咨询与建议

限定检索结果

文献类型

  • 234 篇 期刊文献
  • 208 篇 会议

馆藏范围

  • 442 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 281 篇 工学
    • 180 篇 计算机科学与技术...
    • 157 篇 软件工程
    • 52 篇 电气工程
    • 48 篇 生物工程
    • 45 篇 信息与通信工程
    • 37 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 27 篇 化学工程与技术
    • 21 篇 生物医学工程(可授...
    • 15 篇 建筑学
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 13 篇 材料科学与工程(可...
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
  • 190 篇 理学
    • 107 篇 数学
    • 47 篇 生物学
    • 42 篇 物理学
    • 37 篇 统计学(可授理学、...
    • 30 篇 化学
    • 14 篇 系统科学
  • 90 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 26 篇 医学
    • 20 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 14 篇 法学
    • 11 篇 社会学
  • 14 篇 农学
    • 11 篇 作物学
  • 4 篇 教育学
  • 2 篇 文学

主题

  • 10 篇 deep learning
  • 8 篇 deep neural netw...
  • 8 篇 optimization
  • 8 篇 graph neural net...
  • 8 篇 costs
  • 8 篇 feature extracti...
  • 7 篇 accuracy
  • 7 篇 forecasting
  • 5 篇 urban areas
  • 5 篇 big data
  • 5 篇 computational mo...
  • 5 篇 real-time system...
  • 5 篇 machine learning
  • 5 篇 uncertainty
  • 5 篇 data visualizati...
  • 5 篇 robustness
  • 4 篇 internet of thin...
  • 4 篇 scalability
  • 4 篇 memory managemen...
  • 4 篇 image segmentati...

机构

  • 64 篇 national enginee...
  • 58 篇 fujian provincia...
  • 36 篇 school of inform...
  • 29 篇 institute of env...
  • 28 篇 college of mecha...
  • 27 篇 center for data ...
  • 26 篇 peking universit...
  • 24 篇 department of bu...
  • 24 篇 institute of con...
  • 18 篇 national enginee...
  • 18 篇 school of mathem...
  • 17 篇 department of to...
  • 17 篇 peng cheng labor...
  • 17 篇 beijing internat...
  • 14 篇 national enginee...
  • 14 篇 department of bu...
  • 12 篇 center for machi...
  • 12 篇 college of compu...
  • 12 篇 college of mecha...
  • 11 篇 peking universit...

作者

  • 39 篇 chang kuo-chi
  • 28 篇 cui bin
  • 27 篇 chu kai-chun
  • 26 篇 jianxiao wang
  • 21 篇 wang hsiao-chuan
  • 20 篇 chang fu-hsiang
  • 18 篇 bin cui
  • 18 篇 zhang wentao
  • 17 篇 pan jeng-shyang
  • 16 篇 lin yuh-chung
  • 15 篇 hsu tsui-lien
  • 15 篇 sung tien-wen
  • 12 篇 wang jianxiao
  • 10 篇 zhao jie
  • 10 篇 yang zhi
  • 10 篇 tong yang
  • 10 篇 nguyen trong-the
  • 9 篇 yang tong
  • 9 篇 zhang li
  • 8 篇 jie zhao

