咨询与建议

限定检索结果

文献类型

  • 537 篇 会议
  • 414 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 600 篇 工学
    • 491 篇 计算机科学与技术...
    • 413 篇 软件工程
    • 136 篇 信息与通信工程
    • 64 篇 控制科学与工程
    • 59 篇 生物工程
    • 48 篇 电气工程
    • 33 篇 机械工程
    • 32 篇 电子科学与技术(可...
    • 30 篇 化学工程与技术
    • 25 篇 生物医学工程(可授...
    • 22 篇 仪器科学与技术
    • 22 篇 动力工程及工程热...
    • 18 篇 建筑学
    • 17 篇 航空宇航科学与技...
    • 14 篇 光学工程
    • 14 篇 交通运输工程
    • 12 篇 材料科学与工程(可...
  • 268 篇 管理学
    • 160 篇 图书情报与档案管...
    • 135 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 249 篇 理学
    • 151 篇 数学
    • 59 篇 生物学
    • 45 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 34 篇 化学
    • 19 篇 系统科学
  • 37 篇 法学
    • 32 篇 社会学
  • 26 篇 医学
    • 23 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 文学
  • 4 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 52 篇 semantics
  • 34 篇 data mining
  • 33 篇 knowledge engine...
  • 29 篇 training
  • 22 篇 feature extracti...
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 19 篇 big data
  • 19 篇 information retr...
  • 18 篇 conferences
  • 18 篇 data models
  • 17 篇 task analysis
  • 17 篇 data engineering
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 visualization
  • 14 篇 knowledge manage...
  • 14 篇 knowledge graph
  • 14 篇 wireless sensor ...
  • 13 篇 query processing

机构

  • 153 篇 school of inform...
  • 104 篇 school of comput...
  • 52 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 31 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of inform...
  • 18 篇 key laboratory o...
  • 18 篇 school of econom...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 14 篇 key laboratory o...

作者

  • 48 篇 chen hong
  • 34 篇 wu xindong
  • 34 篇 du xiaoyong
  • 32 篇 wang meng
  • 29 篇 li cuiping
  • 28 篇 zhang jing
  • 28 篇 xiaoyong du
  • 27 篇 wang shan
  • 26 篇 xindong wu
  • 24 篇 hong chen
  • 23 篇 sun geng
  • 20 篇 niyato dusit
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 huang qingming
  • 17 篇 meng wang
  • 17 篇 shan wang
  • 17 篇 wang yang
  • 17 篇 xu qianqian
  • 17 篇 wan changxuan

