咨询与建议

限定检索结果

文献类型

  • 616 篇 期刊文献
  • 600 篇 会议

馆藏范围

  • 1,216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 857 篇 工学
    • 683 篇 计算机科学与技术...
    • 599 篇 软件工程
    • 180 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 88 篇 生物工程
    • 73 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 55 篇 化学工程与技术
    • 54 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 45 篇 电气工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 22 篇 航空宇航科学与技...
    • 21 篇 土木工程
    • 16 篇 建筑学
    • 14 篇 网络空间安全
  • 477 篇 理学
    • 339 篇 数学
    • 106 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 56 篇 化学
    • 35 篇 系统科学
  • 289 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 44 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 20 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 knowledge engine...
  • 53 篇 laboratories
  • 50 篇 educational tech...
  • 41 篇 data mining
  • 27 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 21 篇 image segmentati...
  • 20 篇 feature extracti...
  • 16 篇 deep learning
  • 16 篇 genetic algorith...
  • 15 篇 reinforcement le...
  • 15 篇 artificial intel...
  • 14 篇 ontologies
  • 14 篇 topology
  • 14 篇 clustering algor...
  • 13 篇 support vector m...
  • 12 篇 neural networks

机构

  • 514 篇 college of compu...
  • 273 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 46 篇 college of softw...
  • 42 篇 key laboratory o...
  • 40 篇 school of artifi...
  • 36 篇 key laboratory o...
  • 32 篇 college of compu...
  • 29 篇 key laboratory o...
  • 24 篇 jilin university...
  • 21 篇 school of comput...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 department of co...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 46 篇 yang bo
  • 36 篇 liang yanchun
  • 35 篇 sun geng
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 30 篇 li xiongfei
  • 28 篇 li ximing
  • 27 篇 liu dayou
  • 27 篇 ouyang jihong
  • 27 篇 zuo wanli
  • 26 篇 yanchun liang
  • 25 篇 bo yang
  • 24 篇 liu yanheng
  • 23 篇 niyato dusit
  • 23 篇 yanheng liu
  • 21 篇 li jiahui
  • 20 篇 guan renchu
  • 20 篇 huang lan
  • 20 篇 da-you liu
  • 19 篇 dayou liu

语言

  • 1,119 篇 英文
  • 50 篇 中文
  • 47 篇 其他
检索条件"机构=A Key Laboratory of Symbolic Computation and Knowledge Engineering"
1216 条 记 录,以下是971-980 订阅
排序:
Extending the Expression Ability of LAV Using Ontology Technique
Extending the Expression Ability of LAV Using Ontology Techn...
收藏 引用
International Conference on Information Technology and Computer Science, ITCS
作者: Hao Liang Fei Ren Wanli Zuo Aiqi Zhang College of Computer Science and Technology Jilin University Changchun China Department of Information Changchun Taxation College Changchun China Engineering of the Ministry of Education Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Information fusion is an interdisciplinary research field aiming to combine and merge the information or data from different information sources. The output of information fusion system is a global schema through whic... 详细信息
来源: 评论
Generating the semantic containers for the query interfaces of deep web
Generating the semantic containers for the query interfaces ...
收藏 引用
International Conference on Management and Service Science, MASS 2009
作者: Hao, Liang Wanli, Zuo Jian, Chen Yunge, Mao College of Computer Science and Technology Jilin University Changchun 130012 China Department of Information Changchun Taxation College Changchun 130117 China Key Laboratory of Symbol Computation Knowledge Engineering of the Ministry of Education Changchun 130012 China Network Center of Changchun Taxation College Changchun 130117 China
With the myriad emergence of the online Web Database, the Web is divided into a two layers information platform which is composed of Surface Web and Deep Web. The huge information hidden in the Deep Web is higher in t... 详细信息
来源: 评论
Ontology-based filling forms of deep web entries automatically
收藏 引用
Journal of computational Information Systems 2009年 第6期5卷 1553-1560页
作者: Zuo, Wanli Wang, Ying Wang, Xin Ji, Wenyan Peng, Tao College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Computation and Knowledge Engineering China College of Software Changchun Institute of Technology Changchun 130012 China
An increasing number of databases are becoming web accessible through form-based query interfaces, therefore, this paper proposes a novel method of filling forms on deep web data integration system, which contains thr... 详细信息
来源: 评论
New preprocessing technique based on entirety singleton consistency
收藏 引用
Zidonghua Xuebao/ Acta Automatica Sinica 2009年 第1期35卷 71-76页
作者: Zhu, Xing-Jun Sun, Ji-Gui Zhang, Yong-Gang Li, Ying College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Changchun 130012 China
This paper studies the technique of preprocessing in constraint satisfaction problem (CSP). Firstly, we propose a notion of entirety singleton consistency (ESC) and the algorithm, and then analyze the time and space c... 详细信息
来源: 评论
Novel theorem proving algorithm based on extension rule
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2009年 第1期46卷 9-14页
作者: Sun, Jigui Li, Ying Zhu, Xingjun Lu, Shuai College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Changchun 130012 China
ATP (automated theorem proving) has always been one of the most advanced areas of computer science. The traditional idea used in ATP is to try to deduce the empty clause to check satisfiability, such as resolution bas... 详细信息
来源: 评论
Escrow mechanism for personal security keys on IBE
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 75-80页
作者: Zou, Yue-Peng Ouyang, Dan-Tong He, Li-Li Bai, Hong-Tao College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A new escrow mechanism for personal security keys on IBE was proposed. This mechanism constructed a security trust system composed of private key generator, key management center, and user security component to set up... 详细信息
来源: 评论
Extracting Attributes from Deep Web Interface Using Instances
Extracting Attributes from Deep Web Interface Using Instance...
收藏 引用
Computer Science and Information engineering, CSIE, WRI World Congress on FLAGGED
作者: Hao Liang Fei Ren Wanli Zuo Fengling He Junhua Wang College of Computer Science and Technology Jilin University Changchun China Department of Information Changchun Taxation College Changchun China Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of Education Changchun China
There is myriad high quality information in the Deep Web and the feasible method to access the Deep Web is through the query interface of the Deep Web. Itpsilas necessary to extract abundant attributes and semantic re... 详细信息
来源: 评论
Science Letters:Model for cascading failures in congested Internet
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & engineering) 2008年 第10期9卷 1331-1335页
作者: Jian WANG Yan-heng LIU Jian-qi ZHU Yu JIAO Key Lab of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun 130012 China
Cascading failures often occur in congested networks such as the Internet. A cascading failure can be described as a three-phase process: generation, diffusion, and dissipation of the congestion. In this account, we ... 详细信息
来源: 评论
Novel trusted authentication and evaluation framework in VANET
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 107-113页
作者: Wu, Jing Liu, Yan-Heng Wang, Jian Li, Wei-Ping College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Changchun Jilin University Information Technologies Co. Ltd. Changchun 130012 China
Vehicular ad hoc networks (VANET) have many new characteristics unlike tranditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo... 详细信息
来源: 评论
RETRACTED ARTICLE: The IDS model adapt to load characteristic under IPv6/4 environment
RETRACTED ARTICLE: The IDS model adapt to load characteristi...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Wei, Chuyi Fang, Zhiyi Li, Wei Liu, Xiaonan Yang, Hongjun Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
Thih paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamical... 详细信息
来源: 评论