咨询与建议

限定检索结果

文献类型

  • 257 篇 会议
  • 163 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 286 篇 工学
    • 232 篇 计算机科学与技术...
    • 190 篇 软件工程
    • 43 篇 控制科学与工程
    • 41 篇 信息与通信工程
    • 28 篇 生物工程
    • 24 篇 生物医学工程(可授...
    • 17 篇 电气工程
    • 14 篇 仪器科学与技术
    • 13 篇 机械工程
    • 13 篇 建筑学
    • 13 篇 土木工程
    • 13 篇 化学工程与技术
    • 12 篇 光学工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 动力工程及工程热...
    • 8 篇 网络空间安全
  • 122 篇 理学
    • 61 篇 数学
    • 30 篇 生物学
    • 17 篇 统计学(可授理学、...
    • 16 篇 物理学
    • 14 篇 系统科学
    • 11 篇 化学
  • 109 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 19 篇 医学
    • 15 篇 基础医学(可授医学...
    • 13 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 15 篇 法学
    • 14 篇 社会学
  • 9 篇 教育学
    • 9 篇 教育学
  • 7 篇 农学
  • 4 篇 文学
  • 1 篇 经济学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 19 篇 knowledge engine...
  • 16 篇 artificial intel...
  • 14 篇 software enginee...
  • 14 篇 data mining
  • 10 篇 deep learning
  • 10 篇 semantics
  • 9 篇 visualization
  • 8 篇 information syst...
  • 8 篇 information stor...
  • 7 篇 data models
  • 7 篇 training
  • 7 篇 ontology
  • 6 篇 conferences
  • 6 篇 ontologies
  • 6 篇 medical services
  • 5 篇 computer science
  • 5 篇 computer communi...
  • 5 篇 knowledge manage...
  • 5 篇 database managem...
  • 5 篇 feature extracti...

机构

  • 58 篇 college of compu...
  • 48 篇 college of softw...
  • 28 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 11 篇 college of softw...
  • 7 篇 key laboratory o...
  • 7 篇 jilin university...
  • 6 篇 college of compu...
  • 6 篇 state key labora...
  • 6 篇 jilin university...
  • 5 篇 state key labora...
  • 5 篇 school of softwa...
  • 5 篇 school of artifi...
  • 5 篇 jilin university...
  • 5 篇 beijing key labo...
  • 4 篇 college of compu...
  • 4 篇 humboldt-univers...
  • 4 篇 department of kn...
  • 4 篇 yunnan key labor...
  • 4 篇 faculty of infor...

作者

  • 12 篇 karkaletsis vang...
  • 9 篇 wang xin
  • 8 篇 peng tao
  • 7 篇 niyato dusit
  • 7 篇 sun geng
  • 7 篇 miksch silvia
  • 6 篇 liu lu
  • 6 篇 wang ying
  • 6 篇 leung victor c.m...
  • 6 篇 paliouras georgi...
  • 6 篇 xin wang
  • 5 篇 silvia miksch
  • 5 篇 petasis georgios
  • 5 篇 liang yanchun
  • 5 篇 li jiahui
  • 5 篇 spyropoulos cons...
  • 4 篇 alexander artiki...
  • 4 篇 seok-won lee
  • 4 篇 liu jinyuan
  • 4 篇 zhang wen

