咨询与建议

限定检索结果

文献类型

  • 429 篇 期刊文献
  • 399 篇 会议

馆藏范围

  • 828 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 576 篇 工学
    • 462 篇 计算机科学与技术...
    • 381 篇 软件工程
    • 128 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 60 篇 生物工程
    • 45 篇 生物医学工程(可授...
    • 41 篇 电子科学与技术(可...
    • 39 篇 机械工程
    • 36 篇 电气工程
    • 33 篇 化学工程与技术
    • 29 篇 光学工程
    • 22 篇 航空宇航科学与技...
    • 17 篇 交通运输工程
    • 16 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 13 篇 土木工程
  • 301 篇 理学
    • 215 篇 数学
    • 69 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 42 篇 物理学
    • 33 篇 化学
    • 24 篇 系统科学
  • 193 篇 管理学
    • 104 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 31 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
    • 10 篇 公共卫生与预防医...
  • 12 篇 法学
    • 10 篇 社会学
  • 9 篇 农学
  • 5 篇 经济学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 48 篇 computer science
  • 41 篇 educational inst...
  • 39 篇 laboratories
  • 39 篇 educational tech...
  • 36 篇 knowledge engine...
  • 23 篇 computer science...
  • 21 篇 data mining
  • 14 篇 reinforcement le...
  • 13 篇 semantics
  • 13 篇 feature extracti...
  • 12 篇 image segmentati...
  • 12 篇 contrastive lear...
  • 11 篇 ontologies
  • 10 篇 deep learning
  • 10 篇 authentication
  • 9 篇 recommender syst...
  • 9 篇 genetic algorith...
  • 9 篇 topology
  • 9 篇 training
  • 8 篇 sun

机构

  • 400 篇 college of compu...
  • 288 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 33 篇 college of softw...
  • 31 篇 college of compu...
  • 24 篇 jilin university...
  • 23 篇 school of artifi...
  • 20 篇 jilin university...
  • 19 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 16 篇 school of comput...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 college of compu...
  • 14 篇 the college of c...
  • 11 篇 college of softw...
  • 11 篇 key laboratory o...

作者

  • 39 篇 yang bo
  • 35 篇 sun geng
  • 28 篇 li ximing
  • 25 篇 ouyang jihong
  • 24 篇 niyato dusit
  • 23 篇 dantong ouyang
  • 22 篇 yanheng liu
  • 22 篇 li jiahui
  • 21 篇 liu dayou
  • 21 篇 chen haipeng
  • 21 篇 bo yang
  • 20 篇 liu yanheng
  • 20 篇 li xiongfei
  • 19 篇 ouyang dantong
  • 19 篇 huang lan
  • 18 篇 dayou liu
  • 17 篇 guan renchu
  • 17 篇 wang jiacheng
  • 16 篇 wang jian
  • 16 篇 zhang chunxu

