咨询与建议

限定检索结果

文献类型

  • 852 篇 会议
  • 654 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,003 篇 工学
    • 787 篇 计算机科学与技术...
    • 662 篇 软件工程
    • 167 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 92 篇 生物工程
    • 75 篇 电气工程
    • 66 篇 电子科学与技术(可...
    • 65 篇 机械工程
    • 63 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 38 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 31 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 25 篇 土木工程
  • 446 篇 理学
    • 263 篇 数学
    • 108 篇 生物学
    • 100 篇 物理学
    • 73 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 41 篇 化学
  • 274 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 54 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 12 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 cloud computing
  • 16 篇 optimization
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 96 篇 institute of sof...
  • 54 篇 college of compu...
  • 45 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 18 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 11 篇 zheng changwen
  • 11 篇 dai guozhong

语言

  • 1,316 篇 英文
  • 171 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1529 条 记 录,以下是1141-1150 订阅
排序:
Undo the codebook bias by linear transformation for visual applications  13
Undo the codebook bias by linear transformation for visual a...
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Zhang, Chunjie Zhang, Yifan Wang, Shuhui Pang, Junbiao Liang, Chao Huang, Qingming Tian, Qi School of Computer and Control Engineering University of Chinese Academy of Sciences 100049 Beijing China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing China Key Lab of Intell. Info. Process Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China College of Computer Science and Technology Beijing University of Technology 100124 Beijing China School of Computer National Engineering Research Center for Multimedia Software Wuhan University 430072 Wuhan China Department of Computer Sciences University of Texas at San Antonio San Antonio TX 78249 United States
The bag of visual words model (BoW) and its variants have demonstrate their effectiveness for visual applications and have been widely used by researchers. The BoW model first extracts local features and generates the... 详细信息
来源: 评论
Information security innovation: Personalisation of security services in a mobile cloud infrastructure  1
Information security innovation: Personalisation of security...
收藏 引用
1st Workshop on Theories and Intricacies of Information Security Workshop, INTRICATE-SEC 2012
作者: Eloff, Jan H.P. Eloff, Mariki M. Bihina-Bella, Madeleine A. Isherwood, Donovan Dlamini, Moses Ngassam, Ernest K. SAP Research Internet Application and Services Africa Pretoria South Africa Institute of Corporate Citizenship University of South Africa South Africa Faculty of ICT Tshwane University of Technology Pretoria South Africa Academy of Computer Science and Software Engineering University of Johannesburg South Africa Department of Computer Science University of Pretoria South Africa CSIR Meraka Pretoria South Africa
The increasing demand for on-line and real-time interaction with IT infrastructures by endusers are facilitated by the proliferation of user centric devices such as laptops, iPods, iPads, and smartphones. This trend i... 详细信息
来源: 评论
Building a laboratory surveillance system via a wireless sensor network
收藏 引用
8th International Conference on Grid and Pervasive Computing, GPC 2013
作者: Lei, Chi-Un Seon, J.K. Shen, Zhun Lokman, Ka Hughes, Danny Kim, Youngmin Department of Electrical and Electronic Engineering University of Hong Kong Pokfulam Road Hong Kong Hong Kong LS Industrial Systems Korea Republic of Department of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University Suzhou China Myongji University Korea Republic of Baltic Institute of Advanced Technology Lithuania Department of Computer Science KU Leuven Flanders Belgium UNIST Academy-Industry Research Corporation Korea Republic of
Contemporary technical experimentations become complicated. Therefore, a smart laboratory environment is needed for effective laboratory activities. In particular, a monitoring/surveillance system is needed to detect ... 详细信息
来源: 评论
A framework for provisioning restful services on mobile devices
A framework for provisioning restful services on mobile devi...
收藏 引用
