咨询与建议

限定检索结果

文献类型

  • 2,016 篇 期刊文献
  • 1,496 篇 会议
  • 1 册 图书

馆藏范围

  • 3,513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,407 篇 工学
    • 1,559 篇 计算机科学与技术...
    • 1,251 篇 软件工程
    • 599 篇 信息与通信工程
    • 383 篇 电气工程
    • 286 篇 电子科学与技术(可...
    • 276 篇 控制科学与工程
    • 250 篇 生物工程
    • 185 篇 化学工程与技术
    • 181 篇 光学工程
    • 159 篇 生物医学工程(可授...
    • 148 篇 机械工程
    • 140 篇 仪器科学与技术
    • 101 篇 材料科学与工程(可...
    • 86 篇 动力工程及工程热...
    • 74 篇 交通运输工程
    • 73 篇 建筑学
  • 1,351 篇 理学
    • 631 篇 数学
    • 437 篇 物理学
    • 299 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 186 篇 化学
    • 86 篇 系统科学
    • 74 篇 地球物理学
  • 670 篇 管理学
    • 384 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 129 篇 工商管理
  • 169 篇 医学
    • 143 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
  • 96 篇 法学
    • 81 篇 社会学
  • 59 篇 经济学
  • 45 篇 农学
  • 28 篇 教育学
  • 9 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 98 篇 semantics
  • 74 篇 deep learning
  • 74 篇 feature extracti...
  • 61 篇 training
  • 58 篇 data mining
  • 47 篇 computational mo...
  • 43 篇 convolution
  • 37 篇 data models
  • 33 篇 machine learning
  • 32 篇 object detection
  • 31 篇 visualization
  • 31 篇 accuracy
  • 30 篇 task analysis
  • 30 篇 optimization
  • 28 篇 knowledge engine...
  • 28 篇 big data
  • 28 篇 federated learni...
  • 27 篇 semantic segment...
  • 26 篇 knowledge graph
  • 26 篇 contrastive lear...

机构

  • 156 篇 school of inform...
  • 102 篇 school of comput...
  • 99 篇 university of ch...
  • 55 篇 university of sc...
  • 52 篇 school of econom...
  • 51 篇 school of inform...
  • 51 篇 fujian provincia...
  • 48 篇 key laboratory o...
  • 47 篇 school of physic...
  • 44 篇 hebei normal uni...
  • 44 篇 state key labora...
  • 44 篇 yunnan observato...
  • 43 篇 school of cyber ...
  • 42 篇 tianfu cosmic ra...
  • 42 篇 center for astro...
  • 42 篇 key laboratory o...
  • 42 篇 school of inform...
  • 41 篇 department of ph...
  • 40 篇 college of physi...
  • 39 篇 key laboratory o...

作者

  • 46 篇 feng c.f.
  • 46 篇 guo y.q.
  • 45 篇 bao y.w.
  • 44 篇 niyato dusit
  • 44 篇 hu h.b.
  • 44 篇 liu b.
  • 44 篇 danzengluobu
  • 43 篇 li xin
  • 42 篇 li cheng
  • 41 篇 liu c.
  • 40 篇 axikegu
  • 39 篇 fang j.
  • 39 篇 huang y.
  • 38 篇 bastieri d.
  • 38 篇 jiang k.
  • 38 篇 kuleshov d.
  • 38 篇 min z.
  • 38 篇 liu d.
  • 38 篇 chen m.j.
  • 38 篇 luo q.

