咨询与建议

限定检索结果

文献类型

  • 585 篇 会议
  • 456 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,044 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 649 篇 工学
    • 522 篇 计算机科学与技术...
    • 432 篇 软件工程
    • 157 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 63 篇 生物工程
    • 61 篇 电气工程
    • 39 篇 机械工程
    • 32 篇 电子科学与技术(可...
    • 32 篇 化学工程与技术
    • 32 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 20 篇 航空宇航科学与技...
    • 19 篇 交通运输工程
    • 18 篇 建筑学
    • 17 篇 光学工程
    • 15 篇 网络空间安全
  • 286 篇 管理学
    • 173 篇 图书情报与档案管...
    • 142 篇 管理科学与工程(可...
    • 46 篇 工商管理
  • 277 篇 理学
    • 165 篇 数学
    • 66 篇 生物学
    • 51 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 35 篇 化学
    • 23 篇 系统科学
  • 43 篇 法学
    • 38 篇 社会学
  • 35 篇 医学
    • 30 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 55 篇 semantics
  • 42 篇 data mining
  • 38 篇 knowledge engine...
  • 34 篇 training
  • 25 篇 feature extracti...
  • 22 篇 data engineering
  • 21 篇 computational mo...
  • 20 篇 laboratories
  • 19 篇 conferences
  • 19 篇 big data
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 task analysis
  • 18 篇 knowledge manage...
  • 17 篇 visualization
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 query processing
  • 15 篇 knowledge graph
  • 15 篇 wireless sensor ...

机构

  • 151 篇 school of inform...
  • 104 篇 school of comput...
  • 53 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 26 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 22 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 school of econom...
  • 18 篇 school of inform...
  • 18 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 14 篇 key laboratory o...

作者

  • 48 篇 chen hong
  • 38 篇 wu xindong
  • 34 篇 du xiaoyong
  • 31 篇 wang meng
  • 30 篇 li cuiping
  • 28 篇 xindong wu
  • 28 篇 zhang jing
  • 28 篇 xiaoyong du
  • 26 篇 hong chen
  • 26 篇 wang shan
  • 24 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 huang qingming
  • 17 篇 meng wang
  • 17 篇 shan wang
  • 17 篇 li jiahui
  • 17 篇 wang jiacheng
  • 17 篇 xu qianqian

