咨询与建议

限定检索结果

文献类型

  • 585 篇 会议
  • 456 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,044 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 649 篇 工学
    • 522 篇 计算机科学与技术...
    • 432 篇 软件工程
    • 157 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 63 篇 生物工程
    • 61 篇 电气工程
    • 39 篇 机械工程
    • 32 篇 电子科学与技术(可...
    • 32 篇 化学工程与技术
    • 32 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 20 篇 航空宇航科学与技...
    • 19 篇 交通运输工程
    • 18 篇 建筑学
    • 17 篇 光学工程
    • 15 篇 网络空间安全
  • 286 篇 管理学
    • 173 篇 图书情报与档案管...
    • 142 篇 管理科学与工程(可...
    • 46 篇 工商管理
  • 277 篇 理学
    • 165 篇 数学
    • 66 篇 生物学
    • 51 篇 物理学
    • 51 篇 统计学(可授理学、...
    • 35 篇 化学
    • 23 篇 系统科学
  • 43 篇 法学
    • 38 篇 社会学
  • 35 篇 医学
    • 30 篇 临床医学
    • 22 篇 基础医学(可授医学...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 55 篇 semantics
  • 42 篇 data mining
  • 38 篇 knowledge engine...
  • 34 篇 training
  • 25 篇 feature extracti...
  • 22 篇 data engineering
  • 21 篇 computational mo...
  • 20 篇 laboratories
  • 19 篇 conferences
  • 19 篇 big data
  • 19 篇 information retr...
  • 19 篇 data models
  • 18 篇 task analysis
  • 18 篇 knowledge manage...
  • 17 篇 visualization
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 query processing
  • 15 篇 knowledge graph
  • 15 篇 wireless sensor ...

机构

  • 151 篇 school of inform...
  • 104 篇 school of comput...
  • 53 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 26 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 22 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 school of econom...
  • 18 篇 school of inform...
  • 18 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 14 篇 key laboratory o...

作者

  • 48 篇 chen hong
  • 38 篇 wu xindong
  • 34 篇 du xiaoyong
  • 31 篇 wang meng
  • 30 篇 li cuiping
  • 28 篇 xindong wu
  • 28 篇 zhang jing
  • 28 篇 xiaoyong du
  • 26 篇 hong chen
  • 26 篇 wang shan
  • 24 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 huang qingming
  • 17 篇 meng wang
  • 17 篇 shan wang
  • 17 篇 li jiahui
  • 17 篇 wang jiacheng
  • 17 篇 xu qianqian

