咨询与建议

限定检索结果

文献类型

  • 539 篇 期刊文献
  • 469 篇 会议
  • 1 册 图书

馆藏范围

  • 1,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 工学
    • 558 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 162 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 78 篇 生物工程
    • 55 篇 生物医学工程(可授...
    • 50 篇 机械工程
    • 46 篇 电子科学与技术(可...
    • 45 篇 电气工程
    • 40 篇 化学工程与技术
    • 33 篇 光学工程
    • 23 篇 仪器科学与技术
    • 21 篇 航空宇航科学与技...
    • 18 篇 交通运输工程
    • 15 篇 土木工程
    • 14 篇 动力工程及工程热...
    • 13 篇 网络空间安全
  • 378 篇 理学
    • 259 篇 数学
    • 90 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 45 篇 物理学
    • 40 篇 化学
    • 30 篇 系统科学
  • 247 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 119 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 15 篇 法学
    • 13 篇 社会学
  • 12 篇 农学
  • 5 篇 经济学
  • 5 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 52 篇 computer science
  • 44 篇 educational inst...
  • 44 篇 laboratories
  • 43 篇 knowledge engine...
  • 41 篇 educational tech...
  • 26 篇 data mining
  • 24 篇 computer science...
  • 22 篇 semantics
  • 14 篇 reinforcement le...
  • 14 篇 feature extracti...
  • 13 篇 deep learning
  • 13 篇 image segmentati...
  • 13 篇 artificial intel...
  • 12 篇 ontologies
  • 11 篇 contrastive lear...
  • 11 篇 topology
  • 10 篇 recommender syst...
  • 10 篇 authentication
  • 9 篇 genetic algorith...
  • 9 篇 data models

机构

  • 422 篇 college of compu...
  • 272 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 college of softw...
  • 32 篇 college of compu...
  • 32 篇 school of artifi...
  • 29 篇 key laboratory o...
  • 23 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 school of cyber ...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...
  • 14 篇 college of compu...

作者

  • 38 篇 yang bo
  • 35 篇 sun geng
  • 28 篇 li ximing
  • 27 篇 ouyang jihong
  • 26 篇 liu dayou
  • 25 篇 dantong ouyang
  • 23 篇 niyato dusit
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 21 篇 li jiahui
  • 21 篇 bo yang
  • 21 篇 liu yanheng
  • 19 篇 liu da-you
  • 19 篇 da-you liu
  • 19 篇 li xiongfei
  • 18 篇 chen haipeng
  • 18 篇 dayou liu
  • 18 篇 huang lan
  • 17 篇 chang yi
  • 17 篇 wang jian

