咨询与建议

限定检索结果

文献类型

  • 477 篇 期刊文献
  • 420 篇 会议

馆藏范围

  • 897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 631 篇 工学
    • 507 篇 计算机科学与技术...
    • 433 篇 软件工程
    • 141 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 65 篇 生物工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 机械工程
    • 41 篇 电子科学与技术(可...
    • 39 篇 电气工程
    • 36 篇 化学工程与技术
    • 30 篇 光学工程
    • 22 篇 航空宇航科学与技...
    • 17 篇 交通运输工程
    • 16 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 13 篇 土木工程
    • 11 篇 网络空间安全
  • 333 篇 理学
    • 237 篇 数学
    • 74 篇 生物学
    • 56 篇 统计学(可授理学、...
    • 42 篇 物理学
    • 36 篇 化学
    • 28 篇 系统科学
  • 217 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 32 篇 医学
    • 24 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 12 篇 法学
    • 10 篇 社会学
  • 9 篇 农学
  • 5 篇 经济学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学
  • 1 篇 军事学

主题

  • 49 篇 computer science
  • 41 篇 educational inst...
  • 41 篇 laboratories
  • 39 篇 educational tech...
  • 37 篇 knowledge engine...
  • 23 篇 computer science...
  • 21 篇 data mining
  • 16 篇 semantics
  • 15 篇 reinforcement le...
  • 12 篇 image segmentati...
  • 12 篇 contrastive lear...
  • 12 篇 feature extracti...
  • 11 篇 deep learning
  • 11 篇 ontologies
  • 11 篇 artificial intel...
  • 10 篇 authentication
  • 9 篇 recommender syst...
  • 9 篇 topology
  • 8 篇 sun
  • 8 篇 computational mo...

机构

  • 431 篇 college of compu...
  • 285 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 college of softw...
  • 33 篇 school of artifi...
  • 31 篇 college of compu...
  • 29 篇 key laboratory o...
  • 24 篇 jilin university...
  • 20 篇 jilin university...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 school of comput...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 14 篇 key laboratory o...
  • 14 篇 college of compu...
  • 13 篇 international ce...

作者

  • 39 篇 yang bo
  • 35 篇 sun geng
  • 31 篇 li ximing
  • 27 篇 ouyang jihong
  • 25 篇 dantong ouyang
  • 25 篇 liu dayou
  • 24 篇 niyato dusit
  • 22 篇 ouyang dantong
  • 22 篇 yanheng liu
  • 22 篇 li jiahui
  • 22 篇 bo yang
  • 21 篇 chen haipeng
  • 21 篇 huang lan
  • 21 篇 liu yanheng
  • 20 篇 li xiongfei
  • 19 篇 guan renchu
  • 18 篇 dayou liu
  • 17 篇 chang yi
  • 17 篇 wang jian
  • 17 篇 wang jiacheng