语言

  • 886 篇 英文
  • 46 篇 其他
  • 22 篇 中文
检索条件"机构=Key Laboratory of Knowledge and Data Engineering"
954 条 记 录,以下是631-640 订阅
排序:
Mining opinion word from customer review
International Journal of Database Theory and Application
收藏 引用
International Journal of database Theory and Application 2016年 第2期9卷 129-136页
作者: Tengjiao, Jiang Minjuan, Zhong Shumei, Liao Siwen, Luo School of Information Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
Online customer review is considered as a significant informative resource which is useful for both potential customer and product manufacturers. As a result, it is one of the most challenging tasks to mine customer r... 详细信息
来源: 评论
Iterative context-aware graph inference for visual dialog
arXiv
收藏 引用
arXiv 2020年
作者: Guo, Dan Wang, Hui Zhang, Hanwang Zha, Zheng-Jun Wang, Meng Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology School of Computer Science and Information Engineering Hefei University of Technology Nanyang Technological University University of Science and Technology of China
Visual dialog is a challenging task that requires the comprehension of the semantic dependencies among implicit visual and textual contexts. This task can refer to the relation inference in a graphical model with spar... 详细信息
来源: 评论
Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge Attention
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Da Feng, Lin Fan, Yuqi Shang, Siyuan Wei, Zhenchun The Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Ministry of Education China School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei230009 China
It is imperative to assure the security of smart contracts via intelligent vulnerability detection tools before deploying smart contracts on blockchains. The existing deep learning-based approaches fail to effectively... 详细信息
来源: 评论
An Edit Distance Algorithm with Block Swap
An Edit Distance Algorithm with Block Swap
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Tian Xia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Resource Management Renmin University of China. Beijing 100872 China
The edit distance between two given strings X and Y is the minimum number of edit operations that transform X into Y. In ordinary course, string editing is based on character insert, delete, and substitute operations.... 详细信息
来源: 评论
From knowledge Graph Development to Serving Industrial knowledge Automation:A Review  41
From Knowledge Graph Development to Serving Industrial Knowl...
收藏 引用
第41届中国控制会议
作者: Guangxuan Song Dongmei Fu Dawei Zhang Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education School of Automation and Electrical EngineeringUniversity of Science and Technology Beijing Beijing Engineering Research Center of Industrial Spectrum Imaging School of Automation and Electrical EngineeringUniversity of Science and Technology Beijing Shunde Graduate School of University of Science and Technology Beijing Beijing Advanced Innovation Center for Materials Genome Engineering Institute for Advanced Materials and TechnologyUniversity of Science and Technology Beijing National Materials Corrosion and Protection Data Center University of Science and Technology Beijing
knowledge is essential for the management,scheduling,and operation of all industrial *** automation refers to the automation of knowledge-based work,which is a disruptive technology of the *** in the era of big data,K... 详细信息
来源: 评论
Malicious Web Pages Detection Based on Abnormal Visibility Recognition
Malicious Web Pages Detection Based on Abnormal Visibility R...
收藏 引用
International Conference on E-Business and Information System Security, EBISS
作者: Bin Liang Jianjun Huang Fang Liu Dawei Wang Daxiang Dong Zhaohui Liang Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China Beijing China School of Information Renmin University of China Beijing China Renmin University of China Beijing CN
In recent years, Web sites have already become the attackers' main target. When attackers embed malicious code in the Web pages, they generally change the display mode of the corresponding HTML tags to make the di... 详细信息
来源: 评论
Deep Semantic-Enhanced Event Detection via Symmetric Graph Convolutional Network
Deep Semantic-Enhanced Event Detection via Symmetric Graph C...
收藏 引用
IEEE International Conference on Big knowledge (ICBK)
作者: Chenchen Sun Xingrui Zhuo Zhenya Lu Chenyang Bu Gongqing Wu Key Laboratory of Knowledge Engineering with Big Data (the Ministry of Education of China) Hefei University of Technology Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Event detection, an important research topic of information extraction, aims to automatically identify and classify event instances from the text. Previous studies have introduced methods combining syntactic informati... 详细信息
来源: 评论
Balanced Tree Partitioning with Succinct Logic
Balanced Tree Partitioning with Succinct Logic
收藏 引用
IEEE International Conference on Big knowledge (ICBK)
作者: Xindong Wu Shaojing Sheng Peng Zhou Key Laboratory of Knowledge Engineering with Big Data (Heifei Unversity of Technology) Ministry of Education Heifei China School of Compuster Science and Technology Anhui University Heifei China
As a widely used data structure, graphs are good at characterizing data with internal associations, such as social and biological data. Tree structured data are special and are widely used in many real-world applicati... 详细信息
来源: 评论
Performance study on logging to another main memory database
Performance study on logging to another main memory database
收藏 引用
International Conference on New Trends in Information and Service Science, NISS
作者: Xiongpai Qin Xiaoyun Zhou Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing 100872 China Department of Computer Science and Technology Xuzhou Normal University Jiangsu 221008 China
In update intensive main memory database applications, huge volume of log records is generated, to maintain the ACID properties of the database system, the log records should be persistent efficiently. Delegating logg... 详细信息
来源: 评论
Label Enhanced Event Detection with Collective knowledge and Heterogeneous Graph
Label Enhanced Event Detection with Collective Knowledge and...
收藏 引用
IEEE International Conference on Big knowledge (ICBK)
作者: Gongqing Wu Zhenya Lu Zhuochun Miao Xingrui Zhuo Zan Zhang Key Laboratory of Knowledge Engineering with Big Data (the Ministry of Education of China) Hefei University of Technology Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Event Detection (ED) aims to recognize instances of specified types of event triggers in text. Existing graph neural network-based models have achieved promising progress to alleviate this problem by capturing differe... 详细信息
来源: 评论