咨询与建议

限定检索结果

文献类型

  • 1,969 篇 期刊文献
  • 1,484 篇 会议
  • 1 册 图书

馆藏范围

  • 3,454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,367 篇 工学
    • 1,529 篇 计算机科学与技术...
    • 1,236 篇 软件工程
    • 581 篇 信息与通信工程
    • 355 篇 电气工程
    • 277 篇 电子科学与技术(可...
    • 263 篇 控制科学与工程
    • 249 篇 生物工程
    • 181 篇 化学工程与技术
    • 178 篇 光学工程
    • 158 篇 生物医学工程(可授...
    • 145 篇 机械工程
    • 132 篇 仪器科学与技术
    • 105 篇 材料科学与工程(可...
    • 86 篇 动力工程及工程热...
    • 72 篇 交通运输工程
    • 71 篇 建筑学
  • 1,324 篇 理学
    • 630 篇 数学
    • 423 篇 物理学
    • 298 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 175 篇 化学
    • 86 篇 系统科学
    • 70 篇 地球物理学
  • 655 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 315 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 158 篇 医学
    • 136 篇 临床医学
    • 104 篇 基础医学(可授医学...
    • 70 篇 药学(可授医学、理...
  • 96 篇 法学
    • 81 篇 社会学
  • 58 篇 经济学
  • 44 篇 农学
  • 24 篇 教育学
  • 9 篇 文学
  • 9 篇 军事学
  • 3 篇 艺术学

主题

  • 97 篇 semantics
  • 73 篇 feature extracti...
  • 72 篇 deep learning
  • 61 篇 training
  • 58 篇 data mining
  • 46 篇 computational mo...
  • 43 篇 convolution
  • 35 篇 data models
  • 33 篇 object detection
  • 33 篇 machine learning
  • 30 篇 task analysis
  • 30 篇 visualization
  • 29 篇 optimization
  • 29 篇 accuracy
  • 28 篇 knowledge engine...
  • 28 篇 big data
  • 28 篇 federated learni...
  • 26 篇 semantic segment...
  • 26 篇 contrastive lear...
  • 25 篇 knowledge graph

机构

  • 156 篇 school of inform...
  • 101 篇 school of comput...
  • 98 篇 university of ch...
  • 54 篇 university of sc...
  • 52 篇 school of econom...
  • 51 篇 school of inform...
  • 51 篇 fujian provincia...
  • 47 篇 school of physic...
  • 47 篇 key laboratory o...
  • 44 篇 hebei normal uni...
  • 44 篇 state key labora...
  • 44 篇 yunnan observato...
  • 43 篇 school of cyber ...
  • 42 篇 tianfu cosmic ra...
  • 42 篇 center for astro...
  • 41 篇 department of ph...
  • 40 篇 key laboratory o...
  • 40 篇 school of inform...
  • 40 篇 college of physi...
  • 39 篇 key laboratory o...

作者

  • 46 篇 feng c.f.
  • 46 篇 guo y.q.
  • 46 篇 bao y.w.
  • 44 篇 hu h.b.
  • 44 篇 liu b.
  • 44 篇 danzengluobu
  • 43 篇 li xin
  • 42 篇 niyato dusit
  • 42 篇 li cheng
  • 41 篇 liu c.
  • 40 篇 axikegu
  • 39 篇 fang j.
  • 39 篇 huang y.
  • 38 篇 bastieri d.
  • 38 篇 jiang k.
  • 38 篇 kuleshov d.
  • 38 篇 min z.
  • 38 篇 liu d.
  • 38 篇 chen m.j.
  • 38 篇 luo q.

