咨询与建议

限定检索结果

文献类型

  • 585 篇 会议
  • 446 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,034 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 637 篇 工学
    • 514 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 148 篇 信息与通信工程
    • 68 篇 控制科学与工程
    • 63 篇 生物工程
    • 51 篇 电气工程
    • 36 篇 机械工程
    • 32 篇 电子科学与技术(可...
    • 32 篇 化学工程与技术
    • 32 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 19 篇 航空宇航科学与技...
    • 18 篇 建筑学
    • 16 篇 光学工程
    • 15 篇 交通运输工程
  • 280 篇 管理学
    • 167 篇 图书情报与档案管...
    • 138 篇 管理科学与工程(可...
    • 46 篇 工商管理
  • 271 篇 理学
    • 159 篇 数学
    • 65 篇 生物学
    • 50 篇 物理学
    • 47 篇 统计学(可授理学、...
    • 35 篇 化学
    • 24 篇 系统科学
  • 43 篇 法学
    • 38 篇 社会学
  • 35 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 14 篇 药学(可授医学、理...
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 54 篇 semantics
  • 41 篇 data mining
  • 38 篇 knowledge engine...
  • 33 篇 training
  • 23 篇 feature extracti...
  • 22 篇 data engineering
  • 21 篇 computational mo...
  • 20 篇 laboratories
  • 19 篇 conferences
  • 19 篇 big data
  • 19 篇 information retr...
  • 18 篇 task analysis
  • 18 篇 knowledge manage...
  • 18 篇 data models
  • 17 篇 visualization
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 query processing
  • 15 篇 wireless sensor ...
  • 14 篇 knowledge graph

机构

  • 151 篇 school of inform...
  • 104 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 22 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 school of econom...
  • 18 篇 school of inform...
  • 18 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 14 篇 key laboratory o...

作者

  • 48 篇 chen hong
  • 35 篇 wu xindong
  • 34 篇 du xiaoyong
  • 31 篇 wang meng
  • 30 篇 li cuiping
  • 28 篇 zhang jing
  • 28 篇 xiaoyong du
  • 26 篇 xindong wu
  • 26 篇 wang shan
  • 24 篇 hong chen
  • 23 篇 sun geng
  • 20 篇 niyato dusit
  • 19 篇 hong richang
  • 18 篇 liu jun
  • 18 篇 huang qingming
  • 17 篇 meng wang
  • 17 篇 shan wang
  • 17 篇 xu qianqian
  • 17 篇 wan changxuan
  • 16 篇 xuegang hu

