咨询与建议

限定检索结果

文献类型

  • 623 篇 期刊文献
  • 607 篇 会议

馆藏范围

  • 1,230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 877 篇 工学
    • 702 篇 计算机科学与技术...
    • 596 篇 软件工程
    • 180 篇 信息与通信工程
    • 120 篇 控制科学与工程
    • 86 篇 生物工程
    • 72 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 55 篇 电子科学与技术(可...
    • 54 篇 化学工程与技术
    • 47 篇 电气工程
    • 45 篇 光学工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 23 篇 航空宇航科学与技...
    • 21 篇 土木工程
    • 16 篇 建筑学
    • 15 篇 网络空间安全
  • 472 篇 理学
    • 337 篇 数学
    • 102 篇 生物学
    • 80 篇 统计学(可授理学、...
    • 61 篇 物理学
    • 55 篇 化学
    • 35 篇 系统科学
  • 291 篇 管理学
    • 152 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 46 篇 医学
    • 38 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 20 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 laboratories
  • 52 篇 knowledge engine...
  • 50 篇 educational tech...
  • 41 篇 data mining
  • 27 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 23 篇 feature extracti...
  • 22 篇 image segmentati...
  • 16 篇 reinforcement le...
  • 16 篇 deep learning
  • 16 篇 genetic algorith...
  • 15 篇 artificial intel...
  • 14 篇 ontologies
  • 14 篇 contrastive lear...
  • 14 篇 topology
  • 14 篇 clustering algor...
  • 13 篇 support vector m...

机构

  • 529 篇 college of compu...
  • 288 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 46 篇 college of softw...
  • 42 篇 key laboratory o...
  • 41 篇 school of artifi...
  • 36 篇 key laboratory o...
  • 31 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 jilin university...
  • 22 篇 school of comput...
  • 20 篇 jilin university...
  • 19 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 department of co...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 47 篇 yang bo
  • 36 篇 sun geng
  • 35 篇 liang yanchun
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 31 篇 li ximing
  • 30 篇 li xiongfei
  • 27 篇 liu dayou
  • 27 篇 ouyang jihong
  • 27 篇 zuo wanli
  • 26 篇 bo yang
  • 25 篇 yanchun liang
  • 24 篇 niyato dusit
  • 24 篇 liu yanheng
  • 23 篇 guan renchu
  • 23 篇 yanheng liu
  • 23 篇 huang lan
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 20 篇 da-you liu

