咨询与建议

限定检索结果

文献类型

  • 66 篇 会议
  • 34 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 61 篇 工学
    • 53 篇 计算机科学与技术...
    • 39 篇 软件工程
    • 22 篇 信息与通信工程
    • 10 篇 电气工程
    • 9 篇 控制科学与工程
    • 8 篇 生物工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 光学工程
    • 3 篇 建筑学
    • 3 篇 土木工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 轻工技术与工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 化学工程与技术
  • 24 篇 理学
    • 15 篇 数学
    • 8 篇 生物学
    • 4 篇 物理学
    • 4 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 地球物理学
  • 19 篇 管理学
    • 13 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 公共卫生与预防医...
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 18 篇 software enginee...
  • 15 篇 data communicati...
  • 12 篇 data mining
  • 7 篇 australia
  • 6 篇 web mining
  • 5 篇 association rule...
  • 5 篇 information retr...
  • 4 篇 access control
  • 4 篇 xml
  • 4 篇 frequency
  • 4 篇 databases
  • 4 篇 artificial intel...
  • 3 篇 deep learning
  • 3 篇 systems engineer...
  • 3 篇 ontologies
  • 3 篇 communication sy...
  • 3 篇 image denoising
  • 3 篇 control systems
  • 3 篇 humans
  • 3 篇 hardware

机构

  • 11 篇 school of softwa...
  • 9 篇 school of softwa...
  • 8 篇 school of softwa...
  • 8 篇 school of softwa...
  • 7 篇 school of softwa...
  • 4 篇 school of softwa...
  • 3 篇 school of comput...
  • 3 篇 school of softwa...
  • 3 篇 school of inform...
  • 3 篇 the national eng...
  • 3 篇 department of sy...
  • 3 篇 peng cheng labor...
  • 3 篇 school of softwa...
  • 3 篇 the school of so...
  • 3 篇 school of comput...
  • 2 篇 college of compu...
  • 2 篇 school of artifi...
  • 2 篇 department of el...
  • 2 篇 the school of co...
  • 2 篇 information secu...

作者

  • 9 篇 yuefeng li
  • 8 篇 lin chia-wen
  • 8 篇 li yuefeng
  • 7 篇 tian chunwei
  • 6 篇 yue xu
  • 5 篇 xu yue
  • 5 篇 j. sitte
  • 5 篇 zuo wangmeng
  • 4 篇 zheng menghua
  • 4 篇 geva shlomo
  • 4 篇 jøsang audun
  • 4 篇 zhang yanning
  • 3 篇 zhong ning
  • 3 篇 sheng-tang wu
  • 3 篇 zhang shichao
  • 3 篇 joaquin sitte
  • 3 篇 n. zhong
  • 3 篇 nayak richi
  • 3 篇 p. winzer
  • 3 篇 fidge colin

