咨询与建议

限定检索结果

文献类型

  • 2,000 篇 期刊文献
  • 1,819 篇 会议
  • 2 册 图书

馆藏范围

  • 3,821 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,562 篇 工学
    • 1,859 篇 计算机科学与技术...
    • 1,571 篇 软件工程
    • 639 篇 信息与通信工程
    • 358 篇 电气工程
    • 337 篇 生物工程
    • 297 篇 控制科学与工程
    • 225 篇 电子科学与技术(可...
    • 209 篇 光学工程
    • 209 篇 生物医学工程(可授...
    • 169 篇 机械工程
    • 134 篇 化学工程与技术
    • 121 篇 交通运输工程
    • 95 篇 仪器科学与技术
    • 85 篇 动力工程及工程热...
    • 82 篇 网络空间安全
    • 77 篇 建筑学
    • 77 篇 安全科学与工程
  • 1,461 篇 理学
    • 805 篇 数学
    • 381 篇 生物学
    • 325 篇 物理学
    • 247 篇 统计学(可授理学、...
    • 147 篇 化学
    • 120 篇 系统科学
  • 712 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 326 篇 图书情报与档案管...
    • 166 篇 工商管理
  • 207 篇 医学
    • 174 篇 临床医学
    • 141 篇 基础医学(可授医学...
    • 88 篇 药学(可授医学、理...
  • 121 篇 法学
    • 96 篇 社会学
  • 72 篇 经济学
  • 48 篇 教育学
  • 45 篇 农学
  • 13 篇 文学
  • 6 篇 军事学
  • 5 篇 艺术学

主题

  • 130 篇 feature extracti...
  • 116 篇 semantics
  • 106 篇 training
  • 104 篇 deep learning
  • 74 篇 computational mo...
  • 61 篇 machine learning
  • 61 篇 data models
  • 60 篇 convolution
  • 53 篇 accuracy
  • 51 篇 predictive model...
  • 50 篇 task analysis
  • 49 篇 federated learni...
  • 47 篇 graph neural net...
  • 45 篇 contrastive lear...
  • 43 篇 reinforcement le...
  • 42 篇 object detection
  • 41 篇 neural networks
  • 41 篇 forecasting
  • 38 篇 data mining
  • 34 篇 optimization

机构

  • 103 篇 school of data a...
  • 68 篇 college of compu...
  • 64 篇 school of comput...
  • 63 篇 peng cheng labor...
  • 61 篇 key laboratory o...
  • 55 篇 school of comput...
  • 53 篇 fujian provincia...
  • 52 篇 university of ch...
  • 51 篇 college of compu...
  • 51 篇 beijing advanced...
  • 46 篇 school of inform...
  • 45 篇 school of comput...
  • 41 篇 national enginee...
  • 37 篇 guangdong key la...
  • 35 篇 school of comput...
  • 35 篇 shenzhen researc...
  • 33 篇 nanyang technolo...
  • 33 篇 school of softwa...
  • 33 篇 school of cyber ...
  • 32 篇 school of comput...

作者

  • 62 篇 niyato dusit
  • 36 篇 chang kuo-chi
  • 35 篇 cheng xueqi
  • 34 篇 zheng wei-shi
  • 30 篇 guo jiafeng
  • 29 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 26 篇 jin hai
  • 25 篇 wu di
  • 24 篇 zhang rui
  • 24 篇 chu kai-chun
  • 24 篇 wang zhongmin
  • 23 篇 jin xiaolong
  • 23 篇 chen yanping
  • 22 篇 wang guoyin
  • 22 篇 hai jin
  • 21 篇 huang qingming
  • 20 篇 ai bo
  • 19 篇 shen linlin
  • 19 篇 li ming