语言

  • 733 篇 英文
  • 79 篇 其他
  • 16 篇 中文
检索条件"机构=1. Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education"
828 条 记 录,以下是641-650 订阅
排序:
Verilog combinational equivalence checking based on smt constraint solver
收藏 引用
ICIC Express Letters, Part B: Applications 2011年 第5期2卷 1087-1092页
作者: Zeng, Hailin Ouyang, Dantong Zhang, Yuehua Zhang, Liming Zhang, Guiling School of Computer Science and Technology Jilin University No. 2699 Qanjin Street Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University No. 2699 Qanjin Street Changchun 130012 China Software College Jilin University No. 2699 Qanjin Street Changchun 130012 China
Most previous works on combinational equivalence checking use BDDs and other Boolean level representations to formulate and solve the problem, and therefore, not utilizing the word-level information inherently present... 详细信息
来源: 评论
A verifiable multi-secret sharing scheme
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2011年 第SUPPL.1期32卷 120-123页
作者: Wang, Yan-Xi Liu, Yan-Heng Wang, Jian Dong, Tian-Zhe College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Analyzing two improved YCH schemes and a multi-secret sharing scheme based on homogeneous linear recursion, we propose and implement a new verifiable multi-secret sharing model based on Shamir secret sharing. The time... 详细信息
来源: 评论
Using TCM in mobile terminals in internet of vehicles
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2011年 第SUPPL.1期32卷 107-110页
作者: Gao, Wen-Bin Liu, Yan-Heng Wang, Jian College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TC... 详细信息
来源: 评论
A fuzzy adaptive multi-population parallel genetic algorithm for spam filtering
收藏 引用
Journal of Convergence Information Technology 2011年 第2期6卷 172-182页
作者: Zhao, Zheng-dong Wang, Gang Zhao, Wei Chen, Hui-ling Zhao, Wei Li, Lu-lu Network Information Center Changchun University of Science and Technology Changchun China College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Department of Information Engineering Jilin Police College China Branch Institute of information technology Changchun Vocational Institute of Technology Changchun China
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering met... 详细信息
来源: 评论
Simulating the Folding Pathway of RNA Secondary Structure Using the Modified Ant Colony Algorithm
收藏 引用
Journal of Bionic engineering 2010年 第4期7卷 382-389页
作者: Jun Yu~(1.2),Changhai Zhang~(1.2),Yuanning Liu~(1.2),Xin Li~(1.2) 1.College of Computer Science and Technology,Jilin University,Changchun 1.001.,P.R.China 2.key {1. of symbolic computation and knowledge engineering (ministry of education,China) Jilin University,Changchun 1.001.,P.R.China [a] College of Computer Science Technology Jilin University Changchun 130012 P. R. China [b] Key Laboratory of Symbolic Computation Knowledge Engineering (Ministry of Education China) Jilin University Changchun 130012 P. R. China
A new method for simulating the folding pathway of RNA secondary structure using the modified ant colony algorithmis *** a given RNA sequence,the set of all possible stems is obtained and the energy of each stem iscal... 详细信息
来源: 评论
Interval-valued fuzzy description logic IFALCN - Preliminary results
Interval-valued fuzzy description logic IFALCN - Preliminary...
收藏 引用
201. IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 201.
作者: Huo, Linlin Ouyang, Jihong Liu, Dayou Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun China
To represent and reason with interval-value information of applications in description logic, based on interval-fuzzy set the classical des cription logic ALCN is extended to the fuzzy description logic IFALCN. Its... 详细信息
来源: 评论
Improved evaluation algorithm of contour detection
收藏 引用
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (engineering and Technology Edition) 2011年 第SUPPL. 1期41卷 179-182页
作者: Zhao, Hong-Wei Liu, Jing Chen, Hua-Cheng Cui, Hong-Rui College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering for Ministry of Education Jilin University Changchun 130012 China Scientific Information Bureau Jilin Transportion Chares Administration Changchun 130061 China
For the low accuracy and imprecise of contour detection evaluation algorithm for a natural image with Ground Truth, we proposed a neighborhood matching algorithm, which had been combined with the original algorithm, a... 详细信息
来源: 评论
A globally optimal approach for surveillance video cropping
A globally optimal approach for surveillance video cropping
收藏 引用
作者: Liu, Jin Shi, Xiaohu Zhang, Yu College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education 130012 Changchun China
In this paper, a novel approach for surveillance video cropping is presented. The basic idea is to obtain a trajectory that a small sub-window can take through the video, selecting the most important regions of the vi... 详细信息
来源: 评论
Solving SAT problem with Boolean algebra
Solving SAT problem with Boolean algebra
收藏 引用
International Conference on Frontier of Computer Science and Technology
作者: Xu, Youjun Ouyang, Dantong Ye, Yuxin He, Jialiang College of Computer Science and Technology China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun China
The satisfiability(SAT) problem is an important problem of automated reasoning. In the past decades, many methods of SAT are proposed, such as method based on resolution, method based on tableau and method based on ex... 详细信息
来源: 评论
RMADV-Hop: An improved DV-Hop localization algorithm
RMADV-Hop: An improved DV-Hop localization algorithm
收藏 引用
7th International Conference on Information Technology - New Generations, ITNG 201.
作者: Yi, Tingting Fang, Zhiyi Li, Ruixue College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun 130012 China
In recent years, with the development of the wireless sensor networks, the localization method receives the attention of many researchers. However, due to the network cost and characteristics of sensor nodes, most of ... 详细信息
来源: 评论