咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 467 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 713 篇 工学
    • 584 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 165 篇 信息与通信工程
    • 68 篇 控制科学与工程
    • 67 篇 生物工程
    • 55 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 37 篇 化学工程与技术
    • 36 篇 机械工程
    • 31 篇 生物医学工程(可授...
    • 23 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 19 篇 光学工程
    • 19 篇 建筑学
    • 17 篇 交通运输工程
    • 17 篇 航空宇航科学与技...
  • 302 篇 管理学
    • 184 篇 图书情报与档案管...
    • 146 篇 管理科学与工程(可...
    • 49 篇 工商管理
  • 292 篇 理学
    • 176 篇 数学
    • 67 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 51 篇 物理学
    • 41 篇 化学
    • 22 篇 系统科学
  • 39 篇 法学
    • 33 篇 社会学
  • 30 篇 医学
    • 26 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 14 篇 药学(可授医学、理...
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 7 篇 教育学
  • 6 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 61 篇 semantics
  • 39 篇 knowledge engine...
  • 37 篇 data mining
  • 30 篇 training
  • 24 篇 feature extracti...
  • 23 篇 data engineering
  • 20 篇 xml
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 20 篇 information retr...
  • 19 篇 conferences
  • 19 篇 big data
  • 18 篇 task analysis
  • 18 篇 data models
  • 17 篇 visualization
  • 17 篇 databases
  • 16 篇 knowledge manage...
  • 15 篇 search engines
  • 15 篇 algorithm design...
  • 14 篇 query processing

机构

  • 195 篇 school of inform...
  • 105 篇 school of comput...
  • 52 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 33 篇 school of inform...
  • 32 篇 jiangxi key labo...
  • 31 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 28 篇 department of ma...
  • 25 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 24 篇 school of econom...
  • 23 篇 key laboratory o...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...

作者

  • 71 篇 du xiaoyong
  • 60 篇 chen hong
  • 38 篇 li cuiping
  • 38 篇 xiaoyong du
  • 34 篇 wu xindong
  • 33 篇 he jun
  • 33 篇 wang meng
  • 31 篇 liu hongyan
  • 30 篇 li xirong
  • 29 篇 hong chen
  • 29 篇 wang shan
  • 28 篇 zhang jing
  • 26 篇 xindong wu
  • 23 篇 sun geng
  • 20 篇 niyato dusit
  • 19 篇 huang qingming
  • 19 篇 hong richang
  • 18 篇 shan wang
  • 18 篇 liu jun
  • 18 篇 xu qianqian

