咨询与建议

限定检索结果

文献类型

  • 552 篇 期刊文献
  • 494 篇 会议
  • 1 册 图书

馆藏范围

  • 1,047 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 729 篇 工学
    • 582 篇 计算机科学与技术...
    • 500 篇 软件工程
    • 164 篇 信息与通信工程
    • 91 篇 控制科学与工程
    • 78 篇 生物工程
    • 55 篇 生物医学工程(可授...
    • 51 篇 机械工程
    • 47 篇 电子科学与技术(可...
    • 46 篇 电气工程
    • 39 篇 化学工程与技术
    • 34 篇 光学工程
    • 23 篇 仪器科学与技术
    • 22 篇 航空宇航科学与技...
    • 18 篇 交通运输工程
    • 15 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 14 篇 网络空间安全
  • 382 篇 理学
    • 264 篇 数学
    • 89 篇 生物学
    • 62 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 39 篇 化学
    • 30 篇 系统科学
  • 253 篇 管理学
    • 134 篇 管理科学与工程(可...
    • 122 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 15 篇 法学
    • 13 篇 社会学
  • 12 篇 农学
  • 5 篇 经济学
  • 5 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 52 篇 computer science
  • 44 篇 educational inst...
  • 44 篇 laboratories
  • 43 篇 knowledge engine...
  • 41 篇 educational tech...
  • 26 篇 data mining
  • 24 篇 computer science...
  • 22 篇 semantics
  • 16 篇 feature extracti...
  • 15 篇 reinforcement le...
  • 15 篇 contrastive lear...
  • 14 篇 image segmentati...
  • 13 篇 deep learning
  • 13 篇 artificial intel...
  • 12 篇 ontologies
  • 11 篇 topology
  • 10 篇 recommender syst...
  • 10 篇 authentication
  • 9 篇 genetic algorith...
  • 9 篇 data models

机构

  • 437 篇 college of compu...
  • 284 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 35 篇 college of softw...
  • 33 篇 school of artifi...
  • 31 篇 college of compu...
  • 29 篇 key laboratory o...
  • 24 篇 jilin university...
  • 20 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 18 篇 school of comput...
  • 16 篇 college of compu...
  • 15 篇 key laboratory o...
  • 15 篇 school of cyber ...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...

作者

  • 39 篇 yang bo
  • 36 篇 sun geng
  • 31 篇 li ximing
  • 27 篇 ouyang jihong
  • 26 篇 liu dayou
  • 25 篇 dantong ouyang
  • 24 篇 niyato dusit
  • 23 篇 bo yang
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 21 篇 huang lan
  • 21 篇 liu yanheng
  • 20 篇 li xiongfei
  • 19 篇 guan renchu
  • 19 篇 liu da-you
  • 19 篇 da-you liu
  • 18 篇 dayou liu
  • 17 篇 chang yi

