咨询与建议

限定检索结果

文献类型

  • 626 篇 期刊文献
  • 597 篇 会议

馆藏范围

  • 1,223 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 871 篇 工学
    • 696 篇 计算机科学与技术...
    • 606 篇 软件工程
    • 186 篇 信息与通信工程
    • 103 篇 控制科学与工程
    • 88 篇 生物工程
    • 73 篇 生物医学工程(可授...
    • 62 篇 机械工程
    • 55 篇 电子科学与技术(可...
    • 55 篇 化学工程与技术
    • 48 篇 电气工程
    • 46 篇 光学工程
    • 27 篇 仪器科学与技术
    • 25 篇 交通运输工程
    • 23 篇 航空宇航科学与技...
    • 22 篇 土木工程
    • 17 篇 建筑学
    • 17 篇 网络空间安全
  • 484 篇 理学
    • 345 篇 数学
    • 108 篇 生物学
    • 85 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 58 篇 化学
    • 34 篇 系统科学
  • 292 篇 管理学
    • 154 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 51 篇 医学
    • 42 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 20 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 knowledge engine...
  • 53 篇 laboratories
  • 50 篇 educational tech...
  • 42 篇 data mining
  • 28 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 23 篇 image segmentati...
  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 reinforcement le...
  • 16 篇 genetic algorith...
  • 15 篇 artificial intel...
  • 14 篇 ontologies
  • 14 篇 topology
  • 14 篇 clustering algor...
  • 13 篇 support vector m...
  • 12 篇 neural networks

机构

  • 517 篇 college of compu...
  • 282 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 46 篇 college of softw...
  • 41 篇 key laboratory o...
  • 40 篇 school of artifi...
  • 35 篇 key laboratory o...
  • 32 篇 college of compu...
  • 29 篇 key laboratory o...
  • 26 篇 jilin university...
  • 21 篇 school of comput...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 department of co...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 46 篇 yang bo
  • 36 篇 sun geng
  • 36 篇 liang yanchun
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 30 篇 li xiongfei
  • 28 篇 li ximing
  • 27 篇 liu dayou
  • 27 篇 ouyang jihong
  • 27 篇 zuo wanli
  • 26 篇 yanchun liang
  • 24 篇 niyato dusit
  • 24 篇 bo yang
  • 24 篇 liu yanheng
  • 23 篇 yanheng liu
  • 22 篇 huang lan
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 20 篇 guan renchu
  • 20 篇 da-you liu

