咨询与建议

限定检索结果

文献类型

  • 461 篇 期刊文献
  • 422 篇 会议
  • 1 册 图书

馆藏范围

  • 884 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 606 篇 工学
    • 475 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 135 篇 信息与通信工程
    • 70 篇 生物工程
    • 68 篇 控制科学与工程
    • 54 篇 生物医学工程(可授...
    • 47 篇 机械工程
    • 45 篇 电子科学与技术(可...
    • 41 篇 电气工程
    • 36 篇 化学工程与技术
    • 31 篇 光学工程
    • 21 篇 航空宇航科学与技...
    • 20 篇 仪器科学与技术
    • 18 篇 交通运输工程
    • 14 篇 土木工程
    • 13 篇 动力工程及工程热...
  • 332 篇 理学
    • 230 篇 数学
    • 81 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 41 篇 物理学
    • 36 篇 化学
    • 26 篇 系统科学
  • 212 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 38 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 12 篇 公共卫生与预防医...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 51 篇 computer science
  • 44 篇 educational inst...
  • 42 篇 laboratories
  • 41 篇 knowledge engine...
  • 41 篇 educational tech...
  • 25 篇 data mining
  • 24 篇 computer science...
  • 15 篇 semantics
  • 14 篇 feature extracti...
  • 13 篇 reinforcement le...
  • 12 篇 image segmentati...
  • 12 篇 ontologies
  • 11 篇 deep learning
  • 11 篇 topology
  • 10 篇 authentication
  • 9 篇 recommender syst...
  • 9 篇 contrastive lear...
  • 9 篇 genetic algorith...
  • 9 篇 artificial intel...
  • 9 篇 multiobjective o...

机构

  • 394 篇 college of compu...
  • 274 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 college of softw...
  • 31 篇 college of compu...
  • 23 篇 school of artifi...
  • 23 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 14 篇 key laboratory o...
  • 14 篇 the college of c...
  • 13 篇 college of compu...
  • 13 篇 college of compu...
  • 11 篇 college of softw...

作者

  • 38 篇 yang bo
  • 34 篇 sun geng
  • 26 篇 li ximing
  • 25 篇 ouyang jihong
  • 23 篇 niyato dusit
  • 23 篇 dantong ouyang
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 21 篇 li jiahui
  • 21 篇 bo yang
  • 20 篇 liu yanheng
  • 19 篇 ouyang dantong
  • 19 篇 da-you liu
  • 19 篇 li xiongfei
  • 18 篇 dayou liu
  • 17 篇 chen haipeng
  • 17 篇 liang yanchun
  • 16 篇 wang jian
  • 16 篇 huang lan
  • 16 篇 wang jiacheng

