咨询与建议

限定检索结果

文献类型

  • 1,724 篇 期刊文献
  • 1,613 篇 会议
  • 1 册 图书

馆藏范围

  • 3,338 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,214 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,213 篇 软件工程
    • 406 篇 信息与通信工程
    • 308 篇 控制科学与工程
    • 242 篇 电气工程
    • 217 篇 化学工程与技术
    • 212 篇 生物工程
    • 182 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 172 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 102 篇 仪器科学与技术
    • 90 篇 材料科学与工程(可...
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 64 篇 交通运输工程
    • 62 篇 冶金工程
    • 61 篇 土木工程
  • 1,169 篇 理学
    • 656 篇 数学
    • 264 篇 生物学
    • 223 篇 物理学
    • 201 篇 统计学(可授理学、...
    • 163 篇 化学
    • 97 篇 系统科学
  • 608 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 271 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 172 篇 医学
    • 142 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 65 篇 法学
  • 62 篇 农学
  • 38 篇 经济学
  • 15 篇 教育学
  • 8 篇 文学
  • 8 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 119 篇 semantics
  • 86 篇 feature extracti...
  • 85 篇 data mining
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 76 篇 deep learning
  • 69 篇 training
  • 65 篇 educational inst...
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 43 篇 image segmentati...
  • 41 篇 contrastive lear...
  • 41 篇 computational mo...
  • 41 篇 predictive model...
  • 40 篇 data models
  • 39 篇 reinforcement le...
  • 39 篇 accuracy
  • 38 篇 convolution
  • 37 篇 conferences

机构

  • 468 篇 college of compu...
  • 285 篇 key laboratory o...
  • 109 篇 school of automa...
  • 91 篇 school of inform...
  • 89 篇 key laboratory o...
  • 85 篇 school of comput...
  • 84 篇 key laboratory o...
  • 56 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 46 篇 school of softwa...
  • 44 篇 college of softw...
  • 41 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 33 篇 college of infor...
  • 31 篇 key laboratory o...
  • 31 篇 college of compu...
  • 30 篇 key laboratory o...

作者

  • 42 篇 yang bo
  • 35 篇 sun geng
  • 35 篇 liang yanchun
  • 32 篇 wu xindong
  • 30 篇 niyato dusit
  • 29 篇 kaixiang peng
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 li ximing
  • 28 篇 chen hong
  • 28 篇 li xiongfei
  • 27 篇 dantong ouyang
  • 25 篇 ouyang jihong
  • 25 篇 bo yang
  • 24 篇 xindong wu
  • 23 篇 peng kaixiang
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu

语言

  • 2,993 篇 英文
  • 263 篇 其他
  • 92 篇 中文
检索条件"机构=Key Laboratory of Ministry of Education for Data Engineering and Knowledge Engineering"
3338 条 记 录,以下是2871-2880 订阅
排序:
Probabilistic range queries for Uncertain Trajectories on road networks  11
Probabilistic range queries for Uncertain Trajectories on ro...
收藏 引用
14th International Conference on Extending database Technology: Advances in database Technology, EDBT 2011
作者: Zheng, Kai Trajcevski, Goce Zhou, Xiaofang Scheuermann, Peter School of ITEE University of Queensland Australia Department of EECS Northwestern University United States School of Information Renmin University of China Key Lab. of Data Engineering and Knowledge Engineering Ministry of Education China
Trajectories representing the motion of moving objects are typically obtained via location sampling, e.g. using GPS or road-side sensors, at discrete time-instants. In-between consecutive samples, nothing is known abo... 详细信息
来源: 评论
Blind identification of image copy-paste tampering based on logarithm polar coordinate transformation
Blind identification of image copy-paste tampering based on ...
收藏 引用
2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2011
作者: Lv, A. Ying-Da Shen, B. Xuan-Jing Chen, C. Hai-Peng College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China
To detect image copy-paste tampering, an improved blind identification was proposed in this study. Firstly, according to gray-level and gray-structure, every couple of doubtful blocks can be located. Secondly, for eac... 详细信息
来源: 评论
K-nearest neighbors in uncertain graph
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第10期48卷 1850-1858页
作者: Zhang, Yinglong Li, Cuiping Chen, Hong Du, Lingxia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Computer and Information Engineer Jiangxi Agriculture University Nanchang 330045 China
In many areas, a lot of data have been modeled by graphs which are subject to uncertainties, such as molecular compounds and protein interaction networks. While many real applications, for example, collaborative filte... 详细信息
来源: 评论
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study
On Mutual Support of Modern and Traditional Access Control M...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Hui Feng Wenchang Shi Zhaohui Liang Bin Liang School of Information Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Renmin University of China Beijing China
Access control is essential to computer security, especially in an open, distributed, networked communication environment. Modern access control model such as UCON aims at accommodating general requirements. Tradition... 详细信息
来源: 评论
MaxRPC algorithms based on bitwise operations
MaxRPC algorithms based on bitwise operations
收藏 引用
Lecture Notes in Computer Science
作者: Guo, Jinsong Li, Zhanshan Zhang, Liang Geng, Xuena Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun 130012 China College of Computer Science and Technology Jilin University Changchun 130012 China
Max Restricted Path Consistency (maxRPC) is a promising domain filtering consistency for binary constraints. In existing algorithms, the process of searching for PC-witnesses requires most constraint checks. And the c... 详细信息
来源: 评论
MyBUD自适应分布式存储管理的设计与实现
MyBUD自适应分布式存储管理的设计与实现
收藏 引用
第29届中国数据库学术会议
作者: ZHOU Ningnan 周宁南 ZHANG Xiao 张孝 SUN Xinyun 孙新云 JU Xingxing 琚星星 LIU Kuicheng 刘奎呈 DU Xiaoyong 杜小勇 WANG Shan 王珊 Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Renmin Universi 中国人民大学数据工程与知识工程教育部重点实验室 北京100872 中国人民大学信息学院 北京100872
面对日益增长的非结构化数据管理需求,实现了基于“自由表”数据模型和BUD参考体系模型的非结构化数据管理平台MyBUD系统。提出了一种能够根据非结构化数据的类型和访问特点自适应地选择分布式存储子系统的方法,同时也对MyBUD进行了T... 详细信息
来源: 评论
A new model for topological relations between convex regions
A new model for topological relations between convex regions
收藏 引用
2011 8th International Conference on Fuzzy Systems and knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC'11
作者: Ouyang, Jihong Ma, Ke Ma, Ling College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun 130012 China
Topological relations between spatial objects have played important roles in spatial representing and reasoning. Various models for expressing topological relations have been put forward. The Region Connection Calculu... 详细信息
来源: 评论
An efficient lightweight RFID authentication protocol for low-cost tags
收藏 引用
Advances in Information Sciences and Service Sciences 2011年 第9期3卷 331-338页
作者: Jialiang, He Dantong, Ouyang Yuxin, Ye College of Computer Science and Engineering Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China
Wireless communication, signal broadcasting, strictly limited resources in tags make RFID systems being confronted with many security attacks and privacy disclosure threats. In this paper, an efficient lightweight RFI... 详细信息
来源: 评论
Discovering Chinese compound term using termhood and unithood measures
Proceedings - 2011 6th Annual ChinaGrid Conference, ChinaGri...
收藏 引用
Proceedings - 2011 6th Annual ChinaGrid Conference, ChinaGrid 2011 2011年 60-67页
作者: Kang, Jingjing Liu, Tao Hu, He Du, Xiaoyong Key Labs. of Data Engineering and Knowledge Engineering Ministry of Education China School of Information Renmin University of China Beijing China
Domain terms play a crucial role in many research areas, which has led to a rise in demand for automatic domain terms extraction. In this paper, we present a two-level evaluation approach based on term hood and unit h... 详细信息
来源: 评论
KAM Type-Theorem for Lower Dimensional Tori in Random Hamiltonian Systems
收藏 引用
Communications in Mathematical Research 2011年 第1期000卷 81-96页
作者: LI YONG XU LU College of Mathematics Key Laboratory of Symbolic computation and Knowledge Engineering of Ministry of EducationJilin UniversityChangchun130012
In this paper,we study the persistence of lower dimensional tori for random Hamiltonian systems,which shows that majority of the unperturbed tori persist as Cantor fragments of lower dimensional ones under small *** t... 详细信息
来源: 评论