咨询与建议

限定检索结果

文献类型

  • 536 篇 会议
  • 272 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 809 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 600 篇 工学
    • 398 篇 计算机科学与技术...
    • 342 篇 软件工程
    • 121 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 66 篇 机械工程
    • 53 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 46 篇 电气工程
    • 28 篇 化学工程与技术
    • 25 篇 光学工程
    • 17 篇 仪器科学与技术
    • 15 篇 建筑学
    • 15 篇 安全科学与工程
    • 14 篇 动力工程及工程热...
    • 14 篇 生物医学工程(可授...
    • 13 篇 土木工程
    • 11 篇 交通运输工程
    • 6 篇 网络空间安全
  • 273 篇 理学
    • 165 篇 数学
    • 52 篇 生物学
    • 50 篇 物理学
    • 50 篇 系统科学
    • 48 篇 统计学(可授理学、...
    • 29 篇 化学
  • 184 篇 管理学
    • 97 篇 图书情报与档案管...
    • 90 篇 管理科学与工程(可...
    • 26 篇 工商管理
  • 16 篇 法学
    • 15 篇 社会学
  • 9 篇 教育学
    • 9 篇 教育学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 文学
  • 3 篇 经济学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 34 篇 wireless sensor ...
  • 31 篇 computer science
  • 31 篇 laboratories
  • 28 篇 face recognition
  • 26 篇 semantics
  • 23 篇 data mining
  • 22 篇 educational inst...
  • 20 篇 feature extracti...
  • 18 篇 computational mo...
  • 16 篇 image reconstruc...
  • 14 篇 telecommunicatio...
  • 14 篇 training
  • 13 篇 image coding
  • 13 篇 clustering algor...
  • 13 篇 robustness
  • 12 篇 control systems
  • 12 篇 cloud computing
  • 12 篇 intelligent sens...
  • 11 篇 target tracking
  • 11 篇 electronic mail

机构

  • 95 篇 beijing key labo...
  • 77 篇 beijing key labo...
  • 62 篇 beijing key labo...
  • 49 篇 beijing key labo...
  • 44 篇 school of electr...
  • 31 篇 school of comput...
  • 23 篇 beijing key labo...
  • 22 篇 seventh research...
  • 19 篇 beijing key labo...
  • 17 篇 school of econom...
  • 16 篇 beijing key labo...
  • 15 篇 beijing key labo...
  • 14 篇 beijing municipa...
  • 12 篇 school of comput...
  • 12 篇 beijing key labo...
  • 11 篇 beijing key labo...
  • 11 篇 seventh research...
  • 10 篇 beijing universi...
  • 9 篇 beijing municipa...
  • 9 篇 school of electr...

作者

  • 118 篇 junping du
  • 85 篇 yin baocai
  • 71 篇 du junping
  • 57 篇 yingmin jia
  • 50 篇 baocai yin
  • 41 篇 sun yanfeng
  • 36 篇 huadong ma
  • 34 篇 kong dehui
  • 31 篇 fashan yu
  • 24 篇 jia yingmin
  • 24 篇 zhang yong
  • 22 篇 yunhui shi
  • 22 篇 liang meiyu
  • 21 篇 xue zhe
  • 20 篇 meiyu liang
  • 19 篇 yanfeng sun
  • 17 篇 liang liu
  • 17 篇 ma huadong
  • 17 篇 hu yongli
  • 16 篇 wang lichun

