咨询与建议

限定检索结果

文献类型

  • 463 篇 期刊文献
  • 422 篇 会议
  • 1 册 图书

馆藏范围

  • 886 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 608 篇 工学
    • 476 篇 计算机科学与技术...
    • 412 篇 软件工程
    • 135 篇 信息与通信工程
    • 70 篇 生物工程
    • 68 篇 控制科学与工程
    • 54 篇 生物医学工程(可授...
    • 47 篇 机械工程
    • 45 篇 电子科学与技术(可...
    • 42 篇 电气工程
    • 37 篇 化学工程与技术
    • 31 篇 光学工程
    • 21 篇 航空宇航科学与技...
    • 20 篇 仪器科学与技术
    • 18 篇 交通运输工程
    • 14 篇 土木工程
    • 13 篇 动力工程及工程热...
  • 334 篇 理学
    • 231 篇 数学
    • 82 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 41 篇 物理学
    • 37 篇 化学
    • 26 篇 系统科学
  • 212 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 38 篇 医学
    • 30 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 12 篇 公共卫生与预防医...
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 农学
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 51 篇 computer science
  • 44 篇 educational inst...
  • 42 篇 laboratories
  • 41 篇 knowledge engine...
  • 41 篇 educational tech...
  • 25 篇 data mining
  • 24 篇 computer science...
  • 15 篇 semantics
  • 14 篇 feature extracti...
  • 13 篇 reinforcement le...
  • 12 篇 image segmentati...
  • 12 篇 ontologies
  • 11 篇 deep learning
  • 11 篇 topology
  • 10 篇 authentication
  • 9 篇 recommender syst...
  • 9 篇 contrastive lear...
  • 9 篇 genetic algorith...
  • 9 篇 artificial intel...
  • 9 篇 multiobjective o...

机构

  • 394 篇 college of compu...
  • 274 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 college of softw...
  • 32 篇 college of compu...
  • 23 篇 school of artifi...
  • 23 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 14 篇 key laboratory o...
  • 14 篇 the college of c...
  • 13 篇 college of compu...
  • 13 篇 college of compu...
  • 11 篇 college of softw...

作者

  • 38 篇 yang bo
  • 34 篇 sun geng
  • 26 篇 li ximing
  • 25 篇 ouyang jihong
  • 23 篇 niyato dusit
  • 23 篇 dantong ouyang
  • 22 篇 liu dayou
  • 22 篇 yanheng liu
  • 21 篇 li jiahui
  • 21 篇 bo yang
  • 20 篇 liu yanheng
  • 19 篇 ouyang dantong
  • 19 篇 da-you liu
  • 19 篇 li xiongfei
  • 18 篇 chen haipeng
  • 18 篇 dayou liu
  • 17 篇 liang yanchun
  • 16 篇 wang jian
  • 16 篇 huang lan
  • 16 篇 wang jiacheng

