咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 799 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,376 篇 工学
    • 1,139 篇 计算机科学与技术...
    • 946 篇 软件工程
    • 257 篇 信息与通信工程
    • 142 篇 生物工程
    • 135 篇 控制科学与工程
    • 99 篇 电气工程
    • 76 篇 生物医学工程(可授...
    • 73 篇 建筑学
    • 68 篇 电子科学与技术(可...
    • 60 篇 土木工程
    • 59 篇 机械工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 33 篇 动力工程及工程热...
    • 31 篇 仪器科学与技术
    • 26 篇 交通运输工程
  • 617 篇 理学
    • 369 篇 数学
    • 149 篇 生物学
    • 131 篇 统计学(可授理学、...
    • 116 篇 物理学
    • 71 篇 系统科学
    • 61 篇 化学
  • 560 篇 管理学
    • 366 篇 图书情报与档案管...
    • 231 篇 管理科学与工程(可...
    • 88 篇 工商管理
  • 80 篇 医学
    • 73 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 42 篇 药学(可授医学、理...
  • 67 篇 法学
    • 61 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 24 篇 教育学
  • 15 篇 农学
  • 8 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 97 篇 semantics
  • 92 篇 data mining
  • 79 篇 knowledge engine...
  • 61 篇 data engineering
  • 53 篇 training
  • 43 篇 knowledge manage...
  • 39 篇 feature extracti...
  • 37 篇 ontologies
  • 35 篇 data models
  • 34 篇 artificial intel...
  • 32 篇 educational inst...
  • 32 篇 computational mo...
  • 32 篇 ontology
  • 31 篇 visualization
  • 31 篇 information retr...
  • 30 篇 machine learning
  • 29 篇 databases
  • 28 篇 computer science
  • 28 篇 conferences
  • 27 篇 xml

机构

  • 196 篇 school of inform...
  • 105 篇 school of comput...
  • 56 篇 department of da...
  • 56 篇 department of da...
  • 50 篇 key laboratory o...
  • 50 篇 key laboratory o...
  • 49 篇 institute of dat...
  • 35 篇 knowledge and da...
  • 34 篇 college of compu...
  • 33 篇 school of inform...
  • 32 篇 jiangxi key labo...
  • 30 篇 key laboratory o...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 27 篇 department of ma...
  • 25 篇 key laboratory o...
  • 24 篇 school of econom...
  • 24 篇 knowledge and da...
  • 22 篇 knowledge and da...
  • 22 篇 knowledge & data...

作者

  • 75 篇 stumme gerd
  • 70 篇 du xiaoyong
  • 62 篇 chen hong
  • 59 篇 nürnberger andre...
  • 41 篇 li cuiping
  • 41 篇 hanika tom
  • 37 篇 xiaoyong du
  • 34 篇 wu xindong
  • 34 篇 atzmueller marti...
  • 33 篇 he jun
  • 33 篇 wade vincent
  • 32 篇 wang meng
  • 32 篇 hotho andreas
  • 31 篇 liu hongyan
  • 30 篇 li xirong
  • 29 篇 hong chen
  • 29 篇 wang shan
  • 28 篇 zhang jing
  • 27 篇 xindong wu
  • 27 篇 o'sullivan decla...