语言

  • 964 篇 英文
  • 47 篇 其他
  • 23 篇 中文
检索条件"机构=Laboratory of Data Engineering and Knowledge Engineering"
1034 条 记 录,以下是821-830 订阅
排序:
Virtualizing system and ordinary services in Windows-based OS-level virtual machines  11
Virtualizing system and ordinary services in Windows-based O...
收藏 引用
Proceedings of the 2011 ACM Symposium on Applied Computing
作者: Shan, Zhiyong Chiueh, Tzi-Cker Wang, Xin Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China Stony Brook University United States
OS-level virtualization incurs smaller start-up and run-time overhead than HAL-based virtualization and thus forms an important building block for developing fault-tolerant and intrusion-tolerant applications. A compl... 详细信息
来源: 评论
Efficient Duplicate Detection on Cloud Using a New Signature Scheme
Efficient Duplicate Detection on Cloud Using a New Signature...
收藏 引用
12th International Conference on Web-Age Information Management
作者: Rong, Chuitian Lu, Wei Du, Xiaoyong Zhang, Xiao Key Labs. of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China China Shanghai Key Laboratory of Intelligent Information Processing China
Duplicate detection has been well recognized as a crucial task to improve the quality of data. Related work on this problem mainly aims to propose efficient approaches over a single machine. However, with increasing v... 详细信息
来源: 评论
Using New Fusion Operations to Improve Trust Expressiveness of Subjective Logic
收藏 引用
Wuhan University Journal of Natural Sciences 2011年 第5期16卷 376-382页
作者: ZHOU Hongwei1,2,3,SHI Wenchang1,2,LIANG Zhaohui1,2,LIANG Bin1,2 1.Key laboratory of data engineering and knowledge engineering,Ministry of Education,Beijing 100872,China 2.School of Information,Renmin University of China,Beijing 100872,China 3.Institute of Electronic Technology,Information engineering University of PLA,Zhengzhou 450004,Henan,China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Information Engineering University of PLA Zhengzhou Henan China
Subjective logic provides a means to describe the trust relationship of the realworld. However, existing fusion operations it offers Weal fused opiniotts equally, which makes it impossible to deal with the weighted op... 详细信息
来源: 评论
Tracer: Enforcing Mandatory Access Control in commodity OS with the support of light-weight intrusion detection and tracing  11
Tracer: Enforcing Mandatory Access Control in commodity OS w...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Key Laboratory of Data Engineering and Knowledge Engineering Renmin University MOE China Stony Brook University United States Industrial Technology Research Institute Taiwan
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p... 详细信息
来源: 评论
Scalable process modeling based on net synthesis under cloud computing environment
Scalable process modeling based on net synthesis under cloud...
收藏 引用
2011 IEEE International Conference on Granular Computing, GrC 2011
作者: Zhou, Jiantao Liang, Rong Wang, Yan College of Computer Science Inner Mongolia University Hohhot China Key Laboratory of Data Mining and Knowledge Engineering Hohhot China
Recently research on modeling methods of complicated processes under complex network environments has become a focus in workflow field. Now cloud computing environment provides a specific application background for th... 详细信息
来源: 评论
Detecting stealthy malware with inter-structure and imported signatures  11
Detecting stealthy malware with inter-structure and imported...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Liang, Bin You, Wei Shi, Wenchang Liang, Zhaohui Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Recent years have witnessed an increasing threat from kernel rootkits. A common feature of such attack is hiding malicious objects to conceal their presence, including processes, sockets, and kernel modules. Scanning ... 详细信息
来源: 评论
Random rough subspace based neural network ensemble for insurance fraud detection
Random rough subspace based neural network ensemble for insu...
收藏 引用
International Workshop on Computational Transportation Science
作者: Xu, Wei Wang, Shengnan Zhang, Dailing Yang, Bo Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
In this paper, a random rough subspace based neural network ensemble method is proposed for insurance fraud detection. In this method, rough set reduction is firstly employed to generate a set of reductions which can ... 详细信息
来源: 评论
A neural network based forecasting method for the unemployment rate prediction using the search engine query data
A neural network based forecasting method for the unemployme...
收藏 引用
2011 8th IEEE International Conference on e-Business engineering, ICEBE 2011
作者: Xu, Wei Zheng, Tingting Li, Ziang Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Unemployment rate prediction has become critically important, because it can help government to make decision and design policies. In recent years, forecast of unemployment rate attracts much attention from government... 详细信息
来源: 评论
Visual group identification method of technical competitors using LinLog graph clustering algorithm
Visual group identification method of technical competitors ...
收藏 引用
IEEE International Conference on Computer Science and Automation engineering
作者: Han, Hong-Qi An, Xiaomi Zhu, Donghua Wang, Xuefeng Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Management and Economics Beijing Institute of Technology Beijing 100872 China
Visualization technique is a powerful method used by science and technology intelligence analysis experts to identify technical competitor groups. Common visualization methods tend to create graphs meeting the aesthet... 详细信息
来源: 评论
A RFID mixed coding scheme based on huffman algorithm
A RFID mixed coding scheme based on huffman algorithm
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Jian, Jiang Guoqiong, Liao Hao, Wang Qizhi, Wan School of Information Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang Nanchang China
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is... 详细信息
来源: 评论