咨询与建议

限定检索结果

文献类型

  • 567 篇 会议
  • 520 篇 期刊文献

馆藏范围

  • 1,087 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 754 篇 工学
    • 591 篇 计算机科学与技术...
    • 517 篇 软件工程
    • 153 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 77 篇 生物工程
    • 67 篇 生物医学工程(可授...
    • 57 篇 机械工程
    • 52 篇 电子科学与技术(可...
    • 50 篇 化学工程与技术
    • 44 篇 光学工程
    • 41 篇 电气工程
    • 26 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 22 篇 航空宇航科学与技...
    • 19 篇 土木工程
    • 14 篇 建筑学
    • 13 篇 动力工程及工程热...
  • 419 篇 理学
    • 295 篇 数学
    • 95 篇 生物学
    • 72 篇 统计学(可授理学、...
    • 57 篇 物理学
    • 51 篇 化学
    • 29 篇 系统科学
  • 253 篇 管理学
    • 136 篇 管理科学与工程(可...
    • 120 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 43 篇 医学
    • 35 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 24 篇 药学(可授医学、理...
  • 19 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 64 篇 computer science
  • 57 篇 educational inst...
  • 50 篇 knowledge engine...
  • 50 篇 laboratories
  • 50 篇 educational tech...
  • 39 篇 data mining
  • 27 篇 computer science...
  • 24 篇 ontology
  • 21 篇 image segmentati...
  • 21 篇 semantics
  • 20 篇 feature extracti...
  • 16 篇 genetic algorith...
  • 15 篇 deep learning
  • 14 篇 ontologies
  • 14 篇 topology
  • 13 篇 reinforcement le...
  • 13 篇 clustering algor...
  • 11 篇 support vector m...
  • 11 篇 recommender syst...
  • 11 篇 neural networks

机构

  • 470 篇 college of compu...
  • 273 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 44 篇 college of softw...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 32 篇 college of compu...
  • 29 篇 school of artifi...
  • 24 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 department of co...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 the college of c...

作者

  • 45 篇 yang bo
  • 35 篇 liang yanchun
  • 34 篇 sun geng
  • 31 篇 ouyang dantong
  • 28 篇 dantong ouyang
  • 28 篇 li xiongfei
  • 26 篇 li ximing
  • 25 篇 ouyang jihong
  • 24 篇 yanchun liang
  • 23 篇 niyato dusit
  • 23 篇 bo yang
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 22 篇 liu yanheng
  • 21 篇 li jiahui
  • 20 篇 da-you liu
  • 19 篇 guan renchu
  • 19 篇 zuo wanli
  • 19 篇 dayou liu
  • 18 篇 chen haipeng

语言

  • 1,020 篇 英文
  • 47 篇 其他
  • 20 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computation and Knowledge Engineering for Ministry of Education"
1087 条 记 录,以下是901-910 订阅
排序:
Novel trusted authentication and evaluation framework in VANET
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 107-113页
作者: Wu, Jing Liu, Yan-Heng Wang, Jian Li, Wei-Ping College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Changchun Jilin University Information Technologies Co. Ltd. Changchun 130012 China
Vehicular ad hoc networks (VANET) have many new characteristics unlike tranditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo... 详细信息
来源: 评论
RETRACTED ARTICLE: The IDS model adapt to load characteristic under IPv6/4 environment
RETRACTED ARTICLE: The IDS model adapt to load characteristi...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Wei, Chuyi Fang, Zhiyi Li, Wei Liu, Xiaonan Yang, Hongjun Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
Thih paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamical... 详细信息
来源: 评论
A Novel Method for Prediction of Protein Domain Using Distance-Based Maximal Entropy
收藏 引用
Journal of Bionic engineering 2008年 第3期5卷 215-223页
作者: Shu-xue Zou Yan-xin Huang Yan Wang Chun-guang Zhou Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun 130012 P. R. China
Detecting the boundaries of protein domains is an important and challenging task in both experimental and computational structural biology. In this paper, a promising method for detecting the domain structure of a pro... 详细信息
来源: 评论
RETRACTED ARTICLE: Experimental research on a new authentication protocol for wireless communication network based on WiMAX
RETRACTED ARTICLE: Experimental research on a new authentica...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Li, Ruixue Fang, Zhiyi Xu, Peng Xiao, Wei Wang, Wei Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China School of Computer Northeast Normal University Changchun 130000 China
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s... 详细信息
来源: 评论
Object localization based on global structure constraint model and optimal algorithm
Object localization based on global structure constraint mod...
收藏 引用
3rd International Conference on Innovative Computing Information and Control, ICICIC'08
作者: Liu, Miao Guo, Dongwei Ma, Jie Liu, Xiaohua Li, Dan Zhou, Chunguang College of Computer Science and Technology Jilin University 130012 Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education 130012 Changchun China
We present a novel object localization approach based on the Global Structure Constraint model (GSC) and Optimal Algorithm. In GSC, Objects are described as constellations of points satisfied with their specific globa... 详细信息
来源: 评论
Dynamic policy updating based on one-point coverage random sets theory
Dynamic policy updating based on one-point coverage random s...
收藏 引用
1st International Workshop on knowledge Discovery and Data Mining, WKDD
作者: Da, Wei Yan-Heng, Liu Lian-Deng, Li Xue-Jie, Liu Hai-Yan, Hu College of Computer Science and Technology Jilin University Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun Jilin 130012 China
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by onepoint coverage random sets theory and also the unified framework ... 详细信息
来源: 评论
Canonical Huffman code based full-text index
收藏 引用
Progress in Natural Science:Materials International 2008年 第3期18卷 325-330页
作者: Yi Zhang a,b, Zhili Pei a, Jinhui Yanga, Yanchun Liang a, a College of Computer Science and Technology, Jilin University, key laboratory of Symbol computation and knowledge engineering of the ministry of education, Changchun 130012, China b Department of Computer Science, Jilin Technology and Business College, Changchun 130062, China College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Changchun 130012 China Department of Computer Science Jilin Technology and Business College Changchun 130062 China
Full-text indices are data structures that can be used to find any substring of a given string. Many full-text indices require space larger than the original string. In this paper, we introduce the canonical Huffman c... 详细信息
来源: 评论
Interpretation of extended pawlak flow graphs using granular computing
收藏 引用
Lecture Notes in Computer Science
作者: Liu, Huawen Sun, Jigui Zhang, Huijie College of Computer Science Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun 130012 China College of Computer Northeast Normal University Changchun 130021 China
In this paper, we mainly discuss the relationship between the extended Pawlak flow graph (EFG) with granular computing (GrC), and develop a both simple and concrete model for EFG using GrC. The distinct advantage is t... 详细信息
来源: 评论
Simulation research on a new scheduling algorithm in IEEE802.16 MAC layer
Simulation research on a new scheduling algorithm in IEEE802...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Guannan, Qu Zhiyi, Fang Wei, Wang Huanhuan, Tang Ansheng, Ma College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China School of Computer Science Northeast Normal University Changchun China
IEEE802.16, as a wireless MAN broadband access standard, defines a flexible QoS mechanism in MAC layer for wild variety classes of services. However, it dose not define specific admission control strategy and scheduli... 详细信息
来源: 评论
Notice of Retraction: The IDS Model Adapt to Load Characteristic under IPv6/4 Environment
Notice of Retraction: The IDS Model Adapt to Load Characteri...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Chuyi Wei Zhiyi Fang Wei Li Xiaonan Liu Hongjun Yang College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
This article has been retracted by the publisher.
来源: 评论