咨询与建议

限定检索结果

文献类型

  • 1,724 篇 期刊文献
  • 1,613 篇 会议
  • 1 册 图书

馆藏范围

  • 3,338 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,214 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,213 篇 软件工程
    • 406 篇 信息与通信工程
    • 308 篇 控制科学与工程
    • 242 篇 电气工程
    • 217 篇 化学工程与技术
    • 212 篇 生物工程
    • 182 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 172 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 102 篇 仪器科学与技术
    • 90 篇 材料科学与工程(可...
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 64 篇 交通运输工程
    • 62 篇 冶金工程
    • 61 篇 土木工程
  • 1,169 篇 理学
    • 656 篇 数学
    • 264 篇 生物学
    • 223 篇 物理学
    • 201 篇 统计学(可授理学、...
    • 163 篇 化学
    • 97 篇 系统科学
  • 608 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 271 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 172 篇 医学
    • 142 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 65 篇 法学
  • 62 篇 农学
  • 38 篇 经济学
  • 15 篇 教育学
  • 8 篇 文学
  • 8 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 119 篇 semantics
  • 86 篇 feature extracti...
  • 85 篇 data mining
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 76 篇 deep learning
  • 69 篇 training
  • 65 篇 educational inst...
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 43 篇 image segmentati...
  • 41 篇 contrastive lear...
  • 41 篇 computational mo...
  • 41 篇 predictive model...
  • 40 篇 data models
  • 39 篇 reinforcement le...
  • 39 篇 accuracy
  • 38 篇 convolution
  • 37 篇 conferences

机构

  • 468 篇 college of compu...
  • 285 篇 key laboratory o...
  • 109 篇 school of automa...
  • 91 篇 school of inform...
  • 89 篇 key laboratory o...
  • 85 篇 school of comput...
  • 84 篇 key laboratory o...
  • 56 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 46 篇 school of softwa...
  • 44 篇 college of softw...
  • 41 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 33 篇 college of infor...
  • 31 篇 key laboratory o...
  • 31 篇 college of compu...
  • 30 篇 key laboratory o...

作者

  • 42 篇 yang bo
  • 35 篇 sun geng
  • 35 篇 liang yanchun
  • 32 篇 wu xindong
  • 30 篇 niyato dusit
  • 29 篇 kaixiang peng
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 li ximing
  • 28 篇 chen hong
  • 28 篇 li xiongfei
  • 27 篇 dantong ouyang
  • 25 篇 ouyang jihong
  • 25 篇 bo yang
  • 24 篇 xindong wu
  • 23 篇 peng kaixiang
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu

