咨询与建议

限定检索结果

文献类型

  • 135 篇 会议
  • 90 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 122 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 43 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 14 篇 电气工程
    • 14 篇 生物工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 10 篇 光学工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 80 篇 理学
    • 48 篇 数学
    • 17 篇 生物学
    • 15 篇 物理学
    • 13 篇 化学
    • 13 篇 统计学(可授理学、...
    • 5 篇 系统科学
  • 54 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 14 篇 农学
    • 13 篇 作物学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
  • 4 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 feature extracti...
  • 5 篇 computer science
  • 5 篇 support vector m...
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 laboratories

机构

  • 24 篇 provincial key l...
  • 24 篇 school of comput...
  • 12 篇 jiangsu provinci...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 college of commu...
  • 4 篇 school of cyber ...

作者

  • 17 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 9 篇 yue guangxue
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 210 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=JiangSu Provincial Key Lab for Computer Information Processing Technology"
226 条 记 录,以下是91-100 订阅
排序:
Smartphone-based colorimetric detection of formaldehyde in the air
收藏 引用
Building Simulation 2024年 第11期17卷 2007-2015页
作者: Meng Yang Jin Ye Tao Yu Ying Song Hua Qian Tianyi Liu Yang Chen Junqi Wang Shi-jie Cao Cong Liu School of Energy and Environment Southeast UniversityNanjing210096China School of Energy and Power Jiangsu University of Science and TechnologyZhenjiangJiangsu212100China Wuhan Second Ship Design and Research Institute Wuhan430205China Hubei Provincial Engineering and Technology Research Center for Food Quality and Safety Test Hubei Provincial Institute for Food Supervision and TestWuhan430075China Laboratory of Image Science and Technology the School of Computer Science and EngineeringSoutheast UniversityNanjingChina Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Southeast UniversityNanjingChina School of Cyber Science and Engineering Southeast UniversityNanjingChina Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationNanjingChina School of Architecture Southeast UniversityNanjingChina Jiangsu Province Engineering Research Center of Urban Heat and Pollution Control Southeast UniversityNanjingChina Global Centre for Clean Air Research(GCARE) University of SurreyGuildfordUK
Adverse impacts of exposure to formaldehyde on human health significantly increases attention in monitoring formaldehyde concentrations in the *** formaldehyde detection methods typically rely on large and costly inst... 详细信息
来源: 评论
Enriched format text categorization using a component similarity approach
Journal of Software
收藏 引用
Journal of Software 2011年 第9期6卷 1713-1720页
作者: Zhu, Fei Yang, Jiong Zhou, Yong School of Computer Science and Technology Soochow University Suzhou Jiangsu 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
Text categorization has been widely studied for years. However, conventional plain text categorization approaches which work good in plain text behave poor when they are simply applied to enriched format texts. An cat... 详细信息
来源: 评论
Identifying query interfaces of deep web entries automatically
收藏 引用
Journal of Computational information Systems 2009年 第3期5卷 1477-1485页
作者: Cui, Zhiming Fang, Wei Huang, Li Xian, Xuefeng Zhang, Shukui Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 China Institute of Intelligent Information Processing and Application Soochow University Suzhou 215006 China
A large number of high-quality web information is deeply hidden in the Web, which can not be indexed by conventional search engines, be called Deep Web. Because query interface is the only entrance to the Deep Web, we... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Ronghui, Wu Renfa, Li Fei, Yu Guangxue, Yue Cheng, Xu School of Computer and Communication Hunan University Changsha410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Wu, Ronghui Li, Renfa Yu, Fei Yue, Guangxue Xu, Cheng School of Computer and Communication Hunan University Changsha 410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论
Adaptive resampling in particle filter based on diversity measures
Adaptive resampling in particle filter based on diversity me...
收藏 引用
International Conference on computer Science and Education
作者: Yu, Jin-Xia Liu, Wen-Jing Tang, Yong-Li College of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Jiangsu Provincial Key Lab. of Image Processing and Image Communication Nanjing University of Posts and Communication Nanjing 210003 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
It is very important to find a criterion when to perform a resampling step. Aimed at this problem, an adaptive resampling algorithm in particle filter based on diversity measures is presented. Based on the analysis an... 详细信息
来源: 评论
The Applications of Generalized Computing In Knowledge Management
The Applications of Generalized Computing In Knowledge Manag...
收藏 引用
2005年公共管理国际会议
作者: YAO Min SHEN Bin ZHANG Yan-gu College of Computer Zhejiang University Provincial Key Lab. for Computer Information processing Technology in Jiangsu Suzhou University School of Computer Wenzhou Normal College
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe... 详细信息
来源: 评论
Implementation of data-exchanging system based on message oriented middleware in agricultural website
收藏 引用
WSEAS Transactions on computers 2008年 第6期7卷 620-629页
作者: Zhang, Xiaoshuan Wu, Qinghua Tian, Dong Zhao, Ming Xiaoshuan, Zhang College of Information and Electrical Engineering China Agricultural University Beijing 100083 China Jiangsu Provincial Key Laboratory Computer Information Processing Technology Suzhou China
With the startup of the Golden Agriculture Project, the step of being-information of agriculture is becoming rapid. And the transformation and share of data is indispensable to the being-information of agriculture. Ho... 详细信息
来源: 评论
An online semantic tree for link detection
收藏 引用
Journal of Convergence information technology 2012年 第5期7卷 147-157页
作者: He, Ruifang Hong, Yu Information System and Software Engineering Lab School of Computer Science and Technology Tianjin University Tianjin 15001 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou 215006 China
Link Detection (abbr. LDT) is to determine whether two stories discuss the same topic in Topic Detection and Tracking (abbr. TDT) track. The key issue is to correctly measure the relevance between two stories. Most re... 详细信息
来源: 评论
Automated trust negotiation with time behavior
收藏 引用
Journal of Networks 2011年 第8期6卷 1091-1098页
作者: Chen, Zuo Yang, Qiuwei Wan, Xin Tu, Yuanyan Yu, Fei Xu, Chen School of Computer and Communication Hunan University Chang sha China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
In automated trust negotiation(ATN), strangers build trust relationship by disclosing attributes credentials alternately. In the recent study of ATN, there was no rigorous formal definition of ATN abstract model, and ... 详细信息
来源: 评论