咨询与建议

限定检索结果

文献类型

  • 922 篇 会议
  • 857 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,784 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,149 篇 工学
    • 850 篇 计算机科学与技术...
    • 707 篇 软件工程
    • 265 篇 信息与通信工程
    • 127 篇 控制科学与工程
    • 123 篇 电气工程
    • 121 篇 生物工程
    • 76 篇 机械工程
    • 68 篇 化学工程与技术
    • 67 篇 电子科学与技术(可...
    • 54 篇 动力工程及工程热...
    • 51 篇 生物医学工程(可授...
    • 46 篇 仪器科学与技术
    • 46 篇 交通运输工程
    • 36 篇 光学工程
    • 36 篇 建筑学
    • 29 篇 土木工程
    • 27 篇 材料科学与工程(可...
  • 577 篇 理学
    • 337 篇 数学
    • 133 篇 生物学
    • 107 篇 物理学
    • 107 篇 统计学(可授理学、...
    • 71 篇 化学
    • 42 篇 系统科学
  • 433 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 91 篇 工商管理
  • 55 篇 经济学
    • 55 篇 应用经济学
  • 50 篇 法学
    • 43 篇 社会学
  • 50 篇 医学
    • 43 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 34 篇 农学
  • 13 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 61 篇 semantics
  • 53 篇 data mining
  • 41 篇 training
  • 34 篇 knowledge engine...
  • 33 篇 feature extracti...
  • 31 篇 big data
  • 28 篇 deep learning
  • 25 篇 computational mo...
  • 22 篇 visualization
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 task analysis
  • 21 篇 laboratories
  • 21 篇 machine learning
  • 20 篇 data engineering
  • 20 篇 information retr...
  • 19 篇 databases
  • 18 篇 object detection
  • 18 篇 ontology
  • 17 篇 convolution

机构

  • 156 篇 key laboratory o...
  • 154 篇 school of inform...
  • 133 篇 school of econom...
  • 104 篇 school of comput...
  • 98 篇 fujian provincia...
  • 82 篇 research center ...
  • 52 篇 key laboratory o...
  • 49 篇 school of inform...
  • 49 篇 key laboratory o...
  • 47 篇 school of inform...
  • 34 篇 school of inform...
  • 33 篇 school of comput...
  • 32 篇 jiangxi key labo...
  • 31 篇 key laboratory o...
  • 31 篇 school of mathem...
  • 31 篇 research center ...
  • 29 篇 institute of env...
  • 29 篇 college of compu...
  • 28 篇 college of mecha...
  • 25 篇 key laboratory o...

作者

  • 49 篇 shi yong
  • 48 篇 chen hong
  • 46 篇 chang kuo-chi
  • 45 篇 pan jeng-shyang
  • 41 篇 yong shi
  • 39 篇 zhang jing
  • 34 篇 wu xindong
  • 34 篇 du xiaoyong
  • 32 篇 xue xingsi
  • 32 篇 wang meng
  • 29 篇 li cuiping
  • 29 篇 chu kai-chun
  • 28 篇 huang qingming
  • 28 篇 xiaoyong du
  • 27 篇 wang shan
  • 26 篇 xindong wu
  • 24 篇 hong chen
  • 24 篇 tian yingjie
  • 23 篇 sun geng
  • 22 篇 xu qianqian

