咨询与建议

限定检索结果

文献类型

  • 2,096 篇 期刊文献
  • 1,716 篇 会议
  • 17 册 图书

馆藏范围

  • 3,829 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,529 篇 工学
    • 1,873 篇 计算机科学与技术...
    • 1,582 篇 软件工程
    • 611 篇 信息与通信工程
    • 385 篇 电气工程
    • 382 篇 生物工程
    • 314 篇 控制科学与工程
    • 242 篇 电子科学与技术(可...
    • 241 篇 生物医学工程(可授...
    • 233 篇 光学工程
    • 151 篇 机械工程
    • 122 篇 化学工程与技术
    • 119 篇 交通运输工程
    • 103 篇 网络空间安全
    • 101 篇 动力工程及工程热...
    • 96 篇 仪器科学与技术
    • 89 篇 安全科学与工程
  • 1,400 篇 理学
    • 720 篇 数学
    • 430 篇 生物学
    • 345 篇 物理学
    • 251 篇 统计学(可授理学、...
    • 134 篇 化学
    • 134 篇 系统科学
  • 735 篇 管理学
    • 461 篇 管理科学与工程(可...
    • 316 篇 图书情报与档案管...
    • 222 篇 工商管理
  • 252 篇 医学
    • 215 篇 临床医学
    • 190 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
    • 106 篇 药学(可授医学、理...
  • 118 篇 法学
    • 99 篇 社会学
  • 75 篇 经济学
  • 50 篇 农学
  • 37 篇 教育学
  • 8 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 123 篇 deep learning
  • 121 篇 accuracy
  • 106 篇 machine learning
  • 101 篇 feature extracti...
  • 92 篇 semantics
  • 90 篇 training
  • 88 篇 computational mo...
  • 76 篇 data models
  • 68 篇 internet of thin...
  • 67 篇 real-time system...
  • 65 篇 predictive model...
  • 61 篇 convolutional ne...
  • 54 篇 federated learni...
  • 52 篇 reinforcement le...
  • 47 篇 graph neural net...
  • 45 篇 deep neural netw...
  • 44 篇 data mining
  • 44 篇 artificial intel...
  • 41 篇 optimization
  • 38 篇 convolution

机构

  • 154 篇 college of compu...
  • 101 篇 beijing advanced...
  • 100 篇 national enginee...
  • 71 篇 nanyang technolo...
  • 67 篇 school of comput...
  • 55 篇 national enginee...
  • 48 篇 school of comput...
  • 47 篇 school of big da...
  • 44 篇 school of comput...
  • 41 篇 school of cyber ...
  • 36 篇 national enginee...
  • 33 篇 university of ch...
  • 32 篇 college of intel...
  • 32 篇 school of comput...
  • 30 篇 school of data a...
  • 30 篇 hubei engineerin...
  • 29 篇 college of compu...
  • 29 篇 services computi...
  • 29 篇 the college of c...
  • 28 篇 school of comput...

作者

  • 149 篇 niyato dusit
  • 104 篇 hai jin
  • 101 篇 jin hai
  • 31 篇 xiaofei liao
  • 31 篇 kang jiawen
  • 26 篇 shen linlin
  • 25 篇 li jianxin
  • 24 篇 rajeswari d.
  • 23 篇 hu shengshan
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 22 篇 tao dacheng
  • 20 篇 sun geng
  • 19 篇 li tianrui
  • 19 篇 haikun liu
  • 19 篇 dusit niyato
  • 19 篇 xiwang dong
  • 19 篇 wang jiacheng
  • 19 篇 du hongyang
  • 18 篇 xiaofei wang

