咨询与建议

限定检索结果

文献类型

  • 1,468 篇 会议
  • 1,048 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 2,519 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,556 篇 工学
    • 1,110 篇 计算机科学与技术...
    • 936 篇 软件工程
    • 343 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 164 篇 电气工程
    • 143 篇 电子科学与技术(可...
    • 143 篇 生物工程
    • 124 篇 机械工程
    • 105 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 80 篇 化学工程与技术
    • 54 篇 仪器科学与技术
    • 54 篇 动力工程及工程热...
    • 44 篇 材料科学与工程(可...
    • 38 篇 建筑学
    • 36 篇 土木工程
    • 35 篇 网络空间安全
    • 30 篇 交通运输工程
  • 955 篇 理学
    • 610 篇 数学
    • 248 篇 物理学
    • 176 篇 生物学
    • 161 篇 统计学(可授理学、...
    • 87 篇 化学
    • 73 篇 系统科学
  • 433 篇 管理学
    • 236 篇 图书情报与档案管...
    • 211 篇 管理科学与工程(可...
    • 73 篇 工商管理
  • 72 篇 医学
    • 58 篇 临床医学
    • 46 篇 基础医学(可授医学...
  • 49 篇 法学
    • 37 篇 社会学
  • 37 篇 农学
  • 23 篇 经济学
  • 20 篇 教育学
  • 9 篇 哲学
  • 6 篇 艺术学
  • 4 篇 文学
  • 4 篇 军事学

主题

  • 113 篇 feature extracti...
  • 96 篇 semantics
  • 74 篇 information proc...
  • 64 篇 laboratories
  • 63 篇 training
  • 56 篇 computers
  • 45 篇 computational mo...
  • 43 篇 face recognition
  • 43 篇 visualization
  • 42 篇 image segmentati...
  • 41 篇 data mining
  • 41 篇 machine learning
  • 39 篇 optimization
  • 38 篇 accuracy
  • 37 篇 humans
  • 34 篇 deep learning
  • 34 篇 robustness
  • 31 篇 support vector m...
  • 30 篇 predictive model...
  • 30 篇 decoding

机构

  • 432 篇 key laboratory o...
  • 214 篇 university of ch...
  • 83 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 65 篇 peng cheng labor...
  • 64 篇 college of compu...
  • 52 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 47 篇 the key laborato...
  • 46 篇 key laboratory o...
  • 46 篇 hunan provincial...
  • 44 篇 school of comput...
  • 44 篇 graduate univers...
  • 42 篇 college of infor...
  • 40 篇 fujian provincia...
  • 40 篇 chinese academy ...
  • 35 篇 key laboratory o...
  • 34 篇 fujian key labor...
  • 33 篇 national enginee...
  • 32 篇 school of comput...

作者

  • 98 篇 zhongzhi shi
  • 93 篇 shi zhongzhi
  • 73 篇 xilin chen
  • 72 篇 shiguang shan
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 47 篇 li yingsong
  • 44 篇 xu qianqian
  • 40 篇 feng yang
  • 39 篇 huang zhixiang
  • 35 篇 yingsong li
  • 35 篇 he qing
  • 34 篇 wen gao
  • 31 篇 qing he
  • 29 篇 guo wenzhong
  • 28 篇 yang zhiyong
  • 28 篇 zhuang fuzhen
  • 27 篇 jiang kai
  • 27 篇 li hua
  • 27 篇 zhixiang huang

