咨询与建议

限定检索结果

文献类型

  • 1,471 篇 会议
  • 1,071 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,594 篇 工学
    • 1,145 篇 计算机科学与技术...
    • 949 篇 软件工程
    • 350 篇 信息与通信工程
    • 206 篇 控制科学与工程
    • 172 篇 电气工程
    • 147 篇 电子科学与技术(可...
    • 147 篇 生物工程
    • 128 篇 机械工程
    • 106 篇 光学工程
    • 90 篇 生物医学工程(可授...
    • 80 篇 化学工程与技术
    • 58 篇 仪器科学与技术
    • 55 篇 动力工程及工程热...
    • 42 篇 材料科学与工程(可...
    • 40 篇 建筑学
    • 37 篇 土木工程
    • 36 篇 网络空间安全
    • 30 篇 交通运输工程
  • 963 篇 理学
    • 611 篇 数学
    • 254 篇 物理学
    • 175 篇 生物学
    • 162 篇 统计学(可授理学、...
    • 89 篇 化学
    • 73 篇 系统科学
  • 439 篇 管理学
    • 240 篇 图书情报与档案管...
    • 213 篇 管理科学与工程(可...
    • 74 篇 工商管理
  • 75 篇 医学
    • 61 篇 临床医学
    • 45 篇 基础医学(可授医学...
  • 48 篇 法学
    • 36 篇 社会学
  • 37 篇 农学
  • 23 篇 经济学
  • 17 篇 教育学
  • 9 篇 哲学
  • 8 篇 艺术学
  • 4 篇 文学
  • 4 篇 军事学

主题

  • 112 篇 feature extracti...
  • 95 篇 semantics
  • 74 篇 information proc...
  • 64 篇 laboratories
  • 63 篇 training
  • 56 篇 computers
  • 44 篇 computational mo...
  • 43 篇 image segmentati...
  • 43 篇 face recognition
  • 43 篇 visualization
  • 41 篇 data mining
  • 40 篇 machine learning
  • 38 篇 optimization
  • 38 篇 accuracy
  • 37 篇 humans
  • 35 篇 deep learning
  • 33 篇 robustness
  • 31 篇 support vector m...
  • 30 篇 predictive model...
  • 29 篇 object detection

机构

  • 439 篇 key laboratory o...
  • 216 篇 university of ch...
  • 83 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 65 篇 peng cheng labor...
  • 65 篇 college of compu...
  • 52 篇 college of mathe...
  • 49 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 45 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 44 篇 school of comput...
  • 44 篇 graduate univers...
  • 42 篇 college of infor...
  • 41 篇 chinese academy ...
  • 39 篇 fujian provincia...
  • 35 篇 fujian key labor...
  • 35 篇 key laboratory o...
  • 33 篇 national enginee...
  • 32 篇 school of comput...

作者

  • 99 篇 zhongzhi shi
  • 97 篇 shi zhongzhi
  • 73 篇 xilin chen
  • 72 篇 shiguang shan
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 47 篇 li yingsong
  • 44 篇 xu qianqian
  • 42 篇 huang zhixiang
  • 41 篇 feng yang
  • 38 篇 he qing
  • 34 篇 yingsong li
  • 34 篇 wen gao
  • 31 篇 qing he
  • 29 篇 li hua
  • 29 篇 guo wenzhong
  • 28 篇 jiang kai
  • 28 篇 yang zhiyong
  • 28 篇 zhuang fuzhen
  • 26 篇 liu yang

