咨询与建议

限定检索结果

文献类型

  • 95 篇 会议
  • 78 篇 期刊文献

馆藏范围

  • 173 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 129 篇 工学
    • 103 篇 计算机科学与技术...
    • 88 篇 软件工程
    • 25 篇 信息与通信工程
    • 9 篇 仪器科学与技术
    • 8 篇 化学工程与技术
    • 7 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 6 篇 生物工程
    • 4 篇 机械工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 网络空间安全
    • 2 篇 力学(可授工学、理...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 交通运输工程
    • 1 篇 电气工程
  • 38 篇 理学
    • 18 篇 数学
    • 11 篇 物理学
    • 8 篇 化学
    • 6 篇 生物学
    • 5 篇 统计学(可授理学、...
    • 2 篇 系统科学
  • 35 篇 管理学
    • 22 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 3 篇 法学
    • 2 篇 法学
    • 1 篇 社会学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学

主题

  • 12 篇 semantics
  • 6 篇 servers
  • 6 篇 cloud computing
  • 5 篇 web services
  • 4 篇 task analysis
  • 4 篇 bandwidth
  • 4 篇 authentication
  • 4 篇 computational mo...
  • 4 篇 algorithm design...
  • 4 篇 protocols
  • 4 篇 natural language...
  • 4 篇 sentiment analys...
  • 4 篇 software
  • 3 篇 conferences
  • 3 篇 knowledge based ...
  • 3 篇 raman spectrosco...
  • 3 篇 network topology
  • 3 篇 iterative method...
  • 3 篇 optimization
  • 3 篇 image retrieval

机构

  • 54 篇 school of comput...
  • 43 篇 beijing engineer...
  • 9 篇 school of comput...
  • 7 篇 department of co...
  • 7 篇 beijing engineer...
  • 6 篇 southeast academ...
  • 6 篇 beijing engineer...
  • 5 篇 huazhong univers...
  • 5 篇 beijing institut...
  • 5 篇 beijing engineer...
  • 4 篇 faculty of arts ...
  • 4 篇 department of el...
  • 4 篇 beijing engineer...
  • 4 篇 beijing engineer...
  • 3 篇 beijing engineer...
  • 3 篇 beijing institut...
  • 3 篇 shanghai radio e...
  • 3 篇 beijing engineer...
  • 3 篇 beijing advanced...
  • 3 篇 key laboratory o...

作者

  • 43 篇 huang heyan
  • 22 篇 heyan huang
  • 16 篇 liao lejian
  • 15 篇 lejian liao
  • 14 篇 mao xian-ling
  • 13 篇 liehuang zhu
  • 12 篇 gao yang
  • 12 篇 zhu liehuang
  • 10 篇 jian ping
  • 8 篇 fan li
  • 8 篇 song dandan
  • 7 篇 meng shen
  • 7 篇 du xiaojiang
  • 7 篇 dandan song
  • 7 篇 shumin shi
  • 7 篇 shi shumin
  • 6 篇 guizani mohsen
  • 6 篇 nie yuxiang
  • 6 篇 yang yizhe
  • 6 篇 li jiawei