International Conference on Adaptive science & Technology (ICAST)
作者: Charl van der Westhuizen Marijke Coetzee SAP P&I BIT Mobile Empowerment University of Johannesburg Pretoria Academy of Computer Science and Software Engineering University of Johannesburg
Web services that are accessible on mobile devices such as smart phones and tablets are a reality in today's age. Web services hosted on mobile devices consume valuable device resources such as battery power, conn... 详细信息
来源: 评论
Semi-supervised learning with local and global consistency by geodesic distance and sparse representation  1
收藏 引用
3rd Sino-Foreign-Interchange Workshop on Intelligent science and Intelligent Data engineering, IScIDE 2012
作者: Gui, Jie Zhao, Zhongqiu Hu, Rongxiang Jia, Wei Intelligent Computing Lab. Hefei Institute of Intelligent Machines Chinese Academy of Sciences Hefei Anhui 230031 China State Key Laboratory for Novel Software Technology Nanjing University China College of Computer Science and Information Engineering Hefei University of Technology China Institue of Energy Safety Chinese Academy of Sciences Hefei Anhui 230031 China
In many practical data mining applications, such as web categorization, key gene selection, etc., generally, unlabeled training examples are readily available, but labeled ones are fairly expensive to obtain. Therefor... 详细信息
来源: 评论
Kinetics and Modeling of Chemical Leaching of Sphalerite Concentrate Using Ferric Iron in a Redox-controlled Reactor
收藏 引用
Chinese Journal of Chemical engineering 2013年 第8期21卷 933-936页
作者: 宋健 高玲 林建群 吴洪斌 林建强 State Key Lab of Microbial Technology Shandong University Department of Pharmacy and Biotechnology Zibo Vocational Institute Shandong Provincial Key Lab for Distributed Computer Software Novel Technology School of Information Science and EngineeringShandong Normal University Institute of Agro-products Processing Science and Technology Xinjiang Academy of Agricultural and Reclamation Science
This work presents a study for chemical leaching of sphalerite concentrate under various constant Fe3+ concentrations and redox potential conditions. The effects of Fe3+ concentration and redox potential on chemical l... 详细信息
来源: 评论
Depth-of-Field Rendering with Saliency-Based Bilateral Filtering
Depth-of-Field Rendering with Saliency-Based Bilateral Filte...
收藏 引用
IEEE International Conference on computer-Aided Design and computer Graphics
作者: Weichen Xue Dong Xing Ming Lin Jing Wang Bin Sheng Lizhuang Ma Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai China State Key Lab. of Computer Science Inst. of Software Chinese Academy of Sciences Beijing China
Depth of Field (DoF) is an indispensable feature of photo realistic rendering and photography retouching. In this paper, we propose an image-based rendering technique which can simulate the depth-of-field effect. The ... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Statistical fault localization in decision support system based on probability distribution criterion
Statistical fault localization in decision support system ba...
收藏 引用
Conference of the North American Fuzzy Information Processing Society - NAFIPS
作者: P. Hao Z. Zheng Y. Gao Z. Zhang Department of Automation Science and Electrical Engineering Beihang University Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
Finding the location of a fault in code is an important research and practical problem, which often requires much time and manual effort. To automate this time consuming task, a class of predicate-based statistical fa... 详细信息
来源: 评论
Study on mechanisms of secure data aggregation based on weighted fitting analysis
收藏 引用
Ruan Jian Xue Bao/Journal of software 2013年 第SUPPL.1期24卷 108-116页
作者: Li, Ping Yang, Wu Xie, Jin-Yang Zhu, Hong-Song Zhang, Yong-Guang Li, Xiao-Feng School of Computer and Telecommunications Changsha University of Science and Technology Changsha 410114 China State Key Laboratory of Information Security Institute of Information Engineering The Chinese Academy of Sciences Beijing 100093 China Software Development Center Beijing Institute of Control Engineering Beijing 100190 China
Cryptographic approaches are vulnerable to impersonation attacks when nodes become compromised. Meanwhile, trust-based judgment and confirmation of cluster heads in WSN imposes higher communication cost. Trust managem... 详细信息
来源: 评论