咨询与建议

限定检索结果

文献类型

  • 623 篇 期刊文献
  • 607 篇 会议

馆藏范围

  • 1,230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 877 篇 工学
    • 702 篇 计算机科学与技术...
    • 596 篇 软件工程
    • 180 篇 信息与通信工程
    • 120 篇 控制科学与工程
    • 86 篇 生物工程
    • 72 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 55 篇 电子科学与技术(可...
    • 54 篇 化学工程与技术
    • 47 篇 电气工程
    • 45 篇 光学工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 23 篇 航空宇航科学与技...
    • 21 篇 土木工程
    • 16 篇 建筑学
    • 15 篇 网络空间安全
  • 472 篇 理学
    • 337 篇 数学
    • 102 篇 生物学
    • 80 篇 统计学(可授理学、...
    • 61 篇 物理学
    • 55 篇 化学
    • 35 篇 系统科学
  • 291 篇 管理学
    • 152 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 46 篇 医学
    • 38 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 20 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 laboratories
  • 52 篇 knowledge engine...
  • 50 篇 educational tech...
  • 41 篇 data mining
  • 27 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 23 篇 feature extracti...
  • 22 篇 image segmentati...
  • 16 篇 reinforcement le...
  • 16 篇 deep learning
  • 16 篇 genetic algorith...
  • 15 篇 artificial intel...
  • 14 篇 ontologies
  • 14 篇 contrastive lear...
  • 14 篇 topology
  • 14 篇 clustering algor...
  • 13 篇 support vector m...

机构

  • 529 篇 college of compu...
  • 288 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 46 篇 college of softw...
  • 42 篇 key laboratory o...
  • 41 篇 school of artifi...
  • 36 篇 key laboratory o...
  • 31 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 jilin university...
  • 22 篇 school of comput...
  • 20 篇 jilin university...
  • 19 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 department of co...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 47 篇 yang bo
  • 36 篇 sun geng
  • 35 篇 liang yanchun
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 31 篇 li ximing
  • 30 篇 li xiongfei
  • 27 篇 liu dayou
  • 27 篇 ouyang jihong
  • 27 篇 zuo wanli
  • 26 篇 bo yang
  • 25 篇 yanchun liang
  • 24 篇 niyato dusit
  • 24 篇 liu yanheng
  • 23 篇 guan renchu
  • 23 篇 yanheng liu
  • 23 篇 huang lan
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 20 篇 da-you liu

语言

  • 1,095 篇 英文
  • 85 篇 其他
  • 50 篇 中文
检索条件"机构=Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering"
1230 条 记 录,以下是761-770 订阅
排序:
A parallel scheduling algorithm for reinforcement learning in large state space
收藏 引用
Frontiers of Computer Science 2012年 第6期6卷 631-646页
作者: Quan LIU Xudong YANG Ling JING Jin LI Jiao LI Institute of Computer Science and Technology Soochow UniversitySuzhou 215006China Department of Computer Science and Technology Nanjing UniversityNanjing 210093China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun 130012China
The main challenge in the area of reinforcement learning is scaling up to larger and more complex problems. Aiming at the scaling problem of reinforcement learning, a scalable reinforcement learning method, DCS-SRL, i... 详细信息
来源: 评论
Learning the structure of dynamic bayesian network with domain knowledge
Learning the structure of dynamic bayesian network with doma...
收藏 引用
2012 International Conference on Machine Learning and Cybernetics, ICMLC 2012
作者: Chen, Juan Jia, Haiyang Huang, Yuxiao Liu, Dayou College of Computer Science and Technology Key Laboratory for Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Dynamic Bayesian Network (DBN) is a graphical model for representing temporal stochastic processes. Learning the structure of DBN is a fundamental step for parameter learning, inference and application. For large scal... 详细信息
来源: 评论
Quasi-periodic Solutions of the General Nonlinear Beam Equations
收藏 引用
Communications in Mathematical Research 2012年 第1期28卷 51-64页
作者: GAO YI-XIAN College of Mathematics and Statistics Northeast Normal University Changchun 130024 Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012
In this paper, one-dimensional (1D) nonlinear beam equations of the form utt - uxx + uxxxx + mu = f (u) with Dirichlet boundary conditions are considered, where the nonlinearity f is an analytic, odd function an... 详细信息
来源: 评论
Research of the timer granularity based on linux
Research of the timer granularity based on linux
收藏 引用
International Conference on Computer, Informatics, Cybernetics and Applications 2011, CICA 2011
作者: Qingtian, Geng Nan, Jiang Hongwei, Zhao Junling, Liu Department of Computer Science and Technology Jilin University Changchun 130012 China Changchun Normal University Changchun 130032 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun 130012 China
Time interrupts play an important role in the system. When time interrupts occur, system will inspect process running state, providing an opportunity to schedule, which is important for improving system real time perf... 详细信息
来源: 评论
Representation for topological relations of four simple regions
Representation for topological relations of four simple regi...
收藏 引用
2012 9th International Conference on Fuzzy Systems and knowledge Discovery, FSKD 2012
作者: Li, Jian Ouyang, Jihong Wang, Zhenxin College of Computer Science and Technology Jilin University Changchun 130012 China Information Technology College Jilin Agricultural University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,... 详细信息
来源: 评论
A random network ensemble model based generalized network community mining algorithm
收藏 引用
Zidonghua Xuebao/Acta Automatica Sinica 2012年 第5期38卷 812-822页
作者: Yang, Bo Liu, Jie Liu, Da-You College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
According to the attributes of nodes and the linkages between them, most real-world complex networks could be assortative and disassortative. Community structures are ubiquitous in both types of networks. The ability ... 详细信息
来源: 评论
A RFID authentication protocol with index inner table used in reader
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第2期6卷 119-127页
作者: Jialiang, He Dantong, Ouyang Haiyan, Wang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University China
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel sc... 详细信息
来源: 评论
Conflict-based belief revision operators in possibilistic logic  26
Conflict-based belief revision operators in possibilistic lo...
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Qi, Guilin Wang, Kewen Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China School of Computing and Information Technology Griffith University Australia
In this paper, we investigate belief revision in possibilistic logic, which is a weighted logic proposed to deal with incomplete and uncertain information. Existing revision operators in possibilistic logic are restri... 详细信息
来源: 评论
Revised index inner table used in RFID reader
收藏 引用
Journal of Convergence Information Technology 2012年 第4期7卷 264-271页
作者: Jialiang, He Dantong, Ouyang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China
Well scalability is an important requirement for RFID systems, how to alleviate workload of the backend server so as to deal with large scale tags becomes a challenging research object. Index inner table used in RFID ... 详细信息
来源: 评论
A lightweight RFID authentication protocol for mobile reader
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第6期6卷 80-88页
作者: Jialiang, He Dantong, Ouyang Tian, Bai Liming, Zhang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China
Special physical character and strictly limited resources in tags make RFID systems being confronted with many security problems, mobile reader brings higher design requirements for RFID protocols. In this paper, a li... 详细信息
来源: 评论