咨询与建议

限定检索结果

文献类型

  • 539 篇 期刊文献
  • 469 篇 会议
  • 1 册 图书

馆藏范围

  • 1,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 558 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 162 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 78 篇 生物工程
    • 55 篇 生物医学工程(可授...
    • 50 篇 机械工程
    • 46 篇 电子科学与技术(可...
    • 45 篇 电气工程
    • 40 篇 化学工程与技术
    • 33 篇 光学工程
    • 23 篇 仪器科学与技术
    • 21 篇 航空宇航科学与技...
    • 18 篇 交通运输工程
    • 15 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 13 篇 网络空间安全
  • 378 篇 理学
    • 259 篇 数学
    • 90 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 45 篇 物理学
    • 40 篇 化学
    • 30 篇 系统科学
  • 247 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 119 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 15 篇 法学
    • 13 篇 社会学
  • 12 篇 农学
  • 5 篇 经济学
  • 5 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 52 篇 computer science
  • 44 篇 educational inst...
  • 44 篇 laboratories
  • 43 篇 knowledge engine...
  • 41 篇 educational tech...
  • 26 篇 data mining
  • 24 篇 computer science...
  • 22 篇 semantics
  • 14 篇 reinforcement le...
  • 14 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 image segmentati...
  • 13 篇 artificial intel...
  • 12 篇 ontologies
  • 11 篇 contrastive lear...
  • 11 篇 topology
  • 10 篇 recommender syst...
  • 10 篇 authentication
  • 9 篇 genetic algorith...
  • 9 篇 data models

机构

  • 422 篇 college of compu...
  • 272 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 college of softw...
  • 32 篇 college of compu...
  • 32 篇 school of artifi...
  • 29 篇 key laboratory o...
  • 23 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 school of cyber ...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...
  • 14 篇 college of compu...

作者

  • 38 篇 yang bo
  • 35 篇 sun geng
  • 28 篇 li ximing
  • 27 篇 ouyang jihong
  • 26 篇 liu dayou
  • 25 篇 dantong ouyang
  • 23 篇 niyato dusit
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 21 篇 li jiahui
  • 21 篇 bo yang
  • 21 篇 liu yanheng
  • 19 篇 liu da-you
  • 19 篇 da-you liu
  • 19 篇 li xiongfei
  • 18 篇 chen haipeng
  • 18 篇 dayou liu
  • 18 篇 huang lan
  • 17 篇 chang yi
  • 17 篇 wang jian