语言

  • 2,232 篇 英文
  • 246 篇 其他
  • 58 篇 中文
检索条件"机构=Cognitive Computing and Intelligent Information Processing Laboratory"
2519 条 记 录,以下是1811-1820 订阅
排序:
A forensics tool of Foxmail client
A forensics tool of Foxmail client
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Lili Xie Guolong Chen College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
Computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based ... 详细信息
来源: 评论
Comparing estimated gaze depth in virtual and physical environments  14
Comparing estimated gaze depth in virtual and physical envir...
收藏 引用
8th Symposium on Eye Tracking Research and Applications, ETRA 2014
作者: Duchowski, Andrew T. House, Donald H. Gestring, Jordan Congdon, Robert Świrski, Lech Dodgson, Neil A. Krejtz, Krzysztof Krejtz, Izabela School of Computing Germany Sonoco Institute of Packaging Design and Graphics Clemson University United States Computer Laboratory University of Cambridge United Kingdom Department of Psychology United Kingdom Interdisciplinary Center for Applied Cognitive Studies University of Social Sciences and Humanities Poland Information Processing Institute United Kingdom
We show that the error in 3D gaze depth (vergence) estimated from binocularly-tracked gaze disparity is related to the viewing distance of the screen calibration plane at which 2D gaze is recorded. In a stereoscopic (... 详细信息
来源: 评论
A hybrid artificial fish-school optimization algorithm for solving the quadratic assignment problem
A hybrid artificial fish-school optimization algorithm for s...
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Ziqiang Li Yang Yi Qiwei Yang School of Information and Engineering Xiangtan University Xiangtan China Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University Xiangtan China
The quadratic assignment problem (QAP) is a classic combinatorial optimization problem, which is of the NP-hard nature. In this paper, a hybrid artificial fish school optimization algorithm (HAFSOA) is proposed. In HA... 详细信息
来源: 评论
Topic trend prediction based on wavelet transformation
Topic trend prediction based on wavelet transformation
收藏 引用
2014 11th Web information System and Application Conference(第十一届全国web信息系统及其应用学术会议)
作者: Mingyue Fang Yuzhong Chen Peng Gao Shuiyuan Zhao Songpan Zheng College of Mathematics and Computer Science Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou Fujian China
The research of topic trend prediction can be a good reference for maximizing the propagation effects of network advertisements as well as guiding and controlling the network *** paper proposes PTEP(the Prediction of ... 详细信息
来源: 评论
Parallelization of a DEM code based on CPU-GPU heterogeneous architecture
Parallelization of a DEM code based on CPU-GPU heterogeneous...
收藏 引用
26th International Conference on Parallel Computational Fluid Dynamics, ParCFD 2013
作者: Yue, Xiaoqiang Zhang, Hao Luo, Congshu Shu, Shi Feng, Chunsheng School of Mathematics and Computational Science Xiangtan University 411105 Hunan China Heat and Mass Transfer Technological Center Technical University of Catalonia 08222 Terrassa Spain Hunan Key Laboratory for Computation and Simulation in Science and Engineering Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University 411105 Hunan China
Particulate flows are commonly encountered in both engineering and environmental applications. The discrete element method (DEM) has attracted plentiful attentions since it can predict the whole motion of the particul... 详细信息
来源: 评论
A forensics method of web browsing behavior based on association rule mining
A forensics method of web browsing behavior based on associa...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yiyun Zhang Guolong Chen College of Mathematics and Computer Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente... 详细信息
来源: 评论
Data Replication Placement Strategy Based On Bidding Mode for Cloud Storage Cluster
Data Replication Placement Strategy Based On Bidding Mode fo...
收藏 引用
2014 11th Web information System and Application Conference(第十一届全国web信息系统及其应用学术会议)
作者: Hong Zhang Bing Lin Zhanghui Liu Wenzhong Guo College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou 350116 China
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a ... 详细信息
来源: 评论
cognitive Memory Systems In Consciousness And Memory Model
Cognitive Memory Systems In Consciousness And Memory Model
收藏 引用
International Joint Conference on Neural Networks
作者: Zhongzhi Shi Xiaofeng Wang Xi Yang Key Laboratory of Intelligent Information Processing Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China
Memory is a fundamental component in human brain and plays very important roles for all mental processes. The analysis of memory systems through cognitive architectures can be performed at the computational, or functi... 详细信息
来源: 评论
Queue-based privacy-preserving data aggregation scheme for wireless sensor networks
Queue-based privacy-preserving data aggregation scheme for w...
收藏 引用
2014 International Conference on Communication Technology and Application(CTA2014)
作者: X.Y.Zhu L.Wang Department of Computer Science Hengyang Normal University College of Information Engineering Xiangtan University Key Laboratory of Intelligent Computing & Information Processing(Xiangtan University) Ministry of Education
In this paper, we propose a novel queue-based privacy-preserving data aggregation scheme for additive aggregation function. In the scheme, sensor nodes are divided into clusters in a distributed way first, and then, i... 详细信息
来源: 评论
Robust point pattern matching based on spectral context
Robust point pattern matching based on spectral context
收藏 引用
作者: Tang, Jun Shao, Ling Zhen, Xiantong Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Huangshan Road Hefei 230039 China College of Electronic and Information Engineering Nanjing University of Information Science and Technology Nanjing 210044 China Department of Electronic and Electrical Engineering University of Sheffield Mappin Street Sheffield S1 3JD United Kingdom
Finding correspondences between two related feature point sets is a basic task in computer vision and pattern recognition. In this paper, we present a novel method for point pattern matching via spectral graph analysi... 详细信息
来源: 评论