语言

  • 930 篇 英文
  • 78 篇 其他
  • 39 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computing and Knowledge Engineering"
1047 条 记 录,以下是921-930 订阅
Object Localization Based on Global Structure Constraint Model and Optimal Algorithm
Object Localization Based on Global Structure Constraint Mod...
收藏 引用
International Conference on Innovative computing, Information and Control (ICICIC)
作者: Miao Liu Dongwei Guo Jie Ma Xiaohua Liu Dan Li Chunguang Zhou College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
We present a novel object localization approach based on the global structure constraint model (GSC) and optimal algorithm. In GSC, Objects are described as constellations of points satisfied with their specific globa... 详细信息
来源: 评论
AN ATTRIBUTE DISCRETIZATION ALGORITHM BASED ON ROUGH SET AND INFORMATION ENTROPY
AN ATTRIBUTE DISCRETIZATION ALGORITHM BASED ON ROUGH SET AND...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: HE LIU DA-YOU LIU XIAO-HU SHI YING GAO College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory for Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun 130012 China
Attribute discretization is one of the key issues for the Rough Set theory. First, a method is proposed to compute an initial cut points set. The indistinguishable relation of decision tables did not change, and the n... 详细信息
来源: 评论
Dynamic Policy Updating Based on One-Point Coverage Random Sets Theory
Dynamic Policy Updating Based on One-Point Coverage Random S...
收藏 引用
International Workshop on knowledge Discovery and Data Mining (WKDD)
作者: Wei Da Yan-heng Liu Lian-deng Li Xue-jie Liu Hai-yan Hu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin China College of Computer Science and Technology Jilin University Changchun Jilin China
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by one-point coverage random sets theory and also the unified framework... 详细信息
来源: 评论
Notice of Retraction: Experimental Research on a New Authentication Protocol for Wireless Communication Network Based on WiMAX
Notice of Retraction: Experimental Research on a New Authent...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile computing (WiCom)
作者: Ruixue Li Zhiyi Fang Peng Xu Wei Xiao Wei Wang College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China School of Computer Northeast Normal University Changchun China
This article has been retracted by the publisher.
来源: 评论
Research on Hiberarchy Trusted Network Based on the Grade Division
Research on Hiberarchy Trusted Network Based on the Grade Di...
收藏 引用
2008 3rd International Conference on Intelligent System and knowledge engineering(第三届智能系统与知识工程国际会议)(ISKE 2008)
作者: Jian Wang Yanheng Liu Jing Zhang Jianqi Zhu Tianzhe Dong College of Computer Science and Technology Jilin UniversityChangchunJilin130012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchunJilin130012China
A framework of hiberarchy trusted network basedon the grade division was put forward,and thepartition rules of trusted attributes as well as themethods of grade division were explained in ***,the potential application... 详细信息
来源: 评论
Modeling Cascading Failures in Congested Internet
Modeling Cascading Failures in Congested Internet
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Jian Wang Yanheng Liu Xin Sun Yu Jiao College of Computer Science and Technology Jilin University Changchun Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin 130012 China
Internet is a complex network with the characteristic of self-organized criticality. The cascading dynamics of Internet are presented and two reasons are pointed out, which may cause cascading failures. Different from... 详细信息
来源: 评论
The Application of  PSC-CEA in the Process of Resource Allocation Dynamic Policy Triggering during the Switchover of Mobile IP
The Application of  PSC-CEA in the Process of Resource All...
收藏 引用
International Conference on MultiMedia and Information Technology, MMIT
作者: Wei Da Liu Yan-heng Yu Xue-Gang Hao Jian-ying Li Lian-deng Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Jilin China Jilin University Changchun Jilin CN College of Computer Science and Technology Jilin University China
This paper demonstrates the necessity of the use of PSC-CEA for dynamic policy triggering in the process of mobile IP switching; in the mean time, according to the characteristics of policy based network management, p... 详细信息
来源: 评论
An improved particle swarm optimization algorithm for flowshop scheduling problem
An improved particle swarm optimization algorithm for flowsh...
收藏 引用
International Conference on Information and Automation (ICIA)
作者: Bo Li Changsheng Zhang Ge Bai Erliang Zhang a. The computing center of Changchun Institute of Technology b. Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education c. Aviation university of air force Changchun China
The flowshop scheduling problem has been widely studied in the literature and many techniques have been applied to it, but few algorithms have been proposed to solve it using particle swarm optimization algorithm (PSO...
来源: 评论
A New Authentication Protocol for Wireless Communication Network Based on IEEE802.16
A New Authentication Protocol for Wireless Communication Net...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Ruixue Li Zhiyi Fang Wei Cao Yumei Yin Peng Xu College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun China College of Information Technology Liaodong University Dandong China Changchun Institute of Optics Fine Mechanics and Physics Chinese Academy and Sciences Changchun China
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16, a series of key issues about security methods and techniques were researched. A new authentication protocol... 详细信息
来源: 评论
Translating Query for Deep Web Using Ontology
Translating Query for Deep Web Using Ontology
收藏 引用
International Conference on Computer Science and Software engineering
作者: Hao Liang Wanli Zuo Fei Ren Junhua Wang College of Computer Science and Technology Department of Technology Jilin University Changchun Taxation China College of Computer Science and Technology Key Laboratory of Symbol Computation andKnowledge Engineering of the Ministry of Education Jilin University China College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun China
The e-commerce information on the surface Web is supported by the Deep Web, which can not be accessed directly by the search engines or the Web crawlers. The only way to access the backend database is through query in... 详细信息
来源: 评论