咨询与建议

限定检索结果

文献类型

  • 536 篇 会议
  • 260 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 797 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 588 篇 工学
    • 392 篇 计算机科学与技术...
    • 333 篇 软件工程
    • 120 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 66 篇 机械工程
    • 52 篇 生物工程
    • 49 篇 电子科学与技术(可...
    • 41 篇 电气工程
    • 28 篇 化学工程与技术
    • 24 篇 光学工程
    • 17 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 14 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 生物医学工程(可授...
    • 12 篇 土木工程
    • 11 篇 交通运输工程
    • 6 篇 网络空间安全
  • 270 篇 理学
    • 161 篇 数学
    • 53 篇 生物学
    • 50 篇 物理学
    • 50 篇 系统科学
    • 47 篇 统计学(可授理学、...
    • 29 篇 化学
  • 180 篇 管理学
    • 96 篇 图书情报与档案管...
    • 87 篇 管理科学与工程(可...
    • 26 篇 工商管理
  • 16 篇 法学
    • 15 篇 社会学
  • 9 篇 教育学
    • 9 篇 教育学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 文学
  • 3 篇 经济学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 34 篇 wireless sensor ...
  • 31 篇 computer science
  • 31 篇 laboratories
  • 28 篇 face recognition
  • 26 篇 semantics
  • 22 篇 educational inst...
  • 22 篇 data mining
  • 19 篇 feature extracti...
  • 18 篇 computational mo...
  • 16 篇 image reconstruc...
  • 14 篇 telecommunicatio...
  • 13 篇 image coding
  • 13 篇 clustering algor...
  • 13 篇 robustness
  • 13 篇 training
  • 12 篇 control systems
  • 12 篇 cloud computing
  • 12 篇 intelligent sens...
  • 11 篇 target tracking
  • 11 篇 electronic mail

机构

  • 95 篇 beijing key labo...
  • 76 篇 beijing key labo...
  • 62 篇 beijing key labo...
  • 49 篇 beijing key labo...
  • 44 篇 school of electr...
  • 31 篇 school of comput...
  • 23 篇 beijing key labo...
  • 22 篇 seventh research...
  • 18 篇 beijing key labo...
  • 17 篇 school of econom...
  • 16 篇 beijing key labo...
  • 15 篇 beijing key labo...
  • 13 篇 beijing municipa...
  • 12 篇 school of comput...
  • 12 篇 beijing key labo...
  • 11 篇 beijing key labo...
  • 11 篇 seventh research...
  • 10 篇 beijing universi...
  • 9 篇 school of electr...
  • 8 篇 college of compu...

作者

  • 118 篇 junping du
  • 85 篇 yin baocai
  • 71 篇 du junping
  • 56 篇 yingmin jia
  • 50 篇 baocai yin
  • 41 篇 sun yanfeng
  • 34 篇 huadong ma
  • 34 篇 kong dehui
  • 31 篇 fashan yu
  • 24 篇 jia yingmin
  • 24 篇 zhang yong
  • 22 篇 yunhui shi
  • 21 篇 liang meiyu
  • 20 篇 xue zhe
  • 20 篇 meiyu liang
  • 19 篇 yanfeng sun
  • 17 篇 liang liu
  • 17 篇 ma huadong
  • 17 篇 hu yongli
  • 16 篇 wang lichun

