咨询与建议

限定检索结果

文献类型

  • 162 篇 会议
  • 149 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 312 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 233 篇 工学
    • 155 篇 计算机科学与技术...
    • 132 篇 软件工程
    • 46 篇 控制科学与工程
    • 38 篇 信息与通信工程
    • 27 篇 电气工程
    • 24 篇 机械工程
    • 21 篇 生物工程
    • 18 篇 生物医学工程(可授...
    • 17 篇 光学工程
    • 14 篇 电子科学与技术(可...
    • 12 篇 动力工程及工程热...
    • 8 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 建筑学
    • 6 篇 环境科学与工程(可...
    • 4 篇 仪器科学与技术
  • 125 篇 理学
    • 75 篇 数学
    • 27 篇 系统科学
    • 23 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 20 篇 物理学
    • 9 篇 化学
  • 62 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 14 篇 医学
    • 14 篇 临床医学
    • 10 篇 基础医学(可授医学...
    • 8 篇 药学(可授医学、理...
  • 10 篇 法学
    • 8 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 13 篇 computer science
  • 13 篇 laboratories
  • 8 篇 data mining
  • 7 篇 feature extracti...
  • 7 篇 machine learning
  • 6 篇 educational inst...
  • 6 篇 optimization
  • 6 篇 correlation
  • 6 篇 training
  • 5 篇 image fusion
  • 5 篇 deep learning
  • 5 篇 electronic mail
  • 5 篇 edge computing
  • 5 篇 multiobjective o...
  • 4 篇 support vector m...
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 control systems
  • 4 篇 iterative learni...
  • 4 篇 clustering algor...

机构

  • 31 篇 beijing key labo...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 college of compu...
  • 11 篇 guangdong provin...
  • 10 篇 national enginee...
  • 8 篇 beijing key labo...
  • 8 篇 department of el...
  • 8 篇 department of co...
  • 8 篇 school of electr...
  • 8 篇 state key labora...
  • 7 篇 department of co...
  • 7 篇 computer vision ...
  • 6 篇 beijing key labo...
  • 6 篇 intelligent dist...
  • 6 篇 state key labora...
  • 5 篇 guangdong key la...
  • 5 篇 the seventh rese...
  • 5 篇 college of elect...
  • 5 篇 key laboratory o...

作者

  • 45 篇 junping du
  • 33 篇 yingmin jia
  • 24 篇 fashan yu
  • 14 篇 shen linlin
  • 8 篇 bei zeng
  • 8 篇 jangmyung lee
  • 8 篇 zhengfeng ji
  • 7 篇 deyuan meng
  • 7 篇 ismail leila
  • 7 篇 materwala huned
  • 6 篇 wenling li
  • 6 篇 jun zhang
  • 6 篇 chunnian liu
  • 6 篇 leila ismail
  • 5 篇 nengkun yu
  • 5 篇 wang jinbao
  • 5 篇 zhao hai
  • 5 篇 pei jihong
  • 5 篇 zhao yang
  • 5 篇 du junping

