咨询与建议

限定检索结果

文献类型

  • 1,669 篇 期刊文献
  • 1,563 篇 会议
  • 1 册 图书

馆藏范围

  • 3,233 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,133 篇 工学
    • 1,399 篇 计算机科学与技术...
    • 1,202 篇 软件工程
    • 393 篇 信息与通信工程
    • 258 篇 控制科学与工程
    • 230 篇 电气工程
    • 218 篇 化学工程与技术
    • 211 篇 生物工程
    • 180 篇 生物医学工程(可授...
    • 179 篇 机械工程
    • 166 篇 电子科学与技术(可...
    • 148 篇 光学工程
    • 101 篇 仪器科学与技术
    • 88 篇 材料科学与工程(可...
    • 75 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 62 篇 交通运输工程
    • 61 篇 冶金工程
    • 61 篇 土木工程
  • 1,157 篇 理学
    • 647 篇 数学
    • 265 篇 生物学
    • 222 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 160 篇 化学
    • 96 篇 系统科学
  • 597 篇 管理学
    • 352 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 167 篇 医学
    • 136 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 66 篇 药学(可授医学、理...
  • 64 篇 法学
  • 62 篇 农学
  • 37 篇 经济学
  • 14 篇 教育学
  • 8 篇 文学
  • 7 篇 艺术学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 118 篇 semantics
  • 84 篇 data mining
  • 82 篇 feature extracti...
  • 78 篇 knowledge engine...
  • 77 篇 computer science
  • 73 篇 deep learning
  • 65 篇 educational inst...
  • 65 篇 training
  • 57 篇 laboratories
  • 57 篇 educational tech...
  • 46 篇 neural networks
  • 42 篇 image segmentati...
  • 41 篇 computational mo...
  • 40 篇 data models
  • 39 篇 predictive model...
  • 38 篇 convolution
  • 37 篇 conferences
  • 37 篇 accuracy
  • 36 篇 reinforcement le...
  • 35 篇 visualization

机构

  • 453 篇 college of compu...
  • 270 篇 key laboratory o...
  • 107 篇 school of automa...
  • 90 篇 school of inform...
  • 87 篇 key laboratory o...
  • 85 篇 school of comput...
  • 84 篇 key laboratory o...
  • 55 篇 key laboratory o...
  • 54 篇 shandong provinc...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 45 篇 school of softwa...
  • 43 篇 college of softw...
  • 39 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 college of infor...
  • 32 篇 college of compu...
  • 30 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 41 篇 yang bo
  • 35 篇 liang yanchun
  • 34 篇 sun geng
  • 33 篇 wu xindong
  • 29 篇 niyato dusit
  • 29 篇 du xiaoyong
  • 28 篇 ouyang dantong
  • 28 篇 kaixiang peng
  • 28 篇 chen hong
  • 27 篇 dantong ouyang
  • 27 篇 li xiongfei
  • 26 篇 li ximing
  • 25 篇 ouyang jihong
  • 23 篇 xindong wu
  • 23 篇 bo yang
  • 23 篇 yanchun liang
  • 23 篇 jie dong
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 22 篇 li cuiping

