咨询与建议

限定检索结果

文献类型

  • 1,724 篇 期刊文献
  • 1,613 篇 会议
  • 1 册 图书

馆藏范围

  • 3,338 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,214 篇 工学
    • 1,464 篇 计算机科学与技术...
    • 1,213 篇 软件工程
    • 406 篇 信息与通信工程
    • 308 篇 控制科学与工程
    • 242 篇 电气工程
    • 217 篇 化学工程与技术
    • 212 篇 生物工程
    • 182 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 172 篇 电子科学与技术(可...
    • 142 篇 光学工程
    • 102 篇 仪器科学与技术
    • 90 篇 材料科学与工程(可...
    • 77 篇 动力工程及工程热...
    • 73 篇 建筑学
    • 64 篇 交通运输工程
    • 62 篇 冶金工程
    • 61 篇 土木工程
  • 1,169 篇 理学
    • 656 篇 数学
    • 264 篇 生物学
    • 223 篇 物理学
    • 201 篇 统计学(可授理学、...
    • 163 篇 化学
    • 97 篇 系统科学
  • 608 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 271 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 172 篇 医学
    • 142 篇 临床医学
    • 100 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 65 篇 法学
  • 62 篇 农学
  • 38 篇 经济学
  • 15 篇 教育学
  • 8 篇 文学
  • 8 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 119 篇 semantics
  • 86 篇 feature extracti...
  • 85 篇 data mining
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 76 篇 deep learning
  • 69 篇 training
  • 65 篇 educational inst...
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 43 篇 image segmentati...
  • 41 篇 contrastive lear...
  • 41 篇 computational mo...
  • 41 篇 predictive model...
  • 40 篇 data models
  • 39 篇 reinforcement le...
  • 39 篇 accuracy
  • 38 篇 convolution
  • 37 篇 conferences

机构

  • 468 篇 college of compu...
  • 285 篇 key laboratory o...
  • 109 篇 school of automa...
  • 91 篇 school of inform...
  • 89 篇 key laboratory o...
  • 85 篇 school of comput...
  • 84 篇 key laboratory o...
  • 56 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 46 篇 school of softwa...
  • 44 篇 college of softw...
  • 41 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 33 篇 college of infor...
  • 31 篇 key laboratory o...
  • 31 篇 college of compu...
  • 30 篇 key laboratory o...

作者

  • 42 篇 yang bo
  • 35 篇 sun geng
  • 35 篇 liang yanchun
  • 32 篇 wu xindong
  • 30 篇 niyato dusit
  • 29 篇 kaixiang peng
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 li ximing
  • 28 篇 chen hong
  • 28 篇 li xiongfei
  • 27 篇 dantong ouyang
  • 25 篇 ouyang jihong
  • 25 篇 bo yang
  • 24 篇 xindong wu
  • 23 篇 peng kaixiang
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu

