咨询与建议

限定检索结果

文献类型

  • 554 篇 期刊文献
  • 494 篇 会议
  • 1 册 图书

馆藏范围

  • 1,049 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 732 篇 工学
    • 584 篇 计算机科学与技术...
    • 486 篇 软件工程
    • 165 篇 信息与通信工程
    • 104 篇 控制科学与工程
    • 78 篇 生物工程
    • 55 篇 生物医学工程(可授...
    • 50 篇 机械工程
    • 47 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 39 篇 化学工程与技术
    • 33 篇 光学工程
    • 23 篇 仪器科学与技术
    • 22 篇 航空宇航科学与技...
    • 18 篇 交通运输工程
    • 15 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 14 篇 网络空间安全
  • 379 篇 理学
    • 261 篇 数学
    • 89 篇 生物学
    • 60 篇 统计学(可授理学、...
    • 47 篇 物理学
    • 39 篇 化学
    • 30 篇 系统科学
  • 251 篇 管理学
    • 134 篇 管理科学与工程(可...
    • 120 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 15 篇 法学
    • 13 篇 社会学
  • 12 篇 农学
  • 5 篇 经济学
  • 5 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 52 篇 computer science
  • 44 篇 educational inst...
  • 44 篇 laboratories
  • 43 篇 knowledge engine...
  • 41 篇 educational tech...
  • 26 篇 data mining
  • 24 篇 computer science...
  • 22 篇 semantics
  • 17 篇 feature extracti...
  • 15 篇 reinforcement le...
  • 15 篇 contrastive lear...
  • 14 篇 image segmentati...
  • 13 篇 deep learning
  • 13 篇 artificial intel...
  • 12 篇 ontologies
  • 11 篇 topology
  • 10 篇 recommender syst...
  • 10 篇 authentication
  • 10 篇 training
  • 9 篇 genetic algorith...

机构

  • 438 篇 college of compu...
  • 287 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 35 篇 college of softw...
  • 33 篇 school of artifi...
  • 31 篇 college of compu...
  • 29 篇 key laboratory o...
  • 24 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 18 篇 school of comput...
  • 16 篇 college of compu...
  • 15 篇 key laboratory o...
  • 15 篇 school of cyber ...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...

作者

  • 39 篇 yang bo
  • 36 篇 sun geng
  • 31 篇 li ximing
  • 27 篇 ouyang jihong
  • 26 篇 liu dayou
  • 25 篇 dantong ouyang
  • 24 篇 niyato dusit
  • 23 篇 bo yang
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 21 篇 huang lan
  • 21 篇 liu yanheng
  • 20 篇 li xiongfei
  • 19 篇 guan renchu
  • 19 篇 liu da-you
  • 19 篇 da-you liu
  • 18 篇 dayou liu
  • 17 篇 chang yi

语言

  • 913 篇 英文
  • 97 篇 其他
  • 39 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computing and Knowledge Engineering"
1049 条 记 录,以下是901-910 订阅
排序:
Novel theorem proving algorithm based on extension rule
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2009年 第1期46卷 9-14页
作者: Sun, Jigui Li, Ying Zhu, Xingjun Lu, Shuai College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Changchun 130012 China
ATP (automated theorem proving) has always been one of the most advanced areas of computer science. The traditional idea used in ATP is to try to deduce the empty clause to check satisfiability, such as resolution bas... 详细信息
来源: 评论
Escrow mechanism for personal security keys on IBE
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 75-80页
作者: Zou, Yue-Peng Ouyang, Dan-Tong He, Li-Li Bai, Hong-Tao College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A new escrow mechanism for personal security keys on IBE was proposed. This mechanism constructed a security trust system composed of private key generator, key management center, and user security component to set up... 详细信息
来源: 评论
Novel trusted authentication and evaluation framework in VANET
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 107-113页
作者: Wu, Jing Liu, Yan-Heng Wang, Jian Li, Wei-Ping College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Changchun Jilin University Information Technologies Co. Ltd. Changchun 130012 China
Vehicular ad hoc networks (VANET) have many new characteristics unlike tranditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo... 详细信息
来源: 评论
RETRACTED ARTICLE: The IDS model adapt to load characteristic under IPv6/4 environment
RETRACTED ARTICLE: The IDS model adapt to load characteristi...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile computing, WiCOM 2008
作者: Wei, Chuyi Fang, Zhiyi Li, Wei Liu, Xiaonan Yang, Hongjun Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
Thih paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamical... 详细信息
来源: 评论
Feature Recognition Based on Graph Decomposition and Neural Network
Feature Recognition Based on Graph Decomposition and Neural ...
收藏 引用
International Conference on Convergence Information Technology
作者: Yi RongQing Li WenHui Wang Duo Yuan Hua Key laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education Jilin University Changchun China
A hybrid of graph-based and neural network recognition system is developed. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are ... 详细信息
来源: 评论
Feature Recognition Based on Neural Network
Feature Recognition Based on Neural Network
收藏 引用
International Conference on Computer Science and Information Technology (CSIT)
作者: Rongqing Yi Wenhui Li Duo Wang Hua Yuan Key laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education Jilin University Changchun China
An efficient methodology for recognizing features is presented. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are first checke... 详细信息
来源: 评论
RETRACTED ARTICLE: Experimental research on a new authentication protocol for wireless communication network based on WiMAX
RETRACTED ARTICLE: Experimental research on a new authentica...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile computing, WiCOM 2008
作者: Li, Ruixue Fang, Zhiyi Xu, Peng Xiao, Wei Wang, Wei Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China School of Computer Northeast Normal University Changchun 130000 China
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s... 详细信息
来源: 评论
Object localization based on global structure constraint model and optimal algorithm
Object localization based on global structure constraint mod...
收藏 引用
3rd International Conference on Innovative computing Information and Control, ICICIC'08
作者: Liu, Miao Guo, Dongwei Ma, Jie Liu, Xiaohua Li, Dan Zhou, Chunguang College of Computer Science and Technology Jilin University 130012 Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education 130012 Changchun China
We present a novel object localization approach based on the Global Structure Constraint model (GSC) and Optimal Algorithm. In GSC, Objects are described as constellations of points satisfied with their specific globa... 详细信息
来源: 评论
Dynamic policy updating based on one-point coverage random sets theory
Dynamic policy updating based on one-point coverage random s...
收藏 引用
1st International Workshop on knowledge Discovery and Data Mining, WKDD
作者: Da, Wei Yan-Heng, Liu Lian-Deng, Li Xue-Jie, Liu Hai-Yan, Hu College of Computer Science and Technology Jilin University Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun Jilin 130012 China
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by onepoint coverage random sets theory and also the unified framework ... 详细信息
来源: 评论
Interpretation of extended pawlak flow graphs using granular computing
收藏 引用
Lecture Notes in Computer Science
作者: Liu, Huawen Sun, Jigui Zhang, Huijie College of Computer Science Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun 130012 China College of Computer Northeast Normal University Changchun 130021 China
In this paper, we mainly discuss the relationship between the extended Pawlak flow graph (EFG) with granular computing (GrC), and develop a both simple and concrete model for EFG using GrC. The distinct advantage is t... 详细信息
来源: 评论