语言

  • 99 篇 英文
  • 4 篇 其他
检索条件"机构=School of Software Engineering and Data Communications QUT"
103 条 记 录,以下是91-100 订阅
排序:
Interpretations of association rules by granular computing
Interpretations of association rules by granular computing
收藏 引用
作者: Li, Yuefeng Zhong, Ning School of Software Engineering and Data Communications Queensland University of Technology Brisbane QLD 4001 Australia Department of Systems and Information Engineering Maebashi Institute of Technology Maebashi 371-0816 Japan
This paper presents interpretations for association rules. It first introduces Pawlak's method, and the corresponding algorithm of finding decision rules (a kind of association rules). It then uses extended random... 详细信息
来源: 评论
Web based collection selection using singular value decomposition  03
Web based collection selection using singular value decompos...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: J. King Yuefeng Li School of Software Engineering and Data Communications Queensland University of Technology QLD Australia
As the number of electronic data collections available on the Internet increases, so does the difficulty of finding the right collection for a given query. Often the first time user is overwhelmed by the array of opti... 详细信息
来源: 评论
Agent-based privilege negotiation for E-commerce on World Wide Web
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2003年 2722卷 68-71页
作者: Au, Richard Yao, Ming Looi, Mark Information Security Research Centre School of Software Engineering and Data Communications Queensland University of Technology Brisbane QLD 4001 Australia
来源: 评论
Privilege negotiation agents for distributed authorisation on World Wide Web
Privilege negotiation agents for distributed authorisation o...
收藏 引用
IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT)
作者: R. Au Ming Yao M. Looi Information Security Research Centre School of Software Engineering and Data Communications Queensland University of Technology QLD Australia
Privilege negotiation agents migrate from the security servers of different administrative domains on the Internet to the user's secure client agent environment. They work cooperatively for trust establishment and... 详细信息
来源: 评论
Ontology-based Web mining model: representations of user profiles  03
Ontology-based Web mining model: representations of user pro...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Y. Li N. Zhong School of Software Engineering and Data Communications Queensland University of Technology QLD Australia Department of Systems and Information Engineering Meabashi Institute of Technology Japan
Web mining is used to search the right information from the Web to meet user information needs. Acquiring correct user profiles is difficult, since users may be unsure of their interests and may not wish to invest a g... 详细信息
来源: 评论
Interpretations of association rules by granular computing
Interpretations of association rules by granular computing
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Y. Li N. Zhong School of Software Engineering & Data Communications Queensland University of Technology Brisbane QLD Australia Department of Systems and Information Engineering Maebashi Institute of Technology Maebashi Japan
We present interpretations for association rules. We first introduce Pawlak's method, and the corresponding algorithm of finding decision rules (a kind of association rules). We then use extended random sets to pr... 详细信息
来源: 评论
A design pattern for Web-based parallel genetic algorithms
A design pattern for Web-based parallel genetic algorithms
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Maolin Tang School of Software Engineering and Data Communications Queensland University of Technology Brisbane QLD Australia
Aiming at developing more efficient and robust genetic algorithms (GA) over the Internet, a new asynchronous, coarse-grain parallel genetic algorithm model is proposed in this paper. On the basis of the model, we pres... 详细信息
来源: 评论
User profile model: A view from artificial intelligence  3rd
User profile model: A view from artificial intelligence
收藏 引用
3rd International Conference on Rough Sets and Current Trends in Computing, RSCTC 2002
作者: Li, Yuefeng Yao, Y.Y. School of Software Engineering and Data Communications Queensland University of Technology BrisbaneQLD4001 Australia Department of Computer Science University of Regina Regina SKS4S 0A2 Canada
The goal of this paper is to develop a user profile model for agent-based information filtering. We try to formalize the whole process of information filtering from an Artificial Intelligence point view. This research... 详细信息
来源: 评论
Advanced mean field methods: theory and practice
收藏 引用
Neurocomputing 2002年 第1-4期48卷 1057-1060页
作者: James M Hogan School of Software Engineering and Data Communications Queensland University of Technology GPO Box 2434 Brisbane Qld 4001 Australia
来源: 评论
ON A METHOD OF CRYPTANALYSIS FOR CRYPTOSYSTEM WITH INVOLUTION
收藏 引用
ELECTRONICS AND communications IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE 1995年 第5期78卷 1-11页
作者: TSUNOO, Y OKAMOTO, E UEMATSU, T Member NEC Software Hokuriku Ltd. Ishikawa Japan 920-21 School of Information Science Japan Advanced Institute of Science and Technology Ishikawa Japan 923-12 Members Tomohiko Uyematsu graduated in Electrical Engineering from Tokyo Institute of Technology in 1982 and received a Master's degree from the same university in 1984 after whichhe became an assistant in the Electrical and Electronics Engineering Department there. In1990 he became a Lecturer and in 1991 an Assistant Professor. In 1992 he became Assistant Professor at the School of Information Science Japan Advanced Institute of Science and Technology. He holds a doctorate in engineering. Among his research interests are signal theory optical communications theory coding theory and data compression algorithms. In 1988 he received a Shinohara Commemorative Science Encouragement Prize and in 1992 a Best Paper Award. He is the author of the bookIntroduction to Record Data Compression Algorithms. He is a member of the Measurement Control Society and the Society for Information Theory and Its Applications.
Cryptology provides the technological basis for guaranteed network security. In the field of business, to guarantee the security of information, everyone needs easy-to-use cryptology. Starting with the announcement by... 详细信息
来源: 评论