语言

  • 168 篇 英文
  • 4 篇 中文
  • 1 篇 其他
检索条件"机构=Language Information Processing and Cloud Computing Application"
173 条 记 录,以下是11-20 订阅
排序:
Knowledge-enriched joint-learning model for implicit emotion cause extraction
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第1期8卷 118-128页
作者: Chenghao Wu Shumin Shi Jiaxing Hu Heyan Huang School of Computer Science and Technology Beijing Institute of TechnologyBeijingChina Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications BeijingChina
Emotion cause extraction(ECE)task that aims at extracting potential trigger events of certain emotions has attracted extensive attention ***,current work neglects the implicit emotion expressed without any explicit em... 详细信息
来源: 评论
A Hybrid Method of Domain Lexicon Construction for Opinion Targets Extraction Using Syntax and Semantics
收藏 引用
Journal of Computer Science & Technology 2016年 第3期31卷 595-603页
作者: Chun Liao Chong Feng Sen Yang He-Yan Huang Department of Computer Science and Technology Beijing Institute of Technology Beijing 100081 China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology Beijing 100081 China
Opinion targets extraction of Chinese microblogs plays an important role in opinion mining. There has been a significant progress in this area recently, especially the method based on conditional random field (CRF).... 详细信息
来源: 评论
End States Guided Matching Network for Retrieval-based Multi-turn Conversation  3
End States Guided Matching Network for Retrieval-based Multi...
收藏 引用
2021年第三届先进计算机技术、信息科学与通信国际会议(CTISC2021)
作者: Weixin Tan Dandan Song Yujin Gao Lab of High Volume language Information Processing & Cloud Computing Beijing Lab of Intelligent Information TechnologyBeijing Institute of Technology
Multi-turn conversation response selection aims to choose the best response from multiple candidates based on matching it with the dialogue context. Mostly, a response full of context-related information tends to be a... 详细信息
来源: 评论
PSVM: a preference-enhanced SVM model using preference data for classification
收藏 引用
Science China(information Sciences) 2017年 第12期60卷 165-178页
作者: Lerong MA Dandan SONG Lejian LIAO Jingang WANG Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Science and Technology Beijing Institute of Technology College of Mathematics and Computer Science Yan'an University Search Business Department Alibaba Group
Classification is an essential task in data mining, machine learning and pattern recognition *** classification models focus on distinctive samples from different categories. There are fine-grained differences between... 详细信息
来源: 评论
A VoLTE Encryption Experiment for Android Smartphones  5th
A VoLTE Encryption Experiment for Android Smartphones
收藏 引用
5th International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2017
作者: Liu, Shaoru Wang, Yao Zhang, Quanxin Li, Yuanzhang School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China Research Center of Massive Language Information Processing and Cloud Computing Application Beijing100081 China
With the increasing popularity of 4G networks, communication technology based on VoLTE protocol has gradually become more and more mature. However, the public pay more attention to data security in the communication. ... 详细信息
来源: 评论
A novel audio information hiding scheme based on rMAC
A novel audio information hiding scheme based on rMAC
收藏 引用
2012 International Conference on information Technology and Software Engineering, ITSE 2012
作者: Yu, Litao Zhu, Liehuang Liu, Dan Xie, Yuzhou Beijing Eng. Res. Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing 100086 China
We present a novel audio information hiding scheme based on robust message authentication code (rMAC). By combining coefficient quantization based information hiding scheme with rMAC and chaotic encryption, proposed s... 详细信息
来源: 评论
Incorporating social actions into recommender systems
Incorporating social actions into recommender systems
收藏 引用
14th International Conference on Web-Age information Management, WAIM 2013
作者: Ma, Di Song, Dandan Liao, Lejian Beijing Eng. Res. Ctr. of High Vol. Language Information Processing and Cloud Computing Application Beijing Lab of Intelligent Information Technology School of Computer Science Beijing China
With the rapidly growing amount of information available on the internet, recommender systems become popular tools to promote relevant online information to a given user. Although collaborative filtering is the most p... 详细信息
来源: 评论
Failure Handling of E-Business Services in an Extensible Constraint Service Model
Failure Handling of E-Business Services in an Extensible Con...
收藏 引用
2013 IEEE 4th International Conference on Software Engineering and Service Science
作者: Ruoyu Chen Lejian Liao Zhi Fang Beijing Engineering Research Centre of High Volume Language Information Processing & Cloud Computing Applications Beijing Key Laboratory of Intelligent Information TechnologySchool of Computer ScienceBeijing Institute of Technology
Failure handling of business transactions is essential in E-Business *** paper extends the service process specification proposed in a contract-centered constraint-based service modelling framework with failure handli... 详细信息
来源: 评论
SSD lifespan-oriented cache optimization in SSD/HDD hybrid storage system
SSD lifespan-oriented cache optimization in SSD/HDD hybrid s...
收藏 引用
International Conference on Environmental Engineering and Computer application, ICEECA 2014
作者: Wang, X. Zhang, Q.X. Tan, Y.A. Qu, J.Q. Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing China Shanghai Radio Equipment Research Institute Shanghai China
Layered SSD/HDD hybrid storage system has been widely used. However, most traditional designs are performance oriented, and not optimized for SSD lifespan. In this paper, SSD lifespan oriented layered model and cache ... 详细信息
来源: 评论
The adaptive multicast data origin authentication protocol
The adaptive multicast data origin authentication protocol
收藏 引用
2nd CCF Internet Conference of China, ICoC 2013
作者: Zhu, Liehuang Yang, Hao Yang, Zhenghe Beijing Eng. Research Center of Massive Language Info. Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing China
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into account. However, the network conditions will obviously influence the... 详细信息
来源: 评论