networks Based on Reverse Elite Sparrow Search Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2021年 第4期6卷 763-775页
作者: Ning, Chun-Yuan Liao, Lyu-Chao Nguyen, Trong-The Huang, Kuan-Chun Pan, Jeng-Shyang Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China Multimedia Communications Lab University of Information Technology VNU-HCM Viet Nam Department of Industrial and Systems Engineering Chung Yuan Christian University Taoyuan320314 Taiwan College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
This study suggests a solution to the routing optimization insufficiency based on the reverse elite sparrow search algorithm (RESSA) for energy balancing and network lifetime prolonging in wireless sensor networks (WS... 详细信息
来源: 评论
A Secure data Deduplication Scheme Based on Differential Privacy
A Secure Data Deduplication Scheme Based on Differential Pri...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jun Ren Zhiqiang Yao Jinbo Xiong Yuanyuan Zhang Ayong Ye Faculty of Software Fujian Normal University Fuzhou China Fujian Engineering Research Center of Public Service Big Data Mining and Application Furhou China Fujian Normal University Fuzhou Fujian CN Fujian Provincial Key Laboratory of Network Security and Cryptology FJNU Fuzhou China
In cloud computing environment, especially in Big data era, adversary may use data deduplication service supported by the cloud service provider as a side channel to eavesdrop users' privacy or sensitive informati... 详细信息
来源: 评论
An improving data compression capability in sensor node to support sensorml-compatible for internet-of-things
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2018年 第2期3卷 74-90页
作者: Nguyen, Trong-The Dao, Thi-Kien Pan, Jeng-Shyang Horng, Mong-Fong Shieh, Chin-Shiuh Department of Information Technology Haiphong Private University No. 35 Danlap Rd. Hai-Phong Viet Nam Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian China College of Information Science and Engineering Fujian University of Technology Fujian China Department of Electronics Engineering National Kaohsiung University of Applied Sciences Taiwan
Limited bandwidth and lacked compatibility information of the sensor nodes in Wireless Sensor Network (WSN) are critical issues in implementing WSN applica-tions. This paper proposes a method of improvement to data co... 详细信息
来源: 评论
Fuzzy-NMS: Improving 3D Object Detection With Fuzzy Classification in NMS
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-15页
作者: Wang, Li Zhang, Xinyu Zhao, Fachuan Wu, Chuze Wang, Yichen Song, Ziying Yang, Lei Xu, Bin Li, Jun Ge, Shuzhi Sam School of Machanical Engineering Beijing Institute of Technology Beijing China School of Vehicle and Mobility Tsinghua University Beijing China School of Computer and Information Technology Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China Department of Electrical and Computer Engineering Interactive Digital Media Institute Social Robotics Laboratory National University of Singapore Singapore
Non-maximum suppression (NMS) is an essential post-processing module in many 3D object detection frameworks to remove overlapping candidate bounding boxes. However, an overreliance on classification scores and difficu... 详细信息
来源: 评论
An overview on visualization of ontology alignment and ontology entity  5th
An overview on visualization of ontology alignment and ontol...
收藏 引用
5th Euro-China Conference on Intelligent data Analysis and Applications, ECC 2018
作者: Chen, Jie Xue, Xingsi Huang, Lili Ren, Aihong College of Information Science and Engineering Fujian University of Technology FuzhouFujian350118 China Intelligent Information Processing Research Center Fujian University of Technology FuzhouFujian350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications FuzhouFujian350118 China Fujian Key Lab for Automotive Electronics and Electric Drive Fujian University of Technology FuzhouFujian350118 China College of Humanities and Law Fujian Agriculture and Forestry University FuzhouFujian350002 China School of Mathematics and Information Science Baoji University of Arts and Sciences BaojiShaanxi721013 China
Visualization of ontology alignment and ontology entity is becoming a method to help Solve the problem of semantic heterogeneity. This paper first introduces the basic concepts of ontology and ontology matching, and t... 详细信息
来源: 评论
A Dynamics Theory of Implicit Regularization in Deep Low-Rank Matrix Factorization
arXiv
收藏 引用
arXiv 2022年
作者: Cao, Jian Qian, Chen Huang, Yihui Chen, Dicheng Gao, Yuncheng Dong, Jiyang Guo, Di Qu, Xiaobo Department of Electronic Science Biomedical Intelligent Cloud R&D Center Fujian Provincial Key Laboratory of Plasma and Magnetic Resonance Xiamen University Xiamen361005 China School of Computer and Information Engineering Fujian Engineering Research Center for Medical Data Mining and Application Xiamen University of Technology Xiamen361024 China
Implicit regularization is an important way to interpret neural networks. Recent theory starts to explain implicit regularization with the model of deep matrix factorization (DMF) and analyze the trajectory of discret... 详细信息
来源: 评论
Studies and implementation of the trusted process mechanism in a secure operating system
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2010年 第SUPPL. 1期50卷 1547-1553页
作者: Zhang, Chongbin Li, Fengjuan Liang, Bin China Information Technology Security Evaluation Center Beijing 100085 China Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renming University of China Beijing 100872 China
The trusted process mechanism is an important part of the operating system security mechanism, but there is no uniform definition of the trusted process and there are some limitations in understanding its fundamental ... 详细信息
来源: 评论
QGEval: Benchmarking Multi-dimensional Evaluation for Question Generation
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Weiping Wei, Bifan Hu, Jianxiang Cai, Zhongmin Liu, Jun School of Computer Science and Technology Xi’an Jiaotong University Xi’an China School of Continuing Education Xi’an Jiaotong University Xi’an China MOE KLINNS Lab School of Automation Science and Engineering Xi’an Jiaotong University Xi’an China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an China
Automatically generated questions often suffer from problems such as unclear expression or factual inaccuracies, requiring a reliable and comprehensive evaluation of their quality. Human evaluation is widely used in t... 详细信息
来源: 评论