咨询与建议

限定检索结果

文献类型

  • 135 篇 会议
  • 90 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 122 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 43 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 14 篇 电气工程
    • 14 篇 生物工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 10 篇 光学工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 80 篇 理学
    • 48 篇 数学
    • 17 篇 生物学
    • 15 篇 物理学
    • 13 篇 化学
    • 13 篇 统计学(可授理学、...
    • 5 篇 系统科学
  • 54 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 14 篇 农学
    • 13 篇 作物学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
  • 4 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 feature extracti...
  • 5 篇 computer science
  • 5 篇 support vector m...
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 laboratories

机构

  • 24 篇 provincial key l...
  • 24 篇 school of comput...
  • 12 篇 jiangsu provinci...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 college of commu...
  • 4 篇 school of cyber ...

作者

  • 17 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 9 篇 yue guangxue
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 210 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=JiangSu Provincial Key Lab for Computer Information Processing Technology"
226 条 记 录,以下是161-170 订阅
排序:
Global learning of noun phrase anaphoricity in coreference resolution via label propagation
Global learning of noun phrase anaphoricity in coreference r...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Zhou, Guo Dong Kong, Fang JiangSu Provincial Key Lab. for Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou 215006 China
Knowledge of noun phrase anaphoricity might be profitably exploited in coreference resolution to bypass the resolution of non-anaphoric noun phrases. However, it is surprising to notice that recent attempts to incorpo... 详细信息
来源: 评论
Employing the centering theory in pronoun resolution from the semantic perspective
Employing the centering theory in pronoun resolution from th...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Kong, Fang Zhou, Guo Dong Zhu, Qiaoming JiangSu Provincial Key Lab. for Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou 215006 China
In this paper, we employ the centering theory in pronoun resolution from the semantic perspective. First, diverse semantic role features with regard to different predicates in a sentence are explored. Moreover, given ... 详细信息
来源: 评论
Semi-supervised learning for semantic relation classification using stratified sampling strategy
Semi-supervised learning for semantic relation classificatio...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Qian, Longhua Zhou, Guodong Kong, Fang Zhu, Qiaoming Jiangsu Provincial Key Lab for Computer Information Processing Technology School of Computer Science and Technology Soochow University 1 Shizi Street Suzhou 215006 China
This paper presents a new approach to selecting the initial seed set using stratified sampling strategy in bootstrapping-based semi-supervised learning for semantic relation classification. First, the training data is... 详细信息
来源: 评论
Improving nominal SRL in Chinese language with verbal SRL information and automatic predicate recognition
Improving nominal SRL in Chinese language with verbal SRL in...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Li, Junhui Zhou, Guodong Zhao, Hai Zhu, Qiaoming Qian, Peide Jiangsu Provincial Key Lab. for Computer Information Processing Technologies School of Computer Science and Technology Soochow University Suzhou 215006 China Department of Chinese Translation and Linguistics City University of HongKong Hong Kong
This paper explores Chinese semantic role labeling (SRL) for nominal predicates. Besides those widely used features in verbal SRL, various nominal SRL-specific features are first included. Then, we improve the perform... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
Semantic role labeling using Chinese dependency parsing tree
Semantic role labeling using Chinese dependency parsing tree
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hongling Wang Xiaohong Yuan Guodong Zhou Jiangsu Provincial Key Lab for Computer Information Processing Technology Soochow University Suzhou China
Although recent years have seen much progress in semantic role labeling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b... 详细信息
来源: 评论
Secure and efficient VSS scheme based on partial broadcast channels
收藏 引用
Journal of Computational information Systems 2009年 第3期5卷 1149-1155页
作者: Wang, Jialing Zhu, Yanqin Luo, Xizhao School of Computer Science and Technology Soochow University Suzhou 215006 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou 215006 China
In the conventional verifiable secret sharing scheme, a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of participants. Rei and Wang proposed a secret sharing scheme based ... 详细信息
来源: 评论
Extracting Protein-Protein Interaction from Biomedical Text Using Additional Shallow Parsing information
Extracting Protein-Protein Interaction from Biomedical Text ...
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Huanhuan Yu Longhua Qian Guodong Zhou Qiaoming Zhu Jiangsu Provincial Key Laboratory of Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou China
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information... 详细信息
来源: 评论
Identifying query interfaces of deep web entries automatically
收藏 引用
Journal of Computational information Systems 2009年 第3期5卷 1477-1485页
作者: Cui, Zhiming Fang, Wei Huang, Li Xian, Xuefeng Zhang, Shukui Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 China Institute of Intelligent Information Processing and Application Soochow University Suzhou 215006 China
A large number of high-quality web information is deeply hidden in the Web, which can not be indexed by conventional search engines, be called Deep Web. Because query interface is the only entrance to the Deep Web, we... 详细信息
来源: 评论