语言

  • 1,990 篇 英文
  • 95 篇 其他
  • 34 篇 中文
  • 4 篇 德文
检索条件"机构=Knowledge and Data Engineering"
2123 条 记 录,以下是711-720 订阅
排序:
Synthetic Instance Segmentation from Semantic Image Segmentation Masks
arXiv
收藏 引用
arXiv 2023年
作者: Shen, Yuchen Zhang, Dong Zhang, Zhao Fu, Liyong Ye, Qiaolin College of Information Science and Technology & Artificial Intelligence Nanjing Forestry University Jiangsu Nanjing210037 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei230009 China College of Information Science and Technology Nanjing Forestry University Jiangsu Nanjing210037 China Institute of Forest Resource Information Techniques Chinese Academy of Forestry Beijing100091 China
In recent years, instance segmentation has garnered significant attention across various applications. However, training a fully-supervised instance segmentation model requires costly both instance-level and pixel-lev... 详细信息
来源: 评论
ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection
arXiv
收藏 引用
arXiv 2023年
作者: He, Junwei Xu, Qianqian Jiang, Yangbangyan Wang, Zitai Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
Graph anomaly detection is crucial for identifying nodes that deviate from regular behavior within graphs, benefiting various domains such as fraud detection and social network. Although existing reconstruction-based ... 详细信息
来源: 评论
An empirical examination of balancing strategy for counterfactual estimation on time series  24
An empirical examination of balancing strategy for counterfa...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Qiang Huang Chuizheng Meng Defu Cao Biwei Huang Yi Chang Yan Liu School of Artificial Intelligence and International Center of Future Science Jilin University Changchun Jilin China Department of Computer Science University of Southern California California Los Angeles Halicioğlu Data Science Institute University of California San Diego San Diego California School of Artificial Intelligence and International Center of Future Science Jilin University Changchun Jilin China and Engineering Research Center of Knowledge-Driven Human-Machine Intelligence MOE Changchun Jilin China
Counterfactual estimation from observations represents a critical endeavor in numerous application fields, such as healthcare and finance, with the primary challenge being the mitigation of treatment bias. The balanci...
来源: 评论
Causal structure learning of nonlinear additive noise model based on streaming feature
Causal structure learning of nonlinear additive noise model ...
收藏 引用
IEEE International Conference on data Mining Workshops (ICDM Workshops)
作者: Jing Yang Gaojin Fan Anbo Shen Aiguo Wang Ministry of Education Key Laboratory of Knowledge Engineering With Big Data(Hefei University of Technology) School of Computer Science and Information Engineering Hefei University of Technology Hefei P. R. China School of Electronic and Information Engineering Foshan University China
The current streaming feature structure learning needs to be improved in the processing of nonlinear continuous data and the dynamic acquisition of causal structures. In this paper, we propose a causal structure learn... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
arXiv
收藏 引用
arXiv 2024年
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong The School of Computer Science and Technology The Ministry of Education Key Laboratory of Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China SGIT AI Lab State Grid Shaanxi Electric Power Company Limited State Grid Corporation of China Shaanxi China The School of Information Science and Technology University of Science and Technology China United Arab Emirates The Baidu Inc China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
Design of Wireless data Center Network Structure Based on ExCCC-DCN  6th
Design of Wireless Data Center Network Structure Based on Ex...
收藏 引用
6th International Conference on data Science, ICDS 2019
作者: Jing, Yanhao Han, Zhijie Du, Xiaoyu Zhang, Qingfang School of Computer and Information Engineering Henan University KaifengHenan475004 China Institute of Data and Knowledge Engineering Henan University KaifengHenan475004 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Network NanjingJiangsu210003 China
A data center is a cluster of servers, which is typically an organic collection of tens of thousands of servers. The sheer number of servers determines how well its performance is related to how it is interconnected. ... 详细信息
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
A lightweight identity authentication scheme for UAV and road base stations  2020
A lightweight identity authentication scheme for UAV and roa...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
作者: Yinyin Li Xiaoyu Du Sufang Zhou International Joint Research Laboratory for Cooperative Vehicular Networks of Henan Kaifeng Henan University Kaifeng Henan School of Computer and Information Engineering Henan University Kaifeng Henan Institute of Data and Knowledge Engineering Henan University Kaifeng Henan
At present, unmanned aerial vehicles (UAVs) have been widely used in civilian fields (such as smart cities). However, the external environment of the UAV network is complex and computing resources are limited, so it i... 详细信息
来源: 评论
Mapping Usability Heuristics to Medical Ethical Principles in Clinical Decision Support Design
收藏 引用
Proceedings of the International Symposium on Human Factors and Ergonomics in Health Care 2021年 第1期10卷 54 - 58页
作者: Tim Arnold Helen J.A. Fuller Scott D. Wood Human Factors Engineering Clinical Informatics and Data Management Office of Health Informatics Veterans Health Administration Washington DC USAUniversity of Michigan College of Pharmacy Ann Arbor USA Human Factors Engineering Clinical Informatics and Data Management Office of Health Informatics Veterans Health Administration Washington DC USA Knowledge Based Systems Clinical Informatics and Data Management Office of Health Informatics Veterans Health Administration Washington DC USA
Human factors professionals voice concerns about the slow and uneven adoption of human-centered design (HCD) principles in healthcare. With good intentions and best efforts, human factors work in healthcare continues,...
来源: 评论