咨询与建议

限定检索结果

文献类型

  • 480 篇 期刊文献
  • 398 篇 会议

馆藏范围

  • 878 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 622 篇 工学
    • 498 篇 计算机科学与技术...
    • 424 篇 软件工程
    • 145 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 65 篇 生物工程
    • 47 篇 生物医学工程(可授...
    • 44 篇 机械工程
    • 41 篇 电气工程
    • 41 篇 电子科学与技术(可...
    • 37 篇 化学工程与技术
    • 30 篇 光学工程
    • 22 篇 航空宇航科学与技...
    • 19 篇 交通运输工程
    • 16 篇 仪器科学与技术
    • 14 篇 土木工程
    • 13 篇 动力工程及工程热...
    • 13 篇 网络空间安全
  • 337 篇 理学
    • 239 篇 数学
    • 77 篇 生物学
    • 58 篇 统计学(可授理学、...
    • 41 篇 物理学
    • 38 篇 化学
    • 28 篇 系统科学
  • 215 篇 管理学
    • 113 篇 管理科学与工程(可...
    • 104 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 35 篇 医学
    • 27 篇 临床医学
    • 19 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
    • 11 篇 公共卫生与预防医...
  • 12 篇 法学
  • 9 篇 农学
  • 5 篇 经济学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学
  • 1 篇 军事学

主题

  • 49 篇 computer science
  • 41 篇 educational inst...
  • 41 篇 laboratories
  • 39 篇 educational tech...
  • 37 篇 knowledge engine...
  • 23 篇 computer science...
  • 22 篇 data mining
  • 17 篇 semantics
  • 15 篇 reinforcement le...
  • 13 篇 deep learning
  • 13 篇 image segmentati...
  • 12 篇 feature extracti...
  • 11 篇 ontologies
  • 11 篇 artificial intel...
  • 10 篇 authentication
  • 10 篇 multiobjective o...
  • 9 篇 recommender syst...
  • 9 篇 topology
  • 8 篇 contrastive lear...
  • 8 篇 computational mo...

机构

  • 421 篇 college of compu...
  • 283 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 college of softw...
  • 33 篇 school of artifi...
  • 32 篇 college of compu...
  • 29 篇 key laboratory o...
  • 25 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 16 篇 school of comput...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...
  • 13 篇 college of compu...
  • 13 篇 international ce...

作者

  • 38 篇 yang bo
  • 35 篇 sun geng
  • 28 篇 li ximing
  • 27 篇 ouyang jihong
  • 25 篇 dantong ouyang
  • 25 篇 liu dayou
  • 24 篇 niyato dusit
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 22 篇 li jiahui
  • 21 篇 chen haipeng
  • 21 篇 liu yanheng
  • 20 篇 bo yang
  • 19 篇 chang yi
  • 19 篇 huang lan
  • 19 篇 li xiongfei
  • 18 篇 dayou liu
  • 17 篇 wang jian
  • 17 篇 wang jiacheng
  • 16 篇 guan renchu

