咨询与建议

限定检索结果

文献类型

  • 554 篇 期刊文献
  • 494 篇 会议
  • 1 册 图书

馆藏范围

  • 1,049 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 732 篇 工学
    • 584 篇 计算机科学与技术...
    • 486 篇 软件工程
    • 165 篇 信息与通信工程
    • 104 篇 控制科学与工程
    • 78 篇 生物工程
    • 55 篇 生物医学工程(可授...
    • 50 篇 机械工程
    • 47 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 39 篇 化学工程与技术
    • 33 篇 光学工程
    • 23 篇 仪器科学与技术
    • 22 篇 航空宇航科学与技...
    • 18 篇 交通运输工程
    • 15 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 14 篇 网络空间安全
  • 379 篇 理学
    • 261 篇 数学
    • 89 篇 生物学
    • 60 篇 统计学(可授理学、...
    • 47 篇 物理学
    • 39 篇 化学
    • 30 篇 系统科学
  • 251 篇 管理学
    • 134 篇 管理科学与工程(可...
    • 120 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 15 篇 法学
    • 13 篇 社会学
  • 12 篇 农学
  • 5 篇 经济学
  • 5 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 52 篇 computer science
  • 44 篇 educational inst...
  • 44 篇 laboratories
  • 43 篇 knowledge engine...
  • 41 篇 educational tech...
  • 26 篇 data mining
  • 24 篇 computer science...
  • 22 篇 semantics
  • 17 篇 feature extracti...
  • 15 篇 reinforcement le...
  • 15 篇 contrastive lear...
  • 14 篇 image segmentati...
  • 13 篇 deep learning
  • 13 篇 artificial intel...
  • 12 篇 ontologies
  • 11 篇 topology
  • 10 篇 recommender syst...
  • 10 篇 authentication
  • 10 篇 training
  • 9 篇 genetic algorith...

机构

  • 438 篇 college of compu...
  • 287 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 35 篇 college of softw...
  • 33 篇 school of artifi...
  • 31 篇 college of compu...
  • 29 篇 key laboratory o...
  • 24 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 18 篇 school of comput...
  • 16 篇 college of compu...
  • 15 篇 key laboratory o...
  • 15 篇 school of cyber ...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...

作者

  • 39 篇 yang bo
  • 36 篇 sun geng
  • 31 篇 li ximing
  • 27 篇 ouyang jihong
  • 26 篇 liu dayou
  • 25 篇 dantong ouyang
  • 24 篇 niyato dusit
  • 23 篇 bo yang
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 21 篇 huang lan
  • 21 篇 liu yanheng
  • 20 篇 li xiongfei
  • 19 篇 guan renchu
  • 19 篇 liu da-you
  • 19 篇 da-you liu
  • 18 篇 dayou liu
  • 17 篇 chang yi

