咨询与建议

限定检索结果

文献类型

  • 611 篇 期刊文献
  • 597 篇 会议

馆藏范围

  • 1,208 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 856 篇 工学
    • 683 篇 计算机科学与技术...
    • 599 篇 软件工程
    • 180 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 88 篇 生物工程
    • 72 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 55 篇 化学工程与技术
    • 54 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 45 篇 电气工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 22 篇 航空宇航科学与技...
    • 21 篇 土木工程
    • 16 篇 建筑学
    • 14 篇 网络空间安全
  • 476 篇 理学
    • 339 篇 数学
    • 106 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 59 篇 物理学
    • 56 篇 化学
    • 34 篇 系统科学
  • 289 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 44 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 20 篇 农学
  • 17 篇 法学
    • 15 篇 社会学
  • 7 篇 经济学
  • 6 篇 教育学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 66 篇 computer science
  • 57 篇 educational inst...
  • 53 篇 knowledge engine...
  • 53 篇 laboratories
  • 50 篇 educational tech...
  • 41 篇 data mining
  • 27 篇 semantics
  • 27 篇 computer science...
  • 27 篇 ontology
  • 21 篇 image segmentati...
  • 20 篇 feature extracti...
  • 16 篇 deep learning
  • 16 篇 genetic algorith...
  • 15 篇 reinforcement le...
  • 15 篇 artificial intel...
  • 14 篇 ontologies
  • 14 篇 topology
  • 14 篇 clustering algor...
  • 13 篇 support vector m...
  • 12 篇 neural networks

机构

  • 512 篇 college of compu...
  • 272 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 45 篇 college of softw...
  • 41 篇 key laboratory o...
  • 39 篇 school of artifi...
  • 35 篇 key laboratory o...
  • 32 篇 college of compu...
  • 29 篇 key laboratory o...
  • 24 篇 jilin university...
  • 21 篇 school of comput...
  • 20 篇 jilin university...
  • 19 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 17 篇 department of co...
  • 17 篇 key laboratory o...
  • 16 篇 jilin university...
  • 15 篇 key laboratory o...
  • 15 篇 the college of c...
  • 15 篇 key laboratory o...

作者

  • 46 篇 yang bo
  • 36 篇 liang yanchun
  • 35 篇 sun geng
  • 33 篇 ouyang dantong
  • 31 篇 dantong ouyang
  • 30 篇 li xiongfei
  • 28 篇 li ximing
  • 27 篇 liu dayou
  • 27 篇 ouyang jihong
  • 27 篇 zuo wanli
  • 26 篇 yanchun liang
  • 24 篇 bo yang
  • 24 篇 liu yanheng
  • 23 篇 niyato dusit
  • 23 篇 yanheng liu
  • 21 篇 li jiahui
  • 20 篇 guan renchu
  • 20 篇 huang lan
  • 20 篇 da-you liu
  • 19 篇 dayou liu

