咨询与建议

限定检索结果

文献类型

  • 1,678 篇 期刊文献
  • 1,565 篇 会议
  • 1 册 图书

馆藏范围

  • 3,244 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,123 篇 工学
    • 1,395 篇 计算机科学与技术...
    • 1,198 篇 软件工程
    • 391 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 225 篇 电气工程
    • 215 篇 化学工程与技术
    • 211 篇 生物工程
    • 180 篇 生物医学工程(可授...
    • 177 篇 机械工程
    • 165 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 101 篇 仪器科学与技术
    • 86 篇 材料科学与工程(可...
    • 75 篇 动力工程及工程热...
    • 71 篇 建筑学
    • 62 篇 交通运输工程
    • 61 篇 冶金工程
    • 60 篇 土木工程
  • 1,149 篇 理学
    • 645 篇 数学
    • 261 篇 生物学
    • 217 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 158 篇 化学
    • 97 篇 系统科学
  • 595 篇 管理学
    • 351 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 168 篇 医学
    • 138 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 64 篇 法学
  • 60 篇 农学
  • 37 篇 经济学
  • 14 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 118 篇 semantics
  • 84 篇 data mining
  • 82 篇 feature extracti...
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 73 篇 deep learning
  • 66 篇 training
  • 65 篇 educational inst...
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 41 篇 computational mo...
  • 40 篇 image segmentati...
  • 40 篇 predictive model...
  • 40 篇 data models
  • 38 篇 convolution
  • 38 篇 accuracy
  • 37 篇 conferences
  • 37 篇 reinforcement le...
  • 35 篇 visualization

机构

  • 455 篇 college of compu...
  • 271 篇 key laboratory o...
  • 108 篇 school of automa...
  • 90 篇 school of inform...
  • 87 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 84 篇 school of comput...
  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 45 篇 school of softwa...
  • 44 篇 college of softw...
  • 40 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 33 篇 college of infor...
  • 31 篇 college of compu...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 41 篇 yang bo
  • 35 篇 liang yanchun
  • 34 篇 sun geng
  • 32 篇 wu xindong
  • 29 篇 niyato dusit
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 kaixiang peng
  • 28 篇 chen hong
  • 27 篇 dantong ouyang
  • 27 篇 li xiongfei
  • 26 篇 li ximing
  • 25 篇 ouyang jihong
  • 24 篇 bo yang
  • 23 篇 xindong wu
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 22 篇 li cuiping