语言

  • 2,993 篇 英文
  • 263 篇 其他
  • 92 篇 中文
检索条件"机构=Key Laboratory of Ministry of Education for Data Engineering and Knowledge Engineering"
3338 条 记 录,以下是2791-2800 订阅
排序:
L-priorities Bloom Filter: A New Member of the Bloom Filter Family
收藏 引用
International Journal of Automation and computing 2012年 第2期9卷 171-176页
作者: Huang-Shui Hu Hong-Wei Zhao Fei Mi College of Computer Science and Technology Jilin University Changchun 130012 PRC Key Laboratory of Symbolic Computation and Knowledge Engineering for Ministry of Education Jilin University Changchun 130012 PRC
A Bloom filter is a space-efficient data structure used for concisely representing a set as well as membership queries at the expense of introducing false positive. In this paper, we propose the L-priorities Bloom fil... 详细信息
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论
Combining spatial cloaking and dummy generation for location privacy preserving
Combining spatial cloaking and dummy generation for location...
收藏 引用
8th International Conference on Advanced data Mining and Applications, ADMA 2012
作者: Xu, Nana Zhu, Dan Liu, Hongyan He, Jun Du, Xiaoyong Liu, Tao Key Labs. of Data Engineering and Knowledge Engineering Ministry of Education China School of Information Renmin University of China China Department of Management Science and Engineering Tsinghua University China
Location privacy preserving is attracting more and more attentions with the wide use of accurate positioning devices. Two kinds of methods based on k-anonymity have been proposed for location privacy preserving. One i... 详细信息
来源: 评论
A parallel scheduling algorithm for reinforcement learning in large state space
收藏 引用
Frontiers of Computer Science 2012年 第6期6卷 631-646页
作者: Quan LIU Xudong YANG Ling JING Jin LI Jiao LI Institute of Computer Science and Technology Soochow UniversitySuzhou 215006China Department of Computer Science and Technology Nanjing UniversityNanjing 210093China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun 130012China
The main challenge in the area of reinforcement learning is scaling up to larger and more complex problems. Aiming at the scaling problem of reinforcement learning, a scalable reinforcement learning method, DCS-SRL, i... 详细信息
来源: 评论
Predicting retweet behavior in Weibo social network
Predicting retweet behavior in Weibo social network
收藏 引用
13th International Conference on Web Information Systems engineering, WISE 2012
作者: Zhang, Hongbo Zhao, Qun Liu, Hongyan Xiao, Ke He, Jun Du, Xiaoyong Chen, Hong Key Labs. of Data Engineering and Knowledge Engineering Ministry of Education China School of Information Renmin University of China China School of Economics and Management Tsinghua University China
Retweeting ensures the information diffusion in micro-blog services. By this simple way, it is convenient for a user to share and spread interesting information in the whole network. In this paper, we consider many fe... 详细信息
来源: 评论
Learning the structure of dynamic bayesian network with domain knowledge
Learning the structure of dynamic bayesian network with doma...
收藏 引用
2012 International Conference on Machine Learning and Cybernetics, ICMLC 2012
作者: Chen, Juan Jia, Haiyang Huang, Yuxiao Liu, Dayou College of Computer Science and Technology Key Laboratory for Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Dynamic Bayesian Network (DBN) is a graphical model for representing temporal stochastic processes. Learning the structure of DBN is a fundamental step for parameter learning, inference and application. For large scal... 详细信息
来源: 评论
Information propagation in online social networks based on user behavior
Information propagation in online social networks based on u...
收藏 引用
3rd International Conference on Information Computing and Applications, ICICA 2012
作者: Li, Niu Han, Xiaoting Key Laboratory of Ministry of Education for Data Engineering and Knowledge Engineering Renmin University of China Beijing China School of Information Resource Management Renmin University of China Beijing China School of Economics and Management Beihang University Beijing China
Along with the development of Internet and Web2.0, online social networks (OSNs) are becoming an important information propagation platform. Therefore, it is of great significance to study the information propagation ... 详细信息
来源: 评论
Conflict-based belief revision operators in possibilistic logic  26
Conflict-based belief revision operators in possibilistic lo...
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Qi, Guilin Wang, Kewen Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China School of Computing and Information Technology Griffith University Australia
In this paper, we investigate belief revision in possibilistic logic, which is a weighted logic proposed to deal with incomplete and uncertain information. Existing revision operators in possibilistic logic are restri... 详细信息
来源: 评论
A Framework for Personalized Management of Domain Ontologies
A Framework for Personalized Management of Domain Ontologies
收藏 引用
International Conference on Computer and Information Science (ACIS)
作者: Runnan Liu Puwei Wang Shixian Zheng Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education Renmin University of China Beijing China
As the sharable and reusable domain knowledge, domain ontology increasingly serves as a foundation for semantic Web. Personalized management of domain ontologies is to provide personalized views of domain ontologies t... 详细信息
来源: 评论
Quasi-periodic Solutions of the General Nonlinear Beam Equations
收藏 引用
Communications in Mathematical Research 2012年 第1期28卷 51-64页
作者: GAO YI-XIAN College of Mathematics and Statistics Northeast Normal University Changchun 130024 Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012
In this paper, one-dimensional (1D) nonlinear beam equations of the form utt - uxx + uxxxx + mu = f (u) with Dirichlet boundary conditions are considered, where the nonlinearity f is an analytic, odd function an... 详细信息
来源: 评论