语言

  • 2,332 篇 英文
  • 160 篇 其他
  • 63 篇 中文
检索条件"机构=Cognitive Computing and Intelligent Information Processing Laboratory"
2545 条 记 录,以下是2241-2250 订阅
排序:
Risk analysis of system security based on evidence theory
Risk analysis of system security based on evidence theory
收藏 引用
International Conference on Computer Design and Applications (ICCDA)
作者: Peida Xu Yong Deng Jianling Xu Xiaoyan Su Key Laboratory of Digital Agricultural Early-warning Technology Ministry of Agriculture of China Beijing China Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University China School of Electronics & Information Technology Shanghai Jiaotong University China School of Electronics & Information Technology Shanghai Jiaotong University Shanghai China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Shanghai Zhejiang China Grain Economics Institute Nanjing University of Finance and Economics Nanjing China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
Algorithm and axiomatization of rough fuzzy sets based finite dimensional fuzzy vectors
收藏 引用
中国高等学校学术文摘·计算机科学 2009年 第4期3卷 560-568页
作者: Mingfen WU School of Information Science Wuyi UniversityJiangmen 529020China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190Ch
Rough sets,proposed by Pawlak and rough fuzzy sets proposed by Dubois and Prade were expressed with the different computing formulas that were more complex and not conducive to computer operations,In this paper,we use... 详细信息
来源: 评论
Risk analysis of physical protection system based on evidence theory
收藏 引用
Journal of information and Computational Science 2010年 第13期7卷 2871-2878页
作者: Xu, Peida Su, Xiaoyan Wu, Jiyi Sun, Xiaohong Zhang, Yajuan Deng, Yong College of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 200240 China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
intelligent science  1
收藏 引用
12th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular computing, RSFDGrC 2009
作者: Shi, Zhongzhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Science Kexueyuan Nanlu #6 Beijing 100190 China
Intelligence Science is an interdisciplinary subject which dedicates to joint research on basic theory and technology of intelligence by brain science, cognitive science, artificial intelligence and others. Brain scie... 详细信息
来源: 评论
Lattice-based system combination for statistical machine translation
Lattice-based system combination for statistical machine tra...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Feng, Yang Liu, Yang Mi, Haitao Liu, Qun Lü, Yajuan Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing 100190 China
Current system combination methods usually use confusion networks to find consensus translations among different systems. Requiring one-to-one mappings between the words in candidate translations, confusion networks h... 详细信息
来源: 评论
Weighted alignment matrices for statistical machine translation
Weighted alignment matrices for statistical machine translat...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Liu, Yang Xia, Tian Xiao, Xinyan Liu, Qun Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing 100190 China
Current statistical machine translation systems usually extract rules from bilingual corpora annotated with 1-best alignments. They are prone to learn noisy rules due to alignment mistakes. We propose a new structure ... 详细信息
来源: 评论
Improving Tree-to-Tree Translation with Packed Forests
Improving Tree-to-Tree Translation with Packed Forests
收藏 引用
Joint Conference of the 47th Annual Meeting of the Association for Computational Linguistics and 4th International Joint Conference on Natural Language processing of the AFNLP, ACL-IJCNLP 2009
作者: Liu, Yang Lü, Yajuan Liu, Qun Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing100190 China
Current tree-to-tree models suffer from parsing errors as they usually use only 1-best parses for rule extraction and decoding. We instead propose a forest-based tree-to-tree model that uses packed forests. The model ... 详细信息
来源: 评论
Joint Decoding with Multiple Translation Models
Joint Decoding with Multiple Translation Models
收藏 引用
Joint Conference of the 47th Annual Meeting of the Association for Computational Linguistics and 4th International Joint Conference on Natural Language processing of the AFNLP, ACL-IJCNLP 2009
作者: Liu, Yang Mi, Haitao Feng, Yang Liu, Qun Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing100190 China
Current SMT systems usually decode with single translation models and cannot benefit from the strengths of other models in decoding phase. We instead propose joint decoding, a method that combines multiple translation... 详细信息
来源: 评论
THE EFFECT OF SCALE TRANSFORMATION FOR HYPER SURFACE CLASSIFICATION METHOD
THE EFFECT OF SCALE TRANSFORMATION FOR HYPER SURFACE CLASSIF...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: QING HE ZHONG-ZHI SHI XU-DONG MA FU-ZHEN ZHUANG The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese
Hyper Surface Classification (HSC), which is based on Jordan Curve Theorem in Topology, has been proven to be a simple and effective method for classifying a large database in our previous work. In this paper, through... 详细信息
来源: 评论
Unusual Pattern Detection Based on Hyper Surface and Minimum Spanning Tree
Unusual Pattern Detection Based on Hyper Surface and Minimum...
收藏 引用
2009 IEEE International Conference on information and Automation(2009年 IEEE信息与自动化国际学术会议)
作者: Qing He Weizhong Zhao Jincheng Li Zhongzhi Shi The Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese A The Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese A
More analysis has been done to discover the meaningful unusual patterns which may mean fraud or anomaly. In this paper, a novel unsupervised approach for discovering meaningful unusual observations is proposed. We fir... 详细信息
来源: 评论