语言

  • 1,111 篇 英文
  • 50 篇 中文
  • 47 篇 其他
检索条件"机构=The Key Laboratory of Symbolic Computation and Knowledge Engineering"
1208 条 记 录,以下是1171-1180 订阅
Network intrusion detection system based on adaptive resonance theory
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2005年 第11期28卷 1882-1889页
作者: Tian, Da-Xin Liu, Yan-Heng Wei, Da Key Laboratory of Symbolic Computation and Knowledge Engineering College of Computer Science and Technology Jilin University Changchun 130012 China
A network intrusion detection system based on adaptive resonance theory (ARTNIDS) is put forward. It detects network intrusions by using anomaly-based detection method. Since the heads of network datagrams include alm... 详细信息
来源: 评论
Realize utility-driven decision theoretic planning on the planning graph
Realize utility-driven decision theoretic planning on the pl...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: You-hong Zhang Ming-hao Yin Wen-xiang Gu Department of Information and Mathematics College of Science Foshan University Foshan China School of Computer Science Northeast Normal University Changchun Jilin China Key Laboratory for Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun China
This paper presents a new model to incorporate decision theory into Graphplan framework, which enables our planner to handle uncertainty and make decision to choose the optimal one among a set of hypothesis valid plan... 详细信息
来源: 评论
AN IMPROVED BICLUSTERING ALGORITHM AND ITS APPLICATION TO GENE EXPRESSION SPECTRUM ANALYSIS
收藏 引用
Genomics, Proteomics & Bioinformatics 2005年 第3期3卷 189-193页
作者: Hua Qu Liu-Pu Wang Yan-Chun Liang Chun-Guo Wu College of Software Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China Guangzhou Institute of China Telecom Guangzhou 510630 China College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Key Laboratory of Information Science and Engineering of the Ministry of Railway/Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing Jiaotong University Beijing 100044 China.
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two ... 详细信息
来源: 评论
Noise suppression of fluorescein angiogram sequences using bilateral filter
Noise suppression of fluorescein angiogram sequences using b...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Xiao-Xin Guo Yi-Nan Lu Zhi-Wen Xu Zhan-Hui Liu Yun-Xiao Wang Yun-Jie Pang Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education College of Computer Science and Technology Jilin University Changchun China
In this paper, a relatively flexible filter called extended bilateral filter is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) and defining a kernel for... 详细信息
来源: 评论
An EAWA Filter for Denoising of Filtering of Fluorescein Angiogram Sequences
An EAWA Filter for Denoising of Filtering of Fluorescein Ang...
收藏 引用
International Conference on Computer and Information Technology (CIT)
作者: Xiaoxin Guo Zhiwen Xu Yinan Lu Yunjie Pang Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education College of Computer Science and Technology Jilin University Changchun China
In this paper, a novel filter model called extended adaptive weighted averaging (EAWA) filter model is proposed, by which some particular filters can be designed via selecting an appropriate pixel of interest (POI) an... 详细信息
来源: 评论
A conditioned secure access control model on multi-weighted roles in workflow system
A conditioned secure access control model on multi-weighted ...
收藏 引用
International Conference on Control and Automation (ICCA)
作者: Jian Zhang Jigui Sun Niya Li Chengquan Hu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China Jilin University Changchun Jilin CN Coll. of Comput. Sci. & Technol. Jilin Univ. Changchun China
The traditional RBAC model already cannot express the complicated secure access control constraint of the workflow. Based on the traditional RBAC model, a new conditioned RBAC model named as CMWRBSAC is proposed on th... 详细信息
来源: 评论
Robust estimation of the fundamental matrix based on an error model
Robust estimation of the fundamental matrix based on an erro...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Hui-Xiang Zhong Yue-Ping Feng Yun-Jie Pang College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun China
A new method is presented for robustly estimating fundamental matrix from matched points. The method comprises two parts. The first uses a robust technique - the random sample consensus (RANSAC) to discard outliers in... 详细信息
来源: 评论
Qualitative spatial relationships cleaning for spatial data mining
Qualitative spatial relationships cleaning for spatial data ...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Hai-Bin Sun Wen-Hui Li Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education College of Computer Science and Technology Jilin University Changchun China
In this article, we investigate the problem of preparing qualitative spatial relations before implementing spatial data mining by checking consistency in a constraint network, which includes topological and cardinal d... 详细信息
来源: 评论
An Application of Fourier-Mellin Transform in Image Registration
An Application of Fourier-Mellin Transform in Image Registra...
收藏 引用
International Conference on Computer and Information Technology (CIT)
作者: Xiaoxin Guo Zhiwen Xu Yinan Lu Yunjie Pang Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education College of Computer Science and Technology Jilin University Changchun China
Fourier-Mellin transform (FMT) is frequently used in content-based image retrieval and digital image watermarking. This paper extends the application of FMT into image registration and proposes an improved registratio... 详细信息
来源: 评论
Mining attributes' sequential patterns for error identification in data set
Mining attributes' sequential patterns for error identificat...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Ya-Bo Liu Da-You Liu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China Jilin University Changchun Jilin CN Coll. of Comput. Sci. & Technol. Jilin Univ. Changchun China
It is well recognized that sequential pattern mining plays an essential role in many scientific and business domains. In this paper, a new extension of sequential pattern, attributes' sequential pattern, is propos... 详细信息
来源: 评论