语言

  • 799 篇 英文
  • 63 篇 其他
  • 35 篇 中文
检索条件"机构=MOE Key Laboratory of Symbolic Computation and Knowledge Engineering"
897 条 记 录,以下是681-690 订阅
排序:
A novel framework for gene selection
收藏 引用
International Journal of Advancements in Computing Technology 2011年 第3期3卷 184-191页
作者: Zhao, Wei Wang, Gang Wang, Hong-bin Chen, Hui-ling Dong, Hao Zhao, Zheng-dong Network Information Center Changchun University of Science and Technology Changchun 130022 China College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Microarray data are highly redundant and noisy, and most genes are believed to be uninformative with respect to studied classes, as only a fraction of genes may present distinct profiles for different classes of sampl... 详细信息
来源: 评论
A Heuristic Genetic Process Mining Algorithm
A Heuristic Genetic Process Mining Algorithm
收藏 引用
International Conference on computational Intelligence and Security
作者: Jiafei Li Jihong OuYang Mingyong Feng Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Jilin University Changchun Jilin CN Industry Applications Department Cattsoft Technology Company Limited Beijing China
The current GPM algorithm needs many iterations to get good process models with high fitness which makes the GPM algorithm usually time-consuming and sometimes the result can not be accepted. To mine higher quality mo... 详细信息
来源: 评论
A Loss Assessment Design Method Based on SOA for Insurance Informationization
A Loss Assessment Design Method Based on SOA for Insurance I...
收藏 引用
International Conference on Digital Manufacturing and Automation (ICDMA)
作者: Niya Li Jian Zhang Wei Lv Chengye Jin Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China Jilin University Changchun Jilin CN College of Computer Science and Technology Jilin University China LeJin Electronics Company Limited Jilin China
The loss assessment is an important operation of claim process in insurance industry. On the growing tide of making the insurance information system the in-depth support to optimizing operation and serving insurant, a... 详细信息
来源: 评论
An adaptive fuzzy ant colony optimization for feature selection
收藏 引用
Journal of computational Information Systems 2011年 第4期7卷 1206-1213页
作者: Liu, Yuanning Wang, Gang Chen, Huiling Zhao, Zhengdong Zhu, Xiaodong Liu, Zhen College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Network Center Changchun University of Science and Technology Changchun 130022 China Graduate School of Engineering Nagasaki Institute of Applied Science Japan
Standard pattern classifiers perform on all data features. Whereas, some of the features are redundant or irrelevant, which reduce prediction accuracy, and increase running time of classifier. The purpose of this stud... 详细信息
来源: 评论
Verilog combinational equivalence checking based on smt constraint solver
收藏 引用
ICIC Express Letters, Part B: Applications 2011年 第5期2卷 1087-1092页
作者: Zeng, Hailin Ouyang, Dantong Zhang, Yuehua Zhang, Liming Zhang, Guiling School of Computer Science and Technology Jilin University No. 2699 Qanjin Street Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University No. 2699 Qanjin Street Changchun 130012 China Software College Jilin University No. 2699 Qanjin Street Changchun 130012 China
Most previous works on combinational equivalence checking use BDDs and other Boolean level representations to formulate and solve the problem, and therefore, not utilizing the word-level information inherently present... 详细信息
来源: 评论
A verifiable multi-secret sharing scheme
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2011年 第SUPPL.1期32卷 120-123页
作者: Wang, Yan-Xi Liu, Yan-Heng Wang, Jian Dong, Tian-Zhe College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Analyzing two improved YCH schemes and a multi-secret sharing scheme based on homogeneous linear recursion, we propose and implement a new verifiable multi-secret sharing model based on Shamir secret sharing. The time... 详细信息
来源: 评论
A fuzzy adaptive multi-population parallel genetic algorithm for spam filtering
收藏 引用
Journal of Convergence Information Technology 2011年 第2期6卷 172-182页
作者: Zhao, Zheng-dong Wang, Gang Zhao, Wei Chen, Hui-ling Zhao, Wei Li, Lu-lu Network Information Center Changchun University of Science and Technology Changchun China College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Department of Information Engineering Jilin Police College China Branch Institute of information technology Changchun Vocational Institute of Technology Changchun China
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering met... 详细信息
来源: 评论
Using TCM in mobile terminals in internet of vehicles
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2011年 第SUPPL.1期32卷 107-110页
作者: Gao, Wen-Bin Liu, Yan-Heng Wang, Jian College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TC... 详细信息
来源: 评论
Simulating the Folding Pathway of RNA Secondary Structure Using the Modified Ant Colony Algorithm
收藏 引用
Journal of Bionic engineering 2010年 第4期7卷 382-389页
作者: Jun Yu~(1,2),Changhai Zhang~(1,2),Yuanning Liu~(1,2),Xin Li~(1,2) 1.College of Computer Science and Technology,Jilin University,Changchun 130012,P.R.China 2.key laboratory of symbolic computation and knowledge engineering (Ministry of Education,China) Jilin University,Changchun 130012,P.R.China [a] College of Computer Science Technology Jilin University Changchun 130012 P. R. China [b] Key Laboratory of Symbolic Computation Knowledge Engineering (Ministry of Education China) Jilin University Changchun 130012 P. R. China
A new method for simulating the folding pathway of RNA secondary structure using the modified ant colony algorithmis *** a given RNA sequence,the set of all possible stems is obtained and the energy of each stem iscal... 详细信息
来源: 评论
Improved evaluation algorithm of contour detection
收藏 引用
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (engineering and Technology Edition) 2011年 第SUPPL. 1期41卷 179-182页
作者: Zhao, Hong-Wei Liu, Jing Chen, Hua-Cheng Cui, Hong-Rui College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering for Ministry of Education Jilin University Changchun 130012 China Scientific Information Bureau Jilin Transportion Chares Administration Changchun 130061 China
For the low accuracy and imprecise of contour detection evaluation algorithm for a natural image with Ground Truth, we proposed a neighborhood matching algorithm, which had been combined with the original algorithm, a... 详细信息
来源: 评论