语言

  • 3,537 篇 英文
  • 240 篇 其他
  • 61 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Big Data \& Key Laboratory of Data Science and Intelligent Computing"
3821 条 记 录,以下是3791-3800 订阅
排序:
Sentiment classification in Persian: Introducing a mutual information-based method for feature selection
Sentiment classification in Persian: Introducing a mutual in...
收藏 引用
Iranian Conference on Electrical Engineering (ICEE)
作者: Ayoub Bagheri Mohamad Saraee Franciska de Jong Intelligent Database Data Mining and Bioinformatics Laboratory Electrical and Computer Engineering Department Isfahan University of Technology Isfahan Iran School of Computing Science and Engineering University of Salford Manchester UK Human Media Interaction University of Twente Enschede Netherlands
With the enormous growth of online reviews in Internet, sentiment analysis has received more and more attention in information retrieval and natural language processing community. Up to now there are very few research... 详细信息
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论
Efficient approximation of the maximal preference scores by lightweight cubic views
Efficient approximation of the maximal preference scores by ...
收藏 引用
15th International Conference on Extending database Technology, EDBT 2012
作者: Chen, Yueguo Cui, Bin Du, Xiaoyong Tung, Anthony K. H. Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE China Department of Computer Science Peking University Beijing China School of Information Renmin University of China Beijing China School of Computing National University of Singapore Singapore Singapore
Given a multi-features data set, a best preference query (BPQ) computes the maximal preference score (MPS) that the tuples in the data set can achieve with respect to a preference function. BPQs are very useful in app... 详细信息
来源: 评论
Categorization of computing education resources with utilization of crowdsourcing  12
Categorization of computing education resources with utiliza...
收藏 引用
12th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL '12
作者: Chen, Yinlin Bogen II, Paul Logasa Hsieh, Haowei Fox, Edward A. Cassel, Lillian N. Department of Computer Science Virginia Tech. Blacksburg VA United States Intelligent Computing Research Team Computational Data Analytics Group Oak Ridge National Laboratory Oak Ridge TN 37931 United States School of Library and Information Science University of Iowa Iowa City IA 52242 United States Department of Computing Sciences Villanova University Villanova PA 19085 United States
The Ensemble Portal harvests resources from multiple heterogeneous federated collections. Managing these dynamically increasing collections requires an automatic mechanism to categorize records in to corresponding top... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Single attribute Join Queries within latest sampling periods in sensor networks
Single attribute Join Queries within latest sampling periods...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Shangfeng Mo Hong Chen Yinglong Li School of Math and Computing Science Hunan University of Science and Technology Xiangtan China Key Laboratory of Data Engineering and Knowledge Engineering of MOE School of Information Renmin University of China Beijing China
Join processing in wireless sensor networks is a challenging problem. Current solutions are not involved in the join operation among tuples of the latest sampling periods. In this article, we proposed a continuous Sin... 详细信息
来源: 评论
Corrigendum: “Provably-secure electronic cash based on certicateless partially-blind signatures”
收藏 引用
Electronic Commerce Research and Applications 2013年 第1期12卷 60-60页
作者: Lei Zhang Futai Zhang Bo Qin Shubo Liu East China Normal University Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing Shanghai China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Chair in Data Privacy Tarragona Catalonia Spain Nanjing Normal University School of Computer Science and Technology China Xi’an University of Technology School of Science Department of Maths China Wuhan University School of Computer Science Wuhan China
来源: 评论
Context-specific miRNA regulation network predicts cancer prognosis
Context-specific miRNA regulation network predicts cancer pr...
收藏 引用
IEEE International Conference on Systems Biology
作者: Xionghui Zhou Juan Liu Changning Liu Simon Rayner Fengji Liang Jingfang Ju Yinghui Li Shanguang Chen Jianghui Xiong School of Computer Science Wuhan University Wuhan China Bioinformatics Research Group Key Laboratory of Intelligent Information Processing Advanced Computing Research Laboratory Institute of Computing Technology Chinese Academy of Sciences (CAS) Beijing China Bioinformatics Group State Key Laboratory of Virology Wuhan Institute of Virology Chinese Academy of Sciences (CAS) Wuhan China Bioinformatics Group and Data Coordination Center State Key Laboratory of Space Medicine Fundamentals and Application China Astronaut Research and Training Center Beijing China Department of Pathology Stony Brook University Medical Center New York USA
MicroRNAs can regulate hundreds of target genes and play a pivotal role in a broad range of biological process. However, relatively little is known about how these highly connected miRNAs-target networks are remodelle... 详细信息
来源: 评论
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on intelligent Networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
Proximity user identification using correlogram
收藏 引用
作者: Shahidi, Shervin Mazrooei, Parisa Esfahani, Navid Nasr Saraee, Mohammad Intelligent Databases Data Mining and Bioinformatics Research Laboratory Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan 84156-83111 Iran Isfahan Mathematics House Isfahan 81645-356 Iran School of Computing Science and Engineering University of Salford Greater Manchester United Kingdom
This paper represents a technique, applying user action patterns in order to distinguish between users and identify them. In this method, users' actions sequences are mapped to numerical sequences and each user... 详细信息
来源: 评论