语言

  • 761 篇 英文
  • 32 篇 中文
  • 16 篇 其他
检索条件"机构=Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Computer"
809 条 记 录,以下是471-480 订阅
排序:
Optimal density estimation for exposure-path prevention in wireless sensor networks using percolation theory
Optimal density estimation for exposure-path prevention in w...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Liang Liu Xi Zhang Huadong Ma Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University-áof Posts and-áTelecommunications Beijing China Networking and Information System Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
Most existing works on sensor coverage mainly concentrate on the full coverage models which ensure that all points in the deployment region are covered at the expense of high complexity and cost. In contrast, the expo... 详细信息
来源: 评论
Web service composition algorithm based on hybrid-QoS and pair-wise comparison matrix
收藏 引用
Journal of Information and Computational Science 2012年 第1期9卷 135-142页
作者: Zhang, Longchang Zhang, Tongguang Zhang, Chengwen School of Marketing Management Liaoning Technical University Huludao 125105 China College of Computer and Information Engineering Xinxiang University Xinxiang 453003 China Beijing Key Laboratory of Intelligent Telecommunications Software Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China
Open and dynamic Internet environment increased the uncertainty of composition service selection and user's weight expressed by pair-wise comparison matrix is closer to user's habits. To solve the above diffic... 详细信息
来源: 评论
Tracking and identifying burglar using collaborative sensor-camera networks
Tracking and identifying burglar using collaborative sensor-...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Haitao Zhang Shaojie Tang Xiang-Yang Li Huadong Ma Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University슠of Posts and슠Telecommunications Beijing China Department of Computer Science Illinois Institute of Technology Chicago USA Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China
This work presents BurTrap, a networking system which integrates wireless modules (such as TelosB nodes) with networked surveillance cameras to automatically, accurately, timely track and identify burglar who stole th... 详细信息
来源: 评论
A binary-classification-tree based framework for distributed target classification in multimedia sensor networks
A binary-classification-tree based framework for distributed...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Liang Liu Anlong Ming Huadong Ma Xi Zhang Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University슠of Posts and슠Telecommunications Beijing China Networking and Information System Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
With rapid improvements and miniaturization in hardware, sensor nodes equipped with acoustic and visual information collection modules promise an unprecedented opportunity for target surveillance applications. This pa... 详细信息
来源: 评论
Physarum optimization: A biology-inspired algorithm for minimal exposure path problem in wireless sensor networks
Physarum optimization: A biology-inspired algorithm for mini...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Liang Liu Yuning Song Huadong Ma Xi Zhang Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University슠of Posts and슠Telecommunications Beijing China Networking and Information System Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
Using insights from biological processes could help to design new optimization techniques for long-standing computational problems. This paper exploits a cellular computing model in the slime mold physarum polycephalu... 详细信息
来源: 评论
Irregular community discovery for cloud service improvement
Irregular community discovery for cloud service improvement
收藏 引用
作者: Liu, Jin Zhou, Jing Wang, Junfeng Zhang, Feng Liu, Fei State Key Lab. of Software Engineering Wuhan University Wuhan 430072 China Lab. of Complex Systems and Intelligence Science Institute of Automation CAS Beijing 100190 China State Key Lab. for Novel Software Technology Nanjing University Nanjing China School of Computer Science Communication University of China Beijing 100024 China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Beijing 100190 China College of Computer Science Sichuan University Chengdu 610064 China Software School Sun Yat-sen University Guangzhou 510006 China
Utility services provided by cloud computing rely on virtual customer communities forming spontaneously and evolving continuously. Clarifying the explicit boundaries of these communities is thus essential to the quali... 详细信息
来源: 评论
Parallel implementation of apriori algorithm based on MapReduce
Parallel implementation of apriori algorithm based on MapRed...
收藏 引用
13th ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2012
作者: Li, Ning Zeng, Li He, Qing Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Graduate University Chinese Academy of Sciences Beijing 100139 China Key Lab. of Machine Learning and Computational Intelligence College of Mathematics and Computer Science Hebei University Baoding 071002 Hebei China
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorith... 详细信息
来源: 评论
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model
收藏 引用
IEEE Transactions on computers 2012年 第5期61卷 713-725页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Yuan He Xufei Mao Yunhao Liu Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering Building of Electronics and Information Engineering University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology (TNLIST) Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Tsinghua National Laboratory for Information Science and Technology (TNLIST) School of Software Tsinghua University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm... 详细信息
来源: 评论
STUDY AND IMPLEMENTATION OF PERSONALIZED SEARCHING SYSTEM BASED ON USER'S INTEREST MODEL
STUDY AND IMPLEMENTATION OF PERSONALIZED SEARCHING SYSTEM BA...
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Xue Li Junping Du Lingling Zi Katsunori Shimohara Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer ScienceBeijing University of Posts and Telecommunications School of Electronic and Information Engineering Liaoning Technical University Department of Information Systems Design Doshisha University
The common personalized searching technology can neither make full use of features of domain knowledge,nor understand the user's special needs in this *** at solving this issue,this paper studies personalized sear... 详细信息
来源: 评论
The hot topics evaluation and key issues in online news about emergency events
The hot topics evaluation and key issues in online news abou...
收藏 引用
World Congress on intelligent Control and Automation (WCICA)
作者: Liping Chen Junping Du Katsunori Shimohara Maoqiang Song Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing China Department of Information Systems Design Doshisha University Kyotanabe Kyoto Japan Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
This paper concentrates on the evaluation system of hot topics in the online news about the emergency events. First, the overall technology framework of the system was established and description was formulated on the... 详细信息
来源: 评论