咨询与建议

限定检索结果

文献类型

  • 1,690 篇 期刊文献
  • 1,569 篇 会议
  • 1 册 图书

馆藏范围

  • 3,260 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,138 篇 工学
    • 1,402 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 393 篇 信息与通信工程
    • 258 篇 控制科学与工程
    • 230 篇 电气工程
    • 217 篇 化学工程与技术
    • 211 篇 生物工程
    • 181 篇 生物医学工程(可授...
    • 179 篇 机械工程
    • 166 篇 电子科学与技术(可...
    • 148 篇 光学工程
    • 101 篇 仪器科学与技术
    • 88 篇 材料科学与工程(可...
    • 75 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 62 篇 交通运输工程
    • 61 篇 冶金工程
    • 61 篇 土木工程
  • 1,159 篇 理学
    • 647 篇 数学
    • 265 篇 生物学
    • 222 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 160 篇 化学
    • 97 篇 系统科学
  • 597 篇 管理学
    • 352 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 170 篇 医学
    • 138 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 64 篇 法学
  • 62 篇 农学
  • 37 篇 经济学
  • 14 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 118 篇 semantics
  • 84 篇 data mining
  • 82 篇 feature extracti...
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 73 篇 deep learning
  • 66 篇 training
  • 65 篇 educational inst...
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 42 篇 image segmentati...
  • 41 篇 computational mo...
  • 40 篇 predictive model...
  • 40 篇 data models
  • 38 篇 convolution
  • 38 篇 accuracy
  • 37 篇 conferences
  • 37 篇 reinforcement le...
  • 35 篇 visualization

机构

  • 455 篇 college of compu...
  • 271 篇 key laboratory o...
  • 108 篇 school of automa...
  • 90 篇 school of inform...
  • 87 篇 key laboratory o...
  • 85 篇 school of comput...
  • 84 篇 key laboratory o...
  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 45 篇 school of softwa...
  • 44 篇 college of softw...
  • 40 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 33 篇 college of infor...
  • 32 篇 college of compu...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 41 篇 yang bo
  • 35 篇 liang yanchun
  • 34 篇 sun geng
  • 33 篇 wu xindong
  • 29 篇 niyato dusit
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 kaixiang peng
  • 28 篇 chen hong
  • 27 篇 dantong ouyang
  • 27 篇 li xiongfei
  • 26 篇 li ximing
  • 25 篇 ouyang jihong
  • 24 篇 bo yang
  • 23 篇 xindong wu
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 22 篇 li cuiping

