咨询与建议

限定检索结果

文献类型

  • 601 篇 会议
  • 458 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 657 篇 工学
    • 531 篇 计算机科学与技术...
    • 438 篇 软件工程
    • 151 篇 信息与通信工程
    • 79 篇 控制科学与工程
    • 63 篇 生物工程
    • 54 篇 电气工程
    • 37 篇 机械工程
    • 32 篇 电子科学与技术(可...
    • 32 篇 化学工程与技术
    • 32 篇 生物医学工程(可授...
    • 24 篇 仪器科学与技术
    • 23 篇 动力工程及工程热...
    • 19 篇 建筑学
    • 19 篇 航空宇航科学与技...
    • 16 篇 光学工程
    • 16 篇 交通运输工程
  • 282 篇 管理学
    • 166 篇 图书情报与档案管...
    • 141 篇 管理科学与工程(可...
    • 47 篇 工商管理
  • 271 篇 理学
    • 158 篇 数学
    • 66 篇 生物学
    • 50 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 35 篇 化学
    • 24 篇 系统科学
  • 43 篇 法学
    • 38 篇 社会学
  • 35 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 14 篇 药学(可授医学、理...
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 7 篇 教育学
  • 5 篇 文学
  • 5 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 54 篇 semantics
  • 41 篇 data mining
  • 38 篇 knowledge engine...
  • 35 篇 training
  • 24 篇 feature extracti...
  • 22 篇 data engineering
  • 22 篇 computational mo...
  • 20 篇 laboratories
  • 20 篇 data models
  • 19 篇 conferences
  • 19 篇 big data
  • 18 篇 knowledge manage...
  • 18 篇 information retr...
  • 17 篇 task analysis
  • 17 篇 visualization
  • 16 篇 xml
  • 16 篇 databases
  • 15 篇 query processing
  • 15 篇 knowledge graph
  • 15 篇 wireless sensor ...

机构

  • 153 篇 school of inform...
  • 105 篇 school of comput...
  • 52 篇 key laboratory o...
  • 50 篇 key laboratory o...
  • 34 篇 college of compu...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 31 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 28 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 22 篇 key laboratory o...
  • 19 篇 school of econom...
  • 18 篇 key laboratory o...
  • 18 篇 school of inform...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 college of compu...
  • 16 篇 school of cyber ...

作者

  • 50 篇 chen hong
  • 36 篇 du xiaoyong
  • 33 篇 wu xindong
  • 32 篇 li cuiping
  • 31 篇 wang meng
  • 29 篇 xindong wu
  • 29 篇 zhang jing
  • 28 篇 xiaoyong du
  • 26 篇 wang shan
  • 24 篇 hong chen
  • 23 篇 sun geng
  • 22 篇 liu jun
  • 21 篇 niyato dusit
  • 19 篇 hong richang
  • 18 篇 huang qingming
  • 17 篇 meng wang
  • 17 篇 shan wang
  • 17 篇 wang jiacheng
  • 17 篇 xu qianqian
  • 17 篇 wan changxuan

