咨询与建议

限定检索结果

文献类型

  • 898 篇 会议
  • 571 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,470 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 993 篇 工学
    • 671 篇 计算机科学与技术...
    • 586 篇 软件工程
    • 211 篇 信息与通信工程
    • 155 篇 控制科学与工程
    • 108 篇 生物工程
    • 102 篇 电气工程
    • 100 篇 机械工程
    • 72 篇 生物医学工程(可授...
    • 70 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 52 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 31 篇 动力工程及工程热...
    • 28 篇 仪器科学与技术
    • 28 篇 土木工程
    • 28 篇 交通运输工程
    • 27 篇 建筑学
    • 23 篇 材料科学与工程(可...
  • 498 篇 理学
    • 276 篇 数学
    • 111 篇 生物学
    • 105 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 76 篇 系统科学
    • 51 篇 化学
  • 279 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 61 篇 工商管理
  • 44 篇 法学
    • 39 篇 社会学
  • 43 篇 医学
    • 38 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 22 篇 经济学
  • 17 篇 教育学
  • 11 篇 农学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 52 篇 training
  • 36 篇 semantics
  • 35 篇 feature extracti...
  • 29 篇 computational mo...
  • 27 篇 data mining
  • 26 篇 deep learning
  • 25 篇 neural networks
  • 25 篇 laboratories
  • 24 篇 convolution
  • 22 篇 accuracy
  • 21 篇 optimization
  • 21 篇 wireless sensor ...
  • 20 篇 computer science
  • 19 篇 machine learning
  • 19 篇 data models
  • 19 篇 robustness
  • 17 篇 reinforcement le...
  • 17 篇 software enginee...
  • 15 篇 conferences
  • 15 篇 image segmentati...

机构

  • 70 篇 college of compu...
  • 56 篇 beijing key labo...
  • 53 篇 school of softwa...
  • 48 篇 school of electr...
  • 37 篇 beijing key labo...
  • 36 篇 guangdong key la...
  • 35 篇 key laboratory o...
  • 34 篇 national enginee...
  • 33 篇 state key labora...
  • 28 篇 guangdong provin...
  • 23 篇 school of comput...
  • 22 篇 shenzhen institu...
  • 22 篇 seventh research...
  • 19 篇 school of inform...
  • 19 篇 university of ch...
  • 18 篇 peng cheng labor...
  • 15 篇 guangdong key la...
  • 15 篇 beijing key labo...
  • 15 篇 computer vision ...
  • 14 篇 beijing key labo...

作者

  • 78 篇 junping du
  • 53 篇 shen linlin
  • 49 篇 yingmin jia
  • 28 篇 fashan yu
  • 25 篇 du junping
  • 17 篇 jia yingmin
  • 17 篇 huadong ma
  • 16 篇 linlin shen
  • 15 篇 wu qingyao
  • 15 篇 xie weicheng
  • 14 篇 yin baocai
  • 14 篇 cai yi
  • 13 篇 gao can
  • 13 篇 yu fashan
  • 12 篇 liang liu
  • 12 篇 wang jinbao
  • 11 篇 deyuan meng
  • 11 篇 zhang qiang
  • 11 篇 xi zhang
  • 11 篇 dou wanchun