语言

  • 3,471 篇 英文
  • 333 篇 其他
  • 33 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3829 条 记 录,以下是3761-3770 订阅
排序:
Novel hybrid feature selection algorithms for diagnosing erythemato-squamous diseases
收藏 引用
1st International Conference on Health Information Science, HIS 2012
作者: Xie, Juanying Lei, Jinhu Xie, Weixin Gao, Xinbo Shi, Yong Liu, Xiaohui School of Computer Science Shaanxi Normal University Xi'an 710062 China School of Electronic Engineering Xidian University Xi'an 710071 China School of Information Engineering Shenzhen University Shenzhen 518060 China CAS Research Centre of Fictitious Economy and Data Science Chinese Academy of Sciences Beijing 100080 China School of Information Systems Computing and Mathematics Brunel University London UB8 3PH United Kingdom
This paper proposes hybrid feature selection algorithms to build the efficient diagnostic models based on a new accuracy criterion, generalized F-score (GF) and SVM. The hybrid algorithms adopt Sequential Forward Sear... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Single attribute Join Queries within latest sampling periods in sensor networks
Single attribute Join Queries within latest sampling periods...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Shangfeng Mo Hong Chen Yinglong Li School of Math and Computing Science Hunan University of Science and Technology Xiangtan China Key Laboratory of Data Engineering and Knowledge Engineering of MOE School of Information Renmin University of China Beijing China
Join processing in wireless sensor networks is a challenging problem. Current solutions are not involved in the join operation among tuples of the latest sampling periods. In this article, we proposed a continuous Sin... 详细信息
来源: 评论
Corrigendum: “Provably-secure electronic cash based on certicateless partially-blind signatures”
收藏 引用
Electronic Commerce Research and Applications 2013年 第1期12卷 60-60页
作者: Lei Zhang Futai Zhang Bo Qin Shubo Liu East China Normal University Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing Shanghai China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Chair in Data Privacy Tarragona Catalonia Spain Nanjing Normal University School of Computer Science and Technology China Xi’an University of Technology School of Science Department of Maths China Wuhan University School of Computer Science Wuhan China
来源: 评论
LotusX: A Position-Aware XML Graphical Search System with Auto-Completion
LotusX: A Position-Aware XML Graphical Search System with Au...
收藏 引用
International Conference on data engineering
作者: Chunbin Lin Jiaheng Lu Tok Wang Ling Bogdan Cautis Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China School of Computing National University of Singapore Singapore Télécom Paris Technology France
The existing query languages for XML (e.g., XQuery) require professional programming skills to be formulated, however, such complex query languages burden the query processing. In addition, when issuing an XML query, ... 详细信息
来源: 评论
Mining hidden mixture context with ADIOS-P to improve predictive pre-fetcher accuracy
Mining hidden mixture context with ADIOS-P to improve predic...
收藏 引用
IEEE International Conference on e-Science and Grid computing
作者: Jong Youl Choi Hasan Abbasi David Pugmire Norbert Podhorszki Scott Klasky Cristian Capdevila Manish Parashar Matthew Wolf Judy Qiu Geoffrey Fox Scientific Data Group Oak Ridge National Laboratory Oak Ridge Tennessee USA Electrical Engineering and Computer Science The University of Tennessee Knoxville Tennessee USA Electrical and Computer Engineering Rutgers University Piscataway New Jersey USA School of Computer Science Georgia Institute of Technology Atlanta Georgia USA School of Informatics and Computing Indiana University Bloomington Indiana USA
Predictive pre-fetcher, which predicts future data access events and loads the data before users requests, has been widely studied, especially in file systems or web contents servers, to reduce data load latency. Espe... 详细信息
来源: 评论
Multilingual adaptive search for digital libraries
收藏 引用
Lecture Notes in Computer Science
作者: Ghorab, M. Rami Leveling, Johannes Lawless, Séamus O'Connor, Alexander Zhou, Dong Jones, Gareth J. F. Wade, Vincent Knowledge and Data Engineering Group School of Computer Science and Statistics Trinity College Dublin Dublin 2 Ireland CNGL School of Computing Dublin City University Dublin 9 Ireland
We describe a framework for Adaptive Multilingual Information Retrieval (AMIR) which allows multilingual resource discovery and delivery using on-the-fly machine translation of documents and queries. Result documents ... 详细信息
来源: 评论
Personalised Multilingual Hypertext retrieval: An overview
Personalised Multilingual Hypertext retrieval: An overview
收藏 引用
1st Workshop on Personalised Multilingual Hypertext Retrieval, PMHR 2011, Held in Conjunction with the ACM Hypertext 2011, HT2011
作者: Agosti, Maristella De Luca, Ernesto William Lawless, Séamus Leveling, Johannes Department of Information Engineering University of Padua Italy DAI Lab. Berlin Institute of Technology Germany Knowledge and Data Engineering Group Trinity College Dublin Ireland School of Computing Dublin City University Ireland
The aims of the workshop on Personalised Multilingual Hypertext Retri eval (PMHR) are twofold: to set the scene in this challenging area, allowing the different communities engaged in related research topics to meet a...
来源: 评论
A semantic model for integrated content management, localisation and language technology processing
A semantic model for integrated content management, localisa...
收藏 引用
2nd International Workshop on the Multilingual Semantic Web 2011, MSW 2011 - In Conjunction with the International Semantic Web Conference, ISWC 2011
作者: Jones, Dominic O'Connor, Alexander Abgaz, Yalemisew M. Lewis, David Centre for Next Generation Localisation School of Computer Science and Statistics Trinity College Dublin Ireland Knowledge and Data Engineering Group School of Computer Science and Statistics Trinity College Dublin Ireland School of Computing Dublin City University Dublin Ireland
Providers of products and services are faced with the dual challenge of supporting the languages and individual needs of the global customer while also accommodating the increasing relevance of user-generated content.... 详细信息
来源: 评论
A mandatory access control model based on concept lattice
A mandatory access control model based on concept lattice
收藏 引用
International Conference on Network computing and Information Security (NCIS)
作者: Zhang, Lei Zhang, Hongli Yin, Lihua Shen, Xiajiong School of Computer Science and Technology Harbin Institute of Technology Harbin China Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute of Data and Knowledge Engineering Henan University Kaifeng China
Confidentiality and integrity of information are basic attributes of information security, but the existing access control models cannot unify the both well. A mandatory access control model based on access control co... 详细信息
来源: 评论