咨询与建议

限定检索结果

文献类型

  • 2,530 篇 期刊文献
  • 2,262 篇 会议
  • 2 册 图书

馆藏范围

  • 4,794 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,220 篇 工学
    • 2,319 篇 计算机科学与技术...
    • 1,873 篇 软件工程
    • 830 篇 信息与通信工程
    • 455 篇 电气工程
    • 408 篇 生物工程
    • 373 篇 控制科学与工程
    • 290 篇 电子科学与技术(可...
    • 240 篇 光学工程
    • 214 篇 生物医学工程(可授...
    • 207 篇 机械工程
    • 190 篇 化学工程与技术
    • 113 篇 仪器科学与技术
    • 111 篇 交通运输工程
    • 108 篇 建筑学
    • 106 篇 动力工程及工程热...
    • 101 篇 土木工程
    • 100 篇 网络空间安全
    • 85 篇 安全科学与工程
  • 1,705 篇 理学
    • 895 篇 数学
    • 477 篇 生物学
    • 419 篇 物理学
    • 282 篇 统计学(可授理学、...
    • 207 篇 化学
    • 114 篇 系统科学
  • 935 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 457 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 223 篇 医学
    • 190 篇 临床医学
    • 136 篇 基础医学(可授医学...
  • 148 篇 法学
    • 117 篇 社会学
  • 80 篇 经济学
  • 78 篇 农学
  • 44 篇 教育学
  • 18 篇 文学
  • 10 篇 军事学
  • 4 篇 艺术学

主题

  • 151 篇 semantics
  • 147 篇 feature extracti...
  • 133 篇 deep learning
  • 127 篇 training
  • 91 篇 computational mo...
  • 74 篇 data mining
  • 71 篇 data models
  • 69 篇 convolution
  • 66 篇 machine learning
  • 66 篇 accuracy
  • 61 篇 predictive model...
  • 55 篇 object detection
  • 53 篇 federated learni...
  • 48 篇 neural networks
  • 48 篇 adaptation model...
  • 47 篇 task analysis
  • 47 篇 contrastive lear...
  • 47 篇 graph neural net...
  • 43 篇 visualization
  • 43 篇 forecasting

机构

  • 168 篇 school of inform...
  • 97 篇 school of comput...
  • 76 篇 school of comput...
  • 74 篇 school of comput...
  • 70 篇 henan key labora...
  • 68 篇 fujian provincia...
  • 67 篇 guangdong key la...
  • 60 篇 shandong provinc...
  • 57 篇 school of comput...
  • 53 篇 key laboratory o...
  • 52 篇 shandong enginee...
  • 52 篇 school of econom...
  • 52 篇 school of inform...
  • 52 篇 national enginee...
  • 49 篇 peng cheng labor...
  • 48 篇 key laboratory o...
  • 46 篇 school of inform...
  • 45 篇 key laboratory o...
  • 44 篇 university of ch...
  • 43 篇 school of electr...

作者

  • 41 篇 niyato dusit
  • 41 篇 chen hong
  • 40 篇 zhang rui
  • 35 篇 chang kuo-chi
  • 33 篇 wang meng
  • 33 篇 du xiaoyong
  • 32 篇 liu jun
  • 32 篇 zhang jing
  • 30 篇 pan jeng-shyang
  • 29 篇 liu yang
  • 29 篇 li cuiping
  • 27 篇 wu xindong
  • 27 篇 huang qingming
  • 25 篇 chu kai-chun
  • 25 篇 shen linlin
  • 25 篇 jin hai
  • 24 篇 wen ji-rong
  • 24 篇 xindong wu
  • 22 篇 yong shi
  • 21 篇 meng wang

