咨询与建议

限定检索结果

文献类型

  • 633 篇 会议
  • 461 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 709 篇 工学
    • 582 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 165 篇 信息与通信工程
    • 68 篇 控制科学与工程
    • 67 篇 生物工程
    • 55 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 37 篇 化学工程与技术
    • 36 篇 机械工程
    • 30 篇 生物医学工程(可授...
    • 23 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 19 篇 光学工程
    • 19 篇 建筑学
    • 17 篇 交通运输工程
    • 17 篇 航空宇航科学与技...
  • 302 篇 管理学
    • 184 篇 图书情报与档案管...
    • 146 篇 管理科学与工程(可...
    • 49 篇 工商管理
  • 291 篇 理学
    • 176 篇 数学
    • 67 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 51 篇 物理学
    • 41 篇 化学
    • 21 篇 系统科学
  • 39 篇 法学
    • 33 篇 社会学
  • 29 篇 医学
    • 26 篇 临床医学
    • 19 篇 基础医学(可授医学...
    • 14 篇 药学(可授医学、理...
  • 21 篇 经济学
    • 21 篇 应用经济学
  • 7 篇 教育学
  • 6 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 61 篇 semantics
  • 39 篇 knowledge engine...
  • 37 篇 data mining
  • 30 篇 training
  • 24 篇 feature extracti...
  • 23 篇 data engineering
  • 20 篇 xml
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 20 篇 information retr...
  • 19 篇 conferences
  • 19 篇 big data
  • 18 篇 task analysis
  • 18 篇 data models
  • 17 篇 visualization
  • 17 篇 databases
  • 16 篇 knowledge manage...
  • 15 篇 search engines
  • 15 篇 algorithm design...
  • 14 篇 query processing

机构

  • 195 篇 school of inform...
  • 104 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 33 篇 school of inform...
  • 32 篇 jiangxi key labo...
  • 31 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 28 篇 department of ma...
  • 25 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 24 篇 school of econom...
  • 23 篇 key laboratory o...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...

作者

  • 71 篇 du xiaoyong
  • 60 篇 chen hong
  • 38 篇 li cuiping
  • 38 篇 xiaoyong du
  • 34 篇 wu xindong
  • 33 篇 he jun
  • 33 篇 wang meng
  • 31 篇 liu hongyan
  • 30 篇 li xirong
  • 29 篇 hong chen
  • 29 篇 wang shan
  • 28 篇 zhang jing
  • 24 篇 xindong wu
  • 23 篇 sun geng
  • 20 篇 niyato dusit
  • 19 篇 huang qingming
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 xu qianqian
  • 17 篇 meng wang

语言

  • 1,024 篇 英文
  • 47 篇 其他
  • 24 篇 中文
检索条件"机构=Key Labs of Data Engineering and Knowledge Engineering"
1095 条 记 录,以下是891-900 订阅
排序:
Discovering Chinese Compound Term Using Termhood and Unithood Measures
Discovering Chinese Compound Term Using Termhood and Unithoo...
收藏 引用
ChinaGrid Annual Conference (ChinaGrid)
作者: Jingjing Kang Tao Liu He Hu Xiaoyong Du Key Laboratories of Data Engineering and Knowledge Engineering Ministry of Education China School of Information Renmin University of China Beijing China
Domain terms play a crucial role in many research areas, which has led to a rise in demand for automatic domain terms extraction. In this paper, we present a two-level evaluation approach based on term hood and unit h... 详细信息
来源: 评论
Lawyer information integration and recommendation by multi-source information validation
Lawyer information integration and recommendation by multi-s...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Tao Liu Biao Fan He Hu Xiao-Yong Du Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China School of Information Renmin University of China Beijing China
On the internet, all-round lawyer information is located at separated information sources, which prevent web users from effective information acquisition. In order to build a unified view of separated, heterogeneous, ... 详细信息
来源: 评论
Parallel Aggregation Queries over Star Schema: A Hierarchical Encoding Scheme and Efficient Percentile Computing as a Case
Parallel Aggregation Queries over Star Schema: A Hierarchica...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Xiongpai Qin Huiju Wang Xiaoyong Du Shan Wang Ministry of Education Key Laboratory of Data Engineering and Knowledge Engineering RUC Beijing China School of Information Renmin University of China Beijing China
Big data analysis is a main challenge we meet recently. Cloud computing is attracting more and more big data analysis applications, due to its well scalability and fault-tolerance. Some aggregation functions, like SUM... 详细信息
来源: 评论
Analysis of bandwagon and average hybrid attack model against trust-based recommender systems
Analysis of bandwagon and average hybrid attack model agains...
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Zhang, Fuguo School of Information and Technology Jiangxi University of Finance and Economics Nanchang China Institute of Information Resource Management Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
Recommender systems have been accepted as a vital application on the web by offering product advice or information that users might be interested in. Despite its success, similarity-based collaborative filtering suffe... 详细信息
来源: 评论
Managing Electronic Records in E-government:Current Trends and Future Directions Internationally
Managing Electronic Records in E-government:Current Trends a...
收藏 引用
International Conference on Management and Service Science(2011年第五届管理与服务科学国际会议 MASS 2011)
作者: Xiaomi An Wei Zhang Shuyang Sun Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of School of Information Resources Management Renmin University of China Beijing China
More and more literature has been written on electronic records management (ERM) in e-government in recent three years, however, much is limited to experiences of one country with more focus on electronic records mana... 详细信息
来源: 评论
A RFID Mixed Coding Scheme Based on Huffman Algorithm
A RFID Mixed Coding Scheme Based on Huffman Algorithm
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Jiang Jian Liao Guoqiong Wang Hao Wan Qizhi School of Information Technology Jiangxi university of Finance and Economics China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang Nanchang China
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is... 详细信息
来源: 评论
A decomposition method to solve the large-scale scheduling problems based on cellular manufacturing technology
A decomposition method to solve the large-scale scheduling p...
收藏 引用
International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC)
作者: Li Niu Xiaoting Han Data Engineering and Knowledge Engineering Key Laboratory School of Information Resource Management Renmin University of China Beijing China School of Economics and Management Beihang University Beijing China
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on large-scale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems... 详细信息
来源: 评论
A decomposition method to solve the large-scale scheduling problems based on cellular manufacturing technology
A decomposition method to solve the large-scale scheduling p...
收藏 引用
2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce, AIMSEC 2011
作者: Niu, Li Han, Xiaoting Data Engineering and Knowledge Engineering Key Laboratory School of Information Resource Management Renmin University of China Beijing China School of Economics and Management Beihang University Beijing China
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on largescale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems,... 详细信息
来源: 评论
Formal Analysis of Trusted Computing: One Case Study
Formal Analysis of Trusted Computing: One Case Study
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system.... 详细信息
来源: 评论
B-IRP: An Improving Integrity Report Protocol for Remote Attestation
B-IRP: An Improving Integrity Report Protocol for Remote Att...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re... 详细信息
来源: 评论