咨询与建议

限定检索结果

文献类型

  • 2,016 篇 期刊文献
  • 1,496 篇 会议
  • 1 册 图书

馆藏范围

  • 3,513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,407 篇 工学
    • 1,559 篇 计算机科学与技术...
    • 1,251 篇 软件工程
    • 599 篇 信息与通信工程
    • 383 篇 电气工程
    • 286 篇 电子科学与技术(可...
    • 276 篇 控制科学与工程
    • 250 篇 生物工程
    • 185 篇 化学工程与技术
    • 181 篇 光学工程
    • 159 篇 生物医学工程(可授...
    • 148 篇 机械工程
    • 140 篇 仪器科学与技术
    • 101 篇 材料科学与工程(可...
    • 86 篇 动力工程及工程热...
    • 74 篇 交通运输工程
    • 73 篇 建筑学
  • 1,351 篇 理学
    • 631 篇 数学
    • 437 篇 物理学
    • 299 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 186 篇 化学
    • 86 篇 系统科学
    • 74 篇 地球物理学
  • 670 篇 管理学
    • 384 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 169 篇 医学
    • 143 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
  • 96 篇 法学
    • 81 篇 社会学
  • 59 篇 经济学
  • 45 篇 农学
  • 28 篇 教育学
  • 9 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 98 篇 semantics
  • 74 篇 deep learning
  • 74 篇 feature extracti...
  • 61 篇 training
  • 58 篇 data mining
  • 47 篇 computational mo...
  • 43 篇 convolution
  • 37 篇 data models
  • 33 篇 machine learning
  • 32 篇 object detection
  • 31 篇 visualization
  • 31 篇 accuracy
  • 30 篇 task analysis
  • 30 篇 optimization
  • 28 篇 knowledge engine...
  • 28 篇 big data
  • 28 篇 federated learni...
  • 27 篇 semantic segment...
  • 26 篇 knowledge graph
  • 26 篇 contrastive lear...

机构

  • 156 篇 school of inform...
  • 102 篇 school of comput...
  • 99 篇 university of ch...
  • 55 篇 university of sc...
  • 52 篇 school of econom...
  • 51 篇 school of inform...
  • 51 篇 fujian provincia...
  • 48 篇 key laboratory o...
  • 47 篇 school of physic...
  • 44 篇 hebei normal uni...
  • 44 篇 state key labora...
  • 44 篇 yunnan observato...
  • 43 篇 school of cyber ...
  • 42 篇 tianfu cosmic ra...
  • 42 篇 center for astro...
  • 42 篇 key laboratory o...
  • 42 篇 school of inform...
  • 41 篇 department of ph...
  • 40 篇 college of physi...
  • 39 篇 key laboratory o...

作者

  • 46 篇 feng c.f.
  • 46 篇 guo y.q.
  • 45 篇 bao y.w.
  • 44 篇 niyato dusit
  • 44 篇 hu h.b.
  • 44 篇 liu b.
  • 44 篇 danzengluobu
  • 43 篇 li xin
  • 42 篇 li cheng
  • 41 篇 liu c.
  • 40 篇 axikegu
  • 39 篇 fang j.
  • 39 篇 huang y.
  • 38 篇 bastieri d.
  • 38 篇 jiang k.
  • 38 篇 kuleshov d.
  • 38 篇 min z.
  • 38 篇 liu d.
  • 38 篇 chen m.j.
  • 38 篇 luo q.

