咨询与建议

限定检索结果

文献类型

  • 604 篇 期刊文献
  • 586 篇 会议

馆藏范围

  • 1,190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 844 篇 工学
    • 680 篇 计算机科学与技术...
    • 574 篇 软件工程
    • 176 篇 信息与通信工程
    • 114 篇 控制科学与工程
    • 86 篇 生物工程
    • 74 篇 生物医学工程(可授...
    • 53 篇 机械工程
    • 53 篇 化学工程与技术
    • 51 篇 电子科学与技术(可...
    • 46 篇 电气工程
    • 40 篇 光学工程
    • 22 篇 航空宇航科学与技...
    • 21 篇 仪器科学与技术
    • 21 篇 交通运输工程
    • 19 篇 土木工程
    • 14 篇 建筑学
    • 13 篇 动力工程及工程热...
  • 465 篇 理学
    • 331 篇 数学
    • 104 篇 生物学
    • 79 篇 统计学(可授理学、...
    • 60 篇 物理学
    • 54 篇 化学
    • 33 篇 系统科学
  • 280 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 44 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 18 篇 农学
  • 16 篇 法学
    • 14 篇 社会学
  • 7 篇 经济学
  • 4 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 65 篇 computer science
  • 59 篇 educational inst...
  • 53 篇 laboratories
  • 52 篇 knowledge engine...
  • 50 篇 educational tech...
  • 40 篇 data mining
  • 28 篇 computer science...
  • 26 篇 semantics
  • 25 篇 ontology
  • 21 篇 image segmentati...
  • 20 篇 feature extracti...
  • 17 篇 deep learning
  • 17 篇 genetic algorith...
  • 16 篇 reinforcement le...
  • 16 篇 clustering algor...
  • 15 篇 ontologies
  • 15 篇 artificial intel...
  • 14 篇 contrastive lear...
  • 13 篇 support vector m...
  • 13 篇 topology

机构

  • 505 篇 college of compu...
  • 287 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 44 篇 college of softw...
  • 43 篇 key laboratory o...
  • 40 篇 school of artifi...
  • 36 篇 key laboratory o...
  • 31 篇 college of compu...
  • 29 篇 key laboratory o...
  • 24 篇 jilin university...
  • 21 篇 jilin university...
  • 19 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 school of comput...
  • 17 篇 department of co...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 42 篇 yang bo
  • 37 篇 liang yanchun
  • 35 篇 sun geng
  • 33 篇 li xiongfei
  • 31 篇 ouyang dantong
  • 31 篇 li ximing
  • 30 篇 dantong ouyang
  • 27 篇 liu dayou
  • 27 篇 ouyang jihong
  • 27 篇 bo yang
  • 27 篇 yanchun liang
  • 26 篇 zuo wanli
  • 24 篇 niyato dusit
  • 24 篇 liu yanheng
  • 23 篇 guan renchu
  • 23 篇 huang lan
  • 22 篇 yanheng liu
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 20 篇 da-you liu

