咨询与建议

限定检索结果

文献类型

  • 536 篇 会议
  • 272 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 809 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 600 篇 工学
    • 398 篇 计算机科学与技术...
    • 342 篇 软件工程
    • 121 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 66 篇 机械工程
    • 53 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 46 篇 电气工程
    • 28 篇 化学工程与技术
    • 25 篇 光学工程
    • 17 篇 仪器科学与技术
    • 15 篇 建筑学
    • 15 篇 安全科学与工程
    • 14 篇 动力工程及工程热...
    • 14 篇 生物医学工程(可授...
    • 13 篇 土木工程
    • 11 篇 交通运输工程
    • 6 篇 网络空间安全
  • 273 篇 理学
    • 165 篇 数学
    • 52 篇 生物学
    • 50 篇 物理学
    • 50 篇 系统科学
    • 48 篇 统计学(可授理学、...
    • 29 篇 化学
  • 184 篇 管理学
    • 97 篇 图书情报与档案管...
    • 90 篇 管理科学与工程(可...
    • 26 篇 工商管理
  • 16 篇 法学
    • 15 篇 社会学
  • 9 篇 教育学
    • 9 篇 教育学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 文学
  • 3 篇 经济学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 34 篇 wireless sensor ...
  • 31 篇 computer science
  • 31 篇 laboratories
  • 28 篇 face recognition
  • 26 篇 semantics
  • 23 篇 data mining
  • 22 篇 educational inst...
  • 20 篇 feature extracti...
  • 18 篇 computational mo...
  • 16 篇 image reconstruc...
  • 14 篇 telecommunicatio...
  • 14 篇 training
  • 13 篇 image coding
  • 13 篇 clustering algor...
  • 13 篇 robustness
  • 12 篇 control systems
  • 12 篇 cloud computing
  • 12 篇 intelligent sens...
  • 11 篇 target tracking
  • 11 篇 electronic mail

机构

  • 95 篇 beijing key labo...
  • 77 篇 beijing key labo...
  • 62 篇 beijing key labo...
  • 49 篇 beijing key labo...
  • 44 篇 school of electr...
  • 31 篇 school of comput...
  • 23 篇 beijing key labo...
  • 22 篇 seventh research...
  • 19 篇 beijing key labo...
  • 17 篇 school of econom...
  • 16 篇 beijing key labo...
  • 15 篇 beijing key labo...
  • 14 篇 beijing municipa...
  • 12 篇 school of comput...
  • 12 篇 beijing key labo...
  • 11 篇 beijing key labo...
  • 11 篇 seventh research...
  • 10 篇 beijing universi...
  • 9 篇 beijing municipa...
  • 9 篇 school of electr...

作者

  • 118 篇 junping du
  • 85 篇 yin baocai
  • 71 篇 du junping
  • 57 篇 yingmin jia
  • 50 篇 baocai yin
  • 41 篇 sun yanfeng
  • 36 篇 huadong ma
  • 34 篇 kong dehui
  • 31 篇 fashan yu
  • 24 篇 jia yingmin
  • 24 篇 zhang yong
  • 22 篇 yunhui shi
  • 22 篇 liang meiyu
  • 21 篇 xue zhe
  • 20 篇 meiyu liang
  • 19 篇 yanfeng sun
  • 17 篇 liang liu
  • 17 篇 ma huadong
  • 17 篇 hu yongli
  • 16 篇 wang lichun