语言

  • 2,809 篇 英文
  • 632 篇 其他
  • 81 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering"
3513 条 记 录,以下是3281-3290 订阅
排序:
LotusX: A Position-Aware XML Graphical Search System with Auto-Completion
LotusX: A Position-Aware XML Graphical Search System with Au...
收藏 引用
International Conference on data engineering
作者: Chunbin Lin Jiaheng Lu Tok Wang Ling Bogdan Cautis Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China China School of Computing National University of Singapore Singapore Télécom Paris Technology France
The existing query languages for XML (e.g., XQuery) require professional programming skills to be formulated, however, such complex query languages burden the query processing. In addition, when issuing an XML query, ... 详细信息
来源: 评论
Research on intrusion detection model of heterogeneous attributes clustering
Journal of Software
收藏 引用
Journal of Software 2012年 第12期7卷 2823-2831页
作者: Xie, Linquan Wang, Ying Yu, Fei Xu, Chen Yue, Guangxue School of Science Jiangxi University of Science and Technology 341000 Ganzhou China School of Science Jiangxi University of Science and Technology 341000 Ganzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University 215000 Soochow China School of Information Science and Engineering Hunan University 416000 Changsha China Department of Computer Science and Technology Huaihua University Huaihua China
A fuzzy clustering algorithm for intrusion detection based on heterogeneous attributes is proposed in this paper. Firstly, the algorithm modifies the comparability measurement for the categorical attributes according ... 详细信息
来源: 评论
Drivers for strategic choice of cloud computing as online service in SMEs
Drivers for strategic choice of cloud computing as online se...
收藏 引用
International Conference on information Systems, ICIS 2012
作者: Li, Min Yu, Yan Zhao, J. Leon Li, Xin University of Science and Technology China-City University of Hong Kong Joint Advanced Research Center 166 Renai Road Dushu Lake Higher Education Town Suzhou China Key Laboratory of Data Engineering and Knowledge Engineering MOE Renmin University of China 59 Zhongguancun Street Haidian District Beijing China Department of Information Systems City University of Hong Kong Tat Chee Avenue Kowloon Hong Kong
Cloud Computing Service (CCS) paradigm is changing IT strategy of organizations in the digital world. CCS that requires few upfront investments and uses lease-based pricing is especially relevant to the Small and Medi... 详细信息
来源: 评论
Pattern mining, semantic label identification and movement prediction using mobile phone data
Pattern mining, semantic label identification and movement p...
收藏 引用
8th International Conference on Advanced data Mining and Applications, ADMA 2012
作者: Xie, Rong Luo, Jun Yue, Yang Li, Qingquan Zou, Xiaoqing International School of Software Wuhan University Wuhan 430079 China Shenzhen Institutes of Advanced Technology CAS Shenzhen 518055 China Shenzhen Key Laboratory of High Performance Data Mining Shenzhen 518055 China Shenzhen University Shenzhen China State Key Lab. of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan 430079 China Faculty of Land Resource Engineering Kunming University of Science and Technology Kunming China
data collected from mobile phones have potential knowledge to provide with important behavior patterns of individuals. In this paper, we present approaches to discovering personal mobility and characteristics based on... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
A RFID mixed coding scheme based on huffman algorithm
A RFID mixed coding scheme based on huffman algorithm
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Jian, Jiang Guoqiong, Liao Hao, Wang Qizhi, Wan School of Information Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang Nanchang China
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is... 详细信息
来源: 评论
Conservative properties analysis of multi-symplectic integrator for the Schrödinger equation with wave operator
收藏 引用
AIP Conference Proceedings 2012年 第1期1479卷 1283-1286页
作者: Linghua Kong Lan Wang Xiuling Yin Yali Duan School of Mathematics and Information Science Jiangxi Normal University Nanchang Jiangxi 330022 China State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing AMSS CAS P.O. Box 2719 Beijing 100190 China School of Mathematical Science University of Science and Technology of China Hefei Anhui 230026 China
In the article, we discuss the conservation laws for the nonlinear Schrödinger equation with wave operator under multisymplectic integrator (MI). The discrete conservation laws of the numerical method are analyze...
来源: 评论
Clustering XML search results based on content and structure similarity
Clustering XML search results based on content and structure...
收藏 引用
2011 International Conference on Management of e-Commerce and e-Government, ICMeCG 2011
作者: Min-Juan, Zhong Chang-Xuan, Wan De-Xi, Liu Xian-Pei, Jiao School of Information and Technology Jiangxi University of Finance and Economics Nanchang China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang China
Clustering XML search results is an effective way to improve performance. However, the key problem is how to measure similarity between XML documents. In this paper, we propose a semantic similarity measure method com... 详细信息
来源: 评论
Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds
Distributed data possession checking for securing multiple r...
收藏 引用
作者: He, Jing Zhang, Yanchun Huang, Guangyan Shi, Yong Cao, Jie Centre for Applied Informatics School of Engineering and Science Victoria University PO Box 14428 Melbourne VIC 8001 Australia Research Center on Fictitious Economy and Data Science Chinese Academy of Sciences China College of Information Science and Technology University of Nebraska at Omaha United States Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing 210003 China
Distributing multiple replicas in geographically-dispersed clouds is a popular approach to reduce latency to users. It is important to ensure that each replica should have availability and data integrity features;that... 详细信息
来源: 评论
Cryptanalysis of a lattice-knapsack mixed public key cryptosystem
Cryptanalysis of a lattice-knapsack mixed public key cryptos...
收藏 引用
11th International Conference on Cryptology and Network Security, CANS 2012
作者: Xu, Jun Hu, Lei Sun, Siwei Wang, Ping State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China University of Chinese Academy of Sciences Beijing 100049 China School of Mathematical Science Anhui University Hefei 230601 Anhui China Tian Jin Zhong Wei Aerospace Data System Technology Co. Ltd. China Aerospace Science and Technology Corporation Beijing 100086 China Space Star Technology Co. Ltd. China Aerospace Science and Technology Corporation Beijing 100086 China Institute No.503 of the Fifth Research Academy China Aerospace Science and Technology Corporation Beijing 100086 China
Recently, a lattice based public key cryptosystem mixed with a knapsack was presented in the CANS 2011 conference. In this paper, we propose two message recovery attacks on this cryptosystem. The first one is a broadc... 详细信息
来源: 评论