语言

  • 2,993 篇 英文
  • 157 篇 其他
  • 93 篇 中文
检索条件"机构=Key Laboratory of the Ministry of Education for Data Engineering and Knowledge Engineering"
3233 条 记 录,以下是3031-3040 订阅
排序:
Clonal Selection Based Memetic Algorithm for Job Shop Scheduling Problems
收藏 引用
Journal of Bionic engineering 2008年 第2期5卷 111-119页
作者: Jin-hui Yang Liang Sun Heow Pueh Lee Yun Qian Yan-chun Liang College of Computer Science and Technology Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Changchun 130012 P. R. China Institute of High Performance Computing Singapore 117528 Singapore Department of Mechanical Engineering National University of Singapore Singapore 117576 Singapore Institute of Electric and Information Engineering Beihua University Jilin 13202 l P. R. China
A clonal selection based memetic algorithm is proposed for solving job shop scheduling problems in this paper. In the proposed algorithm, the clonal selection and the local search mechanism are designed to enhance exp... 详细信息
来源: 评论
RETRACTED ARTICLE: Experimental research on a new authentication protocol for wireless communication network based on WiMAX
RETRACTED ARTICLE: Experimental research on a new authentica...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Li, Ruixue Fang, Zhiyi Xu, Peng Xiao, Wei Wang, Wei Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China School of Computer Northeast Normal University Changchun 130000 China
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s... 详细信息
来源: 评论
Object localization based on global structure constraint model and optimal algorithm
Object localization based on global structure constraint mod...
收藏 引用
3rd International Conference on Innovative Computing Information and Control, ICICIC'08
作者: Liu, Miao Guo, Dongwei Ma, Jie Liu, Xiaohua Li, Dan Zhou, Chunguang College of Computer Science and Technology Jilin University 130012 Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education 130012 Changchun China
We present a novel object localization approach based on the Global Structure Constraint model (GSC) and Optimal Algorithm. In GSC, Objects are described as constellations of points satisfied with their specific globa... 详细信息
来源: 评论
Corrigendum to “Catalog segmentation with double constraints in business” [Pattern Recognition Letters 30 (4) (2009) 440–448]
收藏 引用
Pattern Recognition Letters 2009年 第15期30卷 1440-1440页
作者: Xiujuan Xu Yu Liu Zhe Wang Chunguang Zhou Yanchun Liang College of Computer Science Jilin University Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Changchun 130012 China School of Software Dalian University of Technology Dalian Economic and Technological Development Zone Liaoning Number 8 Road Dalian 116620 China
来源: 评论
Dynamic policy updating based on one-point coverage random sets theory
Dynamic policy updating based on one-point coverage random s...
收藏 引用
1st International Workshop on knowledge Discovery and data Mining, WKDD
作者: Da, Wei Yan-Heng, Liu Lian-Deng, Li Xue-Jie, Liu Hai-Yan, Hu College of Computer Science and Technology Jilin University Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun Jilin 130012 China
Aiming at the dynamic policy trigger problem in policy based network management, this thesis first introduces the uncertain information generated by onepoint coverage random sets theory and also the unified framework ... 详细信息
来源: 评论
Interpretation of extended pawlak flow graphs using granular computing
收藏 引用
Lecture Notes in Computer Science
作者: Liu, Huawen Sun, Jigui Zhang, Huijie College of Computer Science Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun 130012 China College of Computer Northeast Normal University Changchun 130021 China
In this paper, we mainly discuss the relationship between the extended Pawlak flow graph (EFG) with granular computing (GrC), and develop a both simple and concrete model for EFG using GrC. The distinct advantage is t... 详细信息
来源: 评论
Feature Recognition Based on Neural Network
Feature Recognition Based on Neural Network
收藏 引用
International Conference on Computer Science and Information Technology (CSIT)
作者: Rongqing Yi Wenhui Li Duo Wang Hua Yuan Key laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education Jilin University Changchun China
An efficient methodology for recognizing features is presented. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are first checke... 详细信息
来源: 评论
Feature Recognition Based on Graph Decomposition and Neural Network
Feature Recognition Based on Graph Decomposition and Neural ...
收藏 引用
International Conference on Convergence Information Technology
作者: Yi RongQing Li WenHui Wang Duo Yuan Hua Key laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education Jilin University Changchun China
A hybrid of graph-based and neural network recognition system is developed. The part information is taken from the B-rep solid date library then broken down into sub-graph. Once the sub-graphs are generated, they are ... 详细信息
来源: 评论
Simulation research on a new scheduling algorithm in IEEE802.16 MAC layer
Simulation research on a new scheduling algorithm in IEEE802...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Guannan, Qu Zhiyi, Fang Wei, Wang Huanhuan, Tang Ansheng, Ma College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun China School of Computer Science Northeast Normal University Changchun China
IEEE802.16, as a wireless MAN broadband access standard, defines a flexible QoS mechanism in MAC layer for wild variety classes of services. However, it dose not define specific admission control strategy and scheduli... 详细信息
来源: 评论
Notice of Retraction: The IDS Model Adapt to Load Characteristic under IPv6/4 Environment
Notice of Retraction: The IDS Model Adapt to Load Characteri...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Chuyi Wei Zhiyi Fang Wei Li Xiaonan Liu Hongjun Yang College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
This article has been retracted by the publisher.
来源: 评论