咨询与建议

限定检索结果

文献类型

  • 922 篇 会议
  • 857 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,784 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,149 篇 工学
    • 850 篇 计算机科学与技术...
    • 707 篇 软件工程
    • 265 篇 信息与通信工程
    • 127 篇 控制科学与工程
    • 123 篇 电气工程
    • 121 篇 生物工程
    • 76 篇 机械工程
    • 68 篇 化学工程与技术
    • 67 篇 电子科学与技术(可...
    • 54 篇 动力工程及工程热...
    • 51 篇 生物医学工程(可授...
    • 46 篇 仪器科学与技术
    • 46 篇 交通运输工程
    • 36 篇 光学工程
    • 36 篇 建筑学
    • 29 篇 土木工程
    • 27 篇 材料科学与工程(可...
  • 577 篇 理学
    • 337 篇 数学
    • 133 篇 生物学
    • 107 篇 物理学
    • 107 篇 统计学(可授理学、...
    • 71 篇 化学
    • 42 篇 系统科学
  • 433 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 91 篇 工商管理
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 50 篇 法学
    • 43 篇 社会学
  • 50 篇 医学
    • 43 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 34 篇 农学
  • 13 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 61 篇 semantics
  • 53 篇 data mining
  • 41 篇 training
  • 34 篇 knowledge engine...
  • 33 篇 feature extracti...
  • 31 篇 big data
  • 28 篇 deep learning
  • 25 篇 computational mo...
  • 22 篇 visualization
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 task analysis
  • 21 篇 laboratories
  • 21 篇 machine learning
  • 20 篇 data engineering
  • 20 篇 information retr...
  • 19 篇 databases
  • 18 篇 object detection
  • 18 篇 ontology
  • 17 篇 convolution

机构

  • 156 篇 key laboratory o...
  • 154 篇 school of inform...
  • 133 篇 school of econom...
  • 104 篇 school of comput...
  • 98 篇 fujian provincia...
  • 82 篇 research center ...
  • 52 篇 key laboratory o...
  • 49 篇 school of inform...
  • 49 篇 key laboratory o...
  • 47 篇 school of inform...
  • 34 篇 school of inform...
  • 33 篇 school of comput...
  • 32 篇 jiangxi key labo...
  • 31 篇 key laboratory o...
  • 31 篇 school of mathem...
  • 31 篇 research center ...
  • 29 篇 institute of env...
  • 29 篇 college of compu...
  • 28 篇 college of mecha...
  • 25 篇 key laboratory o...

作者

  • 49 篇 shi yong
  • 48 篇 chen hong
  • 46 篇 chang kuo-chi
  • 45 篇 pan jeng-shyang
  • 41 篇 yong shi
  • 39 篇 zhang jing
  • 34 篇 wu xindong
  • 34 篇 du xiaoyong
  • 32 篇 xue xingsi
  • 32 篇 wang meng
  • 29 篇 li cuiping
  • 29 篇 chu kai-chun
  • 28 篇 huang qingming
  • 28 篇 xiaoyong du
  • 27 篇 wang shan
  • 26 篇 xindong wu
  • 24 篇 hong chen
  • 24 篇 tian yingjie
  • 23 篇 sun geng
  • 22 篇 xu qianqian

