咨询与建议

限定检索结果

文献类型

  • 2,476 篇 期刊文献
  • 2,189 篇 会议
  • 2 册 图书

馆藏范围

  • 4,667 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,139 篇 工学
    • 2,255 篇 计算机科学与技术...
    • 1,852 篇 软件工程
    • 800 篇 信息与通信工程
    • 438 篇 电气工程
    • 408 篇 生物工程
    • 332 篇 控制科学与工程
    • 287 篇 电子科学与技术(可...
    • 239 篇 光学工程
    • 212 篇 生物医学工程(可授...
    • 200 篇 机械工程
    • 191 篇 化学工程与技术
    • 113 篇 交通运输工程
    • 108 篇 动力工程及工程热...
    • 107 篇 仪器科学与技术
    • 102 篇 建筑学
    • 95 篇 土木工程
    • 90 篇 网络空间安全
    • 83 篇 安全科学与工程
  • 1,677 篇 理学
    • 882 篇 数学
    • 478 篇 生物学
    • 407 篇 物理学
    • 282 篇 统计学(可授理学、...
    • 201 篇 化学
    • 113 篇 系统科学
  • 918 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 448 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 212 篇 医学
    • 180 篇 临床医学
    • 138 篇 基础医学(可授医学...
  • 147 篇 法学
    • 115 篇 社会学
  • 82 篇 农学
  • 80 篇 经济学
  • 38 篇 教育学
  • 18 篇 文学
  • 11 篇 军事学
  • 4 篇 艺术学

主题

  • 145 篇 semantics
  • 138 篇 feature extracti...
  • 128 篇 deep learning
  • 123 篇 training
  • 86 篇 computational mo...
  • 69 篇 data mining
  • 69 篇 data models
  • 67 篇 convolution
  • 67 篇 machine learning
  • 59 篇 predictive model...
  • 58 篇 accuracy
  • 55 篇 object detection
  • 48 篇 task analysis
  • 48 篇 neural networks
  • 46 篇 graph neural net...
  • 44 篇 visualization
  • 43 篇 adaptation model...
  • 42 篇 forecasting
  • 41 篇 federated learni...
  • 41 篇 convolutional ne...

机构

  • 164 篇 school of inform...
  • 98 篇 school of comput...
  • 76 篇 school of comput...
  • 73 篇 school of comput...
  • 70 篇 henan key labora...
  • 70 篇 fujian provincia...
  • 67 篇 guangdong key la...
  • 60 篇 shandong provinc...
  • 54 篇 school of comput...
  • 53 篇 key laboratory o...
  • 52 篇 school of econom...
  • 52 篇 school of inform...
  • 51 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 46 篇 school of inform...
  • 46 篇 national enginee...
  • 44 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 42 篇 university of ch...
  • 41 篇 state key labora...

作者

  • 39 篇 niyato dusit
  • 39 篇 zhang rui
  • 38 篇 chen hong
  • 36 篇 chang kuo-chi
  • 33 篇 wang meng
  • 31 篇 du xiaoyong
  • 31 篇 zhang jing
  • 30 篇 wu xindong
  • 30 篇 pan jeng-shyang
  • 29 篇 liu yang
  • 27 篇 liu jun
  • 27 篇 li cuiping
  • 25 篇 wen ji-rong
  • 25 篇 chu kai-chun
  • 24 篇 huang qingming
  • 24 篇 jin hai
  • 22 篇 yong shi
  • 21 篇 meng wang
  • 21 篇 xindong wu
  • 21 篇 shen linlin

