咨询与建议

限定检索结果

文献类型

  • 877 篇 会议
  • 568 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,446 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 982 篇 工学
    • 669 篇 计算机科学与技术...
    • 586 篇 软件工程
    • 209 篇 信息与通信工程
    • 155 篇 控制科学与工程
    • 108 篇 生物工程
    • 106 篇 电气工程
    • 101 篇 机械工程
    • 74 篇 生物医学工程(可授...
    • 66 篇 电子科学与技术(可...
    • 65 篇 光学工程
    • 52 篇 化学工程与技术
    • 40 篇 安全科学与工程
    • 30 篇 仪器科学与技术
    • 30 篇 动力工程及工程热...
    • 29 篇 土木工程
    • 28 篇 建筑学
    • 28 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 492 篇 理学
    • 274 篇 数学
    • 111 篇 生物学
    • 98 篇 物理学
    • 80 篇 统计学(可授理学、...
    • 75 篇 系统科学
    • 53 篇 化学
  • 281 篇 管理学
    • 150 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 44 篇 法学
    • 39 篇 社会学
  • 42 篇 医学
    • 38 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 21 篇 经济学
  • 16 篇 教育学
  • 11 篇 农学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 52 篇 training
  • 39 篇 semantics
  • 33 篇 feature extracti...
  • 29 篇 computational mo...
  • 27 篇 deep learning
  • 27 篇 data mining
  • 26 篇 neural networks
  • 25 篇 laboratories
  • 24 篇 convolution
  • 21 篇 optimization
  • 21 篇 wireless sensor ...
  • 21 篇 accuracy
  • 20 篇 computer science
  • 18 篇 machine learning
  • 18 篇 robustness
  • 17 篇 data models
  • 16 篇 reinforcement le...
  • 16 篇 software enginee...
  • 16 篇 convolutional ne...
  • 15 篇 conferences

机构

  • 64 篇 college of compu...
  • 56 篇 beijing key labo...
  • 52 篇 school of softwa...
  • 48 篇 school of electr...
  • 37 篇 beijing key labo...
  • 35 篇 key laboratory o...
  • 34 篇 guangdong key la...
  • 30 篇 state key labora...
  • 28 篇 national enginee...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 guangdong provin...
  • 20 篇 shenzhen institu...
  • 18 篇 university of ch...
  • 18 篇 peng cheng labor...
  • 17 篇 school of inform...
  • 16 篇 beijing key labo...
  • 15 篇 beijing key labo...
  • 14 篇 guangdong key la...
  • 14 篇 key laboratory o...

作者

  • 78 篇 junping du
  • 51 篇 yingmin jia
  • 49 篇 shen linlin
  • 30 篇 fashan yu
  • 25 篇 du junping
  • 18 篇 huadong ma
  • 17 篇 jia yingmin
  • 16 篇 linlin shen
  • 15 篇 wu qingyao
  • 14 篇 yin baocai
  • 14 篇 cai yi
  • 13 篇 yu fashan
  • 13 篇 xie weicheng
  • 12 篇 liang liu
  • 11 篇 deyuan meng
  • 11 篇 xi zhang
  • 11 篇 tan mingkui
  • 11 篇 meiyu liang
  • 10 篇 zhang qiang
  • 10 篇 liang meiyu

