咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 127 篇 期刊文献

馆藏范围

  • 385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 243 篇 工学
    • 183 篇 计算机科学与技术...
    • 151 篇 软件工程
    • 63 篇 信息与通信工程
    • 27 篇 电气工程
    • 27 篇 生物工程
    • 25 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 20 篇 光学工程
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 环境科学与工程(可...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
    • 6 篇 建筑学
  • 139 篇 理学
    • 86 篇 数学
    • 32 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 26 篇 物理学
    • 11 篇 化学
    • 7 篇 系统科学
  • 76 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 20 篇 法学
    • 17 篇 社会学
  • 11 篇 医学
    • 10 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 农学

主题

  • 30 篇 feature extracti...
  • 16 篇 semantics
  • 11 篇 optimization
  • 9 篇 image segmentati...
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 deep learning
  • 8 篇 predictive model...
  • 7 篇 reinforcement le...
  • 7 篇 big data
  • 7 篇 data mining
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 contrastive lear...
  • 6 篇 computational mo...
  • 6 篇 particle swarm o...
  • 6 篇 genetic algorith...
  • 6 篇 clustering algor...
  • 6 篇 computer vision

机构

  • 63 篇 college of compu...
  • 62 篇 college of mathe...
  • 38 篇 fujian provincia...
  • 37 篇 fujian key labor...
  • 26 篇 fujian key labor...
  • 20 篇 engineering rese...
  • 18 篇 fujian provincia...
  • 17 篇 key laboratory o...
  • 15 篇 fujian provincia...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 8 篇 fuzhou universit...
  • 7 篇 shandong college...
  • 7 篇 shandong provinc...
  • 7 篇 peng cheng labor...
  • 7 篇 college of mathe...
  • 7 篇 fujian provincia...
  • 7 篇 fujian provincia...
  • 7 篇 school of inform...

作者

  • 29 篇 guo wenzhong
  • 20 篇 guo kun
  • 14 篇 wenzhong guo
  • 13 篇 xing chen
  • 13 篇 xianghan zheng
  • 12 篇 wang shiping
  • 12 篇 chen xing
  • 11 篇 yu zhiyong
  • 10 篇 guolong chen
  • 9 篇 xiao ke
  • 9 篇 li jinping
  • 8 篇 niu yuzhen
  • 8 篇 xiaodong wu
  • 8 篇 zheng xianghan
  • 8 篇 ke xiao
  • 8 篇 yanhua liu
  • 8 篇 chen yuzhong
  • 8 篇 wu ling
  • 7 篇 huang fangwan
  • 7 篇 dong chen

