咨询与建议

限定检索结果

文献类型

  • 536 篇 会议
  • 272 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 809 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 600 篇 工学
    • 398 篇 计算机科学与技术...
    • 342 篇 软件工程
    • 121 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 66 篇 机械工程
    • 53 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 46 篇 电气工程
    • 28 篇 化学工程与技术
    • 25 篇 光学工程
    • 17 篇 仪器科学与技术
    • 15 篇 建筑学
    • 15 篇 安全科学与工程
    • 14 篇 动力工程及工程热...
    • 14 篇 生物医学工程(可授...
    • 13 篇 土木工程
    • 11 篇 交通运输工程
    • 6 篇 网络空间安全
  • 273 篇 理学
    • 165 篇 数学
    • 52 篇 生物学
    • 50 篇 物理学
    • 50 篇 系统科学
    • 48 篇 统计学(可授理学、...
    • 29 篇 化学
  • 184 篇 管理学
    • 97 篇 图书情报与档案管...
    • 90 篇 管理科学与工程(可...
    • 26 篇 工商管理
  • 16 篇 法学
    • 15 篇 社会学
  • 9 篇 教育学
    • 9 篇 教育学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 文学
  • 3 篇 经济学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 34 篇 wireless sensor ...
  • 31 篇 computer science
  • 31 篇 laboratories
  • 28 篇 face recognition
  • 26 篇 semantics
  • 23 篇 data mining
  • 22 篇 educational inst...
  • 20 篇 feature extracti...
  • 18 篇 computational mo...
  • 16 篇 image reconstruc...
  • 14 篇 telecommunicatio...
  • 14 篇 training
  • 13 篇 image coding
  • 13 篇 clustering algor...
  • 13 篇 robustness
  • 12 篇 control systems
  • 12 篇 cloud computing
  • 12 篇 intelligent sens...
  • 11 篇 target tracking
  • 11 篇 electronic mail

机构

  • 95 篇 beijing key labo...
  • 77 篇 beijing key labo...
  • 62 篇 beijing key labo...
  • 49 篇 beijing key labo...
  • 44 篇 school of electr...
  • 31 篇 school of comput...
  • 23 篇 beijing key labo...
  • 22 篇 seventh research...
  • 19 篇 beijing key labo...
  • 17 篇 school of econom...
  • 16 篇 beijing key labo...
  • 15 篇 beijing key labo...
  • 14 篇 beijing municipa...
  • 12 篇 school of comput...
  • 12 篇 beijing key labo...
  • 11 篇 beijing key labo...
  • 11 篇 seventh research...
  • 10 篇 beijing universi...
  • 9 篇 beijing municipa...
  • 9 篇 school of electr...

作者

  • 118 篇 junping du
  • 85 篇 yin baocai
  • 71 篇 du junping
  • 57 篇 yingmin jia
  • 50 篇 baocai yin
  • 41 篇 sun yanfeng
  • 36 篇 huadong ma
  • 34 篇 kong dehui
  • 31 篇 fashan yu
  • 24 篇 jia yingmin
  • 24 篇 zhang yong
  • 22 篇 yunhui shi
  • 22 篇 liang meiyu
  • 21 篇 xue zhe
  • 20 篇 meiyu liang
  • 19 篇 yanfeng sun
  • 17 篇 liang liu
  • 17 篇 ma huadong
  • 17 篇 hu yongli
  • 16 篇 wang lichun