语言

  • 914 篇 英文
  • 57 篇 其他
  • 38 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computing and Knowledge Engineering"
1009 条 记 录,以下是231-240 订阅
排序:
Value ordering heuristic for solving algorithm based on the AC-4 algorithm
Value ordering heuristic for solving algorithm based on the ...
收藏 引用
2nd International Workshop on Intelligent Systems and Applications, ISA2010
作者: Li, Zhan-Shan Du, Hui-Ying Xing, Shi-Mei Meng, Fan-Wei School of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China
We have studied the AC-4 algorithm and then present value ordering heuristic for solving algorithm BT-MSV which is based on the AC-4 algorithm. This algorithm takes full advantage of supported information which is rec... 详细信息
来源: 评论
MAX-MIN ant system on GPU with CUDA
MAX-MIN ant system on GPU with CUDA
收藏 引用
2009 4th International Conference on Innovative computing, Information and Control, ICICIC 2009
作者: Bai, Hongtao Ouyang, Dantong Li, Ximing He, Lili Yu, Haihong College of Computer Science and Technology Jilin University 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University 130012 China
We propose a parallel MAX-MIN Ant System (MMAS) algorithm that is suitable for an implementation on graphics processing units (GPUs). Multi ant colonies with respective parameter settings are whole offloaded to the GP... 详细信息
来源: 评论
Entailment-based axiom pinpointing in debugging incoherent terminologies  1
Entailment-based axiom pinpointing in debugging incoherent t...
收藏 引用
1st International Workshop on Semantic Technologies, IWOST 2015
作者: Ye, Yuxin Ouyang, Dantong Su, Jing College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China
One of the major problems of axiom pinpointing for incoherent terminologies is the precise positioning within the conflict axioms. In this paper we present a formal notion for the entailment-based axiom pinpointing of... 详细信息
来源: 评论
Underwater Target Detection Based on Reinforcement Learning and Ant Colony Optimization
收藏 引用
Journal of Ocean University of China 2022年 第2期21卷 323-330页
作者: WANG Xinhua ZHU Yungang LI Dayu ZHANG Guang School of Computer Science Northeast Electric Power UniversityJilin 132012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and TechnologyJilin UniversityChangchun 130012China State Key Laboratory of Applied Optics Changchun Institute of OpticsFine Mechanics and PhysicsChinese Academy of SciencesChangchun 130033China
Underwater optical imaging produces images with high resolution and abundant information and hence has outstanding advantages in short-distance underwater target ***,low-light and high-noise scenarios pose great chall... 详细信息
来源: 评论
Flexible planning using fuzzy description logics
Flexible planning using fuzzy description logics
收藏 引用
2007 International Conference on Artificial Intelligence, ICAI 2007
作者: Shi, Lian Sun, Jigui Lu, Shuai Yin, Minghao College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun 130012 China
Description Logics are formalisms for representing knowledge of various domains in a structured and formally well-understood way. Typically, DLs are limited to dealing with precise and well defined concepts. In this p... 详细信息
来源: 评论
Static knowledge representation of multi-agent system's specification by description logics
Static knowledge representation of multi-agent system's spec...
收藏 引用
2006 International Workshop on Description Logics, DL 2006
作者: Che, Haiyan Sun, Jigui Yu, Haibo College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun 130012 China
Modularity and rigor are two key elements for multi-agent technology. Hong Zhu's multi-agent system (MAS) development method provides proper language facilities supporting modularity. To enhance this method with r... 详细信息
来源: 评论
key value ordering heuristic for solving algorithm based on the AC-4 algorithm
Key value ordering heuristic for solving algorithm based on ...
收藏 引用
2010 International Conference on Computer, Mechatronics, Control and Electronic engineering, CMCE 2010
作者: Li, Zhan-Shan Du, Hui-Ying Snen, Hai-Jiao Wang, Zi-Wen School of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
We have studied the AC-4 algorithm and then present key value ordering heuristic forming the new solving algorithm BT-KVV, which is based on the AC-4 algorithm. This algorithm takes full advantage of the state informa... 详细信息
来源: 评论
A Pruning Based Continuous RkNN Query Algorithm for Large k
收藏 引用
Chinese Journal of Electronics 2023年 第3期21卷 523-527页
作者: Shengsheng WANG Sheng CHAI Qiannan LV College of Computer Science and Technology Key Laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education Jilin University Changchun China
Reverse k-nearest neighbor (RkNN) query is a hot-spot in spatio-temporal database. With the developing of mobile devices, continuous RkNN query becomes more and more important. Most of the previous methods use the two... 详细信息
来源: 评论
RETRACTED ARTICLE: Experimental research on a new authentication protocol for wireless communication network based on WiMAX
RETRACTED ARTICLE: Experimental research on a new authentica...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile computing, WiCOM 2008
作者: Li, Ruixue Fang, Zhiyi Xu, Peng Xiao, Wei Wang, Wei Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China School of Computer Northeast Normal University Changchun 130000 China
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s... 详细信息
来源: 评论
A wireless intrusion detection method based on dynamic growing neural network
A wireless intrusion detection method based on dynamic growi...
收藏 引用
First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
作者: Liu, Yanheng Tian, Daxin Li, Bin Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China College of Mathematics Science Jilin University Changchun 130012 China
In this paper an intrusion detection method based on Dynamic Growing Neural Network (DGNN) for wireless networking is presented. DGNN is based on the Hebbian learning rule and adds new neurons under certain conditions... 详细信息
来源: 评论