语言

  • 913 篇 英文
  • 97 篇 其他
  • 39 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computing and Knowledge Engineering"
1049 条 记 录,以下是751-760 订阅
排序:
Structure optimization of Bayesian network based on dependency analysis of relational database
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第22期6卷 400-408页
作者: Wang, Limin Xia, Huijie Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University China College of Computer Science and Technology Jilin University China State Key Laboratory for Novel Software Technology Nanjing University China
The utilization of expert knowledge to construct Bayesian Network (BN) is one of the key issues of uncertain inference. In this paper the learning procedure of BN is simplified by applying data dependencies in relatio... 详细信息
来源: 评论
Efficient approximation of the maximal preference scores by lightweight cubic views
Efficient approximation of the maximal preference scores by ...
收藏 引用
15th International Conference on Extending Database Technology, EDBT 2012
作者: Chen, Yueguo Cui, Bin Du, Xiaoyong Tung, Anthony K. H. Key Laboratory of Data Engineering and Knowledge Engineering Renmin University of China MOE China Department of Computer Science Peking University Beijing China School of Information Renmin University of China Beijing China School of Computing National University of Singapore Singapore Singapore
Given a multi-features data set, a best preference query (BPQ) computes the maximal preference score (MPS) that the tuples in the data set can achieve with respect to a preference function. BPQs are very useful in app... 详细信息
来源: 评论
GAUSSIAN CONVEX EVIDENCE THEORY MODEL
GAUSSIAN CONVEX EVIDENCE THEORY MODEL
收藏 引用
2012 IEEE 2nd International Conference on Cloud computing and Intelligence Systems
作者: Yungang Zhu Dayou Liu Baokui Zhou College of Computer Science and Technology Jilin UniversityChangchun 130012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of EducationJilin University
Convex evidence theory model is the only method to fuse ordered proposition, in this paper we proposed a novel convex evidence theory model based on Gaussian function, we modified Gaussian function and used it to comb... 详细信息
来源: 评论
Lightweight encryption function structure protection of RFID security protocol
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第7期4卷 155-162页
作者: Jialiang, He Dantong, Ouyang Xi, Zhu Jinchao, Ji Tian, Bai College of Computer Science and Engineering Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China Australian School of Business University of New South Wales Australia
In this paper, a new security requirement about RFID protocols is proposed firstly, it is lightweight encryption function structure protection. Subsequently, a lightweight RFID authentication protocol is proposed as a... 详细信息
来源: 评论
Formal model extraction for combinational equivalence checking
收藏 引用
Journal of Convergence Information Technology 2012年 第8期7卷 371-380页
作者: Zhang, Guiling Ouyang, Dantong Bai, Hongtao Zeng, Hailin Ma, Tiemin Zhang, Yuehua School of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun China Center for Computer Fundamental Education Jilin University Changchun China
In formal verification, the first step is to build a formal model. Most of the academic tools represent the designs in BLIF or BLIF-MV network, while cannot directly take Verilog source code as an input. For instance,... 详细信息
来源: 评论
An efficient RFID authentication protocol supporting tag ownership transfer
收藏 引用
International Journal of Advancements in computing Technology 2012年 第4期4卷 244-253页
作者: Jialiang, He Dantong, Ouyang Youjun, Xu Yu, Shang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University China College of Computer Science and Information Technology Daqing Normal University China
Except common security and privacy requirements, well scalability and supporting tag ownership transfer are important requests for RFID systems. In this paper, an efficient RFID mutual authentication protocol supporti... 详细信息
来源: 评论
Representation for topological relations of four simple regions
Representation for topological relations of four simple regi...
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: Jian Li Jihong Ouyang Zhenxin Wang Information Technology College Jilin Agricultural University China College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,... 详细信息
来源: 评论
Processing of 3D meshed surfaces using spherical wavelets
收藏 引用
Computer Aided Drafting,Design and Manufacturing 2012年 第1期22卷 20-26页
作者: Hu Jianping Liu Xiuping WangXiaochao and Xie Qi School of Science Northeast Dianli University Jilin 132012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education J ilin University Changchun 130012 China School of Mathematical Sciences Dalian University of Technology Dalian 116024 China
This paper presents an efficient technique for processing of 3D meshed surfaces via spherical wavelets. More specifically, an input 3D mesh is firstly transformed into a spherical vector signal by a fast low distortio... 详细信息
来源: 评论
A homotopy interior point method for solving the optimal power flow problem
收藏 引用
Journal of Computational Information Systems 2012年 第7期8卷 2899-2906页
作者: Su, Menglong Cai, Hua Mathematics and Information Science College Luoyang Normal University Luoyang 471022 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China College of Mathematics Jilin University Changchun 130012 China
In this paper, based on the newly introduced mappings ξi (x, yi) ∈ Rn, i = 1, , m and ηi (x, zj) ∈ Rn, j = 1, , l, using the idea of homotopy methods, we propose a homotopy interior point method for solving the op... 详细信息
来源: 评论
SBoost: A new imbalanced data learning algorithm
收藏 引用
Journal of Convergence Information Technology 2012年 第1期7卷 238-244页
作者: Dong, Yuanfang Li, Xiongfei Zhao, Haiying School of Economics and Management Changchun University of Science and Technology Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China School of Computer Science and Technology Xinjiang Normal University Wulumuqi China
An imbalanced data classification algorithm named as SBoost is proposed. SBoost regards the decision tree as a weak classifier. Only the instances that their prediction value is more than the threshold are updated wit... 详细信息
来源: 评论