咨询与建议

限定检索结果

文献类型

  • 635 篇 会议
  • 476 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,115 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 724 篇 工学
    • 592 篇 计算机科学与技术...
    • 482 篇 软件工程
    • 174 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 67 篇 生物工程
    • 65 篇 电气工程
    • 39 篇 机械工程
    • 39 篇 电子科学与技术(可...
    • 37 篇 化学工程与技术
    • 30 篇 生物医学工程(可授...
    • 23 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 21 篇 交通运输工程
    • 19 篇 光学工程
    • 19 篇 建筑学
    • 18 篇 航空宇航科学与技...
    • 16 篇 网络空间安全
  • 308 篇 管理学
    • 190 篇 图书情报与档案管...
    • 150 篇 管理科学与工程(可...
    • 49 篇 工商管理
  • 298 篇 理学
    • 182 篇 数学
    • 68 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 52 篇 物理学
    • 41 篇 化学
    • 21 篇 系统科学
  • 39 篇 法学
    • 33 篇 社会学
  • 29 篇 医学
    • 26 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 21 篇 经济学
    • 21 篇 应用经济学
  • 7 篇 教育学
  • 6 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 62 篇 semantics
  • 39 篇 knowledge engine...
  • 38 篇 data mining
  • 31 篇 training
  • 26 篇 feature extracti...
  • 23 篇 data engineering
  • 20 篇 xml
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 20 篇 information retr...
  • 19 篇 conferences
  • 19 篇 big data
  • 19 篇 data models
  • 18 篇 task analysis
  • 17 篇 visualization
  • 17 篇 databases
  • 16 篇 knowledge manage...
  • 15 篇 search engines
  • 15 篇 knowledge graph
  • 15 篇 algorithm design...

机构

  • 195 篇 school of inform...
  • 105 篇 school of comput...
  • 54 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 33 篇 school of inform...
  • 32 篇 jiangxi key labo...
  • 31 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 28 篇 department of ma...
  • 26 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 24 篇 school of econom...
  • 23 篇 key laboratory o...
  • 21 篇 school of inform...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...

作者

  • 71 篇 du xiaoyong
  • 60 篇 chen hong
  • 38 篇 li cuiping
  • 38 篇 xiaoyong du
  • 37 篇 wu xindong
  • 33 篇 he jun
  • 33 篇 wang meng
  • 31 篇 liu hongyan
  • 31 篇 hong chen
  • 30 篇 li xirong
  • 29 篇 wang shan
  • 28 篇 xindong wu
  • 28 篇 zhang jing
  • 24 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 huang qingming
  • 19 篇 hong richang
  • 18 篇 shan wang
  • 18 篇 liu jun
  • 18 篇 xu qianqian

