咨询与建议

限定检索结果

文献类型

  • 2,476 篇 期刊文献
  • 2,189 篇 会议
  • 2 册 图书

馆藏范围

  • 4,667 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,139 篇 工学
    • 2,255 篇 计算机科学与技术...
    • 1,852 篇 软件工程
    • 800 篇 信息与通信工程
    • 438 篇 电气工程
    • 408 篇 生物工程
    • 332 篇 控制科学与工程
    • 287 篇 电子科学与技术(可...
    • 239 篇 光学工程
    • 212 篇 生物医学工程(可授...
    • 200 篇 机械工程
    • 191 篇 化学工程与技术
    • 113 篇 交通运输工程
    • 108 篇 动力工程及工程热...
    • 107 篇 仪器科学与技术
    • 102 篇 建筑学
    • 95 篇 土木工程
    • 90 篇 网络空间安全
    • 83 篇 安全科学与工程
  • 1,677 篇 理学
    • 882 篇 数学
    • 478 篇 生物学
    • 407 篇 物理学
    • 282 篇 统计学(可授理学、...
    • 201 篇 化学
    • 113 篇 系统科学
  • 918 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 448 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 212 篇 医学
    • 180 篇 临床医学
    • 138 篇 基础医学(可授医学...
  • 147 篇 法学
    • 115 篇 社会学
  • 82 篇 农学
  • 80 篇 经济学
  • 38 篇 教育学
  • 18 篇 文学
  • 11 篇 军事学
  • 4 篇 艺术学

主题

  • 145 篇 semantics
  • 138 篇 feature extracti...
  • 128 篇 deep learning
  • 123 篇 training
  • 86 篇 computational mo...
  • 69 篇 data mining
  • 69 篇 data models
  • 67 篇 convolution
  • 67 篇 machine learning
  • 59 篇 predictive model...
  • 58 篇 accuracy
  • 55 篇 object detection
  • 48 篇 task analysis
  • 48 篇 neural networks
  • 46 篇 graph neural net...
  • 44 篇 visualization
  • 43 篇 adaptation model...
  • 42 篇 forecasting
  • 41 篇 federated learni...
  • 41 篇 convolutional ne...

机构

  • 164 篇 school of inform...
  • 98 篇 school of comput...
  • 76 篇 school of comput...
  • 73 篇 school of comput...
  • 70 篇 henan key labora...
  • 70 篇 fujian provincia...
  • 67 篇 guangdong key la...
  • 60 篇 shandong provinc...
  • 54 篇 school of comput...
  • 53 篇 key laboratory o...
  • 52 篇 school of econom...
  • 52 篇 school of inform...
  • 51 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 46 篇 school of inform...
  • 46 篇 national enginee...
  • 44 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 42 篇 university of ch...
  • 41 篇 state key labora...

作者

  • 39 篇 niyato dusit
  • 39 篇 zhang rui
  • 38 篇 chen hong
  • 36 篇 chang kuo-chi
  • 33 篇 wang meng
  • 31 篇 du xiaoyong
  • 31 篇 zhang jing
  • 30 篇 wu xindong
  • 30 篇 pan jeng-shyang
  • 29 篇 liu yang
  • 27 篇 liu jun
  • 27 篇 li cuiping
  • 25 篇 wen ji-rong
  • 25 篇 chu kai-chun
  • 24 篇 huang qingming
  • 24 篇 jin hai
  • 22 篇 yong shi
  • 21 篇 meng wang
  • 21 篇 xindong wu
  • 21 篇 shen linlin

