咨询与建议

限定检索结果

文献类型

  • 2,451 篇 期刊文献
  • 2,176 篇 会议
  • 2 册 图书

馆藏范围

  • 4,629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,132 篇 工学
    • 2,251 篇 计算机科学与技术...
    • 1,851 篇 软件工程
    • 800 篇 信息与通信工程
    • 434 篇 电气工程
    • 408 篇 生物工程
    • 332 篇 控制科学与工程
    • 288 篇 电子科学与技术(可...
    • 239 篇 光学工程
    • 211 篇 生物医学工程(可授...
    • 200 篇 机械工程
    • 192 篇 化学工程与技术
    • 113 篇 交通运输工程
    • 108 篇 动力工程及工程热...
    • 107 篇 仪器科学与技术
    • 102 篇 建筑学
    • 95 篇 土木工程
    • 91 篇 网络空间安全
    • 83 篇 安全科学与工程
  • 1,674 篇 理学
    • 882 篇 数学
    • 478 篇 生物学
    • 407 篇 物理学
    • 282 篇 统计学(可授理学、...
    • 201 篇 化学
    • 112 篇 系统科学
  • 918 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 448 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 209 篇 医学
    • 178 篇 临床医学
    • 137 篇 基础医学(可授医学...
  • 147 篇 法学
    • 115 篇 社会学
  • 82 篇 农学
  • 79 篇 经济学
  • 38 篇 教育学
  • 18 篇 文学
  • 11 篇 军事学
  • 4 篇 艺术学

主题

  • 144 篇 semantics
  • 136 篇 feature extracti...
  • 127 篇 deep learning
  • 119 篇 training
  • 84 篇 computational mo...
  • 68 篇 data mining
  • 68 篇 data models
  • 67 篇 convolution
  • 67 篇 machine learning
  • 59 篇 predictive model...
  • 58 篇 accuracy
  • 55 篇 object detection
  • 48 篇 task analysis
  • 47 篇 neural networks
  • 46 篇 graph neural net...
  • 43 篇 visualization
  • 42 篇 forecasting
  • 42 篇 adaptation model...
  • 41 篇 federated learni...
  • 40 篇 convolutional ne...

机构

  • 164 篇 school of inform...
  • 99 篇 school of comput...
  • 75 篇 school of comput...
  • 73 篇 school of comput...
  • 70 篇 henan key labora...
  • 70 篇 fujian provincia...
  • 66 篇 guangdong key la...
  • 60 篇 shandong provinc...
  • 54 篇 school of comput...
  • 53 篇 key laboratory o...
  • 52 篇 school of econom...
  • 52 篇 school of inform...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 46 篇 school of inform...
  • 45 篇 national enginee...
  • 43 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 42 篇 university of ch...
  • 41 篇 state key labora...

作者

  • 39 篇 niyato dusit
  • 39 篇 zhang rui
  • 39 篇 chen hong
  • 37 篇 chang kuo-chi
  • 33 篇 wang meng
  • 31 篇 du xiaoyong
  • 31 篇 zhang jing
  • 30 篇 wu xindong
  • 30 篇 pan jeng-shyang
  • 29 篇 liu yang
  • 27 篇 liu jun
  • 27 篇 li cuiping
  • 25 篇 wen ji-rong
  • 25 篇 chu kai-chun
  • 24 篇 huang qingming
  • 24 篇 jin hai
  • 22 篇 yong shi
  • 22 篇 wang shan
  • 21 篇 meng wang
  • 21 篇 xindong wu

