咨询与建议

限定检索结果

文献类型

  • 225 篇 会议
  • 139 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 367 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 232 篇 工学
    • 195 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 52 篇 信息与通信工程
    • 22 篇 生物工程
    • 19 篇 控制科学与工程
    • 14 篇 生物医学工程(可授...
    • 10 篇 化学工程与技术
    • 9 篇 光学工程
    • 9 篇 电子科学与技术(可...
    • 7 篇 机械工程
    • 7 篇 仪器科学与技术
    • 6 篇 动力工程及工程热...
    • 6 篇 电气工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 交通运输工程
    • 3 篇 建筑学
  • 105 篇 理学
    • 57 篇 数学
    • 26 篇 生物学
    • 21 篇 物理学
    • 18 篇 统计学(可授理学、...
    • 10 篇 化学
    • 8 篇 系统科学
  • 78 篇 管理学
    • 54 篇 图书情报与档案管...
    • 30 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 12 篇 医学
    • 11 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 10 篇 法学
    • 9 篇 社会学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 经济学
  • 2 篇 文学
  • 2 篇 农学

主题

  • 17 篇 semantics
  • 11 篇 data engineering
  • 10 篇 laboratories
  • 10 篇 data mining
  • 9 篇 training
  • 8 篇 knowledge engine...
  • 8 篇 wireless sensor ...
  • 8 篇 machine learning
  • 7 篇 query processing
  • 7 篇 feature extracti...
  • 7 篇 information retr...
  • 7 篇 forecasting
  • 6 篇 object detection
  • 6 篇 knowledge manage...
  • 6 篇 search engines
  • 6 篇 contrastive lear...
  • 6 篇 costs
  • 5 篇 xml
  • 5 篇 embeddings
  • 4 篇 helium

机构

  • 87 篇 school of inform...
  • 50 篇 key laboratory o...
  • 18 篇 key lab of data ...
  • 18 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 gaoling school o...
  • 10 篇 engineering rese...
  • 10 篇 beijing key labo...
  • 9 篇 key lab. of inte...
  • 9 篇 department of ma...
  • 8 篇 school of comput...
  • 8 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 key lab of data ...
  • 7 篇 renmin universit...
  • 7 篇 key laboratory o...
  • 7 篇 university of ch...
  • 7 篇 school of comput...
  • 7 篇 school of cyber ...
  • 7 篇 key lab of big d...

作者

  • 35 篇 du xiaoyong
  • 32 篇 chen hong
  • 30 篇 li xirong
  • 22 篇 li cuiping
  • 20 篇 xiaoyong du
  • 15 篇 hong chen
  • 13 篇 he jun
  • 12 篇 liu jun
  • 11 篇 liu hongyan
  • 11 篇 yang gang
  • 11 篇 wang shan
  • 9 篇 wang shuai
  • 9 篇 dou zhicheng
  • 8 篇 wen ji-rong
  • 8 篇 shan wang
  • 8 篇 zhang lingling
  • 8 篇 huang qingming
  • 8 篇 xu qianqian
  • 8 篇 cuiping li
  • 7 篇 zhao suyun

语言

  • 339 篇 英文
  • 23 篇 其他
  • 5 篇 中文
检索条件"机构=Moe Key Lab of Data Engineering and Knowledge Engineering"
367 条 记 录,以下是281-290 订阅
排序:
Efficient Duplicate Detection on Cloud Using a New Signature Scheme
Efficient Duplicate Detection on Cloud Using a New Signature...
收藏 引用
12th International Conference on Web-Age Information Management
作者: Rong, Chuitian Lu, Wei Du, Xiaoyong Zhang, Xiao Key Labs. of Data Engineering and Knowledge Engineering MOE China School of Information Renmin University of China China Shanghai Key Laboratory of Intelligent Information Processing China
Duplicate detection has been well recognized as a crucial task to improve the quality of data. Related work on this problem mainly aims to propose efficient approaches over a single machine. However, with increasing v... 详细信息
来源: 评论
Tracer: Enforcing Mandatory Access Control in commodity OS with the support of light-weight intrusion detection and tracing  11
Tracer: Enforcing Mandatory Access Control in commodity OS w...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Key Laboratory of Data Engineering and Knowledge Engineering Renmin University MOE China Stony Brook University United States Industrial Technology Research Institute Taiwan
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware p... 详细信息
来源: 评论
Detecting stealthy malware with inter-structure and imported signatures  11
Detecting stealthy malware with inter-structure and imported...
收藏 引用
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
作者: Liang, Bin You, Wei Shi, Wenchang Liang, Zhaohui Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Recent years have witnessed an increasing threat from kernel rootkits. A common feature of such attack is hiding malicious objects to conceal their presence, including processes, sockets, and kernel modules. Scanning ... 详细信息
来源: 评论
Safe side effects commitment for OS-level virtualization  11
Safe side effects commitment for OS-level virtualization
收藏 引用
Proceedings of the 8th ACM international conference on Autonomic computing
作者: Shan, Zhiyong Wang, Xin Chiueh, Tzi-Cker Meng, Xiaofeng Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing China Stony Brook University Stony Brook NY United States Industrial Technology Research Institute Taiwan
A common application of virtual machines (VM) is to use and then throw away, basically treating a VM like a completely isolated and disposable entity. The disadvantage of this approach is that if there is no malicious... 详细信息
来源: 评论
Effect factors on secondary structure of protein sequence pattern
Effect factors on secondary structure of protein sequence pa...
收藏 引用
International Workshop on Intelligent Systems and Applications
作者: Liu, Tao Li, Minghui Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
Discovering the relationship between protein sequence pattern and protein secondary structure is important for accurately predicting secondary structure of protein sequence. A protein secondary structure pattern dicti... 详细信息
来源: 评论
Large scale report generation in data consolidation environments of banks
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) 2012年 第SUPPL.1期40卷 5-8页
作者: Qin, Xiongpai Zhou, Xiaoyun Wu, Zhongxin Yang, Hongzhi Wang, Wei Ministry of Education Key Lab of Data Engineering and Knowledge Engineering Renmin University of China Beijing 100872 China Information School Renmin University of China Beijing 100872 China Computer Science Department Jiangsu Normal University Xuzhou 221116 Jiangsu China Beijing Nantian Software Co. Ltd. Beijing 100085 China
To generate large number of reports in a limited time window, four techniques were proposed, including ROLAP&SQL, Shared Scanning, Hadoop based Solution, and MOLAP&Cube Sharding, an algorithm that performs in ... 详细信息
来源: 评论
Probabilistic range queries for Uncertain Trajectories on road networks  11
Probabilistic range queries for Uncertain Trajectories on ro...
收藏 引用
14th International Conference on Extending database Technology: Advances in database Technology, EDBT 2011
作者: Zheng, Kai Trajcevski, Goce Zhou, Xiaofang Scheuermann, Peter School of ITEE University of Queensland Australia Department of EECS Northwestern University United States School of Information Renmin University of China Key Lab. of Data Engineering and Knowledge Engineering Ministry of Education China
Trajectories representing the motion of moving objects are typically obtained via location sampling, e.g. using GPS or road-side sensors, at discrete time-instants. In-between consecutive samples, nothing is known abo... 详细信息
来源: 评论
Sentiment classification via L2-norm deep belief network  11
Sentiment classification via L2-norm deep belief network
收藏 引用
20th ACM Conference on Information and knowledge Management, CIKM'11
作者: Liu, Tao Li, Minghui Zhou, Shusen Du, Xiaoyong Key Laboratory of Data Engineering and Knowledge Engineering MOE 100872 Beijing China School of Information Renmin University of China 100872 Beijing China Microsoft Asian Research and Development Group 100080 Beijing China Shenzhen Graduate School Harbin Institute of Technology 518055 Shenzhen China
Automatic analysis of sentiments expressed in large scale online reviews is very important for intelligent business applications. Sentiment classification is the most popular task of sentiment analysis, which is more ... 详细信息
来源: 评论
Lawyer information integration and recommendation by multi-source information validation
Lawyer information integration and recommendation by multi-s...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Tao Liu Biao Fan He Hu Xiao-Yong Du Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China School of Information Renmin University of China Beijing China
On the internet, all-round lawyer information is located at separated information sources, which prevent web users from effective information acquisition. In order to build a unified view of separated, heterogeneous, ... 详细信息
来源: 评论
A property of reductions in Fuzzy Variable Precision Rough Set model
A property of reductions in Fuzzy Variable Precision Rough S...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Eric C. C. Tsang Su-Yun Zhao Cai-Li Zhou Faculty of Information Technology Macau University of Science and Technology Taipa Macao China Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China School of Mathematics and Computer Sciences Hebei University China
In this paper, we use strict mathematics reasoning to discover the relation between the threshold and reduction in Fuzzy Variable Precision Rough Sets (FVPRS), i.e., the reductions act as a nested structure with the m... 详细信息
来源: 评论