语言

  • 3,855 篇 英文
  • 868 篇 其他
  • 93 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Key Laboratory of Knowledge Engineering with Big Data School of Computer and Information"
4794 条 记 录,以下是4631-4640 订阅
Spin torque switching in triple-quantum dot device with ferromagnetic contacts for memory applications
Spin torque switching in triple-quantum dot device with ferr...
收藏 引用
作者: Xing, M.-J. Jalil, M.B.A. Tan, S.G. Jiang, Y. State Key Laboratory for Advanced Metals and Materials School of Materials Science and Engineering University of Science and Technology Beijing 100083 China Computational Nanoelectronics and Nano-device Laboratory Electronic and Computer Engineering Department National University of Singapore Singapore 117576 Singapore Data Storage Institute National University of Singapore Singapore 117608 Singapore Information Storage Materials Laboratory Electronic and Computer Engineering Department National University of Singapore Singapore 117576 Singapore
We investigate the applicability of a triple quantum dot (TQD) device for memory operation, in which information is coded by the magnetization of a ferromagnetic (FM) electrode. In the presence of Rashba spin-orbit co... 详细信息
来源: 评论
A property of reductions in Fuzzy Variable Precision Rough Set model
A property of reductions in Fuzzy Variable Precision Rough S...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Eric C. C. Tsang Su-Yun Zhao Cai-Li Zhou Faculty of Information Technology Macau University of Science and Technology Taipa Macao China Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China School of Mathematics and Computer Sciences Hebei University China
In this paper, we use strict mathematics reasoning to discover the relation between the threshold and reduction in Fuzzy Variable Precision Rough Sets (FVPRS), i.e., the reductions act as a nested structure with the m... 详细信息
来源: 评论
Formal Analysis of Trusted Computing: One Case Study
Formal Analysis of Trusted Computing: One Case Study
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system.... 详细信息
来源: 评论
B-IRP: An Improving Integrity Report Protocol for Remote Attestation
B-IRP: An Improving Integrity Report Protocol for Remote Att...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re... 详细信息
来源: 评论
基于主题语义的非合作结构化Top-N深网数据源选择
基于主题语义的非合作结构化Top-N深网数据源选择
收藏 引用
第29届中国数据库学术会议
作者: Deng Song 邓松 Wan Changxuan 万常选 Liu Xiping 刘喜平 Jiang Tengjiao 江腾蛟 Lei Gang 雷刚 School of Information and Technology Jiangxi University of Finance and Economics Nanchang 330013 江西财经大学信息管理学院 南昌 330013 Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economic 江西财经大学数据与知识工程江西省高校重点实验室 南昌 330013
高效且准确地找出存在于深网中的与用户查询意图最相关的Top-N元组,是深网数据集成中的关键问题。针对数据源内容概括未见成果的现状,本文提出了一种能够有效概括非数字、非离散属性特征的非合作结构化深网数据源摘要构建方法。利用... 详细信息
来源: 评论
Visual group identification method of technical competitors using LinLog graph clustering algorithm
Visual group identification method of technical competitors ...
收藏 引用
IEEE International Conference on computer Science and Automation engineering (CSAE)
作者: Hong-qi Han Xiaomi An Donghua Zhu Xuefeng Wang Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) Ministry of Education School of Information Resource Management Beijing 100872 China School of Management and Economics Beijing Institute of Technology 100872 China
Visualization technique is a powerful method used by science and technology intelligence analysis experts to identify technical competitor groups. Common visualization methods tend to create graphs meeting the aesthet... 详细信息
来源: 评论
An improved elastic net with heuristic cloning strategy for traveling salesman problem
收藏 引用
ICIC Express Letters 2011年 第11期5卷 3995-4000页
作者: Yang, Gang Yang, Nan Yi, Junyan Key Laboratory of Data Engineering and Knowledge Engineering MOE School of Information Renmin University of China No. 59 Zhongguancun Street Haidian District Beijing 100872 China Department of Computer Science and Technology Zhejiang University of Technology No. 18 Chaowang Road Hangzhou 310014 China
Based on analysis of relationships between solution qualities and number of initial dynamic points in elastic net algorithm, we propose an improved elastic network algorithm (IENA) introduced in a heuristic cloning st... 详细信息
来源: 评论
Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networks
Constant approximation for virtual backbone construction wit...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Hongwei Du Qiang Ye Weili Wu Wonjun Lee Deying Li Dingzhu Du Stephen Howard Department of Computer Science and Information Technology University of Prince Edward Island Canada Department of Computer Science University of Texas Dallas USA Department of Computer Science and Engineering Korea University Seoul South Korea Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China
In wireless sensor networks, virtual backbone construction based on connected dominating set is a competitive issue for routing efficiency and topology control. Assume that a sensor networks is defined as a connected ... 详细信息
来源: 评论
Idea-map: A Spatiotemporal View of Research Ideas
Idea-map: A Spatiotemporal View of Research Ideas
收藏 引用
2011 Eighth International Conference on Fuzzy System and knowledge Discovery(第八届模糊系统与知识发现国际会议 FSKD 2011)
作者: HeHu Xiaoyong Du Key Laboratory of Data Engineering and Knowledge Engineering(Renmin University of China) MOE Beijing 100872 P. R. China School of Information Renmin University of China Beijing 100872 P. R. China
in this paper, we describe idea-map, a mash-up application building on top of Linked data Cloud. It reads in user's keywords (about research ideas) and executes a SPARQL query against DBLP endpoint. Spatial an... 详细信息
来源: 评论
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论