咨询与建议

限定检索结果

文献类型

  • 2,016 篇 期刊文献
  • 1,496 篇 会议
  • 1 册 图书

馆藏范围

  • 3,513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,407 篇 工学
    • 1,559 篇 计算机科学与技术...
    • 1,251 篇 软件工程
    • 599 篇 信息与通信工程
    • 383 篇 电气工程
    • 286 篇 电子科学与技术(可...
    • 276 篇 控制科学与工程
    • 250 篇 生物工程
    • 185 篇 化学工程与技术
    • 181 篇 光学工程
    • 159 篇 生物医学工程(可授...
    • 148 篇 机械工程
    • 140 篇 仪器科学与技术
    • 101 篇 材料科学与工程(可...
    • 86 篇 动力工程及工程热...
    • 74 篇 交通运输工程
    • 73 篇 建筑学
  • 1,351 篇 理学
    • 631 篇 数学
    • 437 篇 物理学
    • 299 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 186 篇 化学
    • 86 篇 系统科学
    • 74 篇 地球物理学
  • 670 篇 管理学
    • 384 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 169 篇 医学
    • 143 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
  • 96 篇 法学
    • 81 篇 社会学
  • 59 篇 经济学
  • 45 篇 农学
  • 28 篇 教育学
  • 9 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 98 篇 semantics
  • 74 篇 deep learning
  • 74 篇 feature extracti...
  • 61 篇 training
  • 58 篇 data mining
  • 47 篇 computational mo...
  • 43 篇 convolution
  • 37 篇 data models
  • 33 篇 machine learning
  • 32 篇 object detection
  • 31 篇 visualization
  • 31 篇 accuracy
  • 30 篇 task analysis
  • 30 篇 optimization
  • 28 篇 knowledge engine...
  • 28 篇 big data
  • 28 篇 federated learni...
  • 27 篇 semantic segment...
  • 26 篇 knowledge graph
  • 26 篇 contrastive lear...

机构

  • 156 篇 school of inform...
  • 102 篇 school of comput...
  • 99 篇 university of ch...
  • 55 篇 university of sc...
  • 52 篇 school of econom...
  • 51 篇 school of inform...
  • 51 篇 fujian provincia...
  • 48 篇 key laboratory o...
  • 47 篇 school of physic...
  • 44 篇 hebei normal uni...
  • 44 篇 state key labora...
  • 44 篇 yunnan observato...
  • 43 篇 school of cyber ...
  • 42 篇 tianfu cosmic ra...
  • 42 篇 center for astro...
  • 42 篇 key laboratory o...
  • 42 篇 school of inform...
  • 41 篇 department of ph...
  • 40 篇 college of physi...
  • 39 篇 key laboratory o...

作者

  • 46 篇 feng c.f.
  • 46 篇 guo y.q.
  • 45 篇 bao y.w.
  • 44 篇 niyato dusit
  • 44 篇 hu h.b.
  • 44 篇 liu b.
  • 44 篇 danzengluobu
  • 43 篇 li xin
  • 42 篇 li cheng
  • 41 篇 liu c.
  • 40 篇 axikegu
  • 39 篇 fang j.
  • 39 篇 huang y.
  • 38 篇 bastieri d.
  • 38 篇 jiang k.
  • 38 篇 kuleshov d.
  • 38 篇 min z.
  • 38 篇 liu d.
  • 38 篇 chen m.j.
  • 38 篇 luo q.

