咨询与建议

限定检索结果

文献类型

  • 539 篇 会议
  • 426 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 968 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 613 篇 工学
    • 500 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 145 篇 信息与通信工程
    • 69 篇 控制科学与工程
    • 59 篇 生物工程
    • 58 篇 电气工程
    • 36 篇 机械工程
    • 32 篇 电子科学与技术(可...
    • 30 篇 化学工程与技术
    • 25 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 22 篇 动力工程及工程热...
    • 18 篇 建筑学
    • 18 篇 交通运输工程
    • 18 篇 航空宇航科学与技...
    • 15 篇 网络空间安全
    • 14 篇 光学工程
  • 274 篇 管理学
    • 166 篇 图书情报与档案管...
    • 139 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 256 篇 理学
    • 157 篇 数学
    • 60 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 45 篇 物理学
    • 34 篇 化学
    • 19 篇 系统科学
  • 37 篇 法学
    • 32 篇 社会学
  • 26 篇 医学
    • 23 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 文学
  • 4 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 53 篇 semantics
  • 35 篇 data mining
  • 33 篇 knowledge engine...
  • 30 篇 training
  • 24 篇 feature extracti...
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 19 篇 big data
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 conferences
  • 17 篇 task analysis
  • 17 篇 data engineering
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 knowledge graph
  • 15 篇 visualization
  • 14 篇 knowledge manage...
  • 14 篇 wireless sensor ...
  • 13 篇 query processing

机构

  • 153 篇 school of inform...
  • 104 篇 school of comput...
  • 54 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 31 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 26 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of inform...
  • 18 篇 key laboratory o...
  • 18 篇 school of econom...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 14 篇 key laboratory o...

作者

  • 48 篇 chen hong
  • 37 篇 wu xindong
  • 34 篇 du xiaoyong
  • 32 篇 wang meng
  • 29 篇 li cuiping
  • 28 篇 xindong wu
  • 28 篇 zhang jing
  • 28 篇 xiaoyong du
  • 27 篇 wang shan
  • 26 篇 hong chen
  • 24 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 huang qingming
  • 17 篇 meng wang
  • 17 篇 shan wang
  • 17 篇 wang yang
  • 17 篇 li jiahui
  • 17 篇 wang jiacheng