语言

  • 1,039 篇 英文
  • 52 篇 其他
  • 24 篇 中文
检索条件"机构=Key Labs of Data Engineering and Knowledge Engineering"
1115 条 记 录,以下是951-960 订阅
排序:
Adaptive Loose Optimization for Robust Question Answering
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Jie Wang, Pinghui Wang, Zewei Kong, Dechen Hu, Min Han, Ting Liu, Jun The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The China Mobile Research Institute China The Shannxi Provincial Key Laboratory of Big Data Knowledge Engineering School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China
Question answering methods are well-known for leveraging data bias, such as the language prior in visual question answering and the position bias in machine reading comprehension (extractive question answering). Curre... 详细信息
来源: 评论
Milling of multi-relational association rules
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2007年 第11期18卷 2752-2765页
作者: He, Jun Liu, Hong-Yan Du, Xiao-Yong Department of Computer Science and Technology Renmin University of China Beijing 100872 China Department of Management Science and Engineering Tsinghua University Beijing 100084 China Key Laboratory of Data Engineering and Knowledge Engineering Beijing 100872 China
Association rule mining is one of the most important and basic technique in data mining, which has been studied extensively and has a wide range of applications. However, as traditional data mining algorithms usually ... 详细信息
来源: 评论
QGEval: Benchmarking Multi-dimensional Evaluation for Question Generation
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Weiping Wei, Bifan Hu, Jianxiang Cai, Zhongmin Liu, Jun School of Computer Science and Technology Xi’an Jiaotong University Xi’an China School of Continuing Education Xi’an Jiaotong University Xi’an China MOE KLINNS Lab School of Automation Science and Engineering Xi’an Jiaotong University Xi’an China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an China
Automatically generated questions often suffer from problems such as unclear expression or factual inaccuracies, requiring a reliable and comprehensive evaluation of their quality. Human evaluation is widely used in t... 详细信息
来源: 评论
Visible Thermal Person Re-Identification Via Multi-Branch Modality Residual Complementary Learning
SSRN
收藏 引用
SSRN 2024年
作者: Chen, Long Sun, Rui Yu, Yiheng Du, Yun Zhang, Xudong Key Laboratory of Knowledge Engineering with Big Data Ministry of Education School of Computer and Information Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei University of Technology Hefei230009 China The School of Computer and Information Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei University of Technology Hefei230009 China
Visible-thermal Person Re-identification (VT Re-ID) is a challenging task in all-weather surveillance system. Existing methods focus on extracting the modality-shared features, ignoring the discriminative inter-modali... 详细信息
来源: 评论
ViGT: Proposal-free Video Grounding with Learnable Token in Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Li, Kun Guo, Dan Wang, Meng School of Computer Science and Information Engineering Hefei University of Technology Hefei230601 China Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Hefei230601 China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230601 China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei230088 China
The video grounding (VG) task aims to locate the queried action or event in an untrimmed video based on rich linguistic descriptions. Existing proposal-free methods are trapped in complex interaction between video and... 详细信息
来源: 评论
Towards efficient local causal structure learning
arXiv
收藏 引用
arXiv 2021年
作者: Yang, Shuai Wang, Hao Yu, Kui Cao, Fuyuan Wu, Xindong The School of Computer Science and Information Engineering Hefei University of Technology Hefei230601 China The School of Computer and Information Technology Shanxi University Taiyuan030006 China The Key Laboratory of Knowledge Engineering With Big Data Ministry of Education Hefei University of Technology Hefei230601 China Mininglamp Academy of Sciences Mininglamp Technology Beijing100102 China
Local causal structure learning aims to discover and distinguish direct causes (parents) and direct effects (children) of a variable of interest from data. While emerging successes have been made, existing methods nee... 详细信息
来源: 评论
Computationally Efficient Approximations for Matrix-based Rényi's Entropy
arXiv
收藏 引用
arXiv 2021年
作者: Gong, Tieliang Dong, Yuxin Yu, Shujian Dong, Bo The School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering Xi’an710049 China The Machine Learning Group UiT - The Arctic University of Norway Department of Computer Science Vrije University Amsterdam Amsterdam Netherlands
The recently developed matrix-based Rényi's αorder entropy enables measurement of information in data simply using the eigenspectrum of symmetric positive semi-definite (PSD) matrices in reproducing kernel H... 详细信息
来源: 评论
Dual UAV Cluster-Assisted Maritime Physical Layer Secure Communications via Collaborative Beamforming
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Jiawei Wang, Aimin Sun, Geng Li, Jiahui Wang, Jiacheng Du, Hongyang Niyato, Dusit College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore Department of Electrical and Electronic Engineering Hong Kong University 999077 Hong Kong
Unmanned aerial vehicles (UAVs) can be utilized as relay platforms to assist maritime wireless communications. However, complex channels and multipath effects at sea can adversely affect the quality of UAV transmitted... 详细信息
来源: 评论
Estimating Noisy Class Posterior with Part-level Labels for Noisy Label Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Rui Shi, Bin Ruan, Jianfei Pan, Tianze Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University China Shaanxi Province Key Lab of Big Data Knowledge Engineering Xi’an Jiaotong University China School of Physics Xi’an Jiaotong University China School of Distance Education Xi’an Jiaotong University China
In noisy label learning, estimating noisy class posteriors plays a fundamental role for developing consistent classifiers, as it forms the basis for estimating clean class posteriors and the transition matrix. Existin... 详细信息
来源: 评论
Studies and implementation of the trusted process mechanism in a secure operating system
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2010年 第SUPPL. 1期50卷 1547-1553页
作者: Zhang, Chongbin Li, Fengjuan Liang, Bin China Information Technology Security Evaluation Center Beijing 100085 China Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renming University of China Beijing 100872 China
The trusted process mechanism is an important part of the operating system security mechanism, but there is no uniform definition of the trusted process and there are some limitations in understanding its fundamental ... 详细信息
来源: 评论