语言

  • 1,056 篇 英文
  • 84 篇 其他
  • 50 篇 中文
检索条件"机构=Key Laboratory for Symbol Computation and Knowledge Engineering"
1190 条 记 录,以下是961-970 订阅
排序:
Modeling Email Worm Propagation Using Game Theory
Modeling Email Worm Propagation Using Game Theory
收藏 引用
The First International Conference on Multimedia Information Networking and Security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Xin Sun Yanheng Liu Jian Wang College of Computer Science and Technology Jilin University Changchun Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin 130012 China
One of the most prevalent security problems in network is the rampant propagation of email worms. In this paper game theory is suggested as a method for modeling and computing the probabilities of expected behaviors o... 详细信息
来源: 评论
A New Framework for Accessing Trusted Network
A New Framework for Accessing Trusted Network
收藏 引用
International Workshop on Intelligent Networks and Intelligent Systems (ICINIS)
作者: Jian Wang Yanheng Liu Xiangpeng Jia Xiaomin Liu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Jilin University Changchun Jilin CN China Mobile Shenyang Branch Corporation Shenyang China
Trusted network connect (TNC), whose goal is to improve network security from source, now has become hot topic in security domain. We proposed a new access model for the terminals without meeting the requirements in T... 详细信息
来源: 评论
The Ontology Based Semantic Evaluating Method in LAV
The Ontology Based Semantic Evaluating Method in LAV
收藏 引用
Pacific-Asia Conference on Circuits, Communications and Systems, PACCS
作者: Fei Ren Hao Liang Liang Hu Wanli Zuo College of Computer Science and Technology Jilin University Changchun China Department of Information Changchun Taxation College Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
The Web has been dramatically deepened by the deep Web, which the traditional information fusion system shows disability to integrate. The myriad information hidden behind the deep Web attracts the considerable attent... 详细信息
来源: 评论
Extending the Expression Ability of LAV Using Ontology Technique
Extending the Expression Ability of LAV Using Ontology Techn...
收藏 引用
International Conference on Information Technology and Computer Science, ITCS
作者: Hao Liang Fei Ren Wanli Zuo Aiqi Zhang College of Computer Science and Technology Jilin University Changchun China Department of Information Changchun Taxation College Changchun China Engineering of the Ministry of Education Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Information fusion is an interdisciplinary research field aiming to combine and merge the information or data from different information sources. The output of information fusion system is a global schema through whic... 详细信息
来源: 评论
A Novel Method for Prediction of Protein Domain Using Distance-Based Maximal Entropy
收藏 引用
Journal of Bionic engineering 2008年 第3期5卷 215-223页
作者: Shu-xue Zou Yan-xin Huang Yan Wang Chun-guang Zhou Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun 130012 P. R. China
Detecting the boundaries of protein domains is an important and challenging task in both experimental and computational structural biology. In this paper, a promising method for detecting the domain structure of a pro... 详细信息
来源: 评论
Hybrid algorithm for flowshop scheduling problem
收藏 引用
Zidonghua Xuebao/ Acta Automatica Sinica 2009年 第3期35卷 332-336页
作者: Zhang, Chang-Sheng Sun, Ji-Gui Yang, Qing-Yun Zheng, Li-Hui Key Laboratory of Symbol Computation and Knowledge Engineer Jilin University Changchun 130012 China Changchun Institute of Optics Fine Mechanics and Physics Chinese Acad. of Sci. Changchun 130012 China
A hybrid particle and genetic algorithm (HPGA) based on the 'alldifferent' constraint is proposed to solve the flowshop scheduling problem, which combines the particle swarm optimization algorithm, genetic ope... 详细信息
来源: 评论
Novel theorem proving algorithm based on extension rule
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2009年 第1期46卷 9-14页
作者: Sun, Jigui Li, Ying Zhu, Xingjun Lu, Shuai College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Changchun 130012 China
ATP (automated theorem proving) has always been one of the most advanced areas of computer science. The traditional idea used in ATP is to try to deduce the empty clause to check satisfiability, such as resolution bas... 详细信息
来源: 评论
New preprocessing technique based on entirety singleton consistency
收藏 引用
Zidonghua Xuebao/ Acta Automatica Sinica 2009年 第1期35卷 71-76页
作者: Zhu, Xing-Jun Sun, Ji-Gui Zhang, Yong-Gang Li, Ying College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Changchun 130012 China
This paper studies the technique of preprocessing in constraint satisfaction problem (CSP). Firstly, we propose a notion of entirety singleton consistency (ESC) and the algorithm, and then analyze the time and space c... 详细信息
来源: 评论
Escrow mechanism for personal security keys on IBE
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 75-80页
作者: Zou, Yue-Peng Ouyang, Dan-Tong He, Li-Li Bai, Hong-Tao College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A new escrow mechanism for personal security keys on IBE was proposed. This mechanism constructed a security trust system composed of private key generator, key management center, and user security component to set up... 详细信息
来源: 评论
Canonical Huffman code based full-text index
收藏 引用
Progress in Natural Science:Materials International 2008年 第3期18卷 325-330页
作者: Yi Zhang a,b, Zhili Pei a, Jinhui Yanga, Yanchun Liang a, a College of Computer Science and Technology, Jilin University, key laboratory of symbol computation and knowledge engineering of the Ministry of Education, Changchun 130012, China b Department of Computer Science, Jilin Technology and Business College, Changchun 130062, China College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Changchun 130012 China Department of Computer Science Jilin Technology and Business College Changchun 130062 China
Full-text indices are data structures that can be used to find any substring of a given string. Many full-text indices require space larger than the original string. In this paper, we introduce the canonical Huffman c... 详细信息
来源: 评论