语言

  • 288 篇 英文
  • 21 篇 其他
  • 3 篇 中文
检索条件"机构=Intelligent Agent Laboratory Department of Computer Science and Software Engineering"
312 条 记 录,以下是281-290 订阅
排序:
Image fusion algorithm based on neighbors and cousins information in nonsubsampled contourlet transform domain
Image fusion algorithm based on neighbors and cousins inform...
收藏 引用
International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR)
作者: Xiao-Bo Qu Guo-Fu Xie Jing-Wen Yan Zi-Qian Zhu Ben-Gang Chen Department of Communication Engineering Xiamen University Xiamen China Department of Software Engineering Xiamen University Xiamen China Key Laboratory of Computer Science Chinese Academy and Sciences Beijing China Key Laboratory of Intelligent Manufacturing Technology Ministry of Education Shantou China Research Institute of Chinese Radar Electronic Equipment Wuxi China
Nonsubsampled contourlet transform (NSCT) provides flexible multiresolution, anisotropy and directional expansion for images. Compared with the foremost contourlet transform, it is shift-invariant and can overcome the... 详细信息
来源: 评论
Feature selection for high dimensional face image using self-organizing maps
收藏 引用
9th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2005
作者: Tan, Xiaoyang Chen, Songcan Zhou, Zhi-Hua Zhang, Fuyan National Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Engineering Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 200433 China
While feature selection is very difficult for high dimensional, unstructured data such as face image, it may be much easier to do if the data can be faithfully transformed into lower dimensional space. In this paper, ... 详细信息
来源: 评论
A general framework of targeted marketing  1
收藏 引用
Third International Atlantic Web Intelligence Conference on Advances in Web Intelligence, AWIC 2005
作者: Huang, Jiajin Zhong, Ning Yao, Y.Y. Liu, Chunnian Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory College of Computer Science and Technology Beijing University of Technology 100022 Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi-City 371-0816 Japan Department of Computer Science University of Regina Regina Sask. S4S 0A2 Canada
In this paper, inspired by a unified probabilistic model of information retrieval, we propose a general framework of targeted marketing by considering three types of information, namely, the customer profiles, the pro... 详细信息
来源: 评论
A mobile agent-based P2P Autonomous Security Hole Discovery system
A mobile agent-based P2P Autonomous Security Hole Discovery ...
收藏 引用
First International Conference on Natural Computation, ICNC 2005
作者: Zheng, Ji Wang, Xin Xue, Xiangyang Toh, C.K. Software School Fudan University Shanghai 200433 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 200433 China Department of Computer Science and Engineering Fudan University Shanghai 200433 China Dept. of Electronic Engineering Queen Mary University of London United Kingdom
A general or agent-based security system is usually constructed hierarchically and has a central manager acting as head of the whole system. However, the manager becomes a bottleneck for being connected by each client... 详细信息
来源: 评论
Investigating manifold learning algorithms based on magnification factors and principal spread directions
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2005年 第12期28卷 2000-2009页
作者: He, Li Zhang, Jun-Ping Zhou, Zhi-Hua Shanghai Key Laboratory of Intelligent Information Processing Department of Computer Science and Engineering Fudan University Shanghai 200433 China Key Laboratory of Complex Systems and Intelligence Science Chinese Academy of Sciences Shanghai 200433 China Department of Computer Science and Engineering School of Mathematical Sciences Fudan University Shanghai 200433 China National Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
As a new unsupervised learning technique, manifold learning has captured the attention of many researchers in the field of machine learning and cognitive sciences. The major algorithms include Isometric mapping (ISOMA... 详细信息
来源: 评论
An improved Bayesian networks learning algorithm based on independence test and MDL scoring
An improved Bayesian networks learning algorithm based on in...
收藏 引用
Proceedings of the International Conference on Active Media Technology, AMT
作者: Junzhong Ji Jing Yan Chunnian Liu N. Zhong College of Computer Science and Technology Beijing University of Technology Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi-City Japan
In recent years, more and more people studied the Bayesian networks learning algorithm that integrates independence test with scoring metric. Based on the proposed hybrid algorithm I-B&B-MDL, a modified method is ... 详细信息
来源: 评论
Predictors of success in diagrammatic problem solving
Predictors of success in diagrammatic problem solving
收藏 引用
3rd International Conference on Diagrammatic Representation and Inference, Diagrams 2004
作者: Yoon, Daesub Narayanan, N. Hari Intelligent and Interactive Systems Laboratory Department of Computer Science and Software Engineering Auburn University AuburnAL36849 United States
We conducted an eye-tracking study of mechanical problem solving from cross-sectional diagrams of devices. Response time, accuracy and eye movement data were collected and analyzed for 72 problem-solving episodes (9 s... 详细信息
来源: 评论
Towards reuse in agent oriented information systems: The importance of being purposive  5th
收藏 引用
5th International Bi-Conference Workshop on agent-Oriented Information Systems, AOIS 2003
作者: Gos, Simon Heinz, Clint Papasimeon, Michael Pearce, Adrian Sterling, Leon ntelligent Agent Laboratory Department of Computer Science and Software Engineering The University of Melbourne ParkvilleVIC3010 Australia Air Operations Division System Sciences Laboratory Defence Science and Technology Organisation 506 Lorimer Street Fishermans BendVIC3207 Australia
The emergence of large information systems has pushed software specification into the area of business modelling to adequately capture and consider business requirements. At the same time, there has been a move toward... 详细信息
来源: 评论
Relational peculiarity oriented data mining
Relational peculiarity oriented data mining
收藏 引用
Proceedings - Fourth IEEE International Conference on Data Mining, ICDM 2004
作者: Zhong, Ning Liu, Chunnian Yao, Y.Y. Ohshima, Muneaki Huang, Mingxin Huang, Jiajin Department of Information Engineering Maebashi Institute of Technology 460-1 Kamisadori-Cho Maebashi 371-0816 Japan Computer Science College Beijing University of Technology Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing 100022 China Department of Computer Science University of Regina Regina Sask. S4S 0A2 Canada
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m... 详细信息
来源: 评论
Relational peculiarity oriented data mining
Relational peculiarity oriented data mining
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Ning Zhong Chunnian Liu Y.Y. Yao M. Ohshima Mingxin Huang Jiajin Huang Department of Information Engineering Maebashi Institute of Technology Maebashi Japan The Computer Science College Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Computer Science University of Regina Regina SAS Canada
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m... 详细信息
来源: 评论