咨询与建议

限定检索结果

文献类型

  • 1,660 篇 期刊文献
  • 1,563 篇 会议

馆藏范围

  • 3,223 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,126 篇 工学
    • 1,394 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 393 篇 信息与通信工程
    • 258 篇 控制科学与工程
    • 230 篇 电气工程
    • 218 篇 化学工程与技术
    • 211 篇 生物工程
    • 180 篇 生物医学工程(可授...
    • 179 篇 机械工程
    • 164 篇 电子科学与技术(可...
    • 148 篇 光学工程
    • 101 篇 仪器科学与技术
    • 88 篇 材料科学与工程(可...
    • 75 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 62 篇 交通运输工程
    • 61 篇 冶金工程
    • 61 篇 土木工程
  • 1,157 篇 理学
    • 647 篇 数学
    • 265 篇 生物学
    • 222 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 160 篇 化学
    • 96 篇 系统科学
  • 597 篇 管理学
    • 352 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 167 篇 医学
    • 136 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 64 篇 法学
  • 62 篇 农学
  • 37 篇 经济学
  • 14 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 118 篇 semantics
  • 84 篇 data mining
  • 82 篇 feature extracti...
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 73 篇 deep learning
  • 65 篇 educational inst...
  • 65 篇 training
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 42 篇 image segmentati...
  • 41 篇 computational mo...
  • 40 篇 data models
  • 39 篇 predictive model...
  • 38 篇 convolution
  • 37 篇 conferences
  • 37 篇 accuracy
  • 36 篇 reinforcement le...
  • 35 篇 visualization

机构

  • 452 篇 college of compu...
  • 270 篇 key laboratory o...
  • 107 篇 school of automa...
  • 90 篇 school of inform...
  • 87 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 84 篇 school of comput...
  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 45 篇 school of softwa...
  • 43 篇 college of softw...
  • 39 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 college of infor...
  • 32 篇 college of compu...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 41 篇 yang bo
  • 35 篇 liang yanchun
  • 34 篇 sun geng
  • 33 篇 wu xindong
  • 29 篇 niyato dusit
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 kaixiang peng
  • 28 篇 chen hong
  • 27 篇 dantong ouyang
  • 27 篇 li xiongfei
  • 26 篇 li ximing
  • 25 篇 ouyang jihong
  • 23 篇 bo yang
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 22 篇 li cuiping
  • 22 篇 peng kaixiang