语言

  • 914 篇 英文
  • 57 篇 其他
  • 38 篇 中文
检索条件"机构=Key Laboratory of Symbolic Computing and Knowledge Engineering of"
1009 条 记 录,以下是181-190 订阅
排序:
A PKI-based lightweight workflow model
A PKI-based lightweight workflow model
收藏 引用
5th International Conference on Control and Automation, ICCA'05
作者: Zhang, Jian Sun, Jigui Li, Niya Hu, Chengquan Li, Zehai College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education China
The workflow model is the abstract expression of the workflow or the business process. Following the WfMC reference model, a PKI-based lightweight workflow model named as PBLW is put forward in this paper. The framewo... 详细信息
来源: 评论
Detecting epistasis by LASSO-penalized-model search algorithm in human Genome-Wide Association Studies
Detecting epistasis by LASSO-penalized-model search algorith...
收藏 引用
4th International Conference on Materials Science and Information Technology, MSIT 2014
作者: Zhou, Zhi Hui Liu, Gui Xia Su, Ling Tao Han, Liang Yan, Lun College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Extensive studies have shown that many complex diseases are influenced by interaction of certain genes, while due to the limitations and drawbacks of adopting logistic regression (LR) to detect epistasis in human Geno... 详细信息
来源: 评论
A BRS-based approach for modeling RFID untraceability
收藏 引用
International Journal of Advancements in computing Technology 2011年 第11期3卷 96-103页
作者: Jialiang, He Dantong, Ouyang Youjun, Xu College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China College of Computer Science and Information Technology Daqing Normal University China
Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications betwe... 详细信息
来源: 评论
Multiple Auxiliary Information Based Deep Model for Collaborative Filtering
收藏 引用
Journal of Computer Science & Technology 2018年 第4期33卷 668-681页
作者: Lin Yue Xiao-Xin Sun Wen-Zhu Gao Guo-Zhong Feng Bang-Zuo Zhang School of Information Science and Technology Northeast Normal University Changchun 130117 China Key Laboratory of Applied Statistics of Ministry of Education Northeast Normal University Changchun 130024 China School of Environment Northeast Normal University Changchun 130117 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
With the ever-growing dynamicity, complexity, technique is proposed and becomes one of the most effective and volume of information resources, the recommendation techniques for solving the so-called problem of informa... 详细信息
来源: 评论
Learning essential graph with immune co-evolutionary algorithm
Learning essential graph with immune co-evolutionary algorit...
收藏 引用
International Conference on Information Science, Signal Processing and Their Applications
作者: Jia, Haiyang Chen, Juan Liu, Dayou College of Computer Science and Technology Key Laboratory for Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin 130012 China
Essential graph is a graphical representation for Markov equivalence classes of Bayesian networks. Learning essential graph can avoid some problems in traditional Bayesian networks learning algorithms: (1) the number ... 详细信息
来源: 评论
A design of product configuration manager based on weight constraint parameter value in manufacture
A design of product configuration manager based on weight co...
收藏 引用
5th International Conference on Control and Automation, ICCA'05
作者: Li, Niya Liu, Dayou Zhang, Jian College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University China
The configuration problem in manufacture is more complicated than most other fields. Therefore, the design of modeling and reasoning module for product configuration manager in manufacture is very important and comple... 详细信息
来源: 评论
A Spatial Correlation-Based Hybrid Method for Intrusion Detection  9
A Spatial Correlation-Based Hybrid Method for Intrusion Dete...
收藏 引用
2017 9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)
作者: Jianqi Zhu Jian Mu Da Wei Bao Feng Youjin Wang Kexin Yin College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Communication and Knowledge Engineering of Ministry of Education Jilin University School of Computer Science and Engineering Changchun University of Technology
In order to solve the problem of low intrusion detection rate and weak generalization ability of Intrusion Detection System(IDS), it proposes a new hybrid method based on the relationship of feature and spatial corr... 详细信息
来源: 评论
Operational semantics of ambient calculus
Operational semantics of ambient calculus
收藏 引用
SOSE 2005: IEEE International Workshop on Service-Oriented System engineering
作者: Zhang, Jing Jin, Ying Guo, De-Gui Liu, Lei Jin, Cheng-Zhi Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education of P.R.China Juin University Changchun 130012 China
Mobile ambients is a process calculus for modeling mobile agents in wide-area networks. It has important theoretical and practical values in studying concurrent and mobile computation as well as the security of intera... 详细信息
来源: 评论
Grid Partition and Agglomeration for Bidirectional Hierarchical Clustering  2nd
Grid Partition and Agglomeration for Bidirectional Hierarchi...
收藏 引用
2nd EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2019
作者: Wu, Lei Chen, Hechang Yu, Xiangchun Chao, Sun Yu, Zhezhou Dou, RuiTing College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Clustering is an important data processing tool, which can be used to reveal the distribution structure of unfamiliar domain data, or as preprocess methods to magnify data object to accelerate subsequent processing or... 详细信息
来源: 评论
Building a Private Cloud Based on Microservices for Computer Science laboratory in Universities  7
Building a Private Cloud Based on Microservices for Computer...
收藏 引用
7th International Conference on Information Science and Control engineering, ICISCE 2020
作者: Liu, Hao Wang, Zhe Huang, Lan Wang, Kangping Jilin University School of Computer Science and Technology Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Changchun China
Computer science labs in universities have different demands in cloud computing compared with typical IT companies. They differ greatly in software requirements and resource utilization. As an instance, we propose bui... 详细信息
来源: 评论