语言

  • 969 篇 英文
  • 52 篇 其他
  • 23 篇 中文
检索条件"机构=Laboratory of Data Engineering and Knowledge Engineering"
1044 条 记 录,以下是171-180 订阅
排序:
Efficient Duplicate Detection on Cloud Using a New Signature Scheme
Efficient Duplicate Detection on Cloud Using a New Signature...
收藏 引用
12th International Conference on Web-Age Information Management
作者: Rong, Chuitian Lu, Wei Du, Xiaoyong Zhang, Xiao Key Labs. of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China China Shanghai Key Laboratory of Intelligent Information Processing China
Duplicate detection has been well recognized as a crucial task to improve the quality of data. Related work on this problem mainly aims to propose efficient approaches over a single machine. However, with increasing v... 详细信息
来源: 评论
Access control of blockchain based on dual-policy attribute-based encryption  22
Access control of blockchain based on dual-policy attribute-...
收藏 引用
22nd IEEE International Conference on High Performance Computing and Communications, 18th IEEE International Conference on Smart City and 6th IEEE International Conference on data Science and Systems, HPCC-SmartCity-DSS 2020
作者: Han, Daojun Chen, Jinyu Zhang, Lei Shen, Yatian Wang, Xueheng Gao, Yihua Institute of Data and Knowledge Engineering School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing School of Computer and Information Engineering Kaifeng China
In scenarios where multiple parties such as the Internet of Things and Supply Chains participate in data sharing and computing, when accessing data, users not only need to accept the forward access control of the data... 详细信息
来源: 评论
Quality aware privacy protection for location-based services
收藏 引用
12th International Conference on database Systems for Advanced Applications, DASFAA 2007
作者: Zhen, Xiao Xiaofeng, Meng Jianliang, Xu School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering MOE Department of Computer Science Hong Kong Baptist University
Protection of users' privacy has been a central issue for location-based services (LBSs). In this paper, we classify two kinds of privacy protection requirements in LBS: location anonymity and identifier anonymity... 详细信息
来源: 评论
High Dynamic Collaborative Team Query via Multi-Fuzzy-Constrained Graph Pattern Matching  9
High Dynamic Collaborative Team Query via Multi-Fuzzy-Constr...
收藏 引用
9th International Conference on Cloud Computing and Big data Analytics, ICCCBDA 2024
作者: Hu, Tao Zhang, Zan Bu, Chenyang Li, Lei Key Laboratory of Knowledge Engineering with Big Data The Ministry of Education of China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Graph pattern matching is a technique widely used in various fields such as protein structure analysis, social group querying, and expert localization. This technique involves finding matching subgraphs in large socia... 详细信息
来源: 评论
RGB-D SLAM Method Based on Feature Association in Dynamic Environment  6
RGB-D SLAM Method Based on Feature Association in Dynamic En...
收藏 引用
6th Asian Conference on Artificial Intelligence Technology, ACAIT 2022
作者: Fang, Baofu Wang, Hao Wang, Hao Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology School of Computer Science and Information Engineering Hefei China
Simultaneous localization and mapping (SLAM) is one of the current research hotspots. However, in visual SLAM for dynamic environments, inaccurate detection of object motion states and incomplete dynamic region cullin... 详细信息
来源: 评论
Semantic SLAM Based on Compensated Segmentation and Geometric Constraints in Dynamic Environments  6
Semantic SLAM Based on Compensated Segmentation and Geometri...
收藏 引用
6th Asian Conference on Artificial Intelligence Technology, ACAIT 2022
作者: Fang, Baofu Zhou, Shuai Wang, Hao Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology School of Computer Science and Information Engineering Hefei China
Most of the existing slam algorithms are designed based on the assumption of a static environment, this strong assumption limits the practical application of most slam systems. The main reason is that moving objects w... 详细信息
来源: 评论
HDROP: Detecting ROP attacks using performance monitoring counters
HDROP: Detecting ROP attacks using performance monitoring co...
收藏 引用
10th International Conference on Information Security Practice and Experience, ISPEC 2014
作者: Zhou, Hongwei Wu, Xin Shi, Wenchang Yuan, Jinhui Liang, Bin Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Information Engineering University Zhengzhou China
Combining short instruction sequences originated only from existing code pieces, Return Oriented Programming (ROP) attacks can bypass the code-integrity effort model. To defeat this kind of attacks, current approaches... 详细信息
来源: 评论
Cluster labeling extraction and ranking feature selection for high quality XML pseudo relevance feedback fragments set
Cluster labeling extraction and ranking feature selection fo...
收藏 引用
9th International Conference on Advanced data Mining and Applications, ADMA 2013
作者: Zhong, Minjuan Wan, Changxuan Liu, Dexi Liao, Shumei Luo, Siwen School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
In traditional pseudo feedback, the main reason of the topic drift is the low quality of the feedback source. Clustering search results is an effective way to improve the quality of feedback set. For XML data, how to ... 详细信息
来源: 评论
Factor decomposition of regional carbon emissions from energy consumption for China
Factor decomposition of regional carbon emissions from energ...
收藏 引用
3rd International Conference on Energy and Environmental Protection, ICEEP 2014
作者: Qi, Ya-Wei School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
This paper calculates the carbon emissions from energy consumption of 30 provinces in China through 2000-2010, and research correlation of factors such as regional economic gap and regional characteristics of carbon e... 详细信息
来源: 评论
Research on government information sharing model using blockchain technology  10
Research on government information sharing model using block...
收藏 引用
10th International Conference on Information Technology in Medicine and Education, ITME 2019
作者: Zhang, Yiwei Deng, Sanhong Zhang, Yue Kong, Jia School of Information Management Nanjing University Jiangsu Key Laboratory of Data Engineering and Knowledge Service. Nanjing China
Research Purpose: The distributed, traceable and security of blockchain technology are applicable to the construction of new government information resource models, which could eliminate the barn effect and trust in g... 详细信息
来源: 评论