语言

  • 1,125 篇 英文
  • 50 篇 中文
  • 48 篇 其他
检索条件"机构=A Key Laboratory of Symbolic Computation and Knowledge Engineering"
1223 条 记 录,以下是121-130 订阅
排序:
DeciLS-PBO: an effective local search method for pseudo-Boolean optimization
收藏 引用
Frontiers of Computer Science 2024年 第5期18卷 239-241页
作者: Luyu JIANG Dantong OUYANG Qi ZHANG Liming ZHANG College of Computer Science and Technology Jilin UniversityChangchun 130012China Key Laboratory of Symbolic Computation and Knowledge Engineering(Ministry of Education) Jilin UniversityChangchun 130012China
1 Introduction Local search method is a rising star for solving combinatorial optimization problems in recent years,and the state-of-the-art local search-based incomplete Maximum Satisfiability(MaxSAT)solversshowpromi... 详细信息
来源: 评论
Applying model-transformation techniques to ontology evolution
Applying model-transformation techniques to ontology evoluti...
收藏 引用
2nd International Conference on Grid Service engineering and Management, GSEM 2005 - Co-located with the 6th International Conference on Net.ObjectDays 2005, NODe 2005
作者: Jin, Longfei Liu, Lei Guo, Degui Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education of China Jilin University Changchun China
Ontology evolution in the Model Driven Semantic Web can be looked as a process of model transformations. A model-transformation based conceptual framework for ontology evolution is presented in the paper. Applications... 详细信息
来源: 评论
A Simplified Rational Representation for Positive-Dimensional Polynomial Systems and SHEPWM Equations Solving
收藏 引用
Journal of Systems Science & Complexity 2017年 第6期30卷 1470-1482页
作者: SHANG Baoxin ZHANG Shugong TAN Chang XIA Peng School of Mathematics Key Laboratory of Symbolic Computation and Knowledge Engineering (Ministry of Education) Jilin University College of Science Northeast Electric Power University College of Science Northeast Forestry University School of Mathematics Liaoning University
The paper is concerned with the improvement of the rational representation theory for solving positive-dimensional polynomial systems. The authors simplify the expression of rational representation set proposed by Tan... 详细信息
来源: 评论
An Automatic Solution in Security Inspection  7
An Automatic Solution in Security Inspection
收藏 引用
7th International Conference on Machine Vision and Information Technology, CMVIT 2023
作者: Zhang, Hui Zhang, Xiaoli Ministry of Education Key Laboratory of Symbolic Computation and Knowledge Engineer Changchun China
In this paper, we present a brand new dataset named cellphone buttery defects in X-ray(CBDx). CBDx consists of 300 X-ray images and 250 of them are anomaly free. We name them 'good'. Others have some defects i... 详细信息
来源: 评论
Integrity constraints in OWL ontologies based on grounded circumscription
收藏 引用
Frontiers of Computer Science 2013年 第6期7卷 812-821页
作者: Dantong OUYANG College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun 130012 China National Engineering Research Center of Geophysics Exploration Instruments Changchun 130026 China
The extensions for logic-based knowledge bases with integrity constraints are rather popular. We put forward an alternative criteria for analysis of integrity constraints in Web ontology language (OWL) ontology unde... 详细信息
来源: 评论
RETRACTED ARTICLE: The IDS model adapt to load characteristic under IPv6/4 environment
RETRACTED ARTICLE: The IDS model adapt to load characteristi...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Wei, Chuyi Fang, Zhiyi Li, Wei Liu, Xiaonan Yang, Hongjun Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
Thih paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamical... 详细信息
来源: 评论
Affine-periodic solutions by averaging methods
收藏 引用
Science China Mathematics 2018年 第3期61卷 439-452页
作者: Jiamin Xing Xue Yang Yong Li College of Mathematics Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University School of Mathematics and Statistics Northeast Normal University Center for Mathematics and Interdisciplinary Sciences Northeast Normal University
This paper concerns the existence of affine-periodic solutions for perturbed affine-periodic *** kind of affine-periodic solutions has the form of x(t+T)≡Qx(t) with some nonsingular matrix Q,which may be quasi-period... 详细信息
来源: 评论
Experimental study of the three key issues of multi-auctioneer model in computer grid
Experimental study of the three key issues of multi-auctione...
收藏 引用
18th IASTED International Conference on Parallel and Distributed Computing and Systems
作者: Han, Xiao Fang, Zhiyi Wang, Wanyu Xu, Fengyuan Huang, Mengzhou School of Economics and Information Systems School of Computer Science and Technology Key Laboratory Symbolic Computation and Knowledge Engineering Education Ministry
By means of introducing multi-auctioneer model, resources in the computational economic grid can be managed and allocated like in the auction. We research and put forward the corresponding solve schemes of three key i... 详细信息
来源: 评论
Design for network camera based on DSP
Design for network camera based on DSP
收藏 引用
2006 International Conference on Hybrid Information Technology, ICHIT 2006
作者: Zhezhou, Yu Yuchen, Xie Congying, Lv Chunguang, Zhou Faner, Meng Lei, Liu Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
The hardware design of the DSP-based network camera is described in this paper which includes the implementation of CCD camera, DSP, Flash, SDRAM, CPLD, and Ethernet. The program of JPEG2000has been tested on the desi... 详细信息
来源: 评论
Research on Trust Prediction from a Sociological Perspective
收藏 引用
Journal of Computer Science & Technology 2015年 第4期30卷 843-858页
作者: 王英 王鑫 左万利 College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun 130012 China School of Computer Technology and Engineering Changehun Institute of Technology Changchun 130012 China
Trust, as a major part of human interactions, plays an important role in helping users collect reliable infor-mation and make decisions. However, in reality, user-specified trust relations are often very sparse and fo... 详细信息
来源: 评论