语言

  • 1,035 篇 英文
  • 47 篇 其他
  • 24 篇 中文
检索条件"机构=Key Labs of Data Engineering and Knowledge Engineering"
1106 条 记 录,以下是861-870 订阅
排序:
Efficient parallel skyline processing using hyperplane projections  11
Efficient parallel skyline processing using hyperplane proje...
收藏 引用
2011 ACM SIGMOD and 30th PODS 2011 Conference
作者: Köhler, Henning Yang, Jing Zhou, Xiaofang School of Information Technology and Electrical Engineering University of Queensland Australia School of Information Renmin University of China Key Labs. of Data Engineering and Knowledge Engineering BeiJing China
The skyline of a set of multi-dimensional points (tuples) consists of those points for which no clearly better point exists in the given set, using component-wise comparison on domains of interest. Skyline queries, i.... 详细信息
来源: 评论
Reduce pruning cost to accelerate multimedia kNN search over MBRs based index structures
Reduce pruning cost to accelerate multimedia kNN search over...
收藏 引用
3rd International Conference on Multimedia Information Networking and Security, MINES 2011
作者: Li, Hui Zhang, Xiao Wang, Shan School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering Beijing China
MBR (Minimum Bounding Rectangle) has been widely used to represent multimedia data objects for multimedia indexing techniques. In kNN search, MINDIST and MINMAXDIST was the most popular pruning metrics employed by MBR... 详细信息
来源: 评论
Preventing Recommendation Attack in Trust-Based Recommender Systems
收藏 引用
Journal of Computer Science & Technology 2011年 第5期26卷 823-828页
作者: 张富国 School of Information and Technology Jiangxi University of Finance and Economics Institute of Information Resource Management Jiangxi University of Finance and Economics Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics
Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation *** work has shown incorporating trust mechanism into traditional collaborativ... 详细信息
来源: 评论
Lawyer information integration and recommendation by multi-source information validation
Lawyer information integration and recommendation by multi-s...
收藏 引用
2011 International Conference on Machine Learning and Cybernetics, ICMLC 2011
作者: Liu, Tao Fan, Biao Hu, He Du, Xiao-Yong Key Laboratory of Data Engineering and Knowledge Engineering MOE School of Information Renmin University of China Beijing 100872 China
On the internet, all-round lawyer information is located at separated information sources, which prevent web users from effective information acquisition. In order to build a unified view of separated, heterogeneous, ... 详细信息
来源: 评论
Improving performance by creating a native join-index for OLAP
收藏 引用
Frontiers of Computer Science 2011年 第2期5卷 236-249页
作者: Yansong ZHANG Shan WANG Jiaheng LU National Survey Research Center at Renmin University of China Beijing 100872 China Key Laboratory of the Ministry of Education for Data Engineering and Knowledge Engineering Renmin University of China Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
The performance of online analytical processing (OLAP) is critical for meeting the increasing requirements of massive volume analytical applications. Typical techniques, such as in-memory processing, column-storage,... 详细信息
来源: 评论
Virtualizing system and ordinary services in Windows-based OS-level virtual machines  11
Virtualizing system and ordinary services in Windows-based O...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied Computing
作者: Shan, Zhiyong Chiueh, Tzi-Cker Wang, Xin Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China Stony Brook University United States
OS-level virtualization incurs smaller start-up and run-time overhead than HAL-based virtualization and thus forms an important building block for developing fault-tolerant and intrusion-tolerant applications. A compl... 详细信息
来源: 评论
Extract knowledge from semi-structured websites for search task simplification  11
Extract knowledge from semi-structured websites for search t...
收藏 引用
20th ACM Conference on Information and knowledge Management, CIKM'11
作者: Gu, Yingqin Yan, Jun Liu, Hongyan He, Jun Ji, Lei Liu, Ning Chen, Zheng Key Labs. of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing China Microsoft Research Asia Beijing China Department of Management Science and Engineering Tsinghua University Beijing China
Simplifying the key tasks of search engine users by directly retrieving to them structured knowledge according to their queries is attracting much attention from both industry and academia. A bottleneck of this challe... 详细信息
来源: 评论
Using New Fusion Operations to Improve Trust Expressiveness of Subjective Logic
收藏 引用
Wuhan University Journal of Natural Sciences 2011年 第5期16卷 376-382页
作者: ZHOU Hongwei1,2,3,SHI Wenchang1,2,LIANG Zhaohui1,2,LIANG Bin1,2 1.key Laboratory of data engineering and knowledge engineering,Ministry of Education,Beijing 100872,China 2.School of Information,Renmin University of China,Beijing 100872,China 3.Institute of Electronic Technology,Information engineering University of PLA,Zhengzhou 450004,Henan,China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Information Engineering University of PLA Zhengzhou Henan China
Subjective logic provides a means to describe the trust relationship of the realworld. However, existing fusion operations it offers Weal fused opiniotts equally, which makes it impossible to deal with the weighted op... 详细信息
来源: 评论
Tracer: Enforcing Mandatory Access Control in commodity OS with the support of light-weight intrusion detection and tracing  11
Tracer: Enforcing Mandatory Access Control in commodity OS w...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Key Laboratory of Data Engineering and Knowledge Engineering Renmin University MOE China Stony Brook University United States Industrial Technology Research Institute Taiwan
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p... 详细信息
来源: 评论
Scalable process modeling based on net synthesis under cloud computing environment
Scalable process modeling based on net synthesis under cloud...
收藏 引用
2011 IEEE International Conference on Granular Computing, GrC 2011
作者: Zhou, Jiantao Liang, Rong Wang, Yan College of Computer Science Inner Mongolia University Hohhot China Key Laboratory of Data Mining and Knowledge Engineering Hohhot China
Recently research on modeling methods of complicated processes under complex network environments has become a focus in workflow field. Now cloud computing environment provides a specific application background for th... 详细信息
来源: 评论