语言

  • 1,276 篇 英文
  • 168 篇 其他
  • 34 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Intelligent Software and Software Engineering Laboratory"
1470 条 记 录,以下是1051-1060 订阅
排序:
Simulation and analysis of classification optimization model of temperature sensing big data in intelligent building  2016
Simulation and analysis of classification optimization model...
收藏 引用
3rd Multidisciplinary International Social Networks Conference, MISNC 2016, 5th ASE International Conference on Social Informatics, SocialInformatics 2016 and 7th ASE International Conference on Data Science, DS 2016
作者: Zhang, Fuquan Mao, Zijing Ding, Gangyi School of software Beijing Institute of Technology Beijing100081 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou350121 China Department of Electrical Engineering University of Texas at San Antonio One UTSA Circle San AntonioTX78249 United States School of software Beijing Institute of TechnologyBeijing 10008 1 China Software Building Beijing Institute of Technology 5 South Zhongguancun Street Haidian Beijing100081 China
The temperature sensor network in intelligent building classified collection of big data processing has the problem of big data redundancy interference, which results in unable to determine the fixed filter thresholds... 详细信息
来源: 评论
Scale and topology preserving SIFT feature hashing  1
收藏 引用
17th Pacific-Rim Conference on Multimedia, PCM 2016
作者: Kang, Chen Zhu, Li Qian, Xueming School of Software Engineering Xi’an Jiaotong University Xi’an710049 China The Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an710049 China
Abstract. In recent years, content based image retrieval has been concerned because of practical needs on Internet services, especially methods that can improve retrieving speed and precision. Thus, we propose a hashi... 详细信息
来源: 评论
TenSR: Multi-dimensional tensor sparse representation
TenSR: Multi-dimensional tensor sparse representation
收藏 引用
2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016
作者: Qi, Na Shi, Yunhui Sun, Xiaoyan Yin, Baocai Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Metropolitan Transportation Beijing University of Technology China Microsoft Research United States Faculty of Electronic Information and Electrical Engineering Dalian University of Technology China
The conventional sparse model relies on data representation in the form of vectors. It represents the vector-valued or vectorized one dimensional (1D) version of an signal as a highly sparse linear combination of basi... 详细信息
来源: 评论
Design and implementation of tourism activity recognition and discovery system  12
Design and implementation of tourism activity recognition an...
收藏 引用
12th World Congress on intelligent Control and Automation, WCICA 2016
作者: Yifan, Yuan Junping, Du Dan, Fan Lee, Jangmyung Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Haidian District Beijing China Department of Electronics Engineering Pusan National University Busan Korea Republic of
With the rapid development of technologies, such as cloud computing, big data and so forth, tourism big data has drawn the attention of many scholars. How to make full use of a large amount of raw data from tourism ac... 详细信息
来源: 评论
A real-time people number detection algorithm of scenic spot based on density center clustering  12
A real-time people number detection algorithm of scenic spot...
收藏 引用
12th World Congress on intelligent Control and Automation, WCICA 2016
作者: Yaomin, Wen Junping, Du Meiyu, Liang Dan, Fan Lee, Jangmyung Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Haidian District Beijing China Department of Electronics Engineering Pusan National University Busan Korea Republic of
In recent years, accidents occur frequently because the people number of scenic spots is lack of control. In this paper, a novel real-time people number detection algorithm of scenic spot based on density center clust... 详细信息
来源: 评论
Grey wolf optimizer (GWO) for Automated Offshore Crane Design
Grey wolf optimizer (GWO) for Automated Offshore Crane Desig...
收藏 引用
IEEE Symposium Series on Computational Intelligence
作者: Ibrahim A. Hameed Robin T. Bye Ottar L. Osen Software and Intelligent Control Engineering Laboratory Faculty of Engineering and Natural Sciences Norwegian University of Science and Technology NTNU in Alesund Postboks 1517 NO-6025 Alesund Norway
In this paper, a new meta-heuristic optimization algorithm called Grey Wolf Optimizer (GWO) is applied to offshore crane design. An offshore crane is a pedestal-mounted elevating and rotating lifting device used to tr... 详细信息
来源: 评论
Proactive Healthcare and an Early Warning Mechanism for Coronary Artery Disease Patients using Internet-of-Thing Devices
Proactive Healthcare and an Early Warning Mechanism for Coro...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Shao-Jie Hsu Shih-Syun Lin Tun-Wen Pai Hamido Fujita Dept. of Computer Science and Engineering National Taiwan Ocean University Keelung Taiwan Intelligent Software Systems Laboratory Iwate Prefectural University Japan
Ubiquitous Internet environment and matured key technologies of sensing devices provide diversified applications of Internet of Thing (IoT). IoT in intelligent healthcare is one of the major topics for convincing powe... 详细信息
来源: 评论
Emergency online attention & psychological distance under risk  2
Emergency online attention & psychological distance under ri...
收藏 引用
2nd ACM SIGSPATIAL International Workshop on the Use of GIS in Emergency Management, EM-GIS 2016
作者: Deng, Qing Li, Lihua Liu, Yi Deng, Xiaolong Zhang, Hui Department of Engineering Physics Tsinghua University China Counter-Terrorism College People's Public Security University of China China Public Order School People's Public Security University of China China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications China
Risk communication is an effective means of emergency management. Online information plays an important role in risk communication, especially in the Big Data Era. Citizens' psychology to send and receive informat... 详细信息
来源: 评论
Multi-style video stylization based on texture advection
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 90-102页
作者: TANG Ying ZHANG Yan SHI XiaoYing FAN Jing School of Computer Science and Technology Zhejiang University of Technology Key Laboratory of Visual Media Intelligent Process Technology of Zhejiang Province School of Software Engineering Hangzhou Dianzi University
Artistic video stylization, which is widely used in multimedia entertainment, transforms a given video into different artistic styles. Most of the existing video stylization algorithms can simulate single or limited v... 详细信息
来源: 评论
Cryptanalysis of a Completely Anonymous Multi-recipient Signcryption Scheme with Public Verification
收藏 引用
Journal of Donghua University(English Edition) 2015年 第2期32卷 240-243页
作者: 张波 孙涛 于代荣 School of Information Science and Engineering University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Shandong Provincial Key Laboratory of Software Engineering
Anonymity is a very important security objective in network ***,Pang et *** a novel multirecipient signcryption scheme with complete anonymity and claimed that the new concrete scheme was strong existential unforgeabi... 详细信息
来源: 评论