语言

  • 2,809 篇 英文
  • 632 篇 其他
  • 81 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering"
3513 条 记 录,以下是3241-3250 订阅
排序:
A frequent pattern mining algorithm based on concept lattice
收藏 引用
Sensors and Transducers 2013年 第9期156卷 351-359页
作者: Changsheng, Zhang Jing, Ruan Haijiang, Xia Hailong, Huang Bingru, Yang School of Computer and Communication Engineering University of Science and Technology Beijing Beijing BJ10 China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing BJ10 China College of Physics and Electronic Information Engineering Wenzhou University Zhejiang ZJ577 China Wenzhou Vocational and Technical College Zhejiang ZJ577 China
The concept lattice is an effective tool for data analysis and rule extraction, it is often well to mine frequent patterns by making use of concept lattice. In this paper, a frequent itemset mining algorithm FPCL base... 详细信息
来源: 评论
Cryptanalysis of 2-layer nonlinear piece in hand method
Cryptanalysis of 2-layer nonlinear piece in hand method
收藏 引用
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and Security engineering, MoCrySEn 2013 and 3rd International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2013
作者: Nie, Xuyun Petzoldt, Albrecht Buchmann, Johannes School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Technische Universität Darmstadt Department of Computer Science Hochschulstraße 10 64289 Darmstadt Germany State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Network and Data Security Key Laboratory of Sichuan Province China
Piece in Hand method is a security enhancement method for Multivariate Public key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece... 详细信息
来源: 评论
A broadcasting multiple blind signature scheme based on quantum GHZ entanglement
收藏 引用
International Journal of Modern Physics: Conference Series 2014年 第33期ijmpcs卷
作者: Yuan Tian Hong Chen Yan Gao Honglin Zhuang Haigang Lian Zhengping Han Peng Yu Xiangze Kong Xiaojun Wen Key Laboratory of Data Engineering and Knowledge Engineering China (Remin University of China) of Ministry of Education Beijing 100872 China School of Information Renmin University of China Beijing 100872 China China Computer User Association Information Protection Branch Beijing 100089 China School of Computer Science and Engineering Beihang University Beijing 100083 China School of Electronics & Information Engineering Shenzhen Polytechnic Shenzhen 518055 China
Using the correlation of the GHZ triplet states, a broadcasting multiple blind signature scheme is proposed. Different from classical multiple signature and current quantum signature schemes, which could only deliver ... 详细信息
来源: 评论
A dominating set based approach to identify effective leader group of social network
A dominating set based approach to identify effective leader...
收藏 引用
19th International Computing and Combinatorics Conference, COCOON 2013
作者: Kim, Donghyun Li, Deying Asgari, Omid Li, Yingshu Tokuta, Alade O. Dept. of Mathematics and Computer Science North Carolina Central University Durham NC 27707 United States Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Renmin 100872 China Dept. of Computer Science Georgia State University Atlanta GA 30303 United States
Very recently, the study of social networks has received a huge attention since we can learn and understand many hidden properties of our society. This paper investigates the potential of social network analysis to se... 详细信息
来源: 评论
Efficient algorithm for dynamic attribute reduction based on a matrix
Beijing Keji Daxue Xuebao/Journal of University of Science a...
收藏 引用
Beijing Keji Daxue Xuebao/Journal of University of Science and technology Beijing 2013年 第2期35卷 249-255页
作者: Qian, Wen-Bin Yang, Bing-Ru Xu, Zhang-Yan Li, Hui School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083 China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing 100083 China School of Computer Science and Information Engineering Guangxi Normal University Guilin 541004 China
Objects in actual decision tables are often changed dynamically. Aiming at this problem, the concept of a simplified decision table is introduced firstly, and a large number of repeated objects are deleted. A simplifi... 详细信息
来源: 评论
A novel image retrieval method based on mutual information descriptors  1
收藏 引用
9th International Conference on Intelligent Computing, ICIC 2013
作者: Hou, Gang Zhang, Ke Zhang, Xiaoxue Kong, Jun Zhang, Ming College of Communication Engineering Jilin University Changchun China College of Humanities and Sciences Northeast Normal University Changchun China School of Computer Science and Information Technology Northeast Normal University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
In this paper, we propose a novel image retrieval method based on mutual information descriptors (MIDs). Under the physiological property of human eyes and human visual perception theory, MIDs are extracted to encode ... 详细信息
来源: 评论
JUFE at INEX 2011 Snippet Retrieval Track
JUFE at INEX 2011 Snippet Retrieval Track
收藏 引用
Lecture Notes in Computer Science
作者: Liu, Dexi Wan, Changxuan Liao, Guoqiong Zhong, Minjuan Liu, Xiping School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
jiangxi University of Finance and Economics (JUFE) submitted 8 runs to the Snippet Retrieval Track at INEX *** report describes an XML snippet retrieval method based on Average Topic Generalization (ATG) model used by... 详细信息
来源: 评论
Summarizing Large-Scale database Schema Using Community Detection
收藏 引用
Journal of Computer Science & technology 2012年 第3期27卷 515-526页
作者: 王雪 周烜 王珊 School of Information Renmin University of China Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China
Schema summarization on large-scale databases is a challenge. In a typical large database schema, a great proportion of the tables are closely connected through a few high degree tables. It is thus difficult to separa... 详细信息
来源: 评论
Research on XML element search results clustering
Research on XML element search results clustering
收藏 引用
6th International Conference on Management of e-Commerce and e-Government, ICMeCG 2012
作者: Zhong, Min-Juan Wan, Chang-Xuan Liu, De-Xi Jiao, Xian-Pei School of Information Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
Clustering XML search results is an effective way to improve performance. However, the key problem is how to measure similarity between XML documents. This paper studies XML search results clustering based on element ... 详细信息
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论