语言

  • 3,021 篇 英文
  • 157 篇 其他
  • 92 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Knowledge Engineering of the Ministry of Education"
3260 条 记 录,以下是3051-3060 订阅
排序:
Privacy Parallel Algorithm for Mining Association Rules and its Application in HRM
Privacy Parallel Algorithm for Mining Association Rules and ...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: XuePing Zhang YanXia Zhu Nan Hua Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou China College of Information Science and Engineering Henan University of Technology Zhengzhou China Technology Department Zhengzhou Super HW Network Technology Company Limited Zhengzhou China
Parallel association rules mining has been improved the efficiency of data mining, and meanwhile concerned with the privacy preserving problem. A simple and effective method of parallel association rules mining which ... 详细信息
来源: 评论
Escrow mechanism for personal security keys on IBE
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 75-80页
作者: Zou, Yue-Peng Ouyang, Dan-Tong He, Li-Li Bai, Hong-Tao College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A new escrow mechanism for personal security keys on IBE was proposed. This mechanism constructed a security trust system composed of private key generator, key management center, and user security component to set up... 详细信息
来源: 评论
A Novel Method for Prediction of Protein Domain Using Distance-Based Maximal Entropy
收藏 引用
Journal of Bionic engineering 2008年 第3期5卷 215-223页
作者: Shu-xue Zou Yan-xin Huang Yan Wang Chun-guang Zhou Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun 130012 P. R. China
Detecting the boundaries of protein domains is an important and challenging task in both experimental and computational structural biology. In this paper, a promising method for detecting the domain structure of a pro... 详细信息
来源: 评论
Novel trusted authentication and evaluation framework in VANET
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 107-113页
作者: Wu, Jing Liu, Yan-Heng Wang, Jian Li, Wei-Ping College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Changchun Jilin University Information Technologies Co. Ltd. Changchun 130012 China
Vehicular ad hoc networks (VANET) have many new characteristics unlike tranditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo... 详细信息
来源: 评论
S-SimRank: Combining Content and Link Information to Cluster Papers Effectively and Efficiently
S-SimRank: Combining Content and Link Information to Cluster...
收藏 引用
4th International Conference on Advanced data Mining and Applications
作者: Cai, Yuanzhe Li, Pei Liu, Hongyan He, Jun Du, Xiaoyong Key Labs of Data Engineering and Knowledge Engineering Ministry of Education China Department of Computer Science Renmin University of China China Department of Management Science and Engineering Tsinghua University China
Both Content analysis and link, analysis have its advantages in measuring relationships among documents. In this paper. we propose a new method to combine these two methods to compute the similarity of research papers... 详细信息
来源: 评论
RETRACTED ARTICLE: The IDS model adapt to load characteristic under IPv6/4 environment
RETRACTED ARTICLE: The IDS model adapt to load characteristi...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Wei, Chuyi Fang, Zhiyi Li, Wei Liu, Xiaonan Yang, Hongjun Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
Thih paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamical... 详细信息
来源: 评论
Canonical Huffman code based full-text index
收藏 引用
Progress in Natural Science:Materials International 2008年 第3期18卷 325-330页
作者: Yi Zhang a,b, Zhili Pei a, Jinhui Yanga, Yanchun Liang a, a College of Computer Science and Technology, Jilin University, key laboratory of Symbol Computation and knowledge engineering of the ministry of education, Changchun 130012, China b Department of Computer Science, Jilin Technology and Business College, Changchun 130062, China College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Changchun 130012 China Department of Computer Science Jilin Technology and Business College Changchun 130062 China
Full-text indices are data structures that can be used to find any substring of a given string. Many full-text indices require space larger than the original string. In this paper, we introduce the canonical Huffman c... 详细信息
来源: 评论
Clonal Selection Based Memetic Algorithm for Job Shop Scheduling Problems
收藏 引用
Journal of Bionic engineering 2008年 第2期5卷 111-119页
作者: Jin-hui Yang Liang Sun Heow Pueh Lee Yun Qian Yan-chun Liang College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Changchun 130012 P. R. China Institute of High Performance Computing Singapore 117528 Singapore Department of Mechanical Engineering National University of Singapore Singapore 117576 Singapore Institute of Electric and Information Engineering Beihua University Jilin 13202 l P. R. China
A clonal selection based memetic algorithm is proposed for solving job shop scheduling problems in this paper. In the proposed algorithm, the clonal selection and the local search mechanism are designed to enhance exp... 详细信息
来源: 评论
RETRACTED ARTICLE: Experimental research on a new authentication protocol for wireless communication network based on WiMAX
RETRACTED ARTICLE: Experimental research on a new authentica...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Li, Ruixue Fang, Zhiyi Xu, Peng Xiao, Wei Wang, Wei Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China School of Computer Northeast Normal University Changchun 130000 China
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s... 详细信息
来源: 评论
Object localization based on global structure constraint model and optimal algorithm
Object localization based on global structure constraint mod...
收藏 引用
3rd International Conference on Innovative Computing Information and Control, ICICIC'08
作者: Liu, Miao Guo, Dongwei Ma, Jie Liu, Xiaohua Li, Dan Zhou, Chunguang College of Computer Science and Technology Jilin University 130012 Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education 130012 Changchun China
We present a novel object localization approach based on the Global Structure Constraint model (GSC) and Optimal Algorithm. In GSC, Objects are described as constellations of points satisfied with their specific globa... 详细信息
来源: 评论