语言

  • 1,352 篇 英文
  • 66 篇 其他
  • 30 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Intelligent Software and Software Engineering Laboratory"
1446 条 记 录,以下是1351-1360 订阅
排序:
Integrating Trust and Role for Secure Interoperation in Multi-Domain Environment
Integrating Trust and Role for Secure Interoperation in Mult...
收藏 引用
International Conference on Information Security and Assurance, ISA
作者: Jianfeng Lu Ruixuan Li Zhengding Lu Bing Li Intelligent and Distributed Computing Laboratory College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory of Software Engineering Wuhan University of China Wuhan China
Traditional access control disciplines such as RBAC has difficulty in covering open and decentralized multi-centric systems because it has focused on a closed system where all users are known and primarily utilizes a ... 详细信息
来源: 评论
Automatic pixel-shift detection and restoration in videos
Automatic pixel-shift detection and restoration in videos
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Haidong Yuan Huadong Ma Xiaodong Huang Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Institute of Electronic Technology University of Information Engineering Zhengzhou China
A common form of serious defect in video is pixel-shift. It is caused by the consecutive pixels loss introduced by video transmission systems. Pixel-shift means a large amount of pixel shifts one by one due to a small... 详细信息
来源: 评论
Solving Sum and Product Riddle via BDD-based model checking
Solving Sum and Product Riddle via BDD-based model checking
收藏 引用
2008 IEEE/WIC/ACM International Conference on Web Intelligence and intelligent Agent Technology - Workshops, WI-IAT Workshops 2008
作者: Luo, Xiangyu Su, Kaile Sattar, Abdul Chen, Yan Tsinghua National Laboratory for Information Science and Technology School of Software Tsinghua University Beijing 100084 China Department of Computer Science Guilin University of Electronic Technology Guilin 541004 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Institute for Integrated and Intelligent Systems Griffith University Brisbane QLD 4111 Australia
We model the Sum and Product Riddle inpublic announcement logic, which is interpreted on an epistemic Kripke model. The model is symbolically represented as a finite state program with n agents. A model checking metho... 详细信息
来源: 评论
The sliced Gaussian mixture filter for efficient nonlinear estimation
The sliced Gaussian mixture filter for efficient nonlinear e...
收藏 引用
International Conference on Information Fusion
作者: Vesa Klumpp Felix Sawo Uwe D. Hanebeck Dietrich Franken Intelligent Sensor-Actuator-Systems Laboratory Institute of Computer Science and Engineering Universität Karlsruhe Germany Data Fusion Algorithms and Software EADS Deutschland GmbH Ulm Germany
This paper addresses the efficient state estimation for mixed linear/nonlinear dynamic systems with noisy measurements. Based on a novel density representation - sliced Gaussian mixture density - the decomposition int... 详细信息
来源: 评论
Collaborative Target Localization in Camera Sensor Networks
Collaborative Target Localization in Camera Sensor Networks
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Liang Liu Huadong Ma Xi Zhang Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
Target localization is an important application in sensor networks. Although the localization problem in acoustic /radar sensor networks has been intensively studied, few consider the problem in camera sensor networks... 详细信息
来源: 评论
Analysis for Localization-Oriented Coverage in Camera Sensor Networks
Analysis for Localization-Oriented Coverage in Camera Sensor...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Liang Liu Huadong Ma Xi Zhang Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
Camera sensor networks have recently emerged as a very critical research topic. Target tracking and localization are important applications in camera sensor networks. In this paper, we investigate the coverage problem... 详细信息
来源: 评论
On Directional K-Coverage Analysis of Randomly Deployed Camera Sensor Networks
On Directional K-Coverage Analysis of Randomly Deployed Came...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: L. Liu H. Ma X. Zhang Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Networking and Information System Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
Recently, smart surveillance is becoming a very important application of camera sensor networks. Most face recognition and tracking techniques employed in surveillance systems rely on the assumption of a frontal view ... 详细信息
来源: 评论
Bond-Percolation Based Optimal Density for Exposure-Path Prevention in Wireless Sensor Networks
Bond-Percolation Based Optimal Density for Exposure-Path Pre...
收藏 引用
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
作者: Liang Liu Xi Zhang Huadong Ma Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Networking and Information System Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
Most existing works on sensor coverage mainly concentrate on the full coverage models which ensure that all points in the deployment region are covered at the expense of high complexity and cost. In contrast, the expo... 详细信息
来源: 评论
Localization-oriented coverage based on Bayesian estimation in camera sensor networks
Localization-oriented coverage based on Bayesian estimation ...
收藏 引用
IEEE International Symposium on World of Wireless Mobile and Multimedia Networks (WoWMoM)
作者: Liang Liu Xi Zhang Huadong Ma Beijing Key Laboratory of Intelligent Telecomm Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Networking and Information Systems Laboratory Department of Electrical and Computer Engineering Texas A and M University College Station TX USA
Target tracking and localization are important applications in camera sensor networks. Although coverage is a very important research topic in wireless sensor networks, and the coverage problem for target detection ha... 详细信息
来源: 评论
Tree parity machine-based One-Time Password authentication schemes
Tree parity machine-based One-Time Password authentication s...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Tieming Chen Samuel H. Huang College of Software Engineering Zhejiang University of Technology Hangzhou China Doctor candidate at College of Computer Science Beihang University Beijing China Intelligent System Laboratory University of Cincinnati Cincinnati OH USA
One-time password (OTP) is always used as the strongest authentication scheme among all password-based solutions. Currently, consumer devices such as smart card have implemented OTP based two-factor authentications fo... 详细信息
来源: 评论