咨询与建议

限定检索结果

文献类型

  • 611 篇 期刊文献
  • 597 篇 会议

馆藏范围

  • 1,208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 856 篇 工学
    • 683 篇 计算机科学与技术...
    • 599 篇 软件工程
    • 180 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 88 篇 生物工程
    • 72 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 55 篇 化学工程与技术
    • 54 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 45 篇 电气工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 22 篇 航空宇航科学与技...
    • 21 篇 土木工程
    • 16 篇 建筑学
    • 14 篇 网络空间安全
  • 476 篇 理学
    • 339 篇 数学
    • 106 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 56 篇 化学
    • 34 篇 系统科学
  • 289 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 44 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 20 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 knowledge engine...
  • 53 篇 laboratories
  • 50 篇 educational tech...
  • 41 篇 data mining
  • 27 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 21 篇 image segmentati...
  • 20 篇 feature extracti...
  • 16 篇 deep learning
  • 16 篇 genetic algorith...
  • 15 篇 reinforcement le...
  • 15 篇 artificial intel...
  • 14 篇 ontologies
  • 14 篇 topology
  • 14 篇 clustering algor...
  • 13 篇 support vector m...
  • 12 篇 neural networks

机构

  • 512 篇 college of compu...
  • 272 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 45 篇 college of softw...
  • 41 篇 key laboratory o...
  • 39 篇 school of artifi...
  • 35 篇 key laboratory o...
  • 32 篇 college of compu...
  • 29 篇 key laboratory o...
  • 24 篇 jilin university...
  • 21 篇 school of comput...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 department of co...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 46 篇 yang bo
  • 36 篇 liang yanchun
  • 35 篇 sun geng
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 30 篇 li xiongfei
  • 28 篇 li ximing
  • 27 篇 liu dayou
  • 27 篇 ouyang jihong
  • 27 篇 zuo wanli
  • 26 篇 yanchun liang
  • 24 篇 bo yang
  • 24 篇 liu yanheng
  • 23 篇 niyato dusit
  • 23 篇 yanheng liu
  • 21 篇 li jiahui
  • 20 篇 guan renchu
  • 20 篇 huang lan
  • 20 篇 da-you liu
  • 19 篇 dayou liu