语言

  • 3,011 篇 英文
  • 152 篇 其他
  • 92 篇 中文
检索条件"机构=Key Laboratory of Ministry of Education for Data Engineering and Knowledge Engineering"
3244 条 记 录,以下是3021-3030 订阅
排序:
Web page malicious code detection based on embedded fingerprints
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2208-2214页
作者: Huang, Jianjun Liang, Bin Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renmin University of China Beijing 100872 China
Web sites have become the main targets of many attackers. Signature-based detection needs to maintain a large signature database and Honeypot based methods are not efficient. Since attackers always make the malicious ... 详细信息
来源: 评论
Efficient Algorithm for Computing Link-Based Similarity in Real World Networks
Efficient Algorithm for Computing Link-Based Similarity in R...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Yuanzhe Cai Gao Cong Xu Jia Hongyan Liu Jun He Jiaheng Lu Xiaoyong Du Key Laboratories of Data Engineering and Knowledge Engineering Ministry of Education China Department of Computer Science Renmin University of China China Department of Computer Science University of Aalborg Denmark Department of Management Science and Engineering Tsinghua University China
Similarity calculation has many applications, such as information retrieval, and collaborative filtering, among many others. It has been shown that link-based similarity measure, such as SimRank, is very effective in ... 详细信息
来源: 评论
ON RESEARCH OF OPTIMIZATION STRATEGY FOR DYNAMIC BACKTRACKING
ON RESEARCH OF OPTIMIZATION STRATEGY FOR DYNAMIC BACKTRACKIN...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: HONG-BO LI ZHAN-SHAN LI YANG AI HUI-YING DU Key Laboratory of Symbolic Computation and Knowledge Engineering for Ministry of Education Jilin University Changchun 130012 College of Computer Science and Technology Jilin University Changchun 130012
Constraint Satisfaction Problem is an important branch of Artificial Intelligence, one typical algorithm to solve Constraint Satisfaction Problem is the searching algorithm based on backtracking. The Dynamic Backtrack... 详细信息
来源: 评论
PEJA:Progressive Energy-Efficient Join Processing for Sensor Networks
收藏 引用
Journal of Computer Science & Technology 2008年 第6期23卷 957-972页
作者: 赖永炫 陈毅隆 陈红 School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education
Sensor networks are widely used in many applications to collaboratively collect information from the physical environment. In these applications, the exploration of the relationship and linkage of sensing data within ... 详细信息
来源: 评论
VSM-RF: A method of relevance feedback in keyword Search over Relational databases
VSM-RF: A method of relevance feedback in Keyword Search ove...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and education, ITME
作者: Zhao-hui Peng Jun Zhang Shan Wang Chang-liang Wang Li-zhen Cui School of Computer Science and Technology Shandong University Jinan 250101 China School of Computer Science and Technology Dalian Maritime University 116026 China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing 100872 China The Hong Kong University of Science and Technology China
In keyword search over relational databases (KSORD), retrieval of user's initial query is often unsatisfying. User has to reformulate his query and execute the new query, which costs much time and effort. In this ... 详细信息
来源: 评论
Bring User Feedback into keyword Search over databases
Bring User Feedback into Keyword Search over Databases
收藏 引用
Web Information Systems and Applications Conference (WISA)
作者: Zhaohui Peng Jun Zhang Shan Wang Changliang Wang School of Computer Science & Technology Shandong University Jinan China Key Laboratory of Data Engineering & Knowledge Engineering Ministry of Education Beijing China School of Computer Science & Technology Dalian Maritime University Dalian China Hong Kong University of Science and Technology Hong Kong China
keyword search over relational databases (KSORD) enables casual users to use keyword queries (a set of keywords) to search relational databases just like searching the Web, without any knowledge of the database schema... 详细信息
来源: 评论
A Novel Spatial Obstructed Distance Using Quantum-Behaved Particle Swarm Optimization
A Novel Spatial Obstructed Distance Using Quantum-Behaved Pa...
收藏 引用
International Conference on Intelligent Computation Technology and Automation, ICICTA
作者: Xueping Zhang Hong Yi Dan Cao Yawei Liu Tengfei Yang Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou University Fuzhou China School of Information Science & Engineering Henan University of Technology Zhengzhou China
Spatial clustering with obstacles constraints (SCOC) has been a new topic in spatial data mining (SDM). Spatial obstructed distance (SOD) is the key to SCOC. The obstacles constraint is generally ignored in computing ... 详细信息
来源: 评论
Modeling Email Worm Propagation Using Game Theory
Modeling Email Worm Propagation Using Game Theory
收藏 引用
The First International Conference on Multimedia Information Networking and Security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Xin Sun Yanheng Liu Jian Wang College of Computer Science and Technology Jilin University Changchun Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin 130012 China
One of the most prevalent security problems in network is the rampant propagation of email worms. In this paper game theory is suggested as a method for modeling and computing the probabilities of expected behaviors o... 详细信息
来源: 评论
Spatial Clustering with Obstacles Constraints by Ant Colony Optimization and Quantum Particle Swarm Optimization
Spatial Clustering with Obstacles Constraints by Ant Colony ...
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence (AICI)
作者: Xueping Zhang Jianjun Wu Haifang Si Tengfei Yang Yawei Liu Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou University Fuzhou China School of Information Science & Engineering Henan University of Technology Zhengzhou China
The paper proposed a novel ant colony optimization (ACO) and quantum particle swarm optimization (QPSO) method for spatial clustering with obstacles constraints (SCOC). We first developed AQPGSOD using ACO and QPSO ba... 详细信息
来源: 评论
A New Framework for Accessing Trusted Network
A New Framework for Accessing Trusted Network
收藏 引用
International Workshop on Intelligent Networks and Intelligent Systems (ICINIS)
作者: Jian Wang Yanheng Liu Xiangpeng Jia Xiaomin Liu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Jilin University Changchun Jilin CN China Mobile Shenyang Branch Corporation Shenyang China
Trusted network connect (TNC), whose goal is to improve network security from source, now has become hot topic in security domain. We proposed a new access model for the terminals without meeting the requirements in T... 详细信息
来源: 评论