语言

  • 4,372 篇 英文
  • 222 篇 其他
  • 81 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information"
4667 条 记 录,以下是4541-4550 订阅
排序:
Query-Aware Complex Object Buffer Management in XML information Retrieval
Query-Aware Complex Object Buffer Management in XML Informat...
收藏 引用
International Asia-Pacific Web Conference (APWEB)
作者: Qiushi Li Qiuyue Wang Shan Wang Key Laboratory of Ministry of Education of Data Engineering and Knowledge Engineering Beijing China School of Information Renmin University of China Beijing China
In this paper, we analyse the data access characteristics of a typical XML information retrieval system and propose a new query aware buffer replacement algorithm based on prediction of Minimum Reuse Distance (MRD for... 详细信息
来源: 评论
Constructing Corpus for Query-oriented XML Text Summarization
Constructing Corpus for Query-oriented XML Text Summarizatio...
收藏 引用
2010 International Conference on Management of e-Commerce and e-Government(第四届电子商务与电子政务管理国际会议 ICMeCG 2010)
作者: Shihan WU Dexi LIU Xianpei JIAO Jiangxi Key Laboratory of Data and Knowledge Engineering School of Information Technology Jiangxi University of Finance & Economics Nanchang Jiangxi China
XML Retrieval is becoming the focus study of the field of information Retrieval and database. Summarization of the results which come from the XML search engines will alleviate the read burden of user's. However, ... 详细信息
来源: 评论
Performance study on logging to another main memory database
Performance study on logging to another main memory database
收藏 引用
International Conference on New Trends in information and Service Science, NISS
作者: Xiongpai Qin Xiaoyun Zhou Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing 100872 China Department of Computer Science and Technology Xuzhou Normal University Jiangsu 221008 China
In update intensive main memory database applications, huge volume of log records is generated, to maintain the ACID properties of the database system, the log records should be persistent efficiently. Delegating logg... 详细信息
来源: 评论
Notice of Retraction: knowledge management technologies and applications: A literature review
Notice of Retraction: Knowledge management technologies and ...
收藏 引用
IEEE International Conference on Advanced Management Science (ICAMS)
作者: Xiaomi An Wang Wang Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing China School of Information Resource Management Renmin University of China Beijing China
This article has been retracted by the publisher.
来源: 评论
Pseudo-relevance feedback driven for XML query expansion
收藏 引用
Journal of Convergence information Technology 2010年 第9期5卷 146-156页
作者: Minjuan, Zhong Changxuan, Wan School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 China
Pseudo-relevance feedback has been perceived as an effective solution for automatic query expansion. However, a recent study has shown that traditional pseudo-relevance feedback may bring into topic drift and hence be... 详细信息
来源: 评论
The Integrated Use of Business Continuity Management Systems, Records Management Systems and knowledge Management Systems
The Integrated Use of Business Continuity Management Systems...
收藏 引用
International Conference on Management and Service Science, MASS
作者: Xiaomi An Wang Wang Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Renmin University of China Beijing China School of Information Resource Management Renmin University of China Beijing China
Much research has been done on integrated use of ISO management system standards. Integrated use of management systems is identified to have shared values of varied integration impacts on resources efficiency building... 详细信息
来源: 评论
Global Top-k Aggregate Queries Based on X-tuple in Uncertain database
Global Top-k Aggregate Queries Based on X-tuple in Uncertain...
收藏 引用
International Conference on Advanced information Networking and Applications Workshops (AINAW)
作者: Dexi Liu Changxuan Wan Naixue Xiong Jong Hyuk Park Sang-Soo Yeoe School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China Department of Computer Science Georgia State University Atlanta GA USA Department of Computer Science and Engineering Seoul National University of Technology Seoul South Korea Division of Computer Engineering Mokwon University Daejeon South Korea
A Top-k aggregate query, which is a powerful technique when dealing with large quantity of data, ranks groups of tuples by their aggregate values and returns k groups with the highest aggregate values. However, compar... 详细信息
来源: 评论
Vulnerabilities Static Detection for Web Applications with False Positive Suppression
Vulnerabilities Static Detection for Web Applications with F...
收藏 引用
2010 IEEE International Conference on information Theory and information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Bin Liang Qianqian Wang Jianjun Huang Jiagui Zhong Jingjing Cai Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) MOE Schoo School of Information Renmin University of China Beijing 100872 China Beijing Venustech Cybervision Co. Ltd Beijing 100094 China
Web applications become more and more important, and the corresponding security problems have been concerned about. This paper presents TASA, an ASP static analyzer, which employs a path-sensitive, inter-procedural an... 详细信息
来源: 评论
Two Novel Semantics of Top-k Queries Processing in Uncertain database
Two Novel Semantics of Top-k Queries Processing in Uncertain...
收藏 引用
International Conference on computer and information Technology (CIT)
作者: Dexi Liu Changxuan Wan N. Xiong Laurence T. Yang Lei Chen School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China Department of Computer Science Georgia State University Atlanta GA USA Department of Computer Science Saint Francis Xavier University Antigonish NS Canada Department of Computer Science HK University of Science and Technology Hong Kong China
Top-k query is a powerful technique in uncertain databases because of the existence of exponential possible worlds, and it is necessary to combine score and confidence of tuples to derive top k answers. Different sema... 详细信息
来源: 评论
Hierarchical Certificateless Signatures
Hierarchical Certificateless Signatures
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: Lei Zhang Qianhong Wu Josep Domingo-Ferrer Bo Qin UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Wuhan University of Technology China School of Science Department of Maths Xi'an University of Technology China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论