咨询与建议

限定检索结果

文献类型

  • 623 篇 期刊文献
  • 607 篇 会议

馆藏范围

  • 1,230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 877 篇 工学
    • 702 篇 计算机科学与技术...
    • 596 篇 软件工程
    • 180 篇 信息与通信工程
    • 120 篇 控制科学与工程
    • 86 篇 生物工程
    • 72 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 55 篇 电子科学与技术(可...
    • 54 篇 化学工程与技术
    • 47 篇 电气工程
    • 45 篇 光学工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 23 篇 航空宇航科学与技...
    • 21 篇 土木工程
    • 16 篇 建筑学
    • 15 篇 网络空间安全
  • 472 篇 理学
    • 337 篇 数学
    • 102 篇 生物学
    • 80 篇 统计学(可授理学、...
    • 61 篇 物理学
    • 55 篇 化学
    • 35 篇 系统科学
  • 291 篇 管理学
    • 152 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 46 篇 医学
    • 38 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 20 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 laboratories
  • 52 篇 knowledge engine...
  • 50 篇 educational tech...
  • 41 篇 data mining
  • 27 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 23 篇 feature extracti...
  • 22 篇 image segmentati...
  • 16 篇 reinforcement le...
  • 16 篇 deep learning
  • 16 篇 genetic algorith...
  • 15 篇 artificial intel...
  • 14 篇 ontologies
  • 14 篇 contrastive lear...
  • 14 篇 topology
  • 14 篇 clustering algor...
  • 13 篇 support vector m...

机构

  • 529 篇 college of compu...
  • 288 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 46 篇 college of softw...
  • 42 篇 key laboratory o...
  • 41 篇 school of artifi...
  • 36 篇 key laboratory o...
  • 31 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 jilin university...
  • 22 篇 school of comput...
  • 20 篇 jilin university...
  • 19 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 department of co...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 47 篇 yang bo
  • 36 篇 sun geng
  • 35 篇 liang yanchun
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 31 篇 li ximing
  • 30 篇 li xiongfei
  • 27 篇 liu dayou
  • 27 篇 ouyang jihong
  • 27 篇 zuo wanli
  • 26 篇 bo yang
  • 25 篇 yanchun liang
  • 24 篇 niyato dusit
  • 24 篇 liu yanheng
  • 23 篇 guan renchu
  • 23 篇 yanheng liu
  • 23 篇 huang lan
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 20 篇 da-you liu

语言

  • 1,095 篇 英文
  • 85 篇 其他
  • 50 篇 中文
检索条件"机构=Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering"
1230 条 记 录,以下是851-860 订阅
排序:
An Approach for Calculating Semantic Similarity between Words Using WordNet
An Approach for Calculating Semantic Similarity between Word...
收藏 引用
International Conference on Digital Manufacturing and Automation (ICDMA)
作者: Dou Hao Wanli Zuo Tao Peng Fengling He College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun China
This paper presents a new edge-counting based method using Word Net to compute the similarity. The method achieves a similarity that perfectly fits with human rating and effectively simulate the human tHought process ... 详细信息
来源: 评论
Communities Detection with Applications to Real-World Networks Analysis
Communities Detection with Applications to Real-World Networ...
收藏 引用
International Conference on computational Intelligence and Security
作者: Bo Yang School of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun China
Community structure is one of non-trivial topological properties ubiquitously demonstrated in real-world complex networks. Related theories and approaches are of fundamental importance for understanding the functions ... 详细信息
来源: 评论
A fuzzy adaptive multi-population parallel genetic algorithm for spam filtering
收藏 引用
Journal of Convergence Information Technology 2011年 第2期6卷 172-182页
作者: Zhao, Zheng-dong Wang, Gang Zhao, Wei Chen, Hui-ling Zhao, Wei Li, Lu-lu Network Information Center Changchun University of Science and Technology Changchun China College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Department of Information Engineering Jilin Police College China Branch Institute of information technology Changchun Vocational Institute of Technology Changchun China
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering met... 详细信息
来源: 评论
H function based tamper-proofing software watermarking scheme
Journal of Software
收藏 引用
Journal of Software 2011年 第1期6卷 149-155页
作者: Zhu, Jianqi Liu, Yanheng Wang, Aimin Yin, Kexin College of Computer Science and technology Ministry of Education Jilin University Changchun China Key Laboratory of Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China College of computer and science and engineering ChangChun University of Technology Changchun China
A novel constant tamper-proofing software watermark technique based on H encryption function is presented. First we split the watermark into smaller pieces before encoding them using CLOC scheme. With the watermark pi... 详细信息
来源: 评论
Robust and efficient annotation based on ontology evolution for deep web data
收藏 引用
Journal of Computers 2011年 第10期6卷 2029-2036页
作者: Chen, Kerui Zuo, Wanli Zhang, Fan He, Fengling Chen, Yongheng Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education College of Computer Science and Technology Jilin University Changchun 130012 China College of Information Engineering Zhongzhou University Zhengzhou 450044 China
Among those researches in Deep Web, compared to research of data extraction which is more mature, the research of data annotation is still at its preliminary stage. Currently, although the approach of applying ontolog... 详细信息
来源: 评论
Image annotation refinement using dynamic weighted voting based on mutual information
Journal of Software
收藏 引用
Journal of Software 2011年 第11 SPEC. ISSUE期6卷 2239-2246页
作者: Song, Haiyu Li, Xiongfei Wang, Pengjie Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Institute of Computer Graphics and Image Processing Dalian Nationalities University Dalian China State Key Laboratory of CAD and CG Zhejiang University Hangzhou China
Automatic image annotation is a promising solution to narrow the semantic gap between low-level content and high-level semantic concept, which has been an active research area in the fields of image retrieval, pattern... 详细信息
来源: 评论
Operon Prediction by Markov Clustering
Operon Prediction by Markov Clustering
收藏 引用
2011·国际基因组学大会
作者: Wei Du Zhongbo Cao Yan Wang Enrico Blanzieri Chen Zhang Yanchun Liang College of Mathematics Jilin University Changchun 130012 China Department of Information and Communication Technology University of Trento Povo 38050 Italy College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China
来源: 评论
A verifiable multi-secret sharing scheme
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern university 2011年 第SUPPL.1期32卷 120-123页
作者: Wang, Yan-Xi Liu, Yan-Heng Wang, Jian Dong, Tian-Zhe College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Analyzing two improved YCH schemes and a multi-secret sharing scheme based on homogeneous linear recursion, we propose and implement a new verifiable multi-secret sharing model based on Shamir secret sharing. The time... 详细信息
来源: 评论
Using TCM in mobile terminals in internet of vehicles
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern university 2011年 第SUPPL.1期32卷 107-110页
作者: Gao, Wen-Bin Liu, Yan-Heng Wang, Jian College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TC... 详细信息
来源: 评论
Automatic table integration by domain-specific ontology
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第1期5卷 218-225页
作者: Kerui, Chen Jinchao, Zhao Wanli, Zuo Fengling, He Yongheng, Chen College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbol Computation and knowledge Engineering of the Ministry of Education Changchun China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou 450002 China
Deep web could automatically produce web pages according to the query criteria of users. The report found most query result page store data information using table form. knowledge management, information retrieval, We... 详细信息
来源: 评论