语言

  • 408 篇 英文
  • 19 篇 其他
  • 6 篇 中文
检索条件"机构=Software and Knowledge Engineering"
432 条 记 录,以下是81-90 订阅
排序:
Improving Local Search for Pseudo Boolean Optimization by Fragile Scoring Function and Deep Optimization  29
Improving Local Search for Pseudo Boolean Optimization by Fr...
收藏 引用
29th International Conference on Principles and Practice of Constraint Programming, CP 2023
作者: Zhou, Wenbo Zhao, Yujiao Wang, Yiyuan Cai, Shaowei Wang, Shimao Wang, Xinyu Yin, Minghao School of Information Science and Technology Northeast Normal University Changchun China Key Laboratory of Applied Statistics of MOE Northeast Normal University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of MOE Jilin University Changchun China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Pseudo-Boolean optimization (PBO) is usually used to model combinatorial optimization problems, especially for some real-world applications. Despite its significant importance in both theory and applications, there ar... 详细信息
来源: 评论
A Multi-objective Optimization Approach for Secure Communications Based on Collaborative Beamforming in UAV Networks
A Multi-objective Optimization Approach for Secure Communica...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Xinrong Guo Fang Mei Geng Sun Tingting Zheng College of Software Jilin University Changchun China College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China College of Electrical and Computer Engineering University of Waterloo Waterloo Canada
With the rapid development of wireless communication, unmanned aerial vehicle (UAV) networks have received extensive attention and been applied in many fields, but some challenges exist in their applications, such as ... 详细信息
来源: 评论
2D-3D Feature Co-Embedding Network with Sparse Annotation for 3D Medical Image Segmentation
2D-3D Feature Co-Embedding Network with Sparse Annotation fo...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Mingzhu Zhu Shuyu Guo Ziwei Wang Jianhang Jiao Tian Bai College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China College of Software Jilin University Changchun China Department of Orthopedics The Second Norman Bethune Hospital of Jilin University Changchun China
Supervised methods on 3D medical image segmentation need large amounts of annotated data, but annotating is time-consuming. Also, existing 3D segmentation methods capture more global structural information but overloo... 详细信息
来源: 评论
Traffic jam prediction based on analysis of residents spatial activities
Traffic jam prediction based on analysis of residents spatia...
收藏 引用
2020 International Conference on Computer Information and Big Data Applications, CIBDA 2020
作者: Lv, Zhijin Fu, Hao Tang, Wei Chen, Xiaoxu College of Software Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun130012 China
The prediction of urban traffic congestion has always been one of the important contents in the research of intelligent transportation systems. The difficulty in predicting urban traffic congestion is that urban traff... 详细信息
来源: 评论
Unsupervised Kernel-based Multi-view Feature Selection with Robust Self-representation and Binary Hashing  39
Unsupervised Kernel-based Multi-view Feature Selection with ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Hu, Rongyao Gan, Jiangzhang Zhan, Mengmeng Li, Li Wei, Mengling School of Computer Science and Technology University of Electronic Science and Technology of China Chengdu 611731 China Knowledge and Data Engineering Laboratory of Chinese Medicine School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054 China School of Computer Science and Technology Hainan University Haikou 570228 China Beijing Information Science and Technology University Beijing 100101 China
Unsupervised multi-view feature selection involves selecting a subset of crucial features across diverse views to diminish feature dimensionality without leveraging label information. While numerous studies may risk l...
来源: 评论
Automatic Detection of Lumbar Spondylolisthesis and Instability Using Supine Magnetic Resonance Images
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Zewen Zhang, Han Zhao, Hang Liu, Yuwu Zhang, Chi Shi, Xiaohu College of Software Jilin University Changchun130021 China Guangyuan Central Hospital China College of Computer Science and Technology Jilin University Changchun130021 China Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of Education Changchun130021 China
Background and Objective: Lumbar spondylolisthesis is a condition in which one vertebra is displaced relative to the vertebra below it. Lumbar instability can be divided into static and dynamic spondylolisthesis depen... 详细信息
来源: 评论
Anomaly Detection of Industrial Control Systems Based on Transfer Learning
收藏 引用
Tsinghua Science and Technology 2021年 第6期26卷 821-832页
作者: Weiping Wang Zhaorong Wang Zhanfan Zhou Haixia Deng Weiliang Zhao Chunyang Wang Yongzhen Guo School of Computer and Communication Engineering the Beijing Key Laboratory of Knowledge Engineering for Materials Scienceand the Institute of Artificial IntelligenceUniversity of Science and Technology BeijingBeijing 100083China Shunde Graduate School University of Science and Technology BeijingGuangzhou 528399China School of Automation and Electrical Engineering University of Science and Technology BeijingBeijing 100083China School of Mechanical Engineering University of Science and Technology BeijingBeijing 100083China Donlinks School of Economics and Management University of Science and Technology Beijing Beijing 100083China School of Automation Beijing Institute of TechnologyBeijing 100081 China Software Testing Center Beijing 100048China.
Industrial Control Systems(ICSs)are the lifeline of a ***,the anomaly detection of ICS traffic is an important *** paper proposes a model based on a deep residual Convolution Neural Network(CNN)to prevent gradient exp... 详细信息
来源: 评论
Emotion Recognition System via Facial Expressions and Speech Using Machine Learning and Deep Learning Techniques
收藏 引用
SN Computer Science 2023年 第4期4卷 363页
作者: Chaudhari, Aayushi Bhatt, Chintan Nguyen, Thanh Thi Patel, Nisarg Chavda, Kirtan Sarda, Kalind U & P U. Patel Department of Computer Engineering Chandubhai S. Patel Institute of Technology Charotar University of Science And Technology (CHARUSAT) Gujarat Changa 388421 India Department of Computer Science and Engineering School of Technology Pandit Deendayal Energy University Knowledge Corridor Gujarat Gandhinagar 382007 India School of Information Technology Faculty of Science Engineering and Built Environment Deakin University Victoria 3216 Australia Bishop University 2600 College St Sherbrooke J1M 1Z7 QC Canada Crest Data Systems Private Limited Gandhinagar Highway Makarba Gujarat Ahmedabad 380051 India Programmer Analyst Meditab Software Pvt Ltd Kalasagar Mall Ghatlodiya Gujarat Ahmedabad 380061 India
Patients in hospitals frequently exhibit psychological issues such as sadness, pessimism, eccentricity, and anxiety. However, hospitals normally lack tools and facilities to continuously monitor the psychological heal... 详细信息
来源: 评论
Linear Encryption Techniques for Counteracting Information-based Stealthy Attacks
Linear Encryption Techniques for Counteracting Information-b...
收藏 引用
International Conference on Control, Automation, Robotics and Vision (ICARCV)
作者: Jun Shang Hanwen Zhang Weixiong Rao Yiguang Hong Department of Control Science and Engineering National Key Laboratory of Autonomous Intelligent Unmanned Systems Shanghai Institute of Intelligent Sci-ence and Technology Frontiers Science Center for Intelligent Autonomous Systems Tongji University Shanghai China Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education School of Automation and Electrical Engineering University of Science and Technology Beijing Beijing China School of Software Engineering Tongji University Shanghai China
This study explores linear encryption techniques to protect against information-based stealthy attacks on re-mote state estimation. Utilizing smart sensors equipped with local Kalman filters, the system transmits inno... 详细信息
来源: 评论
Integrity Estimation of Twitter Based Event Recognition Using Scrutiny of Analyzed Data
Integrity Estimation of Twitter Based Event Recognition Usin...
收藏 引用
Emerging Trends in Information Technology and engineering (ic-ETITE), Conference on
作者: Siva Rama Lingham N M Parameswari Karthick P T. Subha Rathi Priya G Rajesh J. Jagannathan Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai India Department of Computer Science and Engineering Knowledge Institute of Technology Salem India Department of Computer Science and Engineering Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Chennai India School of Engineering and Technology Jeppiaar University Chennai India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Katpadi Vellore India
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati...
来源: 评论