语言

  • 740 篇 英文
  • 30 篇 其他
  • 28 篇 中文
检索条件"机构=Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Computer"
797 条 记 录,以下是531-540 订阅
排序:
TelosCAM: Identifying Burglar through Networked Sensor-Camera Mates with Privacy Protection
TelosCAM: Identifying Burglar through Networked Sensor-Camer...
收藏 引用
Real-Time Systems Symposium (RTSS)
作者: Shaojie Tang Xiang-Yang Li Haitao Zhang Jiankang Han Guojun Dai Cheng Wang Xingfa Shen Department of Computer Science Illinois Institute of Technology Chicago IL USA TNLIST School of Software Tsinghua University China Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications China Institute of Computer Application Technology Hangzhou Dianzi University Hangzhou China Department of Computer Science Tongji University Shanghai China
We present TelosCAM, a networking system that integrates wireless module nodes (such as TelosB nodes) with legacy surveillance cameras to provide storage-efficient and privacy-aware services of accurate, real time tra... 详细信息
来源: 评论
Relationship classification in large scale online social networks and its impact on information propagation
Relationship classification in large scale online social net...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Shaojie Tang Jing Yuan Xufei Mao Xiang-Yang Li Wei Chen Guojun Dai Department of Computer Science Illinois Institute of Technology USA Department of Computer Science NanJing University China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications China Microsoft Research Asia China Institute of Computer Application Technology Hangzhou Dianzi University China
In this paper, we study two tightly coupled topics in online social networks (OSN): relationship classification and information propagation. The links in a social network often reflect social relationships among users... 详细信息
来源: 评论
Strong Barrier Coverage Using Directional Sensors with Arbitrarily Tunable Orientations
Strong Barrier Coverage Using Directional Sensors with Arbit...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Dan Tao Xu-Fei Mao Shao-Jie Tang Hai-Tao Zhang Hua-Dong Ma Hai-Jiang Xie School of Electronic and Information Engineering Beijing Jiaotong University Beijing China Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University슠of Posts and슠Telecommunications Beijing China Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Computer Science and Technology XiAn JiaoTong University XiAn China
Barrier coverage is an important problem for sensor networks to fulfill some given sensing tasks. Barrier coverage guarantees the detection of events happened crossing a barrier of sensors. In majority study of barrie... 详细信息
来源: 评论
Active Collision Avoidance Maneuver Design Under Constant Thrust ⋆
收藏 引用
IFAC Proceedings Volumes 2011年 第1期44卷 9887-9892页
作者: Yongqiang Qi Yingmin Jia Junping Du Fashan Yu The Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Key Laboratory of Mathematics Informatics and Behavioral Semantics (LMIB) Ministry of Education SMSS Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
Abstract In this paper, the relative position parameters of the target spacecraft are obtained by using the vision measurement and the target maneuver positions are calculated through the isochronous interpolation met... 详细信息
来源: 评论
Risk-Sensitive Cubature Filtering for Jump Markov Nonlinear Systems and Its Application to Land Vehicle Positioning ⋆
收藏 引用
IFAC Proceedings Volumes 2011年 第1期44卷 20-25页
作者: Wenling Li Yingmin Jia Junping Du Fashan Yu The Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Key Laboratory of Mathematics Informatics and Behavioral Semantics (LMIB) Ministry of Education SMSS Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
Abstract In this paper, a risk-sensitive filter for a class of jump Markov nonlinear systems is proposed. By using a set of weighted cubature points to approximate the intractable risk-sensitive recursions, the propos... 详细信息
来源: 评论
Method for identify service providers of user privacy information disclosure
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第9 A期32卷 238-245页
作者: Gao, Feng He, Jing-Sha Zhang, Feng College of Computer Science and Technology Beijing University of Technology Beijing 100124 China School of Software Engineering Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China
By research on the privacy disclosure issue in cloud computing, a method for identify privacy disclosure service providers was proposed. Firstly, an optional signature process and a resistant attack method were introd... 详细信息
来源: 评论
Trust based privacy protection method in LBS
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第11 A期32卷 63-70页
作者: Gao, Feng He, Jing-Sha Zhang, Feng Zhang, Yu-Qiang College of Computer Science and Technology Beijing University of Technology Beijing 100124 China School of Software Engineering Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China
For the multiple privacy protection demands in Locations Based Services (LBS), a user-centric trust based privacy protection model was proposed. In the model, user can set their privacy preference freely. The model us... 详细信息
来源: 评论
Semantic image classification of a Relief-F feature weighting based SVM method for performance
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and technology) 2011年 第SUPPL. 1期42卷 750-754页
作者: Liu, Jie Du, Jun-Ping Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
A Relief-F feature weighting based support vector machine (SVM) method for semantic image classification was proposed. Firstly, the feature weight of images in training data set was computed by the Relief-F algorithm;... 详细信息
来源: 评论
Unconventional emergency modeling based on scenario and ontology
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and technology) 2011年 第SUPPL. 1期42卷 835-840页
作者: Wang, Su Du, Jun-Ping Gao, Tian Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
With the characteristics of sudden outbreak and inadequate precursors of unconventional emergency, the traditional emergency disposal systems based on data model can hardly reponse to the undefined and unexpected situ... 详细信息
来源: 评论
STUDY ON FOOD SAFETY ONTOLOGY REASONING APPLICATION BASED ON JENA
STUDY ON FOOD SAFETY ONTOLOGY REASONING APPLICATION BASED ON...
收藏 引用
2011 International Conference on Communications technology and Applications(2011年通信技术与应用国际会议 ICCTA 2011)
作者: Yuehua Yang Juan Hu Junping Du Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer S Department of Information and Technology Beijing College of Politics and Law Beijing 100024 China
This study constructs a food safety ontology which adopts OWL (Web Ontology Language) to represent food safety knowledge in a structural way in order to help knowledge requesters clearly understand food safety knowled... 详细信息
来源: 评论