咨询与建议

限定检索结果

文献类型

  • 620 篇 会议
  • 610 篇 期刊文献

馆藏范围

  • 1,230 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 867 篇 工学
    • 690 篇 计算机科学与技术...
    • 601 篇 软件工程
    • 176 篇 信息与通信工程
    • 106 篇 控制科学与工程
    • 88 篇 生物工程
    • 73 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 55 篇 电子科学与技术(可...
    • 54 篇 化学工程与技术
    • 46 篇 光学工程
    • 43 篇 电气工程
    • 27 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 22 篇 航空宇航科学与技...
    • 19 篇 土木工程
    • 14 篇 建筑学
    • 14 篇 网络空间安全
  • 472 篇 理学
    • 337 篇 数学
    • 105 篇 生物学
    • 83 篇 统计学(可授理学、...
    • 60 篇 物理学
    • 55 篇 化学
    • 33 篇 系统科学
  • 290 篇 管理学
    • 152 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 48 篇 医学
    • 40 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 20 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 knowledge engine...
  • 53 篇 laboratories
  • 50 篇 educational tech...
  • 41 篇 data mining
  • 27 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 22 篇 feature extracti...
  • 21 篇 image segmentati...
  • 16 篇 deep learning
  • 16 篇 genetic algorith...
  • 15 篇 reinforcement le...
  • 14 篇 ontologies
  • 14 篇 contrastive lear...
  • 14 篇 topology
  • 14 篇 clustering algor...
  • 14 篇 artificial intel...
  • 12 篇 support vector m...

机构

  • 518 篇 college of compu...
  • 283 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 48 篇 college of softw...
  • 44 篇 key laboratory o...
  • 41 篇 school of artifi...
  • 36 篇 key laboratory o...
  • 31 篇 college of compu...
  • 24 篇 school of comput...
  • 24 篇 jilin university...
  • 23 篇 key laboratory o...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 18 篇 jilin university...
  • 17 篇 department of co...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...

作者

  • 46 篇 yang bo
  • 36 篇 liang yanchun
  • 35 篇 sun geng
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 31 篇 li ximing
  • 31 篇 li xiongfei
  • 27 篇 ouyang jihong
  • 27 篇 zuo wanli
  • 26 篇 bo yang
  • 26 篇 yanchun liang
  • 23 篇 niyato dusit
  • 23 篇 liu dayou
  • 23 篇 guan renchu
  • 23 篇 yanheng liu
  • 23 篇 huang lan
  • 23 篇 liu yanheng
  • 21 篇 chen haipeng
  • 21 篇 li jiahui
  • 20 篇 da-you liu