语言

  • 795 篇 英文
  • 48 篇 其他
  • 35 篇 中文
检索条件"机构=MOE Key Laboratory of Symbolic Computation and Knowledge Engineering"
878 条 记 录,以下是221-230 订阅
排序:
Black-box expectation propagation for Bayesian models
Black-box expectation propagation for Bayesian models
收藏 引用
2018 SIAM International Conference on Data Mining, SDM 2018
作者: Li, Ximing Li, Changchun Chi, Jinjin Ouyang, Jihong Wang, Wenting College of Computer Science and Technology Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University China College of Mathematics Jilin University China
In this paper, we develop a generic black-box expectation propagation (BBEP) algorithm that can be directly applied to Bayesian models without model-specific derivations. BBEP is built on the spirit of using Monte Car... 详细信息
来源: 评论
A wireless intrusion detection method based on dynamic growing neural network
A wireless intrusion detection method based on dynamic growi...
收藏 引用
First International Multi- Symposiums on Computer and computational Sciences, IMSCCS'06
作者: Liu, Yanheng Tian, Daxin Li, Bin Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China College of Mathematics Science Jilin University Changchun 130012 China
In this paper an intrusion detection method based on Dynamic Growing Neural Network (DGNN) for wireless networking is presented. DGNN is based on the Hebbian learning rule and adds new neurons under certain conditions... 详细信息
来源: 评论
RETRACTED ARTICLE: Experimental research on a new authentication protocol for wireless communication network based on WiMAX
RETRACTED ARTICLE: Experimental research on a new authentica...
收藏 引用
2008 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2008
作者: Li, Ruixue Fang, Zhiyi Xu, Peng Xiao, Wei Wang, Wei Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China School of Computer Northeast Normal University Changchun 130000 China
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s... 详细信息
来源: 评论
Designment of E-R model based on RDF (S)  2
Designment of E-R model based on RDF (S)
收藏 引用
2nd International Workshop on Semantic Technologies, IWOST 2015
作者: Gao, Xiangbin Ouyang, Dantong Ye, Yuxin College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China
Based on the vast domain resources of RDF (S) on the web and SPARQL's powerful query ability, this article presents a new method of designment of E-R model. The steps for this design are: (1) Formu- lating SPARQL ... 详细信息
来源: 评论
Static knowledge representation of multi-agent system's specification by description logics
Static knowledge representation of multi-agent system's spec...
收藏 引用
2006 International Workshop on Description Logics, DL 2006
作者: Che, Haiyan Sun, Jigui Yu, Haibo College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun 130012 China
Modularity and rigor are two key elements for multi-agent technology. Hong Zhu's multi-agent system (MAS) development method provides proper language facilities supporting modularity. To enhance this method with r... 详细信息
来源: 评论
An embedded vertical‐federated feature selection algorithm based on particle swarm optimisation
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第3期8卷 734-754页
作者: Yong Zhang Ying Hu Xiaozhi Gao Dunwei Gong Yinan Guo Kaizhou Gao Wanqiu Zhang School of Information and Control Engineering China University of Mining and TechnologyXuzhouChina The Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchunChina School of Computing University of Eastern FinlandKuopioFinland The Macao Institute of Systems Engineering Macao University of Science and TechnologyTaipaChina
In real life,a large amount of data describing the same learning task may be stored in different institutions(called participants),and these data cannot be shared among par-ticipants due to privacy *** case that diffe... 详细信息
来源: 评论
Interval-valued Fuzzy Description Logic IFALCN-Preliminary Results
Interval-valued Fuzzy Description Logic IFALCN-Preliminary R...
收藏 引用
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems(2010 IEEE 智能计算与智能系统国际会议 ICIS 2010)
作者: Linlin Huo Jihong Ouyang Dayou Liu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College o Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of
To represent and reason with interval-value information of applications in description logic, based on interval-fuzzy set the classical description logic *** is extended to the fuzzy description logic IFALCN. Its'... 详细信息
来源: 评论
Reasoning and predicting POMDP planning complexity via covering numbers
收藏 引用
Frontiers of Computer Science 2016年 第4期10卷 726-740页
作者: Zongzhang ZHANG Qiming FU Xiaofang ZHANG Quan LIU School of Computer Science and Technology Soochow University Suzhou 215000 China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing 210000 China School of Electronic and Information Engineering Suzhou University of Science and Technology Suzhou 215000 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Partially observable Markov decision processes (POMDPs) provide a rich mathematical framework for planning tasks in partially observable stochastic environments. The notion of the covering number, a metric of captur... 详细信息
来源: 评论
TS-Net: Two-stage deformable medical image registration network based on new smooth constraints
收藏 引用
Magnetic Resonance Imaging 2023年 第1期99卷 26-33页
作者: Song, Lei Ma, Mingrui Liu, Guixia College of Computer Science and Technology Jilin University Jilin Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Jilin Changchun 130012 China
Medical image registration can establish the spatial consistency of the corresponding anatomical structures between different medical images, which is important in medical image analysis. In recent years, with the rap... 详细信息
来源: 评论
Integrity constraint validation in dl-liter based ontology using rewriting  2nd
Integrity constraint validation in dl-liter based ontology u...
收藏 引用
2nd International Conference on Young Computer Scientists, Engineers and Educators, ICYCSEE 2016
作者: Cui, Xianji Ouyang, Dantong He, Jialiang College of Information and Communication Engineering Dalian Minzu University Dalian116600 China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Jilin University Changchun130012 China
With the rapid development of information technology, semantic web data present features of massiveness and complexity. As the data-centric science, social computing have great influence in collecting and analyzing se... 详细信息
来源: 评论