语言

  • 1,111 篇 英文
  • 50 篇 中文
  • 47 篇 其他
检索条件"机构=A Key Laboratory of Symbolic Computation and Knowledge Engineering"
1208 条 记 录,以下是221-230 订阅
排序:
Value ordering heuristic for solving algorithm based on the AC-4 algorithm
Value ordering heuristic for solving algorithm based on the ...
收藏 引用
2nd International Workshop on Intelligent Systems and Applications, ISA2010
作者: Li, Zhan-Shan Du, Hui-Ying Xing, Shi-Mei Meng, Fan-Wei School of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China
We have studied the AC-4 algorithm and then present value ordering heuristic for solving algorithm BT-MSV which is based on the AC-4 algorithm. This algorithm takes full advantage of supported information which is rec... 详细信息
来源: 评论
Flexible planning using fuzzy description logics
Flexible planning using fuzzy description logics
收藏 引用
2007 International Conference on Artificial Intelligence, ICAI 2007
作者: Shi, Lian Sun, Jigui Lu, Shuai Yin, Minghao College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun 130012 China
Description Logics are formalisms for representing knowledge of various domains in a structured and formally well-understood way. Typically, DLs are limited to dealing with precise and well defined concepts. In this p... 详细信息
来源: 评论
key value ordering heuristic for solving algorithm based on the AC-4 algorithm
Key value ordering heuristic for solving algorithm based on ...
收藏 引用
2010 International Conference on Computer, Mechatronics, Control and Electronic engineering, CMCE 2010
作者: Li, Zhan-Shan Du, Hui-Ying Snen, Hai-Jiao Wang, Zi-Wen School of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
We have studied the AC-4 algorithm and then present key value ordering heuristic forming the new solving algorithm BT-KVV, which is based on the AC-4 algorithm. This algorithm takes full advantage of the state informa... 详细信息
来源: 评论
Black-box expectation propagation for Bayesian models
Black-box expectation propagation for Bayesian models
收藏 引用
2018 SIAM International Conference on Data Mining, SDM 2018
作者: Li, Ximing Li, Changchun Chi, Jinjin Ouyang, Jihong Wang, Wenting College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University China College of Mathematics Jilin University China
In this paper, we develop a generic black-box expectation propagation (BBEP) algorithm that can be directly applied to Bayesian models without model-specific derivations. BBEP is built on the spirit of using Monte Car... 详细信息
来源: 评论
A Sparse Optical Flow Method for Camera Tracking under Fisheye Camera Models  5
A Sparse Optical Flow Method for Camera Tracking under Fishe...
收藏 引用
5th International Conference on Frontiers Technology of Information and Computer, ICFTIC 2023
作者: Zhang, Zuoming Wang, Xin College of Computer Science and Technology Jilin China College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin China
In computer image processing, optical flow is a classic task used to track the motion of pixels. In the field of robotics, methods like SLAM extensively employ sparse optical flow as a substitute for time-consuming fe... 详细信息
来源: 评论
Warburg Effects in Cancer and Normal Proliferating Cells:Two Tales of the Same Name
收藏 引用
Genomics, Proteomics & Bioinformatics 2019年 第3期17卷 273-286页
作者: Huiyan Sun Liang Chen Sha Cao Yanchun Liang Ying Xu The China-Japan Union Hospital Jilin UniversityChangchun 130033China MOE Key Laboratory of Symbolic Computation and Knowledge Engineering College of Computer Science and TechnologyJilin UniversityChangchun 130012China Computational Systems Biology Lab Department of Biochemistry and Molecular Biology and Institute of BioinformaticsUniversity of GeorgiaAthensGA 30602USA Faculty of Health Sciences University of MacaoTaipaMacao SAR 999078China Department of Biostatistics School of MedicineIndiana UniversityIndianapolisIN 46202USA Zhuhai Laboratory of MOE Key Laboratory of Symbolic Computation and Knowledge Engineering Zhuhai College of Jilin UniversityZhuhai 519041China
It has been observed that both cancer tissue cells and normal proliferating cells(NPCs)have the Warburg *** goal here is to demonstrate that they do this for different *** accomplish this,we have analyzed the transcri... 详细信息
来源: 评论
Entailment-based axiom pinpointing in debugging incoherent terminologies  1
Entailment-based axiom pinpointing in debugging incoherent t...
收藏 引用
1st International Workshop on Semantic Technologies, IWOST 2015
作者: Ye, Yuxin Ouyang, Dantong Su, Jing College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China
One of the major problems of axiom pinpointing for incoherent terminologies is the precise positioning within the conflict axioms. In this paper we present a formal notion for the entailment-based axiom pinpointing of... 详细信息
来源: 评论
A wireless intrusion detection method based on dynamic growing neural network
A wireless intrusion detection method based on dynamic growi...
收藏 引用
First International Multi- Symposiums on Computer and computational Sciences, IMSCCS'06
作者: Liu, Yanheng Tian, Daxin Li, Bin Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China College of Mathematics Science Jilin University Changchun 130012 China
In this paper an intrusion detection method based on Dynamic Growing Neural Network (DGNN) for wireless networking is presented. DGNN is based on the Hebbian learning rule and adds new neurons under certain conditions... 详细信息
来源: 评论
RETRACTED ARTICLE: Experimental research on a new authentication protocol for wireless communication network based on WiMAX
RETRACTED ARTICLE: Experimental research on a new authentica...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Li, Ruixue Fang, Zhiyi Xu, Peng Xiao, Wei Wang, Wei Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China School of Computer Northeast Normal University Changchun 130000 China
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s... 详细信息
来源: 评论
Designment of E-R model based on RDF (S)  2
Designment of E-R model based on RDF (S)
收藏 引用
2nd International Workshop on Semantic Technologies, IWOST 2015
作者: Gao, Xiangbin Ouyang, Dantong Ye, Yuxin College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China
Based on the vast domain resources of RDF (S) on the web and SPARQL's powerful query ability, this article presents a new method of designment of E-R model. The steps for this design are: (1) Formu- lating SPARQL ... 详细信息
来源: 评论