咨询与建议

限定检索结果

文献类型

  • 3,534 篇 会议
  • 2,549 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 6,084 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,100 篇 工学
    • 2,830 篇 计算机科学与技术...
    • 2,301 篇 软件工程
    • 1,050 篇 信息与通信工程
    • 515 篇 电气工程
    • 472 篇 生物工程
    • 468 篇 控制科学与工程
    • 458 篇 电子科学与技术(可...
    • 383 篇 光学工程
    • 298 篇 生物医学工程(可授...
    • 284 篇 机械工程
    • 256 篇 化学工程与技术
    • 202 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 137 篇 网络空间安全
    • 134 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 106 篇 交通运输工程
  • 2,210 篇 理学
    • 1,192 篇 数学
    • 661 篇 物理学
    • 525 篇 生物学
    • 363 篇 统计学(可授理学、...
    • 270 篇 化学
    • 166 篇 系统科学
  • 1,065 篇 管理学
    • 567 篇 图书情报与档案管...
    • 538 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 249 篇 医学
    • 211 篇 临床医学
    • 186 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 148 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 76 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 262 篇 feature extracti...
  • 234 篇 semantics
  • 164 篇 training
  • 131 篇 accuracy
  • 121 篇 computational mo...
  • 111 篇 deep learning
  • 105 篇 convolution
  • 87 篇 data mining
  • 84 篇 image segmentati...
  • 78 篇 object detection
  • 78 篇 data models
  • 76 篇 visualization
  • 70 篇 contrastive lear...
  • 70 篇 robustness
  • 70 篇 convolutional ne...
  • 66 篇 optimization
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 61 篇 federated learni...
  • 59 篇 face recognition

机构

  • 210 篇 shandong provinc...
  • 192 篇 key laboratory o...
  • 187 篇 hubei province k...
  • 143 篇 key laboratory o...
  • 141 篇 school of comput...
  • 141 篇 school of inform...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 99 篇 fujian provincia...
  • 85 篇 shandong provinc...
  • 76 篇 national key lab...
  • 74 篇 university of ch...
  • 73 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 62 篇 hubei province k...
  • 62 篇 shanghai key lab...
  • 60 篇 shanghai key lab...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 64 篇 li zuoyong
  • 56 篇 huang qingming
  • 52 篇 zhaohui li
  • 51 篇 li zhaohui
  • 46 篇 li chenglong
  • 44 篇 zhang fuquan
  • 34 篇 tang jin
  • 33 篇 li wei
  • 32 篇 fan li
  • 32 篇 shen linlin
  • 31 篇 guo di
  • 31 篇 wang wei
  • 30 篇 zuoyong li
  • 30 篇 boxin shi
  • 29 篇 feng rui
  • 28 篇 yang zhiyong
  • 27 篇 wang xiao
  • 25 篇 liu yang
  • 25 篇 gao guanglai
  • 25 篇 li fan

