咨询与建议

限定检索结果

文献类型

  • 3,054 篇 期刊文献
  • 2,638 篇 会议
  • 4 册 图书

馆藏范围

  • 5,696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,722 篇 工学
    • 2,390 篇 计算机科学与技术...
    • 1,946 篇 软件工程
    • 852 篇 信息与通信工程
    • 471 篇 控制科学与工程
    • 445 篇 电气工程
    • 443 篇 生物工程
    • 326 篇 电子科学与技术(可...
    • 299 篇 化学工程与技术
    • 258 篇 生物医学工程(可授...
    • 252 篇 机械工程
    • 229 篇 光学工程
    • 180 篇 材料科学与工程(可...
    • 166 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 145 篇 仪器科学与技术
    • 142 篇 建筑学
    • 135 篇 土木工程
  • 2,074 篇 理学
    • 1,018 篇 数学
    • 534 篇 物理学
    • 525 篇 生物学
    • 334 篇 统计学(可授理学、...
    • 308 篇 化学
    • 148 篇 系统科学
  • 1,054 篇 管理学
    • 621 篇 管理科学与工程(可...
    • 482 篇 图书情报与档案管...
    • 223 篇 工商管理
  • 299 篇 医学
    • 243 篇 临床医学
    • 162 篇 基础医学(可授医学...
  • 174 篇 法学
    • 141 篇 社会学
  • 150 篇 农学
  • 112 篇 经济学
    • 112 篇 应用经济学
  • 42 篇 教育学
  • 16 篇 文学
  • 13 篇 军事学
  • 7 篇 艺术学
  • 1 篇 历史学

主题

  • 176 篇 semantics
  • 149 篇 feature extracti...
  • 140 篇 deep learning
  • 133 篇 training
  • 92 篇 computational mo...
  • 82 篇 data models
  • 78 篇 machine learning
  • 74 篇 convolution
  • 70 篇 data mining
  • 69 篇 predictive model...
  • 62 篇 neural networks
  • 61 篇 accuracy
  • 56 篇 object detection
  • 55 篇 visualization
  • 52 篇 big data
  • 52 篇 graph neural net...
  • 50 篇 optimization
  • 49 篇 task analysis
  • 48 篇 contrastive lear...
  • 48 篇 forecasting

机构

  • 165 篇 school of inform...
  • 147 篇 key laboratory o...
  • 132 篇 school of econom...
  • 97 篇 state key labora...
  • 94 篇 school of comput...
  • 79 篇 fujian provincia...
  • 76 篇 henan key labora...
  • 73 篇 college of big d...
  • 73 篇 school of comput...
  • 73 篇 research center ...
  • 72 篇 school of comput...
  • 69 篇 guangdong key la...
  • 69 篇 university of ch...
  • 60 篇 hubei key labora...
  • 53 篇 shandong provinc...
  • 53 篇 shenzhen researc...
  • 51 篇 key laboratory o...
  • 50 篇 school of inform...
  • 49 篇 national enginee...
  • 48 篇 peng cheng labor...

作者

  • 45 篇 shi yong
  • 41 篇 zhang rui
  • 40 篇 yong shi
  • 40 篇 chen hong
  • 38 篇 chang kuo-chi
  • 37 篇 wu xindong
  • 37 篇 pan jeng-shyang
  • 33 篇 liu yang
  • 33 篇 wang meng
  • 32 篇 xue xingsi
  • 32 篇 du xiaoyong
  • 32 篇 zhang jing
  • 31 篇 liu jun
  • 30 篇 li cuiping
  • 29 篇 wen ji-rong
  • 29 篇 huang qingming
  • 28 篇 chu kai-chun
  • 28 篇 xindong wu
  • 25 篇 hong chen
  • 24 篇 niyato dusit

