咨询与建议

限定检索结果

文献类型

  • 6,218 篇 期刊文献
  • 4,778 篇 会议
  • 5 册 图书

馆藏范围

  • 11,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,484 篇 工学
    • 4,545 篇 计算机科学与技术...
    • 3,801 篇 软件工程
    • 1,604 篇 信息与通信工程
    • 928 篇 电气工程
    • 855 篇 控制科学与工程
    • 773 篇 生物工程
    • 772 篇 化学工程与技术
    • 744 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 531 篇 生物医学工程(可授...
    • 519 篇 机械工程
    • 368 篇 材料科学与工程(可...
    • 357 篇 仪器科学与技术
    • 315 篇 动力工程及工程热...
    • 294 篇 交通运输工程
    • 232 篇 建筑学
    • 227 篇 土木工程
  • 4,379 篇 理学
    • 2,086 篇 数学
    • 1,294 篇 物理学
    • 964 篇 生物学
    • 682 篇 统计学(可授理学、...
    • 627 篇 化学
    • 313 篇 系统科学
  • 1,926 篇 管理学
    • 1,116 篇 管理科学与工程(可...
    • 884 篇 图书情报与档案管...
    • 364 篇 工商管理
  • 538 篇 医学
    • 438 篇 临床医学
    • 324 篇 基础医学(可授医学...
    • 220 篇 药学(可授医学、理...
  • 276 篇 法学
    • 229 篇 社会学
  • 248 篇 农学
  • 159 篇 经济学
  • 88 篇 教育学
  • 33 篇 军事学
  • 30 篇 文学
  • 17 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 261 篇 semantics
  • 223 篇 feature extracti...
  • 208 篇 deep learning
  • 162 篇 data mining
  • 135 篇 computational mo...
  • 127 篇 training
  • 125 篇 machine learning
  • 114 篇 convolution
  • 113 篇 knowledge engine...
  • 101 篇 neural networks
  • 99 篇 predictive model...
  • 98 篇 image segmentati...
  • 94 篇 computer science
  • 91 篇 data models
  • 90 篇 object detection
  • 88 篇 reinforcement le...
  • 88 篇 accuracy
  • 83 篇 optimization
  • 82 篇 laboratories
  • 77 篇 educational inst...

机构

  • 394 篇 college of compu...
  • 306 篇 university of ch...
  • 256 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 166 篇 school of inform...
  • 160 篇 infn sezione di ...
  • 158 篇 horia hulubei na...
  • 152 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 147 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 warsaw
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 111 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 102 篇 bowcock t.j.v.
  • 102 篇 casse g.
  • 101 篇 bobulska d.
  • 100 篇 blake t.
  • 99 篇 borsato m.
  • 99 篇 betancourt c.
  • 99 篇 belin s.
  • 96 篇 afsharnia h.
  • 94 篇 belavin v.
  • 92 篇 bediaga i.
  • 90 篇 cali s.
  • 86 篇 amato s.
  • 85 篇 baryshnikov f.
  • 83 篇 bjørn m.
  • 77 篇 niyato dusit