语言

  • 2,983 篇 英文
  • 157 篇 其他
  • 93 篇 中文
检索条件"机构=Key Laboratory of the Ministry of Education for Data Engineering and Knowledge Engineering"
3223 条 记 录,以下是3021-3030 订阅
排序:
The Ontology Based Semantic Evaluating Method in LAV
The Ontology Based Semantic Evaluating Method in LAV
收藏 引用
Pacific-Asia Conference on Circuits, Communications and Systems, PACCS
作者: Fei Ren Hao Liang Liang Hu Wanli Zuo College of Computer Science and Technology Jilin University Changchun China Department of Information Changchun Taxation College Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
The Web has been dramatically deepened by the deep Web, which the traditional information fusion system shows disability to integrate. The myriad information hidden behind the deep Web attracts the considerable attent... 详细信息
来源: 评论
Using IACO and QPSO to solve spatial clustering with obstacles constraints
Using IACO and QPSO to solve spatial clustering with obstacl...
收藏 引用
IEEE International Conference on Automation and Logistics
作者: Xueping Zhang Hongmei Zhang Yanxia Zhu Yawei Liu Tengfei Yang Taogai Zhang Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou University Fuzhou China School of Computer Science & Engineering Henan University of Technology Zhengzhou Henan China Department of Computer Science & Engineering Henan University of Engineering Zhengzhou China
Spatial clustering has been an active research area in the data mining community. Spatial clustering is not only an important effective method but also a prelude of other task for spatial data mining (SDM). In this pa... 详细信息
来源: 评论
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage System
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Lingfang Zeng Dan Feng Bharadwaj Veeravalli Qingsong Wei Division of Data Storage System Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering National University of Singapore Singapore Data Storage Institute Singapore
With our society more information-driven, we have begun to distribute data in wide-area storage systems. At the same time, both physical failure and logic error have made it difficult to bring the necessary recovery t... 详细信息
来源: 评论
Privacy Parallel Algorithm for Mining Association Rules and its Application in HRM
Privacy Parallel Algorithm for Mining Association Rules and ...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: XuePing Zhang YanXia Zhu Nan Hua Key Laboratory of Spatial Data Mining & Information Sharing of Ministry of Education Fuzhou China College of Information Science and Engineering Henan University of Technology Zhengzhou China Technology Department Zhengzhou Super HW Network Technology Company Limited Zhengzhou China
Parallel association rules mining has been improved the efficiency of data mining, and meanwhile concerned with the privacy preserving problem. A simple and effective method of parallel association rules mining which ... 详细信息
来源: 评论
Escrow mechanism for personal security keys on IBE
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 75-80页
作者: Zou, Yue-Peng Ouyang, Dan-Tong He, Li-Li Bai, Hong-Tao College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A new escrow mechanism for personal security keys on IBE was proposed. This mechanism constructed a security trust system composed of private key generator, key management center, and user security component to set up... 详细信息
来源: 评论
A Novel Method for Prediction of Protein Domain Using Distance-Based Maximal Entropy
收藏 引用
Journal of Bionic engineering 2008年 第3期5卷 215-223页
作者: Shu-xue Zou Yan-xin Huang Yan Wang Chun-guang Zhou Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education College of Computer Science and Technology Jilin University Changchun 130012 P. R. China
Detecting the boundaries of protein domains is an important and challenging task in both experimental and computational structural biology. In this paper, a promising method for detecting the domain structure of a pro... 详细信息
来源: 评论
Novel trusted authentication and evaluation framework in VANET
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 107-113页
作者: Wu, Jing Liu, Yan-Heng Wang, Jian Li, Wei-Ping College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Changchun Jilin University Information Technologies Co. Ltd. Changchun 130012 China
Vehicular ad hoc networks (VANET) have many new characteristics unlike tranditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo... 详细信息
来源: 评论
S-SimRank: Combining Content and Link Information to Cluster Papers Effectively and Efficiently
S-SimRank: Combining Content and Link Information to Cluster...
收藏 引用
4th International Conference on Advanced data Mining and Applications
作者: Cai, Yuanzhe Li, Pei Liu, Hongyan He, Jun Du, Xiaoyong Key Labs of Data Engineering and Knowledge Engineering Ministry of Education China Department of Computer Science Renmin University of China China Department of Management Science and Engineering Tsinghua University China
Both Content analysis and link, analysis have its advantages in measuring relationships among documents. In this paper. we propose a new method to combine these two methods to compute the similarity of research papers... 详细信息
来源: 评论
RETRACTED ARTICLE: The IDS model adapt to load characteristic under IPv6/4 environment
RETRACTED ARTICLE: The IDS model adapt to load characteristi...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Wei, Chuyi Fang, Zhiyi Li, Wei Liu, Xiaonan Yang, Hongjun Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China
Thih paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamical... 详细信息
来源: 评论
Canonical Huffman code based full-text index
收藏 引用
Progress in Natural Science:Materials International 2008年 第3期18卷 325-330页
作者: Yi Zhang a,b, Zhili Pei a, Jinhui Yanga, Yanchun Liang a, a College of Computer Science and Technology, Jilin University, key laboratory of Symbol Computation and knowledge engineering of the ministry of education, Changchun 130012, China b Department of Computer Science, Jilin Technology and Business College, Changchun 130062, China College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Changchun 130012 China Department of Computer Science Jilin Technology and Business College Changchun 130062 China
Full-text indices are data structures that can be used to find any substring of a given string. Many full-text indices require space larger than the original string. In this paper, we introduce the canonical Huffman c... 详细信息
来源: 评论