语言

  • 5,516 篇 英文
  • 432 篇 其他
  • 145 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Information Processing Technology Provincial Key Laboratory for Computer"
6084 条 记 录,以下是4671-4680 订阅
排序:
Identity-based aggregate signcryption in the standard model from multilinear maps
收藏 引用
Frontiers of computer Science 2016年 第4期10卷 741-754页
作者: Hao WANG Zhen LIU Zhe LIU Duncan S. WONG School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Labe ratory for Novel Distributed Computer Software Technology Jinan 250014 China Security and Data Sciences Hong Kong Applied Science and Technology Research Institute (ASTRI) Hong Kong China Laboratory of Algorithmics Cryptology and Security (LACS) University of Luxembourg Luxembourg L-1359 Luxembourg
Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key en... 详细信息
来源: 评论
Block Recursive Least Squares Dictionary Learning Algorithm
Block Recursive Least Squares Dictionary Learning Algorithm
收藏 引用
第28届中国控制与决策会议
作者: Qianru Jiang Sheng Li Zeru Lu Binbin Sun Zhejiang Provincial Key Laboratory for Signal Processing College of Information Engineering Zhejiang University of Technology
The block recursive least square(BRLS) dictionary learning algorithm that deahng with training data arranged in block is proposed in this *** can be used to update overcomplete dictionary for sparse signal *** from tr... 详细信息
来源: 评论
Comparative Study of Compressive Classification-based Approaches for Face Recognition
Comparative Study of Compressive Classification-based Approa...
收藏 引用
IEEE Conference on Industrial Electronics and Applications
作者: Binbin Sun Huang Bai Aihua Yu Zeru Lu Zhejiang Provincial Key Laboratory for Signal Processing College of Information Engineering Zhejiang University of Technology
Feature extraction and classification are two essential components in face recognition. Feature extraction is a process to reduce the original input high-dimensional data and reserve the crucial information. Consideri... 详细信息
来源: 评论
Cross-view Asymmetric Metric Learning for Unsupervised Person Re-identification
arXiv
收藏 引用
arXiv 2017年
作者: Yu, Hong-Xing Wu, Ancong Zheng, Wei-Shi School of Data and Computer Science Sun Yat-sen University China School of Electronics and Information Technology Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Collaborative Innovation Center of High Performance Computing NUDT China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China
While metric learning is important for Person reidentification (RE-ID), a significant problem in visual surveillance for cross-view pedestrian matching, existing metric models for RE-ID are mostly based on supervised ... 详细信息
来源: 评论
Identification of pre-microRNAs by characterizing their sequence order evolution information and secondary structure graphs
收藏 引用
BMC bioinformatics 2018年 第SUPPL 19期19卷 521页
作者: Yuanlin Ma Zuguo Yu Guosheng Han Jinyan Li Vo Anh Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education and Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan University Hunan 411105 China. Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education and Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan University Hunan 411105 China. yuzuguo@***. School of Electrical Engineering and Computer Science Queensland University of Technology GPO Box 2434 Brisbane Q4001 Australia. yuzuguo@***. Advanced Analytics Institute Faculty of Engineering & IT University of Technology Sydney P.O Box 123 Broadway NSW 2007 Australia. School of Mathematical Sciences Queensland University of Technology GPO Box 2434 Brisbane Q4001 Australia.
BACKGROUND:Distinction between pre-microRNAs (precursor microRNAs) and length-similar pseudo pre-microRNAs can reveal more about the regulatory mechanism of RNA biological processes. Machine learning techniques have b... 详细信息
来源: 评论
Estimating probability density of content types for promoting medical records search  38th
Estimating probability density of content types for promotin...
收藏 引用
38th European Conference on information Retrieval Research, ECIR 2016
作者: He, Yun Hu, Qinmin Song, Yang He, Liang Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai200241 China Department of Computer Science and Technology East China Normal University Shanghai200241 China
Disease and symptom in medical records tend to appear in different content types: positive, negative, family history and the others. Traditional information retrieval systems depending on keyword match are often adver... 详细信息
来源: 评论
Visual analyses of music download history: User studies  22nd
Visual analyses of music download history: User studies
收藏 引用
22nd International Conference on MultiMedia Modeling, MMM 2016
作者: Liu, Dong Zhang, Jingxian CAS Key Laboratory of Technology in Geo-spatial Information Processing and Application System University of Science and Technology of China Hefei China Department of Computer Science University of Illinois at Urbana-Champaign ChampaignIL United States
Users’ download history is a primary data source for analyzing user interests. Recent work has shown that user interests are indeed time varying, and accurate profiling of user interest drifts requires the temporal d... 详细信息
来源: 评论
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity
Strongly average-case secure obfuscation: achieving input pr...
收藏 引用
作者: Zhang, Mingwu Mu, Yi Shen, Jian Huang, Xinyi School of Computer Science Hubei University of Technology Wuhan430068 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China School of Computing and Information Technology University of Wollongong NSW2522 Australia
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a new garbled circuit to implement the same functionality as before while obtaining hard-to-understand in some sense, t... 详细信息
来源: 评论
Leveraging composition of object regions for aesthetic assessment of photographs  1
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Lu, Hong Yao, Zeping Bai, Yunhan Zhu, Zhibin Yang, Bohong Chen, Lukun Zhang, Wenqiang Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China Shanghai Engineering Research Center for Video Technology and System School of Computer Science Fudan University Shanghai China College of Information Science and Technology Nanjing Agricultural University Nanjing China
Evaluating the aesthetic quality of photos automatically can be considered as a highly challenging task. In this paper, we propose and investigate a novel method for the aesthetic assessment of photos. We integrate ph... 详细信息
来源: 评论
Non-rigid feature matching for image retrieval using global and local regularizations
Non-rigid feature matching for image retrieval using global ...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yong Ma Huabing Zhou Jun Chen Jingshu Shi Zhongyuan Wang Electronic Information School Wuhan University Wuhan China Hubei Provincial Key Laboratory of Intelligent Robot Wuhan Institute of Technology Wuhan China School of Automation China University of Geosciences Wuhan China Shenzhen Middle School Shenzhen China Computer School Wuhan University Wuhan China
In this paper, we propose a probabilistic method for feature matching of near-duplicate images undergoing non-rigid transformations. We start by creating a set of putative correspondences based on the feature similari... 详细信息
来源: 评论