咨询与建议

限定检索结果

文献类型

  • 2,472 篇 会议
  • 2,118 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,591 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,159 篇 工学
    • 2,217 篇 计算机科学与技术...
    • 1,822 篇 软件工程
    • 787 篇 信息与通信工程
    • 395 篇 控制科学与工程
    • 376 篇 生物工程
    • 339 篇 电气工程
    • 305 篇 电子科学与技术(可...
    • 268 篇 光学工程
    • 226 篇 机械工程
    • 214 篇 生物医学工程(可授...
    • 192 篇 化学工程与技术
    • 139 篇 仪器科学与技术
    • 111 篇 动力工程及工程热...
    • 97 篇 材料科学与工程(可...
    • 83 篇 网络空间安全
    • 79 篇 交通运输工程
    • 79 篇 安全科学与工程
  • 1,783 篇 理学
    • 936 篇 数学
    • 530 篇 物理学
    • 418 篇 生物学
    • 283 篇 统计学(可授理学、...
    • 198 篇 化学
    • 126 篇 系统科学
  • 889 篇 管理学
    • 479 篇 图书情报与档案管...
    • 440 篇 管理科学与工程(可...
    • 156 篇 工商管理
  • 179 篇 医学
    • 152 篇 临床医学
    • 134 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
  • 106 篇 法学
    • 92 篇 社会学
  • 60 篇 农学
  • 46 篇 教育学
  • 44 篇 经济学
  • 19 篇 文学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 5 篇 哲学

主题

  • 177 篇 semantics
  • 162 篇 feature extracti...
  • 118 篇 training
  • 85 篇 deep learning
  • 79 篇 convolution
  • 73 篇 computational mo...
  • 65 篇 object detection
  • 62 篇 accuracy
  • 60 篇 image segmentati...
  • 52 篇 data mining
  • 50 篇 visualization
  • 48 篇 computer science
  • 48 篇 contrastive lear...
  • 47 篇 optimization
  • 47 篇 convolutional ne...
  • 45 篇 support vector m...
  • 45 篇 clustering algor...
  • 43 篇 computer vision
  • 43 篇 robustness
  • 42 篇 machine learning

机构

  • 161 篇 hubei province k...
  • 142 篇 key laboratory o...
  • 114 篇 school of comput...
  • 94 篇 college of compu...
  • 90 篇 provincial key l...
  • 89 篇 faculty of scien...
  • 89 篇 departamento de ...
  • 89 篇 department for p...
  • 88 篇 department of ph...
  • 88 篇 department of ph...
  • 88 篇 dipartimento di ...
  • 88 篇 yerevan physics ...
  • 88 篇 institute of phy...
  • 87 篇 kirchhoff-instit...
  • 86 篇 graduate school ...
  • 85 篇 fakultät für phy...
  • 85 篇 institute of phy...
  • 85 篇 physikalisches i...
  • 84 篇 department of ph...
  • 84 篇 institut für ast...

作者

  • 81 篇 f. buehrer
  • 81 篇 a. t. law
  • 81 篇 c. alexa
  • 81 篇 j. m. izen
  • 81 篇 s. veneziano
  • 81 篇 d. di valentino
  • 81 篇 g. bella
  • 81 篇 j. strandberg
  • 81 篇 d. calvet
  • 81 篇 c. amelung
  • 81 篇 n. orlando
  • 81 篇 c. gumpert
  • 81 篇 h. a. gordon
  • 81 篇 y. tayalati
  • 81 篇 g. spigo
  • 81 篇 v. chiarella
  • 81 篇 f. siegert
  • 81 篇 a. c. könig
  • 81 篇 a. dimitrievska
  • 81 篇 f. deliot

语言

  • 4,193 篇 英文
  • 298 篇 其他
  • 105 篇 中文
检索条件"机构=Jiangsu Computer Information Processing Technology Key Laboratory"
4591 条 记 录,以下是4211-4220 订阅
排序:
The application of flash into M-learning in 3G initial stage
The application of flash into M-learning in 3G initial stage
收藏 引用
2010 3rd International Symposium on Knowledge Acquisition and Modeling, KAM 2010
作者: Tang, Yue-Ming Liu, Quan Wang, Ling-Ling Department of Educational Technology Henan Normal University Xinxiang Henan Province China Institute of Computer Science and Technology Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou Jiangsu Province China
With the