语言

  • 4,332 篇 英文
  • 222 篇 其他
  • 83 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information"
4629 条 记 录,以下是4551-4560 订阅
排序:
Web page malicious code detection based on embedded fingerprints
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2208-2214页
作者: Huang, Jianjun Liang, Bin Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renmin University of China Beijing 100872 China
Web sites have become the main targets of many attackers. Signature-based detection needs to maintain a large signature database and Honeypot based methods are not efficient. Since attackers always make the malicious ... 详细信息
来源: 评论
Bring User Feedback into keyword Search over databases
Bring User Feedback into Keyword Search over Databases
收藏 引用
Web information Systems and Applications Conference (WISA)
作者: Zhaohui Peng Jun Zhang Shan Wang Changliang Wang School of Computer Science & Technology Shandong University Jinan China Key Laboratory of Data Engineering & Knowledge Engineering Ministry of Education Beijing China School of Computer Science & Technology Dalian Maritime University Dalian China Hong Kong University of Science and Technology Hong Kong China
keyword search over relational databases (KSORD) enables casual users to use keyword queries (a set of keywords) to search relational databases just like searching the Web, without any knowledge of the database schema... 详细信息
来源: 评论
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage System
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Lingfang Zeng Dan Feng Bharadwaj Veeravalli Qingsong Wei Division of Data Storage System Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering National University of Singapore Singapore Data Storage Institute Singapore
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery t... 详细信息
来源: 评论
Using IACO and QPSO to solve spatial clustering with obstacles constraints
Using IACO and QPSO to solve spatial clustering with obstacl...
收藏 引用
IEEE International Conference on Automation and Logistics
作者: Xueping Zhang Hongmei Zhang Yanxia Zhu Yawei Liu Tengfei Yang Taogai Zhang Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou University Fuzhou China School of Computer Science & Engineering Henan University of Technology Zhengzhou Henan China Department of Computer Science & Engineering Henan University of Engineering Zhengzhou China
Spatial clustering has been an active research area in the data mining community. Spatial clustering is not only an important effective method but also a prelude of other task for spatial data mining (SDM). In this pa... 详细信息
来源: 评论
PEJA:Progressive Energy-Efficient Join Processing for Sensor Networks
收藏 引用
Journal of computer Science & Technology 2008年 第6期23卷 957-972页
作者: 赖永炫 陈毅隆 陈红 School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education
Sensor networks are widely used in many applications to collaboratively collect information from the physical environment. In these applications, the exploration of the relationship and linkage of sensing data within ... 详细信息
来源: 评论
Static vulnerabilities detection method based on security state tracing and checking
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2009年 第5期32卷 899-909页
作者: Liang, Bin Hou, Kan-Kan Shi, Wen-Chang Liang, Zhao-Hui School of Information Renming University of China Beijing 100872 China MOE Key Laboratory of Data Engineering and Knowledge Engineering Beijing 100872 China
The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates. One main reason is lack of accurate and effective identification an... 详细信息
来源: 评论
A new dynamic hash index for flash-based storage
A new dynamic hash index for flash-based storage
收藏 引用
9th International Conference on Web-Age information Management, WAIM 2008
作者: Xiang, Li Zhou, Da Meng, Xiaofeng School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering MOE
Compared with traditional magnetic disks, Flash memory has many advantages and has been used as external storage media for a wide spectrum of electronic devices (such as PDA, MP3, Digital Camera and Mobile Phone) in r... 详细信息
来源: 评论
Moment+: Mining closed frequent itemsets over data stream
Moment+: Mining closed frequent itemsets over data stream
收藏 引用
4th International Conference on Advanced data Mining and Applications, ADMA 2008
作者: Li, Haifeng Chen, Hong Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing 100872 China
Closed frequent itemsets(CFI) mining uses less memory to store the entire information of frequent itemsets thus is much suitable for mining stream. In this paper, we discuss recent CFI mining methods over stream and p... 详细信息
来源: 评论
Evolving sequential patterns mining model over click stream with Levenshtein-Automata
Evolving sequential patterns mining model over click stream ...
收藏 引用
3rd International Conference on Innovative Computing information and Control, ICICIC'08
作者: Li, Haifeng Chen, Hong Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing 100872 China
Sequential pattern mining is an important problem in continuous, fast, dynamic and unlimited stream mining. Recently approximate mining algorithms are proposed which spend too many system resources and can only obtain... 详细信息
来源: 评论
LOB: Bucket based index for range queries
LOB: Bucket based index for range queries
收藏 引用
9th International Conference on Web-Age information Management, WAIM 2008
作者: Wang, Jieping Du, Xiaoyong Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
database-as-a-Service is a promising data management paradigm in which data is encrypted before being sent to the untrusted server. Efficient querying on encrypted data is a performance critical problem which has vari... 详细信息
来源: 评论