语言

  • 2,993 篇 英文
  • 263 篇 其他
  • 92 篇 中文
检索条件"机构=Key Laboratory of Ministry of Education for Data Engineering and Knowledge Engineering"
3338 条 记 录,以下是2901-2910 订阅
排序:
Finding similar and discriminative parts of deformable shape classes
Finding similar and discriminative parts of deformable shape...
收藏 引用
2011 7th International Conference on Natural Computation, ICNC 2011
作者: Wang, Zhenxin Ouyang, Jihong Liu, Zeyang Li, Xueyan College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China College of Electronic Science and Engineering Jilin University Changchun 130012 China Economics School of Jilin University Changchun 130012 China
This paper presents a novel representation and matching method for deformable shapes. The proposed approach finds most expressive segments of a deformable shape category called similar and discriminative parts, which ... 详细信息
来源: 评论
Formal Analysis of Trusted Computing: One Case Study
Formal Analysis of Trusted Computing: One Case Study
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system.... 详细信息
来源: 评论
B-IRP: An Improving Integrity Report Protocol for Remote Attestation
B-IRP: An Improving Integrity Report Protocol for Remote Att...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re... 详细信息
来源: 评论
H function based tamper-proofing software watermarking scheme
Journal of Software
收藏 引用
Journal of Software 2011年 第1期6卷 149-155页
作者: Zhu, Jianqi Liu, Yanheng Wang, Aimin Yin, Kexin College of Computer Science and technology Ministry of Education Jilin University Changchun China Key Laboratory of Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China College of computer and science and engineering ChangChun University of Technology Changchun China
A novel constant tamper-proofing software watermark technique based on H encryption function is presented. First we split the watermark into smaller pieces before encoding them using CLOC scheme. With the watermark pi... 详细信息
来源: 评论
A NEW HYBRID COLLECTIVE CLASSIFICATION METHOD BASED ON RANDOM WALK AND LINK PATTERN
A NEW HYBRID COLLECTIVE CLASSIFICATION METHOD BASED ON RANDO...
收藏 引用
2011 IEEE International Conference on Cloud Computing and Intelligence Systems(2011年第一届IEEE云计算与智能系统国际会议 IEEE CCIS2011)
作者: Lina Li Jihong Ouyang Dayou Liu Hong Qi Huiling Chen Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun China
Collective classification, which is represented to classify unobserved nodes simultaneously in networked data is becoming an important research area with applications in several domains, such as the classification of ... 详细信息
来源: 评论
Visual group identification method of technical competitors using LinLog graph clustering algorithm
Visual group identification method of technical competitors ...
收藏 引用
IEEE International Conference on Computer Science and Automation engineering (CSAE)
作者: Hong-qi Han Xiaomi An Donghua Zhu Xuefeng Wang Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China) Ministry of Education School of Information Resource Management Beijing 100872 China School of Management and Economics Beijing Institute of Technology 100872 China
Visualization technique is a powerful method used by science and technology intelligence analysis experts to identify technical competitor groups. Common visualization methods tend to create graphs meeting the aesthet... 详细信息
来源: 评论
A kind of improving HMM model and using in the visual speech recognition
A kind of improving HMM model and using in the visual speech...
收藏 引用
2011 International Conference on Computer Science and Service System, CSSS 2011
作者: Zhang, Zeliang Li, Xiongfei Yang, Chengjia Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China Beihua University Jilin China
Visual speech-lip reading, making the computer understands what do speakers want to express through observing the lip direction of them. The most simply method of lip reading in early stage is to compare between chara... 详细信息
来源: 评论
A kind of improving HMM model and using in the visual speech recognition
A kind of improving HMM model and using in the visual speech...
收藏 引用
International Conference on Computer Science and Service System (CSSS)
作者: Zeliang Zhang Xiongfei Li Chengjia Yang Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Beihang University Jilin China
Visual speech-lip reading, making the computer understands what do speakers want to express through observing the lip direction of them. The most simply method of lip reading in early stage is to compare between chara... 详细信息
来源: 评论
Community Mining in Dynamic Social Networks-Clustering Based Improved Ant Colony Algorithm
Community Mining in Dynamic Social Networks-Clustering Based...
收藏 引用
The 6th International Conference on Computer Science & education(第六届国际计算机新科技与教育学术会议 ICCSE 2011)
作者: Zhang Nan Wang Zhe Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun China
Community mining has been the focus of many recent researches on dynamic social networks. In this paper, we propose a clustering based improved ant colony algorithm (CIACA) for community mining in social networks. The... 详细信息
来源: 评论
An Approach for Calculating Semantic Similarity between Words Using WordNet
An Approach for Calculating Semantic Similarity between Word...
收藏 引用
International Conference on Digital Manufacturing and Automation (ICDMA)
作者: Dou Hao Wanli Zuo Tao Peng Fengling He College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun China
This paper presents a new edge-counting based method using Word Net to compute the similarity. The method achieves a similarity that perfectly fits with human rating and effectively simulate the human tHought process ... 详细信息
来源: 评论