语言

  • 1,095 篇 英文
  • 85 篇 其他
  • 50 篇 中文
检索条件"机构=Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering"
1230 条 记 录,以下是581-590 订阅
排序:
The vehicle audio encryption system based on scrambling thought
The vehicle audio encryption system based on scrambling thou...
收藏 引用
2018 International Conference on Network, Communication, Computer engineering (NCCE 2018)
作者: Peibin Wu Jindong Zhang Yang Liu Dongqi Han Yiding Sun College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University State Key Laboratory of Automobile Simulation and Control Jilin University
In this paper,the vehicle audio encryption system based on scrambling thought and applied to vehicle-mounted media is *** pseudo random number is generated each time it is encrypted,and it is substituted into the Fibo... 详细信息
来源: 评论
A new SAT Encoding Scheme for Exactly-one Constraints
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1288卷
作者: Jiatong Cai Yating Su Xixi Yang Jionghao Min Yong Lai College of Software Jilin University Changchun P.R. China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun P.R. China
Exactly-one constraints have comprehensive applications for the fields of artificial intelligence and operations research. For many encoded SAT problems generated by the existing encoding schemes of exactly-one constr...
来源: 评论
Live Video Streaming Authentication for Vehicle Multimedia based on Merkle Tree
Live Video Streaming Authentication for Vehicle Multimedia b...
收藏 引用
2018 International Conference on Network, Communication, Computer engineering (NCCE 2018)
作者: Dongqi Han Jindong Zhang Yang Liu Peibin Wu Yiding Sun College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University State Key Laboratory of Automobile Simulation and Control Jilin University
Merkle tree has been widely applied in the field of P2 P *** this paper,an efficient authentication scheme is proposed in the integrity check module for vehicle live video streaming system by optimizing the constructi... 详细信息
来源: 评论
A Surrogate Model Based Genetic Algorithm for Complex Problem Solving
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1646卷
作者: Ying Pei Hao Gao Xiaosong Han The College of Information Engineering Changchun University of Finance and Economics Changchun 130122 China Key Laboratory for Symbol Computation and Knowledge Engineering of National Education Ministry College of Computer Science and Technology College of Software Jilin University Changchun 130012 China
It is well known that when the fitness function is relatively complex, the optimization time cost of the genetic algorithm will be extremely huge. To address this issue, the surrogate model was employed to predict the...
来源: 评论
A Cloud-Based Evaluation System for Science-and-engineering Students
A Cloud-Based Evaluation System for Science-and-Engineering ...
收藏 引用
2018国际计算机前沿大会(原国际青年计算机大会)
作者: Qian Huang Feng Ye Yong Chen Peiling Xu College of Computer and Information Hohai University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministryof Education Jilin University Postdoctoral Centre Nanjing Longyuan Micro-Electronic Company Suzhou College of Information Technology
With the burgeoning of IT industry, more and more companies and universities concentrate on the scientific evaluation of science-and-engineering students. Existing evaluation strategies typically lie on grades or scor...
来源: 评论
Research on DDoS Attack Detection in Software Defined Network
Research on DDoS Attack Detection in Software Defined Networ...
收藏 引用
2018 International Conference on Cloud Computing, Big Data and Blockchain, ICCBB 2018
作者: Zhao-Hui, Ma Gan-Sen, Zhao Wei-Wen, Li Ze-Feng, Mo Xin-Ming, Wang Bing-Chuan, Chen Cheng-Chuang, Lin School of Computer Science South China Normal University Guangzhou510631 China School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou510006 China School of Mathematical Sciences South China Normal University Guangzhou510631 China School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China
Software Defined Network (SDN) is a new network construction. But due to its construction, SDN is vulnerable to be attacked by Distributed Denial of Service (DDoS) attack. So it is important to detect DDoS attack in S... 详细信息
来源: 评论
An unmanned aerial vehicle pose estimation system based on SLAM
收藏 引用
IOP Conference Series: Materials Science and engineering 2019年 第4期569卷
作者: Xinglei Dou Yuzhou Huo Yongchang Liu Xin Wang College of Software Engineering Jilin University Changchun Jilin 130012 China College of Computer Science and Technology Jilin University Changchun Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineer of Ministry of Education Jilin University Changchun Jilin 130012 China
This paper presents an unmanned aerial vehicle (UAV) pose estimation system based on monocular simultaneous localization and mapping (SLAM) guided by the desired shot. The system enables UAV to automatically adjust th...
来源: 评论
A Two-Dimensional Improvement for Farr-Gao Algorithm
收藏 引用
Journal of Systems Science & Complexity 2016年 第5期29卷 1382-1399页
作者: DONG Tian School of Mathematics Key Laboratory of Symbolic Computation and Knowledge Engineering (Ministry of Education) Jilin University
Farr-Gao algorithm is a state-of-the-art algorithm for reduced Gr?bner bases of vanishing ideals of finite points, which has been implemented in Maple as a build-in command. This paper presents a two-dimensional impro... 详细信息
来源: 评论
Building trust networks in the absence of trust relations
收藏 引用
Frontiers of Information Technology & Electronic engineering 2017年 第10期18卷 1591-1600页
作者: Xin WANG Ying WANG Jian-hua GUO College of Computer Science and Technology Jilin University Changchun 130012 China School of Computer Technology and Engineering Changchun Institute of Technology Changchun 130012 China School of Mathematics and Statistics Northeast Normal University Changchun 130024 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun 130012 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin 541004 China
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media *** is... 详细信息
来源: 评论
A Spatial Correlation-Based Hybrid Method for Intrusion Detection  9
A Spatial Correlation-Based Hybrid Method for Intrusion Dete...
收藏 引用
2017 9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)
作者: Jianqi Zhu Jian Mu Da Wei Bao Feng Youjin Wang Kexin Yin College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Communication and Knowledge Engineering of Ministry of Education Jilin University School of Computer Science and Engineering Changchun University of Technology
In order to solve the problem of low intrusion detection rate and weak generalization ability of Intrusion Detection System(IDS), it proposes a new hybrid method based on the relationship of feature and spatial corr... 详细信息
来源: 评论