语言

  • 761 篇 英文
  • 32 篇 中文
  • 16 篇 其他
检索条件"机构=Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Computer"
809 条 记 录,以下是391-400 订阅
排序:
A linear method for determining intrinsic parameters from two parallel line-segments
收藏 引用
9th International Conference on intelligent Computing, ICIC 2013
作者: Tang, Jianliang Wang, Jie Chen, Wensheng College of Mathematics and Computational Science Shenzhen University Shenzhen 518060 China Key Laboratory of Multimedia and Intelligent Software College of Computer Science and Technology Beijing University of Technology Beijing 100022 China
In this paper, a linear method to determining intrinsic parameters from two parallel line-segments is proposed. Constrains based on the length ratio of line-segments are used to solve the camera calibration problem fr... 详细信息
来源: 评论
Weight calculation based image recognition
收藏 引用
Applied Mechanics and Materials 2013年 303-306卷 1577-1580页
作者: Yuan, Yifan Du, Junping Zhou, Jun Lu, Cheng Bai, Erwei Li, Yawen Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China School of Economics and Management Beijing University of Posts and Telecommunications Beijing 100876 China
The method to recognize facial expression in images quickly has been widely applied in many areas, but there is no way to take into account the accuracy and speed of recognition. This paper presents a method based on ... 详细信息
来源: 评论
Stochastic Bounded Real Lemma for Switched Stochastic Systems with Average Dwell Time
Stochastic Bounded Real Lemma for Switched Stochastic System...
收藏 引用
IEEE Annual Conference on Decision and Control
作者: Hongji Ma Yingmin Jia Junping Du Fumitoshi Matsuno Department of Systems and Control LIMB Beihang University (BUAA) Beijing 100191 China Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Mechanical Engineering and Science Graduate School of Engineering Kyoto University Kyoto 615-8540 Japan
This paper addresses the H_∞ performance and H_∞ control of switched stochastic linear systems subject to average dwell-time switching. At first, a sufficient condition is presented to guarantee the switched stochas... 详细信息
来源: 评论
Multifocus Image Fusion Using Local Perceived Sharpness
Multifocus Image Fusion Using Local Perceived Sharpness
收藏 引用
第25届中国控制与决策会议
作者: Liang Xu Junping Du JangMyung Lee Qian Hu Zhenhong Zhang Ming Fang Qian Wang Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Department of Electronics Engineering Pusan National University
Image fusion has become a valuable tool in many applications. In this paper, we propose a conceptually clear and intuitive algorithm for region-based image fusion. Our method considers the properties of multifocus ima... 详细信息
来源: 评论
Programmable virtual network as a service: Towards a future Internet testbed based on IaaS cloud
收藏 引用
Journal of China Universities of Posts and Telecommunications 2013年 第SUPPL. 1期20卷 126-130页
作者: Liang, Jun-Xue Lin, Zhao-Wen Ma, Yan Wang, Yu-Ning Zhang, Can Mi, Zheng Li, Jian Network and Information Center Institute of Network Technology Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China AirForce Command College Beijing 100097 China
During recently years, several OpenFlow-enabled testbeds have been deployed in world-wide research community. Typically, these OpenFlow-enabled testbeds need to stitch to other testbeds to link to virtual servers and ... 详细信息
来源: 评论
UAV Path Planning for Passive Multi-Target Following in Complex Environment
UAV Path Planning for Passive Multi-Target Following in Comp...
收藏 引用
第三十二届中国控制会议
作者: LIANG Yueqian WU Jingnan JIA Yingmin DU Junping The Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications
In this paper the problem of following multiple noncooperative and high agile surface targets using multiple fixed- wing unmanned aerial vehicles (UAVs) in complex environment is studied and a real-time rule-based tar... 详细信息
来源: 评论
Event-triggered Robust H∞ Control for Linear Systems with Disturbance
Event-triggered Robust H∞ Control for Linear Systems with D...
收藏 引用
第三十二届中国控制会议
作者: JIANG Hao ZHOU Haochong JIA Yingmin DU Junping The Seventh Research Division and the Department of Systems and Control Beihang University(BUAA) Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and TechnologyBeijing University of Posts and Telecommunications
Event-triggered control has received considerable attention for the benefits it brought,like reducing the resource utilization(e.g.,communication load and processor),and providing more system ***,it requires persist... 详细信息
来源: 评论
A quantifying method for trade-off between privacy and utility
A quantifying method for trade-off between privacy and utili...
收藏 引用
IET International Conference on Information and Communications Technologies, IETICT 2013
作者: Gu, Yonghao Wu, Weiming School of Computer Science Beijing University of Posts and Telecommunications China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications China
Many anonymization methods have been used in data publishing and data mining. In the meantime, they reduce the utility of the dataset. So it is important to consider the tradeoff between privacy and utility. Quantifyi... 详细信息
来源: 评论
Privacy disclosure identification in social networks
Privacy disclosure identification in social networks
收藏 引用
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013
作者: Zhang, Feng Wu, Bin Wang, Bai Gao, Feng Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications 100876 Beijing China Network Technology Research Department China Unicom 100048 Beijing China
In online social network, users are much more likely to be influenced by their neighbor nodes and/or connected nodes which have comment interesting. Consequently, the nodes in social network are more easily to accepte... 详细信息
来源: 评论
Super-resolution for surveillance facial images via shape prior and residue compensation
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of multimedia and Ubiquitous Engineering 2013年 第6期8卷 47-58页
作者: Lu, Tao Hu, Ruimin Jiang, Junjun Zhang, Yanduo He, Wei Hubei Province Key Laboratory of Intelligent Robot College of Computer Science and Engineering Wuhan Institute of Technology Wuhan 430073 China National Engineering Research Center on Multimedia Software Wuhan University Wuhan 430072 China Transportation Engineering Institute of Minjiang University Fuzhou 350001 China
Super-resolution (SR) methods are widely used to enhance the resolution of input images such as low-resolution (LR) remote or surveillance images. The key problem of SR algorithm is to introduce a proper prior for hig... 详细信息
来源: 评论