语言

  • 969 篇 英文
  • 52 篇 其他
  • 23 篇 中文
检索条件"机构=Knowledge and Data Engineering Laboratory"
1044 条 记 录,以下是171-180 订阅
排序:
LOB: Bucket based index for range queries
LOB: Bucket based index for range queries
收藏 引用
9th International Conference on Web-Age Information Management, WAIM 2008
作者: Wang, Jieping Du, Xiaoyong Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
database-as-a-Service is a promising data management paradigm in which data is encrypted before being sent to the untrusted server. Efficient querying on encrypted data is a performance critical problem which has vari... 详细信息
来源: 评论
FARP: Mining fuzzy association rules from a probabilistic quantitative database
FARP: Mining fuzzy association rules from a probabilistic qu...
收藏 引用
作者: Pei, Bin Zhao, Suyun Chen, Hong Zhou, Xuan Chen, Dingjie Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Current studies on association rule mining focus on finding Boolean/quantitative association rules from certain databases or Boolean association rules from probabilistic databases. However, little work on mining assoc... 详细信息
来源: 评论
Fault-tolerant routing: κ-inconnected many-to-one routing in wireless networks
Fault-tolerant routing: κ-inconnected many-to-one routing i...
收藏 引用
3rd International Conference on Combinatorial Optimization and Applications, COCOA 2009
作者: Li, Deying Zhu, Qinghua Yang, Huiqiang School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE China
This paper addresses the problem of fault-tolerant many-to-one routing in static wireless networks with asymmetric links, which is important in both theoretical and practical aspects. The problem is to find a minimum ... 详细信息
来源: 评论
Joint user profiling with hierarchical attention networks
收藏 引用
Frontiers of Computer Science 2023年 第3期17卷 133-143页
作者: Xiaojian LIU Yi ZHU Xindong WU Key Laboratory of Knowledge Engineering with Big Data(Hefei University of Technology) Ministry of EducationHefei 230009China School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230009China School of Information Engineering Yangzhou UniversityYangzhou 225009China Mininglamp Academy of Sciences MininglampBeijing 100193China
User profiling by inferring user personality traits,such as age and gender,plays an increasingly important role in many real-world *** existing methods for user profiling either use only one type of data or ignore han... 详细信息
来源: 评论
A hybrid approach for performance assessment in mobile commerce
A hybrid approach for performance assessment in mobile comme...
收藏 引用
International Conference on Control engineering and Information System, ICCEIS 2014
作者: Liu, W. Jiangxi Key Laboratory of Data and Knowledge Engineering Institute of Information Resources Management Jiangxi University of Finance and Economics Nanchang China
This paper proposes an effective fusion of Analytic Hierarchy Process (AHP) and Grey Relational Analysis (GRA) approach for the risk evaluation in Mobile Commerce (MC) development. The hybrid method employs the comple... 详细信息
来源: 评论
Constructing corpus for query-oriented XML text summarization
Constructing corpus for query-oriented XML text summarizatio...
收藏 引用
International Conference on Management of E-Commerce and E-Goverment
作者: Wu, Shihan Liu, Dexi Jiao, Xianpei Jiangxi Key Laboratory of Data and Knowledge Engineering School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China
XML Retrieval is becoming the focus study of the field of Information Retrieval and database. Summarization of the results which come from the XML search engines will alleviate the read burden of user's. However, ... 详细信息
来源: 评论
Efficient Duplicate Detection on Cloud Using a New Signature Scheme
Efficient Duplicate Detection on Cloud Using a New Signature...
收藏 引用
12th International Conference on Web-Age Information Management
作者: Rong, Chuitian Lu, Wei Du, Xiaoyong Zhang, Xiao Key Labs. of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China China Shanghai Key Laboratory of Intelligent Information Processing China
Duplicate detection has been well recognized as a crucial task to improve the quality of data. Related work on this problem mainly aims to propose efficient approaches over a single machine. However, with increasing v... 详细信息
来源: 评论
Scalable process modeling based on net synthesis under cloud computing environment
Scalable process modeling based on net synthesis under cloud...
收藏 引用
2011 IEEE International Conference on Granular Computing, GrC 2011
作者: Zhou, Jiantao Liang, Rong Wang, Yan College of Computer Science Inner Mongolia University Hohhot China Key Laboratory of Data Mining and Knowledge Engineering Hohhot China
Recently research on modeling methods of complicated processes under complex network environments has become a focus in workflow field. Now cloud computing environment provides a specific application background for th... 详细信息
来源: 评论
Identifying Scientific and Technical“Unicorns”
收藏 引用
Journal of data and Information Science 2021年 第2期6卷 96-115页
作者: Lucy L.Xu Miao Qi Fred Y.Ye Jiangsu Key Laboratory of Data Engineering and Knowledge Service School of Information ManagementNanjing UniversityNanjing 210023China University Library Nantong UniversityNantong 226019China
Purpose:Using the metaphor of"unicorn,"we identify the scientific papers and technical patents characterized by the informetric feature of very high citations in the first ten years after publishing,which ma... 详细信息
来源: 评论
Quality aware privacy protection for location-based services
收藏 引用
12th International Conference on database Systems for Advanced Applications, DASFAA 2007
作者: Zhen, Xiao Xiaofeng, Meng Jianliang, Xu School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering MOE Department of Computer Science Hong Kong Baptist University
Protection of users' privacy has been a central issue for location-based services (LBSs). In this paper, we classify two kinds of privacy protection requirements in LBS: location anonymity and identifier anonymity... 详细信息
来源: 评论