咨询与建议

限定检索结果

文献类型

  • 1,724 篇 期刊文献
  • 1,613 篇 会议
  • 1 册 图书

馆藏范围

  • 3,338 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,214 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,213 篇 软件工程
    • 406 篇 信息与通信工程
    • 308 篇 控制科学与工程
    • 242 篇 电气工程
    • 217 篇 化学工程与技术
    • 212 篇 生物工程
    • 182 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 172 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 102 篇 仪器科学与技术
    • 90 篇 材料科学与工程(可...
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 64 篇 交通运输工程
    • 62 篇 冶金工程
    • 61 篇 土木工程
  • 1,169 篇 理学
    • 656 篇 数学
    • 264 篇 生物学
    • 223 篇 物理学
    • 201 篇 统计学(可授理学、...
    • 163 篇 化学
    • 97 篇 系统科学
  • 608 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 271 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 172 篇 医学
    • 142 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 65 篇 法学
  • 62 篇 农学
  • 38 篇 经济学
  • 15 篇 教育学
  • 8 篇 文学
  • 8 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 119 篇 semantics
  • 86 篇 feature extracti...
  • 85 篇 data mining
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 76 篇 deep learning
  • 69 篇 training
  • 65 篇 educational inst...
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 43 篇 image segmentati...
  • 41 篇 contrastive lear...
  • 41 篇 computational mo...
  • 41 篇 predictive model...
  • 40 篇 data models
  • 39 篇 reinforcement le...
  • 39 篇 accuracy
  • 38 篇 convolution
  • 37 篇 conferences

机构

  • 468 篇 college of compu...
  • 285 篇 key laboratory o...
  • 109 篇 school of automa...
  • 91 篇 school of inform...
  • 89 篇 key laboratory o...
  • 85 篇 school of comput...
  • 84 篇 key laboratory o...
  • 56 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 46 篇 school of softwa...
  • 44 篇 college of softw...
  • 41 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 33 篇 college of infor...
  • 31 篇 key laboratory o...
  • 31 篇 college of compu...
  • 30 篇 key laboratory o...

作者

  • 42 篇 yang bo
  • 35 篇 sun geng
  • 35 篇 liang yanchun
  • 32 篇 wu xindong
  • 30 篇 niyato dusit
  • 29 篇 kaixiang peng
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 li ximing
  • 28 篇 chen hong
  • 28 篇 li xiongfei
  • 27 篇 dantong ouyang
  • 25 篇 ouyang jihong
  • 25 篇 bo yang
  • 24 篇 xindong wu
  • 23 篇 peng kaixiang
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu

语言

  • 2,993 篇 英文
  • 263 篇 其他
  • 92 篇 中文
检索条件"机构=Key Laboratory of Ministry of Education for Data Engineering and Knowledge Engineering"
3338 条 记 录,以下是2811-2820 订阅
排序:
RO-BURST: A robust virtualization cost model for workload consolidation over clouds  12
RO-BURST: A robust virtualization cost model for workload co...
收藏 引用
12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012
作者: Wang, Jianzong Hua, Rui Zhu, Yifeng Wan, Jiguang Xie, Changsheng Chen, Yanjun School of Computer Science and Technology Huazhong University of Science and Technology China Wuhan National Laboratory for Optoelectronics China Key Laboratory of Data Storage Systems Ministry of Education of China China Department of Electrical and Computer Engineering University of Maine United States
As more public cloud computing platforms are emerging in the market, a great challenge for these Infrastructure as a Server (IaaS) providers is how to measure the cost and charge the Software as a Service (SaaS) clien... 详细信息
来源: 评论
A random network ensemble model based generalized network community mining algorithm
收藏 引用
Zidonghua Xuebao/Acta Automatica Sinica 2012年 第5期38卷 812-822页
作者: Yang, Bo Liu, Jie Liu, Da-You College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
According to the attributes of nodes and the linkages between them, most real-world complex networks could be assortative and disassortative. Community structures are ubiquitous in both types of networks. The ability ... 详细信息
来源: 评论
Optimizing parameters of algorithm trading strategies using MapReduce
Optimizing parameters of algorithm trading strategies using ...
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: Xiongpai Qin Huiju Wang Furong Li Jidong Chen Xuan Zhou Xiaoyong Du Shan Wang Key Laboratory of Data Engineering and Knowledge Engineering (RUC) Ministry of Education Beijing China School of Information Renmin University of China Beijing China EMC-Greenplum Research China China
In algorithm trading, computer algorithms are used to make the decision on the time, quantity, and direction of operations (buy, sell, or hold) automatically. To create a useful algorithm, the parameters of the algori... 详细信息
来源: 评论
SESSION SEGMENTATION METHOD BASED ON COBWEB
SESSION SEGMENTATION METHOD BASED ON COBWEB
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Zhenshan Hou Mingliang Cui Ping Li Liuliu Wei Wenhao Ying Wanli Zuo Key Laboratory of Symbolic Computation and Knowledge Engineering of the Ministry of Education College of Computer Science and TechnologyJilin University
Session segmentation can not only facilitate further study of users’ interest mining but also act as the foundation of other retrieval researches based on users’ complicated search behaviors. This paper proposes ses... 详细信息
来源: 评论
Research and Implementation of Improved Real-time Crawler Modeling
Research and Implementation of Improved Real-time Crawler Mo...
收藏 引用
International Conference on Electrical Information and Mechatronics(ICEIM2012)
作者: Xianglin Zuo Wenbo Wang Ying Wang Wanli Zuo College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education
The past decade has witnessed the rapid development of search engines, which has become an indispensable part of everyday lifeHowever, people are no longer satisfied with accessing to ordinary information, and they ma... 详细信息
来源: 评论
Feature extraction using composite individual genetic programming: An application to mass classification
Feature extraction using composite individual genetic progra...
收藏 引用
2012 International Applied Mechanics, MechatronicsAutomation and System Simulation Meeting, AMMASS 2012
作者: Lv, Yinghua Guo, Yuting Sun, Hui Zhang, Ming Wang, Jianzhong College of Humanities and Sciences of Northeast Normal University Changchun China Key Laboratory of intelligent information Processing of jinlin Universities College of Computer Science and Information Technology Northeast Normal University Changchun China National Engineering Laboratory for Druggable Gene and Protein Screening Northeast Normal University Changchun China Key Laboratory of symbolic Commputation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
This paper proposes a novel method for breast cancer diagnosis using the features generated by genetic programming (GP). We developed a new individual combination pattern (Composite individual genetic programming) whi... 详细信息
来源: 评论
Representation for topological relations of four simple regions
Representation for topological relations of four simple regi...
收藏 引用
2012 9th International Conference on Fuzzy Systems and knowledge Discovery, FSKD 2012
作者: Li, Jian Ouyang, Jihong Wang, Zhenxin College of Computer Science and Technology Jilin University Changchun 130012 China Information Technology College Jilin Agricultural University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,... 详细信息
来源: 评论
A RFID authentication protocol with index inner table used in reader
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第2期6卷 119-127页
作者: Jialiang, He Dantong, Ouyang Haiyan, Wang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University China
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel sc... 详细信息
来源: 评论
Speech separation in the vehicle environment based on fastICA algorithm
收藏 引用
Journal of Multimedia 2012年 第1期7卷 33-40页
作者: Zhang, Jindong Qin, Guihe Liu, Ye College of computer science and technology Jilin University Changchun China Key Laboratory of Symbol Computation Knowledge Engineering of the Ministry of Education Changchun China
The speech interaction in-vehicle was mainly realized by the speech recognition. The human-machine interaction around was usually disturbed by the noise, and the speech received by the receiver was not the original pu... 详细信息
来源: 评论
Revised index inner table used in RFID reader
收藏 引用
Journal of Convergence Information Technology 2012年 第4期7卷 264-271页
作者: Jialiang, He Dantong, Ouyang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China
Well scalability is an important requirement for RFID systems, how to alleviate workload of the backend server so as to deal with large scale tags becomes a challenging research object. Index inner table used in RFID ... 详细信息
来源: 评论