语言

  • 2,809 篇 英文
  • 632 篇 其他
  • 81 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering"
3513 条 记 录,以下是3301-3310 订阅
排序:
Random rough subspace based neural network ensemble for insurance fraud detection
Random rough subspace based neural network ensemble for insu...
收藏 引用
International Workshop on Computational Transportation Science
作者: Xu, Wei Wang, Shengnan Zhang, Dailing Yang, Bo Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
In this paper, a random rough subspace based neural network ensemble method is proposed for insurance fraud detection. In this method, rough set reduction is firstly employed to generate a set of reductions which can ... 详细信息
来源: 评论
Formal analysis of trusted computing: One case study
Formal analysis of trusted computing: One case study
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. W... 详细信息
来源: 评论
B-IRP: An improving integrity report protocol for remote attestation
B-IRP: An improving integrity report protocol for remote att...
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re... 详细信息
来源: 评论
Effect factors on secondary structure of protein sequence pattern
Effect factors on secondary structure of protein sequence pa...
收藏 引用
International Workshop on Intelligent Systems and Applications
作者: Liu, Tao Li, Minghui Key Laboratory of Data Engineering and Knowledge Engineering MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
Discovering the relationship between protein sequence pattern and protein secondary structure is important for accurately predicting secondary structure of protein sequence. A protein secondary structure pattern dicti... 详细信息
来源: 评论
Detecting stealthy malware with inter-structure and imported signatures  11
Detecting stealthy malware with inter-structure and imported...
收藏 引用
6th International Symposium on information, Computer and Communications Security, ASIACCS 2011
作者: Liang, Bin You, Wei Shi, Wenchang Liang, Zhaohui Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Recent years have witnessed an increasing threat from kernel rootkits. A common feature of such attack is hiding malicious objects to conceal their presence, including processes, sockets, and kernel modules. Scanning ... 详细信息
来源: 评论
A RFID Mixed Coding Scheme Based on Huffman Algorithm
A RFID Mixed Coding Scheme Based on Huffman Algorithm
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Jiang Jian Liao Guoqiong Wang Hao Wan Qizhi School of Information Technology Jiangxi university of Finance and Economics China Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang Nanchang China
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is... 详细信息
来源: 评论
基于主题语义的非合作结构化Top-N深网数据源选择
基于主题语义的非合作结构化Top-N深网数据源选择
收藏 引用
第29届中国数据库学术会议
作者: Deng Song 邓松 Wan Changxuan 万常选 Liu Xiping 刘喜平 Jiang Tengjiao 江腾蛟 Lei Gang 雷刚 School of Information and Technology Jiangxi University of Finance and Economics Nanchang 330013 江西财经大学信息管理学院 南昌 330013 Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economic 江西财经大学数据与知识工程江西省高校重点实验室 南昌 330013
高效且准确地找出存在于深网中的与用户查询意图最相关的Top-N元组,是深网数据集成中的关键问题。针对数据源内容概括未见成果的现状,本文提出了一种能够有效概括非数字、非离散属性特征的非合作结构化深网数据源摘要构建方法。利用... 详细信息
来源: 评论
A neural network based forecasting method for the unemployment rate prediction using the search engine query data
A neural network based forecasting method for the unemployme...
收藏 引用
2011 8th IEEE International Conference on e-Business engineering, ICEBE 2011
作者: Xu, Wei Zheng, Tingting Li, Ziang Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Information Renmin University of China Beijing 100872 China
Unemployment rate prediction has become critically important, because it can help government to make decision and design policies. In recent years, forecast of unemployment rate attracts much attention from government... 详细信息
来源: 评论
K-nearest neighbors in uncertain graph
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2011年 第10期48卷 1850-1858页
作者: Zhang, Yinglong Li, Cuiping Chen, Hong Du, Lingxia Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Computer and Information Engineer Jiangxi Agriculture University Nanchang 330045 China
In many areas, a lot of data have been modeled by graphs which are subject to uncertainties, such as molecular compounds and protein interaction networks. While many real applications, for example, collaborative filte... 详细信息
来源: 评论
Visual group identification method of technical competitors using LinLog graph clustering algorithm
Visual group identification method of technical competitors ...
收藏 引用
IEEE International Conference on Computer Science and Automation engineering
作者: Han, Hong-Qi An, Xiaomi Zhu, Donghua Wang, Xuefeng Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China Ministry of Education Beijing 100872 China School of Management and Economics Beijing Institute of Technology Beijing 100872 China
Visualization technique is a powerful method used by science and technology intelligence analysis experts to identify technical competitor groups. Common visualization methods tend to create graphs meeting the aesthet... 详细信息
来源: 评论