咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 127 篇 期刊文献

馆藏范围

  • 385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 243 篇 工学
    • 183 篇 计算机科学与技术...
    • 151 篇 软件工程
    • 63 篇 信息与通信工程
    • 27 篇 电气工程
    • 27 篇 生物工程
    • 25 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 20 篇 光学工程
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 环境科学与工程(可...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
    • 6 篇 建筑学
  • 139 篇 理学
    • 86 篇 数学
    • 32 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 26 篇 物理学
    • 11 篇 化学
    • 7 篇 系统科学
  • 76 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 20 篇 法学
    • 17 篇 社会学
  • 11 篇 医学
    • 10 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 农学

主题

  • 30 篇 feature extracti...
  • 16 篇 semantics
  • 11 篇 optimization
  • 9 篇 image segmentati...
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 deep learning
  • 8 篇 predictive model...
  • 7 篇 reinforcement le...
  • 7 篇 big data
  • 7 篇 data mining
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 contrastive lear...
  • 6 篇 computational mo...
  • 6 篇 particle swarm o...
  • 6 篇 genetic algorith...
  • 6 篇 clustering algor...
  • 6 篇 computer vision

机构

  • 63 篇 college of compu...
  • 62 篇 college of mathe...
  • 38 篇 fujian provincia...
  • 37 篇 fujian key labor...
  • 26 篇 fujian key labor...
  • 20 篇 engineering rese...
  • 18 篇 fujian provincia...
  • 17 篇 key laboratory o...
  • 15 篇 fujian provincia...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 8 篇 fuzhou universit...
  • 7 篇 shandong college...
  • 7 篇 shandong provinc...
  • 7 篇 peng cheng labor...
  • 7 篇 college of mathe...
  • 7 篇 fujian provincia...
  • 7 篇 fujian provincia...
  • 7 篇 school of inform...

作者

  • 29 篇 guo wenzhong
  • 20 篇 guo kun
  • 14 篇 wenzhong guo
  • 13 篇 xing chen
  • 13 篇 xianghan zheng
  • 12 篇 wang shiping
  • 12 篇 chen xing
  • 11 篇 yu zhiyong
  • 10 篇 guolong chen
  • 9 篇 xiao ke
  • 9 篇 li jinping
  • 8 篇 niu yuzhen
  • 8 篇 xiaodong wu
  • 8 篇 zheng xianghan
  • 8 篇 ke xiao
  • 8 篇 yanhua liu
  • 8 篇 chen yuzhong
  • 8 篇 wu ling
  • 7 篇 huang fangwan
  • 7 篇 dong chen

语言

  • 369 篇 英文
  • 14 篇 中文
  • 7 篇 其他
检索条件"机构=Fujian Key Laboratory of Network Computing and Intelligent Information Processing"
385 条 记 录,以下是131-140 订阅
排序:
Modality-specific Adaptive Scaling Method for Cross-modal Retrieval
Modality-specific Adaptive Scaling Method for Cross-modal Re...
收藏 引用
Image processing, Computer Vision and Machine Learning (ICICML), International Conference on
作者: Baitao Chen Xiao Ke Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou University Fuzhou Fujian China
There are huge differences in data distribution and feature representation of different modalities. How to flexibly and accurately retrieve data from different modalities is a challenging problem. The mainstream commo... 详细信息
来源: 评论
Topic trend prediction based on wavelet transformation
Topic trend prediction based on wavelet transformation
收藏 引用
2014 11th Web information System and Application Conference(第十一届全国web信息系统及其应用学术会议)
作者: Mingyue Fang Yuzhong Chen Peng Gao Shuiyuan Zhao Songpan Zheng College of Mathematics and Computer Science Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou Fujian China
The research of topic trend prediction can be a good reference for maximizing the propagation effects of network advertisements as well as guiding and controlling the network *** paper proposes PTEP(the Prediction of ... 详细信息
来源: 评论
Meta-path and Meta-schema Hierarchical Aggregation for Heterogeneous Graph Neural networks
Meta-path and Meta-schema Hierarchical Aggregation for Heter...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Ling Wu Pingping Gao Kun Guo Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Computer and Data Sciencen (Fuzhou University) China
With deep learning’s advancement in recent years, heterogeneous graph neural networks (HGNNs) have drawn a lot of interest. They are a group of deep learning models specifically designed for handling heterogeneous gr... 详细信息
来源: 评论
Real-Time Action Detection Method based on Multi-Scale Spatiotemporal Feature
Real-Time Action Detection Method based on Multi-Scale Spati...
收藏 引用
Image processing, Computer Vision and Machine Learning (ICICML), International Conference on
作者: Xin Miao Xiao Ke Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou University Fuzhou Fujian China
Spatiotemporal action detection relies on the learning of video spatial and temporal information. The current state-of-the-art convolutional neural network-based action detectors have achieved remarkable results using... 详细信息
来源: 评论
Traffic Engineering in Dynamic Hybrid Segment Routing networks
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论
Abnormal network Traffic Detection based on Leaf Node Density Ratio  2019
Abnormal Network Traffic Detection based on Leaf Node Densit...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Huajun Liu Zhanghui Liu Yanhua Liu Xiaoling Gao College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
As the network evolves, cyber-attacks become more and more diverse. In the process of detecting network traffic, the most complicated but also the most important task is to find unknown abnormal network traffic data i... 详细信息
来源: 评论
Research on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment  15th
Research on Scientific Workflow Scheduling Based on Fuzzy Th...
收藏 引用
15th CCF Conference on Computer Supported Cooperative Work and Social computing, Chinese CSCW 2020
作者: Lin, Chaowei Lin, Bing Chen, Xing College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou350108 China College of Physics and Energy Fujian Normal University Fuzhou350117 China
With the rapid development of Internet of Everything (IoE) and the popularization of 4G/5G wireless networks, edge computing has gradually become the mainstream. In actual edge environment, some factors have an uncert... 详细信息
来源: 评论
Energy Consumption and Time Delay optimization of MEC Based on MultiDimensional Game  5
Energy Consumption and Time Delay optimization of MEC Based ...
收藏 引用
5th IEEE International Conference on Cloud computing and Big Data Analytics, ICCCBDA 2020
作者: Wang, Hui Wang, Yi Lu, Xingjun Hu, Yanjun Anhui University Key Laboratory of Intelligent Computing Signal Processing Ministry of Education Hefei230601 China Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai200050 China
Mobile edge computing (MEC) reduces latency and power consumption of mobile devices by deploying servers on the network edge. Due to the limited computing resources of the MEC server, excessive offloading of the users... 详细信息
来源: 评论
DDoS Detection and Defense Based on FLAD and SDN  20
DDoS Detection and Defense Based on FLAD and SDN
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Dong, Jie Fang, Wenyu Zheng, Wanling Liu, Jinkun Liu, Yanhua College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China
In order to achieve more efficient and accurate DDoS detection while ensuring data privacy, this paper proposes a DDoS detection method based on FLAD. Firstly, this paper uses the FLAD algorithm to train a global DDoS... 详细信息
来源: 评论
A forensics method of web browsing behavior based on association rule mining
A forensics method of web browsing behavior based on associa...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yiyun Zhang Guolong Chen College of Mathematics and Computer Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente... 详细信息
来源: 评论