语言

  • 4,372 篇 英文
  • 222 篇 其他
  • 81 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information"
4667 条 记 录,以下是4481-4490 订阅
排序:
Using New Fusion Operations to Improve Trust Expressiveness of Subjective Logic
收藏 引用
Wuhan University Journal of Natural Sciences 2011年 第5期16卷 376-382页
作者: ZHOU Hongwei1,2,3,SHI Wenchang1,2,LIANG Zhaohui1,2,LIANG Bin1,2 1.key laboratory of data engineering and knowledge engineering,Ministry of Education,Beijing 100872,China 2.school of information,Renmin University of China,Beijing 100872,China 3.Institute of Electronic Technology,information engineering University of PLA,Zhengzhou 450004,Henan,China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Information Engineering University of PLA Zhengzhou Henan China
Subjective logic provides a means to describe the trust relationship of the realworld. However, existing fusion operations it offers Weal fused opiniotts equally, which makes it impossible to deal with the weighted op... 详细信息
来源: 评论
A RFID mixed coding scheme based on huffman algorithm
A RFID mixed coding scheme based on huffman algorithm
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Jian, Jiang Guoqiong, Liao Hao, Wang Qizhi, Wan School of Information Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang Nanchang China
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is... 详细信息
来源: 评论
Effect factors on secondary structure of protein sequence pattern
Effect factors on secondary structure of protein sequence pa...
收藏 引用
International Workshop on Intelligent Systems and Applications
作者: Liu, Tao Li, Minghui Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
Discovering the relationship between protein sequence pattern and protein secondary structure is important for accurately predicting secondary structure of protein sequence. A protein secondary structure pattern dicti... 详细信息
来源: 评论
Detecting stealthy malware with inter-structure and imported signatures  11
Detecting stealthy malware with inter-structure and imported...
收藏 引用
6th International Symposium on information, computer and Communications Security, ASIACCS 2011
作者: Liang, Bin You, Wei Shi, Wenchang Liang, Zhaohui Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Recent years have witnessed an increasing threat from kernel rootkits. A common feature of such attack is hiding malicious objects to conceal their presence, including processes, sockets, and kernel modules. Scanning ... 详细信息
来源: 评论
A neural network based forecasting method for the unemployment rate prediction using the search engine query data
A neural network based forecasting method for the unemployme...
收藏 引用
2011 8th IEEE International Conference on e-Business engineering, ICEBE 2011
作者: Xu, Wei Zheng, Tingting Li, Ziang Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Unemployment rate prediction has become critically important, because it can help government to make decision and design policies. In recent years, forecast of unemployment rate attracts much attention from government... 详细信息
来源: 评论
Formal analysis of trusted computing: One case study
Formal analysis of trusted computing: One case study
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. W... 详细信息
来源: 评论
B-IRP: An improving integrity report protocol for remote attestation
B-IRP: An improving integrity report protocol for remote att...
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re... 详细信息
来源: 评论
Clustering XML search results based on content and structure similarity
Clustering XML search results based on content and structure...
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Min-Juan, Zhong Chang-Xuan, Wan De-Xi, Liu Xian-Pei, Jiao School of Information and Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
Clustering XML search results is an effective way to improve performance. However, the key problem is how to measure similarity between XML documents. In this paper, we propose a semantic similarity measure method com... 详细信息
来源: 评论
A practice probability frequent pattern mining method over transactional uncertain data streams
A practice probability frequent pattern mining method over t...
收藏 引用
Lecture Notes in computer Science
作者: Liao, Guoqiong Wu, Linqing Wan, Changxuan Xiong, Naixue School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China Department of Computer Science Georgia State University United States
In recent years, large amounts of uncertain data are emerged with the widespread employment of the new technologies, such as wireless sensor networks, RFID and privacy protection. According to the features of the unce... 详细信息
来源: 评论
Large scale report generation in data consolidation environments of banks
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) 2012年 第SUPPL.1期40卷 5-8页
作者: Qin, Xiongpai Zhou, Xiaoyun Wu, Zhongxin Yang, Hongzhi Wang, Wei Ministry of Education Key Lab of Data Engineering and Knowledge Engineering Renmin University of China Beijing 100872 China Information School Renmin University of China Beijing 100872 China Computer Science Department Jiangsu Normal University Xuzhou 221116 Jiangsu China Beijing Nantian Software Co. Ltd. Beijing 100085 China
To generate large number of reports in a limited time window, four techniques were proposed, including ROLAP&SQL, Shared Scanning, Hadoop based Solution, and MOLAP&Cube Sharding, an algorithm that performs in ... 详细信息
来源: 评论