咨询与建议

限定检索结果

文献类型

  • 583 篇 会议
  • 443 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 513 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 148 篇 信息与通信工程
    • 68 篇 控制科学与工程
    • 63 篇 生物工程
    • 51 篇 电气工程
    • 36 篇 机械工程
    • 32 篇 电子科学与技术(可...
    • 32 篇 化学工程与技术
    • 31 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 19 篇 航空宇航科学与技...
    • 18 篇 建筑学
    • 16 篇 光学工程
    • 15 篇 交通运输工程
  • 280 篇 管理学
    • 167 篇 图书情报与档案管...
    • 138 篇 管理科学与工程(可...
    • 46 篇 工商管理
  • 270 篇 理学
    • 159 篇 数学
    • 65 篇 生物学
    • 50 篇 物理学
    • 47 篇 统计学(可授理学、...
    • 35 篇 化学
    • 23 篇 系统科学
  • 43 篇 法学
    • 38 篇 社会学
  • 34 篇 医学
    • 30 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 14 篇 药学(可授医学、理...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 54 篇 semantics
  • 41 篇 data mining
  • 38 篇 knowledge engine...
  • 33 篇 training
  • 23 篇 feature extracti...
  • 22 篇 data engineering
  • 21 篇 computational mo...
  • 20 篇 laboratories
  • 19 篇 conferences
  • 19 篇 big data
  • 19 篇 information retr...
  • 18 篇 task analysis
  • 18 篇 knowledge manage...
  • 18 篇 data models
  • 17 篇 visualization
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 query processing
  • 15 篇 wireless sensor ...
  • 14 篇 knowledge graph

机构

  • 151 篇 school of inform...
  • 104 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 22 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 school of econom...
  • 18 篇 school of inform...
  • 18 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 14 篇 key laboratory o...

作者

  • 48 篇 chen hong
  • 35 篇 wu xindong
  • 34 篇 du xiaoyong
  • 31 篇 wang meng
  • 30 篇 li cuiping
  • 28 篇 zhang jing
  • 28 篇 xiaoyong du
  • 26 篇 xindong wu
  • 26 篇 wang shan
  • 24 篇 hong chen
  • 23 篇 sun geng
  • 20 篇 niyato dusit
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 huang qingming
  • 17 篇 meng wang
  • 17 篇 shan wang
  • 17 篇 xu qianqian
  • 17 篇 wan changxuan
  • 16 篇 xuegang hu

语言

  • 959 篇 英文
  • 47 篇 其他
  • 23 篇 中文
检索条件"机构=Knowledge and Data Engineering Laboratory"
1029 条 记 录,以下是271-280 订阅
排序:
EFFICIENT COMPUTATIONS OF LINK-BASED SIMILARITY MEASURES ON THE GPU
EFFICIENT COMPUTATIONS OF LINK-BASED SIMILARITY MEASURES ON ...
收藏 引用
2012 3rd IEEE International Conference on Network Infrastructure and Digital Content
作者: Yong-Yeon Jo Duck-Ho Bae Sang-Wook Kim Data and Knowledge Engineering Laboratory Hanyang University SeoulKorea
In this paper,we first analyze how the characteristics of the GPU affect the performance of link-based similarity *** on the analysis,we describe our strategies to improve the performance of link-based similarity meas... 详细信息
来源: 评论
B-IRP: An improving integrity report protocol for remote attestation
B-IRP: An improving integrity report protocol for remote att...
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re... 详细信息
来源: 评论
Formal analysis of trusted computing: One case study
Formal analysis of trusted computing: One case study
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. W... 详细信息
来源: 评论
Opportunities and challenges faced by digital libraries in the big data era
收藏 引用
Journal of Library Science in China 2016年 5-16页
作者: SU Xinning School of Information Management Jiangsu Key Laboratory of Data Engineering and Knowledge Services Nanjing University
Construction of network-based academic resources is undergoing rapid development in this big data era, displaying a trend to replace digital libraries. This challenge calls for the construction of digital libraries to...
来源: 评论
J+-tree: A new index structure in main memory
收藏 引用
12th International Conference on database Systems for Advanced Applications, DASFAA 2007
作者: Luan, Hua Du, Xiaoyong Wang, Shan Ni, Yongzhi Chen, Qiming School of Information Renmin University of China Beijing China Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing China HP Labs. China Beijing China
As the memory capacity increases and the hardware becomes cheaper, main memory databases (MMDB) have come true and been used in more and more applications, because they can provide better response time and throughputs... 详细信息
来源: 评论
Randomly Sampling based Fuzzy Rough Reduction
Randomly Sampling based Fuzzy Rough Reduction
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Yu Chen Suyun Zhao Hong Chen Key Laboratory of Data Engineering and Knowledge (Renmin University of China)
Now most methods of the existing fuzzy rough based attribute reduction can't be applied to large scale data sets because of high time and space consuming. To overcome this problem, we proposed a randomly sampling ... 详细信息
来源: 评论
SEED: Entity oriented information search and exploration  22
SEED: Entity oriented information search and exploration
收藏 引用
22nd International Conference on Intelligent User Interfaces, IUI 2017
作者: Chen, Jun Jacucci, Giulio Chen, Yueguo Ruotsalo, Tuukka School of Information Renmin University of China China Key Laboratory of Data Engineering and Knowledge Engineering MOE China Helsinki Institute for Information Technology HIIT Department of Computer Science University of Helsinki Finland
Entity search and exploration can enrich search user interfaces by presenting relevant information instantly and offering relevant exploration pointers to users. Previous research has demonstrated that large knowledge... 详细信息
来源: 评论
An integration management system for managing business continuity, records and knowledge
An integration management system for managing business conti...
收藏 引用
International Forum on Information Technology and Applications
作者: An, Xiaomi Chao, Lemen Ye, Liuqi Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Renmin University of China Beijing 100872 China Economic Management School Beijing Institute of Petrol-chemical Technology Beijing 102617 China
Developing an integration management system for business continuity, records and knowledge (IMS of BRK) is beneficial to the collaboration, optimization and innovation of business continuity management system (BCMS), ... 详细信息
来源: 评论
Embodiment and interaction guidelines for designing credible, trustworthy embodied conversational agents
收藏 引用
4th International Workshop on Intelligent Virtual Agents, IVA 2003
作者: Cowell, Andrew J. Stanney, Kay M. Data and Knowledge Engineering Pacific Northwest National Laboratory RichlandWA99352 United States Department of Industrial Engineering and Management Systems University of Central Florida OrlandoFL32816 United States
This paper discusses our recent studies on Embodied Conversational Agent (ECA) design strategies to encourage credible and trustworthy dialogue. We approach the problem from two specific directions: the embodiment tha... 详细信息
来源: 评论
Safe side effects commitment for OS-level virtualization  11
Safe side effects commitment for OS-level virtualization
收藏 引用
Proceedings of the 8th ACM international conference on Autonomic computing
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Meng, Xiaofeng Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing China Stony Brook University Stony Brook NY United States Industrial Technology Research Institute Taiwan
A common application of virtual machines (VM) is to use and then throw away, basically treating a VM like a completely isolated and disposable entity. The disadvantage of this approach is that if there is no malicious... 详细信息
来源: 评论