咨询与建议

限定检索结果

文献类型

  • 1,724 篇 期刊文献
  • 1,613 篇 会议
  • 1 册 图书

馆藏范围

  • 3,338 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,214 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,213 篇 软件工程
    • 406 篇 信息与通信工程
    • 308 篇 控制科学与工程
    • 242 篇 电气工程
    • 217 篇 化学工程与技术
    • 212 篇 生物工程
    • 182 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 172 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 102 篇 仪器科学与技术
    • 90 篇 材料科学与工程(可...
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 64 篇 交通运输工程
    • 62 篇 冶金工程
    • 61 篇 土木工程
  • 1,169 篇 理学
    • 656 篇 数学
    • 264 篇 生物学
    • 223 篇 物理学
    • 201 篇 统计学(可授理学、...
    • 163 篇 化学
    • 97 篇 系统科学
  • 608 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 271 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 172 篇 医学
    • 142 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 65 篇 法学
  • 62 篇 农学
  • 38 篇 经济学
  • 15 篇 教育学
  • 8 篇 文学
  • 8 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 119 篇 semantics
  • 86 篇 feature extracti...
  • 85 篇 data mining
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 76 篇 deep learning
  • 69 篇 training
  • 65 篇 educational inst...
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 43 篇 image segmentati...
  • 41 篇 contrastive lear...
  • 41 篇 computational mo...
  • 41 篇 predictive model...
  • 40 篇 data models
  • 39 篇 reinforcement le...
  • 39 篇 accuracy
  • 38 篇 convolution
  • 37 篇 conferences

机构

  • 468 篇 college of compu...
  • 285 篇 key laboratory o...
  • 109 篇 school of automa...
  • 91 篇 school of inform...
  • 89 篇 key laboratory o...
  • 85 篇 school of comput...
  • 84 篇 key laboratory o...
  • 56 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 46 篇 school of softwa...
  • 44 篇 college of softw...
  • 41 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 33 篇 college of infor...
  • 31 篇 key laboratory o...
  • 31 篇 college of compu...
  • 30 篇 key laboratory o...

作者

  • 42 篇 yang bo
  • 35 篇 sun geng
  • 35 篇 liang yanchun
  • 32 篇 wu xindong
  • 30 篇 niyato dusit
  • 29 篇 kaixiang peng
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 li ximing
  • 28 篇 chen hong
  • 28 篇 li xiongfei
  • 27 篇 dantong ouyang
  • 25 篇 ouyang jihong
  • 25 篇 bo yang
  • 24 篇 xindong wu
  • 23 篇 peng kaixiang
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu

语言

  • 2,993 篇 英文
  • 263 篇 其他
  • 92 篇 中文
检索条件"机构=Key Laboratory of Ministry of Education for Data Engineering and Knowledge Engineering"
3338 条 记 录,以下是2861-2870 订阅
排序:
Formal analysis of trusted computing: One case study
Formal analysis of trusted computing: One case study
收藏 引用
International Conference on Communications and Mobile Computing
作者: Zhou, HongWei Yuan, JinHui Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. W... 详细信息
来源: 评论
3D LIDAR point cloud based intersection recognition for autonomous driving
3D LIDAR point cloud based intersection recognition for auto...
收藏 引用
IEEE Symposium on Intelligent Vehicle
作者: Quanwen Zhu Long Chen Qingquan Li Ming Li Andreas Nüchter Jian Wang School of Geodesy and Geomatics Wuhan University of China Hubei China Engineering Research Center for Spatio-Temporal Data Smart Acquisition and Application Ministry of Education of China andthe School of Electronic Information Wuhan University of China Hubei China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University of China Wuhan Hubei China Computer School Wuhan University of China Hubei China School of Engineering and Science Jacobs University Bremen Bremen Germany
Finding road intersections in advance is crucial for navigation and path planning of moving autonomous vehicles, especially when there is no position or geographic auxiliary information available. In this paper, we in... 详细信息
来源: 评论
An adaptive fuzzy k-nearest neighbor method based on parallel particle swarm optimization for bankruptcy prediction
An adaptive fuzzy k-nearest neighbor method based on paralle...
收藏 引用
作者: Chen, Hui-Ling Liu, Da-You Yang, Bo Liu, Jie Wang, Gang Wang, Su-Jing Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
This study proposes an efficient non-parametric classifier for bankruptcy prediction using an adaptive fuzzy k-nearest neighbor (FKNN) method, where the nearest neighbor k and the fuzzy strength parameter m are adapti... 详细信息
来源: 评论
An approach for calculating semantic similarity between words using WordNet
An approach for calculating semantic similarity between word...
收藏 引用
2011 2nd International Conference on Digital Manufacturing and Automation, ICDMA 2011
作者: Hao, Dou Zuo, Wanli Peng, Tao He, Fengling College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Changchun China
This paper presents a new edge-counting based method using Word Net to compute the similarity. The method achieves a similarity that perfectly fits with human rating and effectively simulate the human tHought process ... 详细信息
来源: 评论
A study on improved hidden Markov models and applications to speech recognition
A study on improved hidden Markov models and applications to...
收藏 引用
2011 International Conference on Computer Science and Service System, CSSS 2011
作者: Zhang, Zeliang Li, Xiongfei Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China Beihua University Jilin China
Visual voice lip-reading, so the computer can understand what the speakers want to express direction by looking at their lips. Lip reading is the easiest way to compare the early characters and templates from the froz... 详细信息
来源: 评论
A Pruning Based Continuous RkNN Query Algorithm for Large k
收藏 引用
电子学报(英文版) 2012年 第3期21卷
作者: WANG Shengsheng CHAI Sheng LV Qiannan College of Computer Science and Technology Key Laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
来源: 评论
An Improved Particle Swarm Optimization for Feature Selection
收藏 引用
Journal of Bionic engineering 2011年 第2期8卷 191-200页
作者: Yuanning Liu College of Computer Science and Technology Jilin University Changchun 130012 P. R. China Key Laboratory of S.vmbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 P. R. China
Particle Swarm Optimization (PSO) is a popular and bionic algorithm based on the social behavior associated with bird flocking for optimization problems. To maintain the diversity of swarms, a few studies of multi-s... 详细信息
来源: 评论
Communities detection with applications to real-world networks analysis
Communities detection with applications to real-world networ...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Yang, Bo School of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China
Community structure is one of non-trivial topological properties ubiquitously demonstrated in real-world complex networks. Related theories and approaches are of fundamental importance for understanding the functions ... 详细信息
来源: 评论
A BRS-based approach for modeling RFID untraceability
收藏 引用
International Journal of Advancements in Computing Technology 2011年 第11期3卷 96-103页
作者: Jialiang, He Dantong, Ouyang Youjun, Xu College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China College of Computer Science and Information Technology Daqing Normal University China
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications betwe... 详细信息
来源: 评论
Large scale report generation in data consolidation environments of banks
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) 2012年 第SUPPL.1期40卷 5-8页
作者: Qin, Xiongpai Zhou, Xiaoyun Wu, Zhongxin Yang, Hongzhi Wang, Wei Ministry of Education Key Lab of Data Engineering and Knowledge Engineering Renmin University of China Beijing 100872 China Information School Renmin University of China Beijing 100872 China Computer Science Department Jiangsu Normal University Xuzhou 221116 Jiangsu China Beijing Nantian Software Co. Ltd. Beijing 100085 China
To generate large number of reports in a limited time window, four techniques were proposed, including ROLAP&SQL, Shared Scanning, Hadoop based Solution, and MOLAP&Cube Sharding, an algorithm that performs in ... 详细信息
来源: 评论