语言

  • 10,217 篇 英文
  • 516 篇 其他
  • 268 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Data Engineering and Knowledge Engineering Key Laboratory"
11001 条 记 录,以下是4891-4900 订阅
排序:
Low cost edge sensing for high quality demosaicking
arXiv
收藏 引用
arXiv 2018年
作者: Niu, Yan State Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of Education College of Computer Science and Technology Jilin University Changchun130012 China
Digital cameras that use Color Filter Arrays (CFA) entail a demosaicking procedure to form full RGB images. As today's camera users generally require images to be viewed instantly, demosaicking algorithms for real... 详细信息
来源: 评论
A Method for Authenticity Identification of Fritillaria Cirrhosa D. Don Based on Deep Learning  4
A Method for Authenticity Identification of Fritillaria Cirr...
收藏 引用
4th IEEE International Conference on Image, Vision and Computing, ICIVC 2019
作者: Hu, Ke Hu, Pan Cao, Dong Yan, Xin Yu, Xi Liu, Chang Chengdu University College of Information Science and Engineering Chengdu China Key Laboratory of Pattern Recognition and Intelligent Information Processing of Sichuan Chengdu University Chengdu China Research Institute of Big Data Chengdu University China Chengdu Institute of Chinese Herbal Medicine China
Since the authentic Fritillaria Cirrhosa D. Don resources are scarce due to its high price and valuable medical uses, it is difficult to meet the clinical needs. Therefore, the problem of adulteration in the market is... 详细信息
来源: 评论
An improved FOO voting scheme using blockchain
An improved FOO voting scheme using blockchain
收藏 引用
作者: Zhou, Yuanjian Liu, Yining Jiang, Chengshun Wang, Shulan College of Computer Science and Technology Henyang Normal University Henyang421002 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China College of Big Data and Intelligent Engineering Yangtze Normal University Chongqing408100 China College of Big Data and Internet Shenzhen Technology University Shenzhen518118 China
The traditional FOO e-voting protocols adopt centralized and non-transparent count center, which leads to distrust to the center and doubts the fairness and correctness of the vote. However, blockchain is the most inn... 详细信息
来源: 评论
Joint Event Extraction Model based on Multi-feature Fusion  8
Joint Event Extraction Model based on Multi-feature Fusion
收藏 引用
8th International Conference on Identification, Information and knowledge in the Internet of Things, IIKI 2019
作者: Wang, Shuo Rao, Yuan Fan, Xiaobing Qi, Jiangnan Research Institute of Xi’an Jiaotong University Shenzhen China Lab of Social Intelligence and Complex Data Precessiong School of Software Engineering Xi’an Jiao Tong University Xi’an China Shaanxi Joint Key Laboratory for Artifact Intelligence Xi’an Jiaotong University Xi’an China
Event extraction is a challenging problem in information extraction, designed to extract structured information from unstructured text. The existing event extraction methods are mostly based on the pipeline model and ... 详细信息
来源: 评论
Review on Fault Diagnosis Techniques for Distributed Parameter Systems
Review on Fault Diagnosis Techniques for Distributed Paramet...
收藏 引用
Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), CAA Symposium on
作者: Qiang Wang Kaixiang Peng Xuerui Cao Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education School of Automation and Electrical Engineering University of Science and Technology Beijing Beijing China
Fault diagnosis for distributed parameter systems (DPSs) is reviewed in this paper. Firstly, the difficulty and significance of fault diagnosis in DPSs are introduced, and the fault detection methods are classified fr... 详细信息
来源: 评论
How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack  20th
How to Make Information-Flow Analysis Based Defense Ineffect...
收藏 引用
20th International Conference on Information Security, ISC 2017
作者: Yang, Xueyi Liu, Limin Zhang, Lingchen Jiang, Weiyu Pan, Shiran School of Cyber Security University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China
Android permission mechanism cannot resist permission abuse, the key of malware detection is to expose its malicious behavior. Although plentiful transformation attacks are used to bypass malware detection, the latest... 详细信息
来源: 评论
A diversity-guided heuristic-based genetic algorithm for triangulation of Bayesian networks
A diversity-guided heuristic-based genetic algorithm for tri...
收藏 引用
International Conference on Networked Computing and Advanced Information Management (NCM)
作者: Xuchu Dong Haihong Yu Dantong Ouyang Yuxin Ye Yonggang Zhang Department of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun Jilin China
For the optimization problem about triangulation of Bayesian networks, a novel genetic algorithm, DHGA, is proposed in this paper. DHGA employs a heuristic-based mutation operation. Moreover, it uses population divers... 详细信息
来源: 评论
Redactable Blockchain Using Lattice-based Chameleon Hash Function
Redactable Blockchain Using Lattice-based Chameleon Hash Fun...
收藏 引用
2022 International Conference on Blockchain Technology and Information Security, ICBCTIS 2022
作者: Peng, Chunying Xu, Haixia Li, Peili Sklois Institute of Information Engineering Cas Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Cas Beijing China Guangxi Key Laboratory of Cryptography and Information Security Guilin China
Blockchain as a tamper-proof, non-modifiable and traceable distributed ledger technology has received extensive attention. Although blockchain's immutability provides security guarantee, it prevents the developmen... 详细信息
来源: 评论
Fish freshness evaluation based on MobileNetV1 and attention mechanism  22
Fish freshness evaluation based on MobileNetV1 and attention...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer engineering
作者: Xin Guo Shenming Gu Dan Wei School of Information Engineering Zhejiang Ocean University China Key Laboratory of Oceanographic Big Data Mining & Application of Zhejiang Province Zhejiang Ocean University China Key Laboratory of Oceanographic Big Data Mining & Application of Zhejiang Province Key Laboratory of Oceanographic Big Data Mining & Application of Zhejiang Province China
Rapid acquisition of fish freshness is an important task. The traditional freshness detection of aquatic fish has the problems of damaging samples, complicated operation and long detection time. A convenient, rapid, n... 详细信息
来源: 评论
Survey of active learning for networked data
Survey of active learning for networked data
收藏 引用
2015 4th National Conference on Electrical,Electronics and Computer engineering(NCEECE 2015)
作者: Xinlei Wang Bo Yang Jing Huang The College of Computer Science and Technology Jilin University The College of Computer Science and Technology Key laboratory of Symbolic Computation and knowledge EngineeringJilin University
Classification in networked data is a popular research of complex network. Because of the large scale of networked data and the shortage of training data, active learning, which is an effective classification method f... 详细信息
来源: 评论