语言

  • 1,075 篇 英文
  • 119 篇 其他
  • 37 篇 中文
检索条件"机构=Key Laboratory of Symbolic of Computation and Knowledge Engineering"
1230 条 记 录,以下是861-870 订阅
排序:
A verifiable multi-secret sharing scheme
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2011年 第SUPPL.1期32卷 120-123页
作者: Wang, Yan-Xi Liu, Yan-Heng Wang, Jian Dong, Tian-Zhe College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Analyzing two improved YCH schemes and a multi-secret sharing scheme based on homogeneous linear recursion, we propose and implement a new verifiable multi-secret sharing model based on Shamir secret sharing. The time... 详细信息
来源: 评论
A fuzzy adaptive multi-population parallel genetic algorithm for spam filtering
收藏 引用
Journal of Convergence Information Technology 2011年 第2期6卷 172-182页
作者: Zhao, Zheng-dong Wang, Gang Zhao, Wei Chen, Hui-ling Zhao, Wei Li, Lu-lu Network Information Center Changchun University of Science and Technology Changchun China College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Department of Information Engineering Jilin Police College China Branch Institute of information technology Changchun Vocational Institute of Technology Changchun China
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering met... 详细信息
来源: 评论
Using TCM in mobile terminals in internet of vehicles
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2011年 第SUPPL.1期32卷 107-110页
作者: Gao, Wen-Bin Liu, Yan-Heng Wang, Jian College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TC... 详细信息
来源: 评论
Automatic table integration by domain-specific ontology
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第1期5卷 218-225页
作者: Kerui, Chen Jinchao, Zhao Wanli, Zuo Fengling, He Yongheng, Chen College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbol Computation and knowledge Engineering of the Ministry of Education Changchun China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou 450002 China
Deep web could automatically produce web pages according to the query criteria of users. The report found most query result page store data information using table form. knowledge management, information retrieval, We... 详细信息
来源: 评论
H function based tamper-proofing software watermarking scheme
Journal of Software
收藏 引用
Journal of Software 2011年 第1期6卷 149-155页
作者: Zhu, Jianqi Liu, Yanheng Wang, Aimin Yin, Kexin College of Computer Science and technology Ministry of Education Jilin University Changchun China Key Laboratory of Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China College of computer and science and engineering ChangChun University of Technology Changchun China
A novel constant tamper-proofing software watermark technique based on H encryption function is presented. First we split the watermark into smaller pieces before encoding them using CLOC scheme. With the watermark pi... 详细信息
来源: 评论
Operon Prediction by Markov Clustering
Operon Prediction by Markov Clustering
收藏 引用
2011·国际基因组学大会
作者: Wei Du Zhongbo Cao Yan Wang Enrico Blanzieri Chen Zhang Yanchun Liang College of Mathematics Jilin University Changchun 130012 China Department of Information and Communication Technology University of Trento Povo 38050 Italy College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China
来源: 评论
Content- and semantic-based progressive multimodal image retrieval
收藏 引用
ICIC Express Letters 2011年 第1期5卷 201-206页
作者: Song, Haiyu Li, Xiongfei Wang, Pengjie Zhang, Xiaoli Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Jilin University Qianjin Avenue Changchun 130012 China Institute of Computer Graphics and Image Processing Dalian Nationalities University Economic and Technological Development Zone Liaohe Road Dalian 116600 China
Image retrieval has been an active research topic due to its great importance in the field of image management, digital library and web searching. However, the performances of the existing approaches, including text-b... 详细信息
来源: 评论
Simulating the Folding Pathway of RNA Secondary Structure Using the Modified Ant Colony Algorithm
收藏 引用
Journal of Bionic engineering 2010年 第4期7卷 382-389页
作者: Jun Yu~(1,2),Changhai Zhang~(1,2),Yuanning Liu~(1,2),Xin Li~(1,2) 1.College of Computer Science and Technology,Jilin University,Changchun 130012,P.R.China 2.key laboratory of symbolic computation and knowledge engineering (Ministry of Education,China) Jilin University,Changchun 130012,P.R.China College of Computer Science and Technology Jilin University Changchun P. R. China Key Laboratory of Symbolic Computation and Knowledge Engineering (Ministry of Education China) Jilin University Changchun P. R. China
A new method for simulating the folding pathway of RNA secondary structure using the modified ant colony algorithmis *** a given RNA sequence,the set of all possible stems is obtained and the energy of each stem iscal... 详细信息
来源: 评论
Improved evaluation algorithm of contour detection
收藏 引用
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (engineering and Technology Edition) 2011年 第SUPPL. 1期41卷 179-182页
作者: Zhao, Hong-Wei Liu, Jing Chen, Hua-Cheng Cui, Hong-Rui College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering for Ministry of Education Jilin University Changchun 130012 China Scientific Information Bureau Jilin Transportion Chares Administration Changchun 130061 China
For the low accuracy and imprecise of contour detection evaluation algorithm for a natural image with Ground Truth, we proposed a neighborhood matching algorithm, which had been combined with the original algorithm, a... 详细信息
来源: 评论
A globally optimal approach for surveillance video cropping
A globally optimal approach for surveillance video cropping
收藏 引用
作者: Liu, Jin Shi, Xiaohu Zhang, Yu College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education 130012 Changchun China
In this paper, a novel approach for surveillance video cropping is presented. The basic idea is to obtain a trajectory that a small sub-window can take through the video, selecting the most important regions of the vi... 详细信息
来源: 评论