语言

  • 2,927 篇 英文
  • 456 篇 其他
  • 75 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Information Technology Jiangxi Key Laboratory of Data and Knowledge Engineering"
3454 条 记 录,以下是3321-3330 订阅
排序:
Vulnerabilities Static Detection for Web Applications with False Positive Suppression
Vulnerabilities Static Detection for Web Applications with F...
收藏 引用
2010 IEEE International Conference on information Theory and information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Bin Liang Qianqian Wang Jianjun Huang Jiagui Zhong Jingjing Cai Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) MOE Schoo School of Information Renmin University of China Beijing 100872 China Beijing Venustech Cybervision Co. Ltd Beijing 100094 China
Web applications become more and more important, and the corresponding security problems have been concerned about. This paper presents TASA, an ASP static analyzer, which employs a path-sensitive, inter-procedural an... 详细信息
来源: 评论
Studies and implementation of the trusted process mechanism in a secure operating system
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2010年 第SUPPL. 1期50卷 1547-1553页
作者: Zhang, Chongbin Li, Fengjuan Liang, Bin China Information Technology Security Evaluation Center Beijing 100085 China Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renming University of China Beijing 100872 China
The trusted process mechanism is an important part of the operating system security mechanism, but there is no uniform definition of the trusted process and there are some limitations in understanding its fundamental ... 详细信息
来源: 评论
Exploring some issues of sub-pixel mapping based on directly spatial attraction
Exploring some issues of sub-pixel mapping based on directly...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Jian Zhang Xiaoling Chen WenXia Gan Shoujin Yin Hao Wu College of Resources and Environment Huazhong Agricultural University HZAU Wuhan China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing (Liesmars) Wuhan University Wuhan China Key Laboratory of Poyang Lake Ecological Environment and Resource Development Jiangxi Normal University Nanchang Jiangxi China School of Resource and Environment Engineering Wuhan University of Technology Wuhan Hubei China
With pixel un-mixing, the omission of pixel caused by mixed pixel can be resolved so as to improve the classification accuracy. But the trouble is only the proportion of each end member object in one pixel which can b... 详细信息
来源: 评论
Hierarchical Certificateless Signatures
Hierarchical Certificateless Signatures
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: Lei Zhang Qianhong Wu Josep Domingo-Ferrer Bo Qin UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Wuhan University of Technology China School of Science Department of Maths Xi'an University of Technology China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
A Review-Based Reputation Evaluation Approach for Web Services
收藏 引用
Journal of Computer Science & technology 2009年 第5期24卷 893-900页
作者: 李海华 杜小勇 Member 田萱 Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) MOE Beijing 100872 China School of Information Renmin University of China Beijing 100872 China School of Information Science & Technology Beijing Forestry University Beijing 100083 China
Web services are commonly perceived as an environment of both offering opportunities and threats. In this environment, one way to minimize threats is to use reputation evaluation, which can be computed, for example, t... 详细信息
来源: 评论
Median query research in wireless sensor networks
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2010年 第2A期38卷 133-137页
作者: Wu, Zhong-Bo Zhang, Hui Chen, Hong Information School Renmin University of China Beijing 100872 China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing 100872 China School of Mathematics and Computer Science Xiangfan University Xiangfan Hubei 441053 China
Poor quality and harsh condition can result in faulty and outlier data in sampling data of sensor nodes. So we need median query to reflect average level of monitoring region. First, we put forward HMA algorithm. Seco... 详细信息
来源: 评论
Rapid resynchronization method for replication in-memory databases supporting mobile communication applications
Rapid resynchronization method for replication in-memory dat...
收藏 引用
2009 WRI World Congress on Computer Science and information engineering, CSIE 2009
作者: Guoqiong, Liao Jing, Li School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 Thailand Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 Thailand
In this paper, a rapid resynchronization method using intent logs is suggested for replication In-memory databases supporting mobile communication applications. Both the identifiers of unsynchronized segments and the ... 详细信息
来源: 评论
Efficient processing of global Top-k aggregate queries in uncertain database
Efficient processing of global Top-k aggregate queries in un...
收藏 引用
2009 International Conference on information engineering and Computer Science, ICIECS 2009
作者: Xing, Xianli Liu, Dexi Principal's Office Jiangxi University of Finance and Economics Nanchang China School of Information Technology Jiangxi University of Finance and Economics Jiangxi Key Laboratory of Data and Knowledge Engineering Nanchang China
Top-k queries in uncertain databases are quite popular and useful due to its wide application usage. However, compared to Top-k in traditional databases, queries over uncertain database are more complicated because of... 详细信息
来源: 评论
Approximation algorithm for constructing data aggregation trees for wireless sensor networks
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第4期3卷 524-534页
作者: Deying LI Jiannong CAO Qinghua ZHU Key Laboratory of Data Engineering and Knowledge Engineering School of InformationRenmin University of ChinaBeijing 100872China Internet and Mobile Computing Lab Department of ComputingHong Kong Polytechnic UniversityHong KongChina
This paper considers the problem of constructing data aggregation trees in wireless sensor networks (WSNs)for a group of sensor nodes to send collected information to a single sink *** data aggregation tree contains t... 详细信息
来源: 评论
Lightweight data mining based database system self-optimization: A case study
Lightweight data mining based database system self-optimizat...
收藏 引用
Joint International Conference on Advances in data and Web Management, APWeb/WAIM 2009
作者: Qin, Xiongpai Cao, Wei Wang, Shan Key Laboratory of Data Engineering and Knowledge Engineering School of Information Renmin University of China MOE Beijing 100872 China
With the system becoming more complex and workloads becoming more fluctuating, it is very hard for DBA to quickly analyze performance data and optimize the system, self optimization is a promising technique. A data mi... 详细信息
来源: 评论