咨询与建议

限定检索结果

文献类型

  • 536 篇 期刊文献
  • 469 篇 会议

馆藏范围

  • 1,005 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 700 篇 工学
    • 556 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 162 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 78 篇 生物工程
    • 55 篇 生物医学工程(可授...
    • 50 篇 机械工程
    • 45 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 40 篇 化学工程与技术
    • 33 篇 光学工程
    • 23 篇 仪器科学与技术
    • 21 篇 航空宇航科学与技...
    • 18 篇 交通运输工程
    • 15 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 13 篇 网络空间安全
  • 378 篇 理学
    • 259 篇 数学
    • 90 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 45 篇 物理学
    • 40 篇 化学
    • 30 篇 系统科学
  • 247 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 119 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 15 篇 法学
    • 13 篇 社会学
  • 12 篇 农学
  • 5 篇 经济学
  • 5 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 52 篇 computer science
  • 44 篇 educational inst...
  • 44 篇 laboratories
  • 43 篇 knowledge engine...
  • 41 篇 educational tech...
  • 26 篇 data mining
  • 24 篇 computer science...
  • 22 篇 semantics
  • 14 篇 reinforcement le...
  • 14 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 image segmentati...
  • 12 篇 ontologies
  • 12 篇 artificial intel...
  • 11 篇 contrastive lear...
  • 11 篇 topology
  • 10 篇 recommender syst...
  • 10 篇 authentication
  • 9 篇 genetic algorith...
  • 9 篇 data models

机构

  • 421 篇 college of compu...
  • 272 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 college of softw...
  • 32 篇 college of compu...
  • 32 篇 school of artifi...
  • 29 篇 key laboratory o...
  • 23 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 school of cyber ...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...
  • 14 篇 college of compu...

作者

  • 38 篇 yang bo
  • 35 篇 sun geng
  • 28 篇 li ximing
  • 27 篇 ouyang jihong
  • 26 篇 liu dayou
  • 25 篇 dantong ouyang
  • 23 篇 niyato dusit
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 21 篇 li jiahui
  • 21 篇 bo yang
  • 21 篇 liu yanheng
  • 19 篇 liu da-you
  • 19 篇 da-you liu
  • 19 篇 li xiongfei
  • 18 篇 chen haipeng
  • 18 篇 dayou liu
  • 18 篇 huang lan
  • 17 篇 chang yi
  • 17 篇 wang jian

语言

  • 910 篇 英文
  • 57 篇 其他
  • 38 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computing and Knowledge Engineering"
1005 条 记 录,以下是881-890 订阅
排序:
AN ATTRIBUTE DISCRETIZATION ALGORITHM BASED ON ROUGH SET AND INFORMATION ENTROPY
AN ATTRIBUTE DISCRETIZATION ALGORITHM BASED ON ROUGH SET AND...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: HE LIU DA-YOU LIU XIAO-HU SHI YING GAO College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory for Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun 130012 China
Attribute discretization is one of the key issues for the Rough Set theory. First, a method is proposed to compute an initial cut points set. The indistinguishable relation of decision tables did not change, and the n... 详细信息
来源: 评论
Dynamic Policy Updating Based on One-Point Coverage Random Sets Theory
Dynamic Policy Updating Based on One-Point Coverage Random S...
收藏 引用
International Workshop on knowledge Discovery and Data Mining (WKDD)
作者: Wei Da Yan-heng Liu Lian-deng Li Xue-jie Liu Hai-yan Hu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin China College of Computer Science and Technology Jilin University Changchun Jilin China
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by one-point coverage random sets theory and also the unified framework... 详细信息
来源: 评论
Notice of Retraction: Experimental Research on a New Authentication Protocol for Wireless Communication Network Based on WiMAX
Notice of Retraction: Experimental Research on a New Authent...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Ruixue Li Zhiyi Fang Peng Xu Wei Xiao Wei Wang College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China School of Computer Northeast Normal University Changchun China
This article has been retracted by the publisher.
来源: 评论
Research on Hiberarchy Trusted Network Based on the Grade Division
Research on Hiberarchy Trusted Network Based on the Grade Di...
收藏 引用
2008 3rd International Conference on Intelligent System and knowledge engineering(第三届智能系统与知识工程国际会议)(ISKE 2008)
作者: Jian Wang Yanheng Liu Jing Zhang Jianqi Zhu Tianzhe Dong College of Computer Science and Technology Jilin UniversityChangchunJilin130012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchunJilin130012China
A framework of hiberarchy trusted network basedon the grade division was put forward,and thepartition rules of trusted attributes as well as themethods of grade division were explained in ***,the potential application... 详细信息
来源: 评论
Modeling Cascading Failures in Congested Internet
Modeling Cascading Failures in Congested Internet
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Jian Wang Yanheng Liu Xin Sun Yu Jiao College of Computer Science and Technology Jilin University Changchun Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin 130012 China
Internet is a complex network with the characteristic of self-organized criticality. The cascading dynamics of Internet are presented and two reasons are pointed out, which may cause cascading failures. Different from... 详细信息
来源: 评论
The Application of  PSC-CEA in the Process of Resource Allocation Dynamic Policy Triggering during the Switchover of Mobile IP
The Application of  PSC-CEA in the Process of Resource All...
收藏 引用
International Conference on MultiMedia and Information Technology, MMIT
作者: Wei Da Liu Yan-heng Yu Xue-Gang Hao Jian-ying Li Lian-deng Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Jilin China Jilin University Changchun Jilin CN College of Computer Science and Technology Jilin University China
This paper demonstrates the necessity of the use of PSC-CEA for dynamic policy triggering in the process of mobile IP switching; in the mean time, according to the characteristics of policy based network management, p... 详细信息
来源: 评论
An improved particle swarm optimization algorithm for flowshop scheduling problem
An improved particle swarm optimization algorithm for flowsh...
收藏 引用
International Conference on Information and Automation (ICIA)
作者: Bo Li Changsheng Zhang Ge Bai Erliang Zhang a. The computing center of Changchun Institute of Technology b. Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education c. Aviation university of air force Changchun China
The flowshop scheduling problem has been widely studied in the literature and many techniques have been applied to it, but few algorithms have been proposed to solve it using particle swarm optimization algorithm (PSO...
来源: 评论
New model and realization of trusted remediation network
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of ...
收藏 引用
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition) 2008年 第5期9卷 470-474页
作者: Wang, Jian Liu, Yan-Heng Zhang, Ying-Ge Mei, Fang College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Changchun 130012 China
A new and feasible trusted remediation model was built with its function and work flow explained in detail. Moreover, the communication and authentication process of remediation model were discussed. Simulation result... 详细信息
来源: 评论
A New Authentication Protocol for Wireless Communication Network Based on IEEE802.16
A New Authentication Protocol for Wireless Communication Net...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Ruixue Li Zhiyi Fang Wei Cao Yumei Yin Peng Xu College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun China College of Information Technology Liaodong University Dandong China Changchun Institute of Optics Fine Mechanics and Physics Chinese Academy and Sciences Changchun China
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol... 详细信息
来源: 评论
Collaborative filtering recommendation algorithm combining probabilistic relational models and user grade
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2008年 第9期45卷 1463-1469页
作者: Gao, Ying Qi, Hong Liu, Jie Liu, Dayou College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Changchun 130012 China
Collaborative filtering is one of successful technologies for building recommender systems. Unfortunately, it suffers from sparsity and scalability problems. To address these problems, a collaborative filtering recomm... 详细信息
来源: 评论