语言

  • 814 篇 英文
  • 52 篇 其他
  • 18 篇 中文
检索条件"机构=Key laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education"
884 条 记 录,以下是621-630 订阅
排序:
Interpolation and approximation for data living on manifold surfaces
收藏 引用
Computer Aided Drafting,Design and Manufacturing 2012年 第4期22卷 16-20页
作者: HU Jianping LIU Xiuping WANG Xiaochao XIE Qi School of Science Northeast Dianli University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University School of Mathematical Sciences Dalian University of Technology
Meshed surfaces are ubiquitous in digital geometry processing and computer graphics. The set of attributes associated with each vertex such as the vertex locations, curvature, temperature, pressure or saliency, can be... 详细信息
来源: 评论
An Improved Median-based Otsu Image Thresholding Algorithm
收藏 引用
AASRI Procedia 2012年 3卷 468-473页
作者: Xiaolu Yang Xuanjing Shen Jianwu Long Haipeng Chen College of Computer Science and Technology Jilin University Changchun Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting, tracking and recognizing. The Otsu scheme, a widely used ima... 详细信息
来源: 评论
Feature extraction using composite individual genetic programming: An application to mass classification
Feature extraction using composite individual genetic progra...
收藏 引用
2012 International Applied Mechanics, MechatronicsAutomation and System Simulation Meeting, AMMASS 2012
作者: Lv, Yinghua Guo, Yuting Sun, Hui Zhang, Ming Wang, Jianzhong College of Humanities and Sciences of Northeast Normal University Changchun China Key Laboratory of intelligent information Processing of jinlin Universities College of Computer Science and Information Technology Northeast Normal University Changchun China National Engineering Laboratory for Druggable Gene and Protein Screening Northeast Normal University Changchun China Key Laboratory of symbolic Commputation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
This paper proposes a novel method for breast cancer diagnosis using the features generated by genetic programming (GP). We developed a new individual combination pattern (Composite individual genetic programming) whi... 详细信息
来源: 评论
Structure optimization of Bayesian network based on dependency analysis of relational database
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第22期6卷 400-408页
作者: Wang, Limin Xia, Huijie Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University China College of Computer Science and Technology Jilin University China State Key Laboratory for Novel Software Technology Nanjing University China
The utilization of expert knowledge to construct Bayesian Network (BN) is one of the key issues of uncertain inference. In this paper the learning procedure of BN is simplified by applying data dependencies in relatio... 详细信息
来源: 评论
GAUSSIAN CONVEX EVIDENCE THEORY MODEL
GAUSSIAN CONVEX EVIDENCE THEORY MODEL
收藏 引用
2012 IEEE 2nd International Conference on Cloud computing and Intelligence Systems
作者: Yungang Zhu Dayou Liu Baokui Zhou College of Computer Science and Technology Jilin UniversityChangchun 130012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of EducationJilin University
Convex evidence theory model is the only method to fuse ordered proposition, in this paper we proposed a novel convex evidence theory model based on Gaussian function, we modified Gaussian function and used it to comb... 详细信息
来源: 评论
Formal model extraction for combinational equivalence checking
收藏 引用
Journal of Convergence Information Technology 2012年 第8期7卷 371-380页
作者: Zhang, Guiling Ouyang, Dantong Bai, Hongtao Zeng, Hailin Ma, Tiemin Zhang, Yuehua School of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun China Center for Computer Fundamental Education Jilin University Changchun China
In formal verification, the first step is to build a formal model. Most of the academic tools represent the designs in BLIF or BLIF-MV network, while cannot directly take Verilog source code as an input. For instance,... 详细信息
来源: 评论
Lightweight encryption function structure protection of RFID security protocol
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第7期4卷 155-162页
作者: Jialiang, He Dantong, Ouyang Xi, Zhu Jinchao, Ji Tian, Bai College of Computer Science and Engineering Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China Australian School of Business University of New South Wales Australia
In this paper, a new security requirement about RFID protocols is proposed firstly, it is lightweight encryption function structure protection. Subsequently, a lightweight RFID authentication protocol is proposed as a... 详细信息
来源: 评论
An efficient RFID authentication protocol supporting tag ownership transfer
收藏 引用
International Journal of Advancements in computing Technology 2012年 第4期4卷 244-253页
作者: Jialiang, He Dantong, Ouyang Youjun, Xu Yu, Shang College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University China College of Computer Science and Information Technology Daqing Normal University China
Except common security and privacy requirements, well scalability and supporting tag ownership transfer are important requests for RFID systems. In this paper, an efficient RFID mutual authentication protocol supporti... 详细信息
来源: 评论
Representation for topological relations of four simple regions
Representation for topological relations of four simple regi...
收藏 引用
International Conference on Fuzzy Systems and knowledge Discovery (FSKD)
作者: Jian Li Jihong Ouyang Zhenxin Wang Information Technology College Jilin Agricultural University China College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China
The purpose of this paper is to study the topological relations of four simple regions. We extend 4-intersection matrix model to 16-intersections matrix model to represent the spatial relations of four simple regions,... 详细信息
来源: 评论
Processing of 3D meshed surfaces using spherical wavelets
收藏 引用
Computer Aided Drafting,Design and Manufacturing 2012年 第1期22卷 20-26页
作者: Hu Jianping Liu Xiuping WangXiaochao and Xie Qi School of Science Northeast Dianli University Jilin 132012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education J ilin University Changchun 130012 China School of Mathematical Sciences Dalian University of Technology Dalian 116024 China
This paper presents an efficient technique for processing of 3D meshed surfaces via spherical wavelets. More specifically, an input 3D mesh is firstly transformed into a spherical vector signal by a fast low distortio... 详细信息
来源: 评论