咨询与建议

限定检索结果

文献类型

  • 132 篇 会议
  • 99 篇 期刊文献

馆藏范围

  • 231 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 143 篇 工学
    • 110 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 37 篇 信息与通信工程
    • 23 篇 生物工程
    • 18 篇 控制科学与工程
    • 14 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 网络空间安全
    • 8 篇 机械工程
    • 8 篇 交通运输工程
    • 6 篇 光学工程
    • 6 篇 化学工程与技术
    • 5 篇 动力工程及工程热...
    • 4 篇 仪器科学与技术
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 安全科学与工程
  • 75 篇 理学
    • 41 篇 数学
    • 24 篇 生物学
    • 16 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 6 篇 化学
    • 3 篇 地球物理学
  • 47 篇 管理学
    • 27 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
  • 1 篇 军事学

主题

  • 15 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 8 篇 machine learning
  • 8 篇 training
  • 7 篇 deep learning
  • 6 篇 conferences
  • 6 篇 neural networks
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 telecommunicatio...
  • 5 篇 anomaly detectio...
  • 5 篇 optimization
  • 5 篇 data mining
  • 5 篇 computational mo...
  • 4 篇 contrastive lear...
  • 4 篇 schedules
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing
  • 4 篇 accuracy

机构

  • 53 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 peng cheng labor...
  • 8 篇 nanjing universi...
  • 8 篇 key laboratory o...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of comput...

作者

  • 37 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 8 篇 jia xu
  • 7 篇 chen ke-jia
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang
  • 6 篇 li yun
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 bao shilong
  • 5 篇 xu lijie
  • 5 篇 huang jiwu
  • 5 篇 chen yunfang
  • 5 篇 liu linfeng

语言

  • 226 篇 英文
  • 5 篇 其他
  • 1 篇 中文
检索条件"机构=Liuzhou Key Laboratory of Big Data Intelligent Processing and Security"
231 条 记 录,以下是91-100 订阅
排序:
Latent Group Recommendation based on Double Fuzzy Clustering and Matrix Tri-factorization
Latent Group Recommendation based on Double Fuzzy Clustering...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Haiyan Wang Jinxia Zhu Zhousheng Wang Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
Group recommendation has received great attention owing to its practical value in real applications. However, group members are implicit and groups are formed occasionally in some scenarios. Existing solutions for lat... 详细信息
来源: 评论
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs
Economical Electricity Supplement for Mobile Collectors in L...
收藏 引用
IEEE International Conference on big data and Cloud Computing (BdCloud)
作者: Xin Zhai Lijie Xu Jialei Zhang Kun Wang Jia Xu Bei Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu...
来源: 评论
SSR-TA: Sequence to Sequence based expert recurrent recommendation for ticket automation
arXiv
收藏 引用
arXiv 2023年
作者: Cao, Chenhan Fang, Xiaoyu Luo, Bingqing Xia, Bin Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
The ticket automation provides crucial support for the normal operation of IT software systems. An essential task of ticket automation is to assign experts to solve upcoming tickets. However, facing thousands of ticke... 详细信息
来源: 评论
An Answer Summarization Scheme Based on Multilayer Attention Model
An Answer Summarization Scheme Based on Multilayer Attention...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiaolong Xu Yihao Dong Jian Song Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China
At present, deep learning technologies have been widely used in the field of natural language process, such as text summarization. In CQA, the answer summary could help users get a complete answer quickly. There are s...
来源: 评论
A Virtual Network Mapping Method Based on Compound Particle Swarm Optimization
A Virtual Network Mapping Method Based on Compound Particle ...
收藏 引用
Cyber security and Information Engineering (ICCSIE), International Conference on
作者: Jianhua Huang Yunlong Tang Yongjun Wei Huan Wang Haifeng Zhang Bing Zhang Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Guangxi Education System Network Security Monitoring Center School of Computer Science and Technology (School of Software) Guangxi University of Science and Technology Liuzhou China Liuzhou Railway Vocational Technical College Liuzhou China
Aiming at problems of low credibility of results and low accuracy of the scheme in the mapping process of virtual networks. It is suggested to use a composite particle swarm optimization approach for virtual network m... 详细信息
来源: 评论
Bidirectional LSTM-CRF for biomedical named entity recognition  14
Bidirectional LSTM-CRF for biomedical named entity recogniti...
收藏 引用
14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Yang, Xuemin Gao, Zhihong Li, Yongmin Pan, Chuandi Yang, Ronggen Gong, Lejun Yang, Geng Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210003 China Zhejiang Engineering Research Center of Intelligence Medicine Wenzhou325035 China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China
Bio-medical entity recognition extracts significant entities, for instance cells, proteins and genes, which is an arduous task in an automatic system that mine knowledge in bioinformatics texts. In this thesis, we uti... 详细信息
来源: 评论
Community-based Message Forwarding in Mobile Social Networks
Community-based Message Forwarding in Mobile Social Networks
收藏 引用
作者: Zhiming Chen Yang Xiang School of Computer Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing
With the popularity of various smart devices and the application of sensor network technology, message transmission using mobile devices is becoming *** paper focuses on the forwarding in mobile social network(MSN).Th...
来源: 评论
A relation prediction method based on PU learning
A relation prediction method based on PU learning
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Gao-Jing Peng Ke-Jia Chen Shijun Xue Bin Liu Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu China
This paper studies relation prediction in heterogeneous information networks under PU learning context. One of the challenges of this problem is the imbalance of data number between the positive set P (the set of node... 详细信息
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network  10
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
10th International Symposium on System security, Safety, and Reliability, ISSSR 2024
作者: Zhao, Jinbo He, Jinling Du, Yuanhan Tang, Ming Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论
Research on SDN Multi Controller Deployment based on K-means++
Research on SDN Multi Controller Deployment based on K-means...
收藏 引用
2020 International Conference on 5G Mobile Communication and Information Science, MCIS-5G 2020
作者: Yue, Li Junyan, Chen Chuxin, Liang Xiaochun, Lei School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Cloud Computing and Big Data Collaborative Innovation Center Guilin541001 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
In large-scale SDN network, a single centralized controller can not meet the demand, and multiple controllers are needed to deal with the problem, which leads to the problem of multi control balanced deployment. In th... 详细信息
来源: 评论