语言

  • 816 篇 英文
  • 52 篇 其他
  • 18 篇 中文
检索条件"机构=Key laboratory of Symbolic Computing and Knowledge Engineering of Ministry of Education"
886 条 记 录,以下是751-760 订阅
排序:
K-harmonic means data clustering with Differential Evolution
K-harmonic means data clustering with Differential Evolution
收藏 引用
International Seminar on Future BioMedical Information engineering, FBIE
作者: Ye Tian Dayou Liu Hong Qi Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Jilin University Changchun Jilin CN
K-harmonic means clustering algorithm (KHM) is a center-based like K-means (KM), which uses the harmonic averages of the distances from each data point to the centers as components to its performance function and over... 详细信息
来源: 评论
The design and analysis of distributed authentication scheme in VANET
The design and analysis of distributed authentication scheme...
收藏 引用
IEEE Youth Conference on Information, computing and Telecommunication, YC-ICT
作者: Jian Wang Yanheng Liu Yu Jiao Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin China Jilin University Changchun Jilin CN
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast develo... 详细信息
来源: 评论
A Combined Method Based on Extension Rule and Resolution
A Combined Method Based on Extension Rule and Resolution
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence (AICI)
作者: Xia Wu Haihong Yu Ying Li College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Theorem proving based on the extension rule is a new reasoning method. It is, in a sense, potentially a complementary method to resolution based method. HRIER is a very fast extension rule algorithm with reduction rul... 详细信息
来源: 评论
Impact of human factors on email worm propagation
Impact of human factors on email worm propagation
收藏 引用
IEEE Symposium on Web Society, SWS
作者: Xin Sun Yanheng Liu Jian Wang Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin China Jilin University Changchun Jilin CN
One of the most prevalent security problems in network is the rampant propagation of email worms. Unlike active worms, the email worm has to be activated by user action in order to spread further. This paper deals wit... 详细信息
来源: 评论
Heuristics Propositional Extension Rule Method
Heuristics Propositional Extension Rule Method
收藏 引用
International Conference on Innovative computing, Information and Control (ICICIC)
作者: Xia Wu Haihong Yu Ying Li College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Theorem proving based on the extension rule is a new reasoning method. Based on the extension rule algorithm RIER, this paper presents a more efficient algorithm HRIER, which uses the heuristic strategy to guide the c... 详细信息
来源: 评论
Ensemble methods for spectral-spatial classification of urban hyperspectral data
Ensemble methods for spectral-spatial classification of urba...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Xin-Lu Wang Björn Waske Jón Atli Benediktsson Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Faculty of Electrical and Computer Engineering University of Iceland Reykjavik Iceland
Classification of hyperspectral data with high spatial resolution from urban areas is investigated. The approach is an extension of existing approaches, using both spectral and spatial information for classification. ... 详细信息
来源: 评论
ON RESEARCH OF OPTIMIZATION STRATEGY FOR DYNAMIC BACKTRACKING
ON RESEARCH OF OPTIMIZATION STRATEGY FOR DYNAMIC BACKTRACKIN...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: HONG-BO LI ZHAN-SHAN LI YANG AI HUI-YING DU Key Laboratory of Symbolic Computation and Knowledge Engineering for Ministry of Education Jilin University Changchun 130012 College of Computer Science and Technology Jilin University Changchun 130012
Constraint Satisfaction Problem is an important branch of Artificial Intelligence, one typical algorithm to solve Constraint Satisfaction Problem is the searching algorithm based on backtracking. The Dynamic Backtrack... 详细信息
来源: 评论
Extending the Expression Ability of LAV Using Ontology Technique
Extending the Expression Ability of LAV Using Ontology Techn...
收藏 引用
International Conference on Information Technology and Computer Science, ITCS
作者: Hao Liang Fei Ren Wanli Zuo Aiqi Zhang College of Computer Science and Technology Jilin University Changchun China Department of Information Changchun Taxation College Changchun China Engineering of the Ministry of Education Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Information fusion is an interdisciplinary research field aiming to combine and merge the information or data from different information sources. The output of information fusion system is a global schema through whic... 详细信息
来源: 评论
A New Framework for Accessing Trusted Network
A New Framework for Accessing Trusted Network
收藏 引用
International Workshop on Intelligent Networks and Intelligent Systems (ICINIS)
作者: Jian Wang Yanheng Liu Xiangpeng Jia Xiaomin Liu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Jilin University Changchun Jilin CN China Mobile Shenyang Branch Corporation Shenyang China
Trusted network connect (TNC), whose goal is to improve network security from source, now has become hot topic in security domain. We proposed a new access model for the terminals without meeting the requirements in T... 详细信息
来源: 评论
Modeling Email Worm Propagation Using Game Theory
Modeling Email Worm Propagation Using Game Theory
收藏 引用
The First International Conference on Multimedia Information Networking and Security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Xin Sun Yanheng Liu Jian Wang College of Computer Science and Technology Jilin University Changchun Jilin 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun Jilin 130012 China
One of the most prevalent security problems in network is the rampant propagation of email worms. In this paper game theory is suggested as a method for modeling and computing the probabilities of expected behaviors o... 详细信息
来源: 评论