语言

  • 1,688 篇 英文
  • 71 篇 其他
  • 25 篇 中文
检索条件"机构=Key Laboratory of Data Mining and Knowledge Engineering"
1784 条 记 录,以下是1571-1580 订阅
排序:
Spatial data mining under Smart Earth
Spatial data mining under Smart Earth
收藏 引用
2011 IEEE International Conference on Granular Computing, GrC 2011
作者: Wang, Shuliang International School of Software of Wuhan University Wuhan University Wuhan Hubei 430072 China Key Laboratory of Data Mining and Knowledge Engineering Hohhot China
Complex spatial data is the fundamental content of Smart Earth. Spatial data mining plays an important role in Smart Earth. In this paper, it is proposed that "Smart earth equals to Digital Earth plus the Interne... 详细信息
来源: 评论
Preventing Recommendation Attack in Trust-Based Recommender Systems
收藏 引用
Journal of Computer Science & Technology 2011年 第5期26卷 823-828页
作者: 张富国 School of Information and Technology Jiangxi University of Finance and Economics Institute of Information Resource Management Jiangxi University of Finance and Economics Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics
Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation *** work has shown incorporating trust mechanism into traditional collaborativ... 详细信息
来源: 评论
Reduce pruning cost to accelerate multimedia kNN search over MBRs based index structures
Reduce pruning cost to accelerate multimedia kNN search over...
收藏 引用
3rd International Conference on Multimedia Information Networking and Security, MINES 2011
作者: Li, Hui Zhang, Xiao Wang, Shan School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering Beijing China
MBR (Minimum Bounding Rectangle) has been widely used to represent multimedia data objects for multimedia indexing techniques. In kNN search, MINDIST and MINMAXDIST was the most popular pruning metrics employed by MBR... 详细信息
来源: 评论
Lawyer information integration and recommendation by multi-source information validation
Lawyer information integration and recommendation by multi-s...
收藏 引用
2011 International Conference on Machine Learning and Cybernetics, ICMLC 2011
作者: Liu, Tao Fan, Biao Hu, He Du, Xiao-Yong Key Laboratory of Data Engineering and Knowledge Engineering MOE School of Information Renmin University of China Beijing 100872 China
On the internet, all-round lawyer information is located at separated information sources, which prevent web users from effective information acquisition. In order to build a unified view of separated, heterogeneous, ... 详细信息
来源: 评论
Improving performance by creating a native join-index for OLAP
收藏 引用
Frontiers of Computer Science 2011年 第2期5卷 236-249页
作者: Yansong ZHANG Shan WANG Jiaheng LU National Survey Research Center at Renmin University of China Beijing 100872 China Key Laboratory of the Ministry of Education for Data Engineering and Knowledge Engineering Renmin University of China Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
The performance of online analytical processing (OLAP) is critical for meeting the increasing requirements of massive volume analytical applications. Typical techniques, such as in-memory processing, column-storage,... 详细信息
来源: 评论
Virtualizing system and ordinary services in Windows-based OS-level virtual machines  11
Virtualizing system and ordinary services in Windows-based O...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied Computing
作者: Shan, Zhiyong Chiueh, Tzi-Cker Wang, Xin Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China Stony Brook University United States
OS-level virtualization incurs smaller start-up and run-time overhead than HAL-based virtualization and thus forms an important building block for developing fault-tolerant and intrusion-tolerant applications. A compl... 详细信息
来源: 评论
Efficient Duplicate Detection on Cloud Using a New Signature Scheme
Efficient Duplicate Detection on Cloud Using a New Signature...
收藏 引用
12th International Conference on Web-Age Information Management
作者: Rong, Chuitian Lu, Wei Du, Xiaoyong Zhang, Xiao Key Labs. of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China China Shanghai Key Laboratory of Intelligent Information Processing China
Duplicate detection has been well recognized as a crucial task to improve the quality of data. Related work on this problem mainly aims to propose efficient approaches over a single machine. However, with increasing v... 详细信息
来源: 评论
Tracer: Enforcing Mandatory Access Control in commodity OS with the support of light-weight intrusion detection and tracing  11
Tracer: Enforcing Mandatory Access Control in commodity OS w...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Key Laboratory of Data Engineering and Knowledge Engineering Renmin University MOE China Stony Brook University United States Industrial Technology Research Institute Taiwan
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p... 详细信息
来源: 评论
A RFID mixed coding scheme based on huffman algorithm
A RFID mixed coding scheme based on huffman algorithm
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Jian, Jiang Guoqiong, Liao Hao, Wang Qizhi, Wan School of Information Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang Nanchang China
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is... 详细信息
来源: 评论
Detecting stealthy malware with inter-structure and imported signatures  11
Detecting stealthy malware with inter-structure and imported...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Liang, Bin You, Wei Shi, Wenchang Liang, Zhaohui Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Recent years have witnessed an increasing threat from kernel rootkits. A common feature of such attack is hiding malicious objects to conceal their presence, including processes, sockets, and kernel modules. Scanning ... 详细信息
来源: 评论