咨询与建议

限定检索结果

文献类型

  • 1,660 篇 期刊文献
  • 1,563 篇 会议

馆藏范围

  • 3,223 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,126 篇 工学
    • 1,394 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 393 篇 信息与通信工程
    • 258 篇 控制科学与工程
    • 230 篇 电气工程
    • 218 篇 化学工程与技术
    • 211 篇 生物工程
    • 180 篇 生物医学工程(可授...
    • 179 篇 机械工程
    • 164 篇 电子科学与技术(可...
    • 148 篇 光学工程
    • 101 篇 仪器科学与技术
    • 88 篇 材料科学与工程(可...
    • 75 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 62 篇 交通运输工程
    • 61 篇 冶金工程
    • 61 篇 土木工程
  • 1,157 篇 理学
    • 647 篇 数学
    • 265 篇 生物学
    • 222 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 160 篇 化学
    • 96 篇 系统科学
  • 597 篇 管理学
    • 352 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 167 篇 医学
    • 136 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 64 篇 法学
  • 62 篇 农学
  • 37 篇 经济学
  • 14 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 118 篇 semantics
  • 84 篇 data mining
  • 82 篇 feature extracti...
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 73 篇 deep learning
  • 65 篇 educational inst...
  • 65 篇 training
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 42 篇 image segmentati...
  • 41 篇 computational mo...
  • 40 篇 data models
  • 39 篇 predictive model...
  • 38 篇 convolution
  • 37 篇 conferences
  • 37 篇 accuracy
  • 36 篇 reinforcement le...
  • 35 篇 visualization

机构

  • 452 篇 college of compu...
  • 270 篇 key laboratory o...
  • 107 篇 school of automa...
  • 90 篇 school of inform...
  • 87 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 84 篇 school of comput...
  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 45 篇 school of softwa...
  • 43 篇 college of softw...
  • 39 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 college of infor...
  • 32 篇 college of compu...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 41 篇 yang bo
  • 35 篇 liang yanchun
  • 34 篇 sun geng
  • 33 篇 wu xindong
  • 29 篇 niyato dusit
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 kaixiang peng
  • 28 篇 chen hong
  • 27 篇 dantong ouyang
  • 27 篇 li xiongfei
  • 26 篇 li ximing
  • 25 篇 ouyang jihong
  • 23 篇 bo yang
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 22 篇 li cuiping
  • 22 篇 peng kaixiang

语言

  • 2,983 篇 英文
  • 157 篇 其他
  • 93 篇 中文
检索条件"机构=Key Laboratory of the Ministry of Education for Data Engineering and Knowledge Engineering"
3223 条 记 录,以下是3001-3010 订阅
排序:
A New Formal Description of Ontology Definition and Ontology Algebra
A New Formal Description of Ontology Definition and Ontology...
收藏 引用
International Symposium on knowledge Acquisition and Modeling, KAM
作者: Junhua Wang Wanli Zuo Fengling He Ying Wang College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education China
Ontology definition is the base of ontology engineering, however, ontology definition currently seldom provides the accurate mathematical characteristics, namely, most of the ontology definitions cannot be described i... 详细信息
来源: 评论
Improved Semantic Retrieval Based on Domain Ontology
Improved Semantic Retrieval Based on Domain Ontology
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: Dong-hui Yuan Da-you Liu Shi-qun Shen Pu Yan Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Jilin University Changchun Jilin CN
Semantic retrieval is a hot area of Web search technology constantly because of the growing information. This paper proposed a creative semantic retrieval method with Path Weight Semantic Distance (PWSD) algorithm whi... 详细信息
来源: 评论
Semantic-Based Hierarchicalize the Result of Suffix Tree Clustering
Semantic-Based Hierarchicalize the Result of Suffix Tree Clu...
收藏 引用
International Symposium on knowledge Acquisition and Modeling, KAM
作者: Guodong hu Wanli Zuo Fengling He Ying Wang College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic of Computation and Knowledge Engineering Ministry of Education China
Suffix tree clustering is a fast, incremental, linear time clustering algorithm, but there are synonymous and label-contained relations among the result clusters. So just return these results to the users directly, wo... 详细信息
来源: 评论
Extending the Expression Ability of LAV Using Ontology Technique
Extending the Expression Ability of LAV Using Ontology Techn...
收藏 引用
International Conference on Information Technology and Computer Science, ITCS
作者: Hao Liang Fei Ren Wanli Zuo Aiqi Zhang College of Computer Science and Technology Jilin University Changchun China Department of Information Changchun Taxation College Changchun China Engineering of the Ministry of Education Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Information fusion is an interdisciplinary research field aiming to combine and merge the information or data from different information sources. The output of information fusion system is a global schema through whic... 详细信息
来源: 评论
Generating the semantic containers for the query interfaces of deep web
Generating the semantic containers for the query interfaces ...
收藏 引用
International Conference on Management and Service Science, MASS 2009
作者: Hao, Liang Wanli, Zuo Jian, Chen Yunge, Mao College of Computer Science and Technology Jilin University Changchun 130012 China Department of Information Changchun Taxation College Changchun 130117 China Key Laboratory of Symbol Computation Knowledge Engineering of the Ministry of Education Changchun 130012 China Network Center of Changchun Taxation College Changchun 130117 China
With the myriad emergence of the online Web database, the Web is divided into a two layers information platform which is composed of Surface Web and Deep Web. The huge information hidden in the Deep Web is higher in t... 详细信息
来源: 评论
Impact of human factors on email worm propagation
Impact of human factors on email worm propagation
收藏 引用
IEEE Symposium on Web Society, SWS
作者: Xin Sun Yanheng Liu Jian Wang Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin China Jilin University Changchun Jilin CN
One of the most prevalent security problems in network is the rampant propagation of email worms. Unlike active worms, the email worm has to be activated by user action in order to spread further. This paper deals wit... 详细信息
来源: 评论
A Combined Method Based on Extension Rule and Resolution
A Combined Method Based on Extension Rule and Resolution
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence (AICI)
作者: Xia Wu Haihong Yu Ying Li College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Theorem proving based on the extension rule is a new reasoning method. It is, in a sense, potentially a complementary method to resolution based method. HRIER is a very fast extension rule algorithm with reduction rul... 详细信息
来源: 评论
The design and analysis of distributed authentication scheme in VANET
The design and analysis of distributed authentication scheme...
收藏 引用
IEEE Youth Conference on Information, Computing and Telecommunication, YC-ICT
作者: Jian Wang Yanheng Liu Yu Jiao Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin China Jilin University Changchun Jilin CN
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo... 详细信息
来源: 评论
Heuristics Propositional Extension Rule Method
Heuristics Propositional Extension Rule Method
收藏 引用
International Conference on Innovative Computing, Information and Control (ICICIC)
作者: Xia Wu Haihong Yu Ying Li College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Theorem proving based on the extension rule is a new reasoning method. Based on the extension rule algorithm RIER, this paper presents a more efficient algorithm HRIER, which uses the heuristic strategy to guide the c... 详细信息
来源: 评论
Web page malicious code detection based on embedded fingerprints
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2208-2214页
作者: Huang, Jianjun Liang, Bin Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renmin University of China Beijing 100872 China
Web sites have become the main targets of many attackers. Signature-based detection needs to maintain a large signature database and Honeypot based methods are not efficient. Since attackers always make the malicious ... 详细信息
来源: 评论