语言

  • 895 篇 英文
  • 51 篇 其他
  • 22 篇 中文
检索条件"机构=Key Laboratory of Knowledge and Data Engineering"
968 条 记 录,以下是361-370 订阅
排序:
Vulnerabilities static detection for Web applications with false positive suppression
Vulnerabilities static detection for Web applications with f...
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
作者: Huang, Jianjun Liang, Bin Zhong, Jiagui Wang, Qianqian Cai, Jingjing Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China Beijing Venustech Cybervision Co. Ltd Beijing 100094 China
Web applications become more and more important, and the corresponding security problems have been concerned about. This paper presents TASA, an ASP static analyzer, which employs a path-sensitive, inter-procedural an... 详细信息
来源: 评论
Scientific Value Weights more than Being Open or Toll Access:An analysis of the OA advantage in Nature and Science
收藏 引用
Journal of data and Information Science 2021年 第4期6卷 62-75页
作者: Howell Y.Wang Shelia X.Wei Cong Cao Xianwen Wang Fred Y.Ye International Joint Informatics Laboratory&Jiangsu Key Laboratory of Data Engineering and Knowledge Service School of Information ManagementNanjing UniversityNanjing 210023China Nottingham University Business School China University of Nottingham Ningbo ChinaNingbo315100China WISE Lab. Dalian University of TechnologyDalian 116024China
Purpose:We attempt to find out whether OA or TA really affects the dissemination of scientific ***/methodology/approach:We design the indicators,hot-degree,and R-index to indicate a topic OA or TA ***,according to the... 详细信息
来源: 评论
A study of SQL-on-Hadoop systems
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8807卷 154-166页
作者: Chen, Yueguo Qin, Xiongpai Bian, Haoqiong Chen, Jun Dong, Zhaoan Du, Xiaoyong Gao, Yanjie Liu, Dehai Lu, Jiaheng Zhang, Huijie Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing China School of Information Renmin University of China Beijing100872 China
Hadoop is now the de facto standard for storing and processing big data, not only for unstructured data but also for some structured data. As a result, providing SQL analysis functionality to the big data resided in H... 详细信息
来源: 评论
Local anatomy for personalised privacy protection
收藏 引用
International Journal of Information and Computer Security 2021年 第2-3期15卷 254-271页
作者: Li, Boyu Liu, Yanheng Wang, Minghai Sun, Geng Li, Bin College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun China Big Data and Network Management Center Jilin University Changchun China College of Mathematics Jilin University Changchun China
Anonymisation technique has been extensively studied and widely applied for privacy-preserving data publishing. However, most existing methods ignore personal anonymity requirements. In these approaches, the microdata... 详细信息
来源: 评论
Interference and power constrained broadcast and multicast routing in wireless ad hoc networks using directional antennas
Interference and power constrained broadcast and multicast r...
收藏 引用
作者: Li, Zheng Li, Deying Liu, Ming School of Information Renmin University of China Beijing 100872 China Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China
In this paper, we address the interference and power constrained broadcast/multicast routing problem (D-IPCB/M) in wireless ad hoc networks using directional antenna as a starting point, which jointly considers low-in... 详细信息
来源: 评论
A Heuristic Sampling Method for Maintaining the Probability Distribution
收藏 引用
Journal of Computer Science & Technology 2021年 第4期36卷 896-909页
作者: Jiao-Yun Yang Jun-Da Wang Yi-Fang Zhang Wen-Juan Cheng Lian Li Key Laboratory of Knowledge Engineering with Big Data of Ministry of Education Hefei University of Technology Hefei 230601China National Smart EldeTca/re International Science and Technology Coopemtion Base Hefei University of Technology Hefei 230601China School of Computer Science and Information Engirwering Hefei University of TechnologyHefei 230601China School of Mathematics Hefei University of TechnologyHefei 230601China
Sampling is a fundamental method for generating data *** many data analysis methods are developed based on probability distributions,maintaining distributions when sampling can help to ensure good data analysis ***,sa... 详细信息
来源: 评论
A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism
收藏 引用
Computer Modeling in engineering & Sciences 2021年 第7期128卷 223-245页
作者: Daojun Han Jinyu Chen Lei Zhang Yatian Shen Yihua Gao Xueheng Wang Henan Key Laboratory of Big Data Analysis and Processing Henan UniversityKaifeng47500China Institute of Data and Knowledge Engineering Henan UniversityKaifeng47500China School of Computer and Information Engineering Henan UniversityKaifeng47500China Department of Network and Finance Agricultural Bank of China Limited Xuchang BranchXuchang461000China School of Software Pingdingshan UniversityPingdingshan467000China Department of Network and Finance Agricultural Bank of China Limited Nanyang BranchNanyang473000China
As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various ***,data on a blockchain cannot be *** a result,it is impo... 详细信息
来源: 评论
DGA-Net: Dynamic Gaussian Attention Network for Sentence Semantic Matching  1st
DGA-Net: Dynamic Gaussian Attention Network for Sentence Se...
收藏 引用
1st CAAI International Conference on Artificial Intelligence, CICAI 2021
作者: Zhang, Kun Lv, Guangyi Wang, Meng Chen, Enhong Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China School of Computer Science and Technology University of Science and Technology of China Hefei China
Sentence semantic matching requires an agent to determine the semantic relation between two sentences, where much recent progress has been made by advancement of representation learning techniques and inspiration of h... 详细信息
来源: 评论
RPR-Net: A Point Cloud-Based Rotation-Aware Large Scale Place Recognition Network  17th
RPR-Net: A Point Cloud-Based Rotation-Aware Large Scale Plac...
收藏 引用
17th European Conference on Computer Vision, ECCV 2022
作者: Fan, Zhaoxin Song, Zhenbo Zhang, Wenping Liu, Hongyan He, Jun Du, Xiaoyong Key Laboratory of Data Engineering and Knowledge Engineering of MOE School of Information Renmin University of China Beijing100872 China Department of Management Science and Engineering Tsinghua University Beijing100084 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China
Point cloud-based large scale place recognition is an important but challenging task for many applications such as Simultaneous Localization and Mapping (SLAM). Taking the task as a point cloud retrieval problem, prev... 详细信息
来源: 评论
data Cleaning of Binary Sensor Events in Activity Recognition by Cluster-Based Methods  7th
Data Cleaning of Binary Sensor Events in Activity Recognitio...
收藏 引用
7th International Conference on Human Aspects of IT for the Aged Population, ITAP 2021, held as part of the 23rd International Conference, HCI International 2021
作者: Zhao, Chunyang Que, Xia Yin, Yue Xing, Xiaoman Yang, Jiaoyun An, Ning Key Laboratory of Knowledge Engineering with Big Data of Ministry of Education Hefei University of Technology Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China Medical Imaging Department Chinese Academy of Sciences Suzhou China
The Ambient Assisted Living (AAL) systems use sensors to detect the daily behavior of older adults and provide necessary assistance based on changes in their cognitive status and physical functions, thus enabling olde... 详细信息
来源: 评论