语言

  • 5,182 篇 英文
  • 404 篇 其他
  • 121 篇 中文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data"
5696 条 记 录,以下是831-840 订阅
排序:
EdgeAuth: An intelligent token-based collaborative authentication scheme
EdgeAuth: An intelligent token-based collaborative authentic...
收藏 引用
作者: Jiang, Xutong Dou, Ruihan He, Qiang Zhang, Xuyun Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Mathematics University of Waterloo Waterloo Canada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing Macquarie University Sydney Australia College of Big Data and Intelligent Engineering Southwest Forestry University China
Edge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply-chain supervisio... 详细信息
来源: 评论
Attributes-based person re-identification via CNNs with coupled clusters loss
收藏 引用
Journal of Systems engineering and Electronics 2020年 第1期31卷 45-55页
作者: SUN Rui HUANG Qiheng FANGWei ZHANG Xudong Key Laboratory of Knowledge Engineering with Big Data(Ministry of Education) Hefei University of TechnologyHefei 230601China School of Computer and Information Hefei University of TechnologyHefei 230601China
Person re-identification(re-id)involves matching a person across nonoverlapping views,with different poses,illuminations and *** attributes are understandable semantic information to help improve the issues including ... 详细信息
来源: 评论
Fine-Grained Anomaly Detection on Dynamic Graphs via Attention Alignment
Fine-Grained Anomaly Detection on Dynamic Graphs via Attenti...
收藏 引用
International Conference on data engineering
作者: Dong Chen Xiang Zhao Weidong Xiao National Key Laboratory of Information Systems Engineering National University of Defense Technology China Laboratory for Big Data and Decision National University of Defense Technology China
Dynamic graphs are ubiquitous in our lives, yet they are also susceptible to the risks imposed by malicious activities. However, identifying anomalies in these dynamic graphs presents a challenging task due to the com... 详细信息
来源: 评论
Electrocardiogram-to-Pair (E2P): A Secure Group Pairing Protocol for WBAN Devices
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhao, Guichuan Tian, Youliang Jiang, Qi Ma, Jianfeng Guizhou University College of Computer Science and Technology Guiyang550000 China Guizhou University State Key Laboratory of Public Big Data College of Big Data and Information Engineering Guiyang550000 China Xidian University School of Cyber Engineering Xi'an710071 China
In a wireless body area network (WBAN), group pairing among multiple wearable devices enables efficient and secure broadcasting group messages. Existing pairing methods that rely on trusted concentrators, active parti... 详细信息
来源: 评论
An Energy-Aware UAVs Path Coverage for Critical Infrastructure Inspections  12
An Energy-Aware UAVs Path Coverage for Critical Infrastructu...
收藏 引用
12th International Conference on Advanced Cloud and big data, CBD 2024
作者: Wang, Yifan Zeng, Wei Li, Guanyu Xiong, Chenglong Wang, Zicheng Mao, Yingchi College of Computer Science and Software Engineering Hohai University Nanjing China Hohai University Key Laboratory of Water Big Data Technology of Ministry of Water Resources Nanjing China Huaneng Lancang River Hydropower Co. CHINA HUANENG Group Kunming China Power China Kunming Engineering Co. Yunnan China
Critical infrastructures increasingly rely on unmanned aerial vehicles (UAVs) for inspection tasks. The significance of different components within these infrastructures is subject to variability and can be influenced... 详细信息
来源: 评论
OpenPose Based Posture Analysis of Basketball Players  5
OpenPose Based Posture Analysis of Basketball Players
收藏 引用
5th International Conference on Applied Machine Learning, ICAML 2023
作者: Zhou, Xiao Liang Wang, De Yong Li, Xin School of Information Science and Engineering Xinjiang University Xinjiang Urumqi China XinJiang Lianhai INA-INT Information Technology Co. Ltd China Key Laboratory of Big Data of Xinjiang Social Security Risk Prevention and Control China
Human pose estimation has a wide range of applications in the field of computer vision, especially in sports event analysis where its importance is increasingly prominent. This study aims to optimize the basketball pl... 详细信息
来源: 评论
Logic-Aware knowledge Graph Reasoning for Structural Sparsity under Large Language Model Supervision  25
Logic-Aware Knowledge Graph Reasoning for Structural Sparsit...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Pan, Yudai Hong, Jiajie Zhao, Tianzhe Song, Lingyun Liu, Jun Shang, Xuequn School of Computer Science Northwest Polytechnical University Shaanxi Xi’an China Key Laboratory of Big Data Storage and Management Northwestern Polytechnical University Shaanxi Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an China Research & Development Institute of Northwestern Polytechnical University in Shenzhen Shenzhen China National Engineering Lab for Big Data Analytics Xi’an Jiaotong University Shaanxi Xi’an China
knowledge Graph (KG) reasoning aims to predict missing entities in incomplete triples, which requires adequate structural information to derive accurate embeddings. However, KGs in the real world are not as dense as t... 详细信息
来源: 评论
Seismic Traveltime Tomography with Label-free Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Feng Yang, Bo Wang, Renfang Qiu, Hong College of Big Data and Software Engineering Zhejiang Wanli University Ningbo315100 China Key Laboratory of Geoscience Big Data and Deep Resource of Zhejiang Province School of Earth Sciences Zhejiang University Hangzhou310027 China
Deep learning techniques have been used to build velocity models (VMs) for seismic traveltime tomography and have shown encouraging performance in recent years. However, they need to generate labeled samples (i.e., pa... 详细信息
来源: 评论
Research on resource scheduling method based on Kubernetes
Research on resource scheduling method based on Kubernetes
收藏 引用
IEEE Information Technology and Mechatronics engineering Conference (ITOEC)
作者: Haoyang Song Liming Zhou Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China School of Computer and Information Engineering Henan University Kaifeng China
With the continuous development of cloud computing, the demand for cloud services in all walks of life is increasing. The scale of cloud computing services based on container technology is constantly growing, and Kube... 详细信息
来源: 评论
PROVABLE SIM-TO-REAL TRANSFER IN CONTINUOUS DOMAIN WITH PARTIAL OBSERVATIONS  11
PROVABLE SIM-TO-REAL TRANSFER IN CONTINUOUS DOMAIN WITH PART...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Hu, Jiachen Zhong, Han Jin, Chi Wang, Liwei School of Computer Science Peking University China Center for Data Science Peking University China Department of Electrical and Computer Engineering Princeton University United States National Key Laboratory of General Artificial Intelligence School of Intelligence Science and Technology Peking University Center for Data Science Peking University Beijing Institute of Big Data Research China
Sim-to-real transfer, which trains RL agents in the simulated environments and then deploys them in the real world, has been widely used to overcome the limitations of gathering samples in the real world. Despite the ...
来源: 评论