语言

  • 887 篇 英文
  • 154 篇 其他
  • 21 篇 中文
检索条件"机构=Laboratory of Data Engineering and Knowledge Engineering"
1062 条 记 录,以下是971-980 订阅
排序:
DB Facade: A Web Cache with Improved data Freshness
DB Facade: A Web Cache with Improved Data Freshness
收藏 引用
International Symposium on Electronic Commerce and Security
作者: Xiongpai Qin Xiaoyun Zhou Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing China School of Information and Electrical Engineering China University of Mining and Technology Xuzhou Jiangsu China
Traditional Web database cache techniques have a major disadvantage, namely poor data freshness, because they employ an asynchronous data refresh strategy. A novel Web database cache, DB Facade, is proposed in this pa... 详细信息
来源: 评论
Against Code Injection with System Call Randomization
Against Code Injection with System Call Randomization
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Zhaohui Liang Bin Liang Luping Li Wei Chen Qingqing Kang Yingqin Gu Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Beijing China Renmin University of China Beijing CN School of Information Renmin University of China China
The existing code injection attack defense methods have some deficiencies on performance overhead and effectiveness. In order to ensure the system performance, we propose a method that uses system call randomization t... 详细信息
来源: 评论
Malicious Web Pages Detection Based on Abnormal Visibility Recognition
Malicious Web Pages Detection Based on Abnormal Visibility R...
收藏 引用
International Conference on E-Business and Information System Security, EBISS
作者: Bin Liang Jianjun Huang Fang Liu Dawei Wang Daxiang Dong Zhaohui Liang Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China Beijing China School of Information Renmin University of China Beijing China Renmin University of China Beijing CN
In recent years, Web sites have already become the attackers' main target. When attackers embed malicious code in the Web pages, they generally change the display mode of the corresponding HTML tags to make the di... 详细信息
来源: 评论
Configurable ranking for XML vague retrieval
收藏 引用
Journal of Computational Information Systems 2009年 第2期5卷 683-692页
作者: Jiang, Tengjiao Wan, Changxuan Liu, Xiping School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 China
Ranking is one of the key factors for efficient and effective XML information retrieval. Compared with traditional IR, XML information retrieval has introduced many new challenges, one of which is that the traditional... 详细信息
来源: 评论
Rapid Resynchronization Method for Replication In-Memory databases Supporting Mobile Communication Applications
Rapid Resynchronization Method for Replication In-Memory Dat...
收藏 引用
Computer Science and Information engineering, CSIE, WRI World Congress on FLAGGED
作者: Guoqiong Liao Jing Li Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China School of Information Technology Jiangxi University of Finance and Economics Nanchang China
In this paper, a rapid resynchronization method using intent logs is suggested for replication in-memory databases supporting mobile communication applications. Both the identifiers of unsynchronized segments and the ... 详细信息
来源: 评论
Web page malicious code detection based on embedded fingerprints
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2208-2214页
作者: Huang, Jianjun Liang, Bin Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renmin University of China Beijing 100872 China
Web sites have become the main targets of many attackers. Signature-based detection needs to maintain a large signature database and Honeypot based methods are not efficient. Since attackers always make the malicious ... 详细信息
来源: 评论
Synchronous replication framework of databases servers supporting reliable electronic commerce applications
收藏 引用
Journal of Computational Information Systems 2009年 第2期5卷 849-858页
作者: Liao, Guoqiong Chen, Shijun School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang 330013 China Siemens Ltd. China Corporate Technology Beijing 100102 China
To support electronic commerce applications with high reliability requirements, a synchronous replication framework of database servers is designed in this paper. At first, a three-tier architecture consisting of Web ... 详细信息
来源: 评论
Efficient Processing of Global Top-k Aggregate Queries in Uncertain database
Efficient Processing of Global Top-k Aggregate Queries in Un...
收藏 引用
International Conference on Information engineering and Computer Science (ICIECS)
作者: Xianli Xing Dexi Liu Principal's Office Jiangxi University of Finance and Economics Nanchang China School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
Top-k queries in uncertain databases are quite popular and useful due to its wide application usage. However, compared to top-k in traditional databases, queries over uncertain database are more complicated because of... 详细信息
来源: 评论
Chinese integral word segmentation recognition based on reliability
收藏 引用
Journal of Information and Computational Science 2009年 第1期6卷 533-542页
作者: Wan, Changxuan Wang, Fang School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 China School of Humanities Nanchang University Nanchang 330013 China
As one part of preprocessing, automatic word segmentation is an key issue in Chinese information retrieval. Since integral words are put wholly together to compose into the more meaningful words and more express users... 详细信息
来源: 评论
Static vulnerabilities detection method based on security state tracing and checking
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第5期32卷 899-909页
作者: Liang, Bin Hou, Kan-Kan Shi, Wen-Chang Liang, Zhao-Hui School of Information Renming University of China Beijing 100872 China MOE Key Laboratory of Data Engineering and Knowledge Engineering Beijing 100872 China
The main problem of existing static vulnerability detection methods based source code analysis is their high false positive and false negative rates. One main reason is lack of accurate and effective identification an... 详细信息
来源: 评论