语言

  • 369 篇 英文
  • 14 篇 中文
  • 7 篇 其他
检索条件"机构=Fujian Key Laboratory of Network Computing and Intelligent Information Processing"
385 条 记 录,以下是151-160 订阅
排序:
A Comprehensive Assessment Method of Asset Importance for key Asset Protection  2019
A Comprehensive Assessment Method of Asset Importance for Ke...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Xiaoling Gao Yanhua Liu Yanbin Qiu Huajun Liu College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
A method of off-line signature verification for digital forensics
A method of off-line signature verification for digital fore...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Weiwei Pan Guolong Chen College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
Signature verification is an important part of digital forensics. In order to solve the shortcomings of manual identification in technical accuracy and subjectivity, this paper proposed an off-line signature identific... 详细信息
来源: 评论
network Traffic Prediction with Attention-based Spatial-Temporal Graph network
Network Traffic Prediction with Attention-based Spatial-Temp...
收藏 引用
IEEE Workshop on High Performance Switching and Routing
作者: Yufei Peng Yingya Guo Run Hao Junda Lin Department of Computer and Data Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University
network traffic prediction plays a significant role in network management. Previous network traffic prediction methods mainly focus on the temporal relationship between network traffic, and used time series models to ...
来源: 评论
Attack Intent Analysis Method Based on Attack Path Graph  2019
Attack Intent Analysis Method Based on Attack Path Graph
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Biqiong Chen Yanhua Liu Shijin Li Xiaoling Gao College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
A multimedia SoC performance evaluation method based on memory access model
A multimedia SoC performance evaluation method based on memo...
收藏 引用
2010 3rd International Congress on Image and Signal processing, CISP 2010
作者: Zhou, Li Sun, Tao Wei, Sufen Guo, Qi School of Information Science and Engineering Shandong University Jinan Shandong China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan Shandong China Information Engineering College Jimei University Xiamen Fujian China
More and more complex application cases bring much heavy bandwidth loading problem to SoC architecture. To design a high performance SoC system which supports large amount and high speed data processing capability, an... 详细信息
来源: 评论
Computation Offloading Algorithm Based on Deep Reinforcement Learning and Multi-Task Dependency for Edge computing  25th
Computation Offloading Algorithm Based on Deep Reinforcemen...
收藏 引用
25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022
作者: Lin, Tengxiang Lin, Cheng-Kuan Chen, Zhen Cheng, Hongju College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China Department of Computer Science National Yang Ming Chiao Tung University Hsinchu300 Taiwan
Edge computing is an emerging promising computing paradigm that brings computation and storage resources to the network edge, significantly reducing service latency. In this paper, we aim to divide the task into sever... 详细信息
来源: 评论
Depth map optimization based on adaptive chrominance image segmentation
Depth map optimization based on adaptive chrominance image s...
收藏 引用
IEEE International Conference on Communication Software and networks
作者: Zhou, Li Sun, Tao Lv, Zhong Wei, Sufen School of Information Science and Engineering Shandong University Jinan Shandong China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan Shandong China Information Engineering College Jimei University Xiamen Fujian China
The development of Free Viewpoint Video (FVV) technique is the most promising multimedia processing fields in recent years. Depth map prediction is the key method in FVV. There are many methods to estimate depth map. ... 详细信息
来源: 评论
Variable projection algorithms with sparse constraint for separable nonlinear models
收藏 引用
Control Theory and Technology 2024年 第1期22卷 135-146页
作者: Hui-Lang Xu Guang-Yong Chen Si-Qing Cheng Min Gan Jing Chen College of Computer and Data Science Fuzhou UniversityFuzhou350116FujianChina Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350116FujianChina Key Laboratory of Intelligent Metro of Universities in Fujian Fuzhou UniversityFuzhou350116FujianChina Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou UniversityFuzhou350116FujianChina School of Science Jiangnan UniversityWuxi214122JiangsuChina
Separable nonlinear models are widely used in various fields such as time series analysis, system modeling, and machine learning, due to their flexible structures and ability to capture nonlinear behavior of data. How... 详细信息
来源: 评论
Scale‐wise interaction fusion and knowledge distillation network for aerial scene recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1178-1190页
作者: Hailong Ning Tao Lei Mengyuan An Hao Sun Zhanxuan Hu Asoke K.Nandi School of Computer Science and Technology Xi'an University of Posts and TelecommunicationsShaanxi Key Laboratory of Network Data Analysis and Intelligent ProcessingXi'anChina Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'anChina School of Electronic Information and Artificial Intelligence Shaanxi University of Science and TechnologyXi'anChina School of Computer Central China Normal UniversityWuhanChina Department of Electronic and Electrical Engineering Brunel University LondonLondonUK Xi'an Jiaotong University Xi'anChina
Aerial scene recognition(ASR)has attracted great attention due to its increasingly essential *** of the ASR methods adopt the multi‐scale architecture because both global and local features play great roles in ***,th... 详细信息
来源: 评论
Heterophilic Graph Representation Learning Based on Multi-Order information Extraction and High and Low Pass Filters  10
Heterophilic Graph Representation Learning Based on Multi-Or...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Wu, Ling Li, Xinyu Yang, Yingjie Guo, Kun Zhang, Qishan Fuzhou University College of Computer and Data Science Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing China De Montfort University School of Computer Science and Informatics Leicester United Kingdom Shanghai International Studies University College of Economics and Humanities Shanghai China
Real-world networks can be divided into homophilic and heterophilic graphs. Significantly, many nodes tend to be heterophilic in a homophilic graph. Graph representation learning in heterophilic graphs has attracted c... 详细信息
来源: 评论