语言

  • 1,688 篇 英文
  • 71 篇 其他
  • 25 篇 中文
检索条件"机构=Key Laboratory of Data Mining and Knowledge Engineering"
1784 条 记 录,以下是1661-1670 订阅
排序:
Vulnerabilities Static Detection for Web Applications with False Positive Suppression
Vulnerabilities Static Detection for Web Applications with F...
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Bin Liang Qianqian Wang Jianjun Huang Jiagui Zhong Jingjing Cai Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) MOE Schoo School of Information Renmin University of China Beijing 100872 China Beijing Venustech Cybervision Co. Ltd Beijing 100094 China
Web applications become more and more important, and the corresponding security problems have been concerned about. This paper presents TASA, an ASP static analyzer, which employs a path-sensitive, inter-procedural an... 详细信息
来源: 评论
Workflow-Based Spatial Modeling Environment and Its Application in Food Provisioning Services of Grassland Ecosystem
Workflow-Based Spatial Modeling Environment and Its Applicat...
收藏 引用
The 18th International Conference on Geoinformatics(第18届国际地理信息科学与技术大会 Geoinformatics 2010)
作者: Yimin Lu Tianxiang Yue Qinmin Wang Chenliang Wang State Key Lab.of Resources & Environmental Information System Institute of Geographic Sciences and N Key Laboratory of Data Mining & Information Sharing of Ministry of Education Spatial Information Res The College of Information Science and Engineering Shandong University of Science and Technology Qin
Nowadays, the key strategic issues about resource and environment, such as global warming, water resources shortage, food security etc. are more complex and multidisciplinary than ever before. In scientific research, ... 详细信息
来源: 评论
Improved paralled algorithm for mining frequent item-set used in HRM
Improved paralled algorithm for mining frequent item-set use...
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: XuePing Zhang YanXia Zhu Nan Hua Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou China College of Information Science and Engineering Henan University of Technology Zhengzhou China Technology Department Zhengzhou Super HW Network Technology Company Limited Zhengzhou China
Based on FP-tree algorithm, this article introduced the method of multi-thread processing and a Multi-Threaded Paralleled frequent item-set mining Algorithm - MTPA was proposed. It has been applied to an enterprise hu... 详细信息
来源: 评论
Global Top-k Aggregate Queries Based on X-tuple in Uncertain database
Global Top-k Aggregate Queries Based on X-tuple in Uncertain...
收藏 引用
International Conference on Advanced Information Networking and Applications Workshops (AINAW)
作者: Dexi Liu Changxuan Wan Naixue Xiong Jong Hyuk Park Sang-Soo Yeoe School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China Department of Computer Science Georgia State University Atlanta GA USA Department of Computer Science and Engineering Seoul National University of Technology Seoul South Korea Division of Computer Engineering Mokwon University Daejeon South Korea
A Top-k aggregate query, which is a powerful technique when dealing with large quantity of data, ranks groups of tuples by their aggregate values and returns k groups with the highest aggregate values. However, compar... 详细信息
来源: 评论
Studies and implementation of the trusted process mechanism in a secure operating system
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2010年 第SUPPL. 1期50卷 1547-1553页
作者: Zhang, Chongbin Li, Fengjuan Liang, Bin China Information Technology Security Evaluation Center Beijing 100085 China Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renming University of China Beijing 100872 China
The trusted process mechanism is an important part of the operating system security mechanism, but there is no uniform definition of the trusted process and there are some limitations in understanding its fundamental ... 详细信息
来源: 评论
Operating system mechanisms for TPM-based lifetime measurement of process integrity
Operating system mechanisms for TPM-based lifetime measureme...
收藏 引用
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09
作者: Xiao, Li Wenchang, Shi Zhaohui, Liang Bin, Liang Zhiyong, Shan Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University) Ministry of Education
Implementing runtime integrity measurement in an acceptable way is a big challenge. We tackle this challenge by developing a framework called Patos. This paper discusses the design and implementation concepts of our o... 详细信息
来源: 评论
Median query research in wireless sensor networks
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2010年 第2A期38卷 133-137页
作者: Wu, Zhong-Bo Zhang, Hui Chen, Hong Information School Renmin University of China Beijing 100872 China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing 100872 China School of Mathematics and Computer Science Xiangfan University Xiangfan Hubei 441053 China
Poor quality and harsh condition can result in faulty and outlier data in sampling data of sensor nodes. So we need median query to reflect average level of monitoring region. First, we put forward HMA algorithm. Seco... 详细信息
来源: 评论
Approximation algorithm for constructing data aggregation trees for wireless sensor networks
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第4期3卷 524-534页
作者: Deying LI Jiannong CAO Qinghua ZHU Key Laboratory of Data Engineering and Knowledge Engineering School of InformationRenmin University of ChinaBeijing 100872China Internet and Mobile Computing Lab Department of ComputingHong Kong Polytechnic UniversityHong KongChina
This paper considers the problem of constructing data aggregation trees in wireless sensor networks (WSNs)for a group of sensor nodes to send collected information to a single sink *** data aggregation tree contains t... 详细信息
来源: 评论
Two Novel Semantics of Top-k Queries Processing in Uncertain database
Two Novel Semantics of Top-k Queries Processing in Uncertain...
收藏 引用
International Conference on Computer and Information Technology (CIT)
作者: Dexi Liu Changxuan Wan N. Xiong Laurence T. Yang Lei Chen School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China Department of Computer Science Georgia State University Atlanta GA USA Department of Computer Science Saint Francis Xavier University Antigonish NS Canada Department of Computer Science HK University of Science and Technology Hong Kong China
Top-k query is a powerful technique in uncertain databases because of the existence of exponential possible worlds, and it is necessary to combine score and confidence of tuples to derive top k answers. Different sema... 详细信息
来源: 评论
A Review-Based Reputation Evaluation Approach for Web Services
收藏 引用
Journal of Computer Science & Technology 2009年 第5期24卷 893-900页
作者: 李海华 杜小勇 Member 田萱 Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China School of Information Science & Technology Beijing Forestry University Beijing 100083 China
Web services are commonly perceived as an environment of both offering opportunities and threats. In this environment, one way to minimize threats is to use reputation evaluation, which can be computed, for example, t... 详细信息
来源: 评论