语言

  • 761 篇 英文
  • 32 篇 中文
  • 16 篇 其他
检索条件"机构=Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Computer"
809 条 记 录,以下是541-550 订阅
排序:
Method for identify service providers of user privacy information disclosure
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第9 A期32卷 238-245页
作者: Gao, Feng He, Jing-Sha Zhang, Feng College of Computer Science and Technology Beijing University of Technology Beijing 100124 China School of Software Engineering Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China
By research on the privacy disclosure issue in cloud computing, a method for identify privacy disclosure service providers was proposed. Firstly, an optional signature process and a resistant attack method were introd... 详细信息
来源: 评论
Unconventional emergency modeling based on scenario and ontology
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and technology) 2011年 第SUPPL. 1期42卷 835-840页
作者: Wang, Su Du, Jun-Ping Gao, Tian Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
With the characteristics of sudden outbreak and inadequate precursors of unconventional emergency, the traditional emergency disposal systems based on data model can hardly reponse to the undefined and unexpected situ... 详细信息
来源: 评论
Semantic image classification of a Relief-F feature weighting based SVM method for performance
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and technology) 2011年 第SUPPL. 1期42卷 750-754页
作者: Liu, Jie Du, Jun-Ping Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
A Relief-F feature weighting based support vector machine (SVM) method for semantic image classification was proposed. Firstly, the feature weight of images in training data set was computed by the Relief-F algorithm;... 详细信息
来源: 评论
STUDY ON FOOD SAFETY ONTOLOGY REASONING APPLICATION BASED ON JENA
STUDY ON FOOD SAFETY ONTOLOGY REASONING APPLICATION BASED ON...
收藏 引用
2011 International Conference on Communications technology and Applications(2011年通信技术与应用国际会议 ICCTA 2011)
作者: Yuehua Yang Juan Hu Junping Du Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer S Department of Information and Technology Beijing College of Politics and Law Beijing 100024 China
This study constructs a food safety ontology which adopts OWL (Web Ontology Language) to represent food safety knowledge in a structural way in order to help knowledge requesters clearly understand food safety knowled... 详细信息
来源: 评论
Robust L_(2) - L_(infinity) Consensus Control of the Second-order Multi-agent Systems with Time-delay
Robust L_(2) - L_(infinity) Consensus Control of the Second-...
收藏 引用
IEEE Conference on Decision and Control
作者: Yan Cui Yingmin Jia Junping Du Fashan Yu Seventh Research Division and the Department of Systems and Control Beihang University Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
Robust L_(2) - L_(infinity) consensus control is studied for the second-order multi-agent systems with external disturbances and parameter uncertainties. By defining an appropriate controlled output, the consensus pro... 详细信息
来源: 评论
Collision Avoidance Maneuver Design Based on Equidistance Interpolation
Collision Avoidance Maneuver Design Based on Equidistance In...
收藏 引用
IEEE Conference on Decision and Control
作者: Yongqiang Qi Yingmin Jia Junping Du Fashan Yu Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper deals with the active collision avoidance maneuver for the chaser along the specified trajectory, and presents a maneuver approach with constant thrust. Using the 3D stereo vision measurement, The relative ... 详细信息
来源: 评论
Two alternative approaches to stochastic discrete-time iterative learning control systems
Two alternative approaches to stochastic discrete-time itera...
收藏 引用
IEEE Conference on Decision and Control
作者: Deyuan Meng Yingmin Jia Junping Du Fashan Yu Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper aims to address the robust convergence problem that arises from discrete-time iterative learning control (ILC) systems subject to random disturbances. Two alternative approaches are considered in order to a... 详细信息
来源: 评论
Column Formation Control of Multi-robot Systems with Input Constraints
Column Formation Control of Multi-robot Systems with Input C...
收藏 引用
IEEE Conference on Decision and Control
作者: Xiaohan Chen Yingmin Jia Junping Du Fashan Yu Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper is concerned with the column formation control of multi-robot systems that are subject to input constraints. A new leader-follower setup is proposed, under which the Lyapunov method can provide a simple con... 详细信息
来源: 评论
Gaussian mixture PHD filter for multiple maneuvering extended targets tracking
Gaussian mixture PHD filter for multiple maneuvering extende...
收藏 引用
IEEE Conference on Decision and Control
作者: Wenling Li Yingmin Jia Junping Du Fashan Yu Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper addresses the problem of tracking multiple maneuvering extended targets in the framework of random finite set theory. An elliptical model is adopted for exploiting sensor measurements of target extent, and ... 详细信息
来源: 评论
Fault analysis study of the block cipher FOX64
收藏 引用
multimedia Tools and Applications 2011年 第3期63卷 691-708页
作者: Li, Ruilin You, Jianxiong Sun, Bing Li, Chao Department of Mathematics and System Science Science College National University of Defense Technology Changsha China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China College of Computer National University of Defense Technology Changsha China
FOX is a family of symmetric block ciphers from MediaCrypt AG that helps to secure digital media, communications, and storage. The high-level structure of FOX is the so-called (extended) Lai–Massey scheme. This paper...
来源: 评论