语言

  • 404 篇 英文
  • 31 篇 其他
  • 8 篇 中文
检索条件"机构=National Engineering Laboratory For Big Data Analysis and Applications"
442 条 记 录,以下是421-430 订阅
排序:
Comments on a privacy preserving public auditing mechanism for shared cloud data  17
Comments on a privacy preserving public auditing mechanism f...
收藏 引用
4th Multidisciplinary International Social Networks Conference, MISNC 2017
作者: Wu, Tsu-Yang Lin, Yueshan Wang, King-Hang Chen, Chien-Ming Pan, Jeng-Shyang Wu, Mu-En Fujian Provincial Key Laboratory of Big Data Mining and Applications National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology Fuzhou350118 China Harbin Institute of Technology Shenzhen Graduate School Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Mathematic Soochow University Taipei Taiwan
Auditing mechanisms are received much attentions from researchers due to the developing of cloud storage. Recently, Wang et al. proposed a privacy preserving public auditing mechanism for shared cloud data with suppor... 详细信息
来源: 评论
New constructions of q-variable 1-resilient rotation symmetric functions over Fp
收藏 引用
Science China(Information Sciences) 2016年 第7期59卷 240-242页
作者: Jiao DU Shaojing FU Longjiang QU Chao LI Shanqi PANG College of Science National University of Defense Technology School of Mathematics and Information Science Henan Normal University Henan Engineering Laboratory for Big Data Statistical Analysis and Optimal Control Henan Normal University College of Computer Science National University of Defense Technology
Dear editor,Motivated by Refs.[1–10],we devote to constructing a class of q-variable 1-resilient rotation symmetric functions(RSFs)over the finite field F;={0,1,...,p-1}in this *** this letter,let p and q be differ... 详细信息
来源: 评论
A parse tree-based NoSQL injection attacks detection mechanism
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2017年 第4期8卷 916-928页
作者: Ma, Hong Wu, Tsu-Yang Chen, Min Yang, Rong-Hua Pan, Jeng-Shyang Fujian Provincial Key Laboratory of Big Data Mining and Applications National Demonstration Center for Experimental Electronic Information and Electrical Technology Education College of Information Science and Engineering Fujian University of Technology No3 Xueyuan Road University Town Fuzhou350118 China
Nowadays, many IT giants such as Facebook, Google, and Amazon adopt non-relational database (NoSQL, Not only SQL) technologies to manage their systems. Although these kind of database technologies have made outstandin... 详细信息
来源: 评论
Comments on recent proposed Cui Et Al.’s KASE and Lu Et Al.’s dIBEKS schemes
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2018年 第1期9卷 162-169页
作者: Wu, Tsu-Yang Meng, Chao Wang, King-Hang Chen, Chien-Ming Pan, Jeng-Shyang Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No3 Xueyuan Road University Town Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology No3 Xueyuan Road University Town Fuzhou350118 China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School HIT Campus of University Town of Shenzhen Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
Searchable encryption is a cryptographic primitive used to search an encrypted data in cloud storage. Recently, Cui et al. and Lu et al. proposed two variants of secure searchable encryption schemes, respectively. How... 详细信息
来源: 评论
Efficient ontology meta-matching based on metamodel-assisted compact MOEA/D
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2017年 第5期8卷 1021-1028页
作者: Xue, Xingsi Tsai, Pei-Wei Feng, Guirong College of Information Science and Engineering Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No.3 Xueyuan Road University Town Minhou FuzhouFujian350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications National Demostration Center for Experimental Electronic Information and Electronical Technology Education Fujian University of Technology No.3 Xueyuan Road University Town Minhou FuzhouFujian350118 China School of Electrical Engineering Xidian University No.2 South Taibai Road XianShaanxi710071 China
In this paper we propose an improved Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D), i.e. metamodel-assisted compact MOEA/D, to efficiently solve the ontology meta-matching problem. Particularl... 详细信息
来源: 评论
Critical behavior of a stochastic anisotropic Bak-Sneppen model
arXiv
收藏 引用
arXiv 2017年
作者: Han, Jihui Li, Wei Su, Zhu Deng, Webing School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China Complexity Science Center Central China Normal University Wuhan China National Engineering Laboratory for Technology Big Data Applications in Education Central China Normal University Wuhan China
In this paper we present our study on the critical behavior of a stochastic anisotropic Bak-Sneppen (saBS) model, in which a parameter α is introduced to describe the interaction strength among nearest species. We es... 详细信息
来源: 评论
Security analysis of Rhee et al.’s public encryption with keyword search schemes: A review
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2018年 第1期3卷 16-25页
作者: Wu, Tsu-Yang Chen, Chien-Ming Wang, King-Hang Pan, Jeng-Shyang Zheng, Weimin Chu, Shu-Chuan Roddick, John F. Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No33 Xuefunan Road University Town Fuzhou350118 China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology No33 Xuefunan Road University Town Fuzhou350118 China School of Computer Science and Technology Harbin Institute of Technology Shenzhen HIT Campus of University Town of Shenzhen Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong College of Science and Engineering Flinders University Sturt Rd Bedford Park SA5042 Australia
Public key encryption with keyword search (PEKS) provides an efficient way to search encrypted files. Recently, Rhee et al. contributed their knowledge to propose several literatures in this research area. In this pap... 详细信息
来源: 评论
A Novel Control Algorithm for Interaction Between Surface Waves and A Permeable Floating Structure
收藏 引用
China Ocean engineering 2016年 第2期30卷 161-176页
作者: Pei-Wei TSAI A.ALSAEDI T.HAYAT Cheng-Wu CHEN College of information Science and Engineering Fujian University of TechnologyFuzhou 350118China Fujian Provincial Key Laboratory of Big Data Mining and Applications(Fujian University of Technology) Fuzhou 350118China Nonlinear Analysis and Applied Mathematics(NAAM)Research Group King Abdulaziz UniversityJeddah 21589Saudi Arabia Department of Mathematics Quaid-I-Azam UniversityIslamabad 44000Pakistan Department of Maritime Information and Technology National Kaohsiung Marine UniversityKaohsiung 80543China Faculty of Engineering King Abdulaziz UniversityJeddah 21589Saudi Arabia
An analytical solution is undertaken to describe the wave-induced flow field and the surge motion of a permeable platform structure with fuzzy controllers in an oceanic *** the design procedure of the controller,a par... 详细信息
来源: 评论
Investigate the relationship between learners’ social characteristics and academic achievements
收藏 引用
Journal of Physics: Conference Series 2018年 第1期1113卷 012021-012021页
作者: Liu, Zhi Zhu, Su Liu, Sannyuya Sun, Jianwen Kang, Lingyun National Engineering Research Center for E-Learning Central China Normal University Wuhan P. R. China National Engineering Laboratory for Technology of Big Data Applications in Education Central China Normal University Wuhan P. R. China National Engineering Research Center for E-Learning Central China Normal University Wuhan P. R. China
The social interaction behaviors of group learning have obtained a lot of attention from researches, and social network analysis (SNA) plays a critical role in exploring collective interactive patterns. In this paper,...
来源: 评论
Robust frequent directions with application in online learning
arXiv
收藏 引用
arXiv 2017年
作者: Luo, Luo Chen, Cheng Zhang, Zhihua Li, Wu-Jun Zhang, Tong Department of Computer Science and Engineering Shanghai Jiao Tong University 800 Dongchuan Road Shanghai200240 China National Engineering Lab for Big Data Analysis and Applications School of Mathematical Sciences Peking University 5 Yiheyuan Road Beijing100871 China National Key Laboratory for Novel Software Technology Collaborative Innovation Center of Novel Software Technology and Industrialization Department of Computer Science and Technology Nanjing University 163 Xianlin Avenue Nanjing210023 China Computer Science & Mathematics Hong Kong University of Science and Technology Hong Kong
The frequent directions (FD) technique is a deterministic approach for online sketching that has many applications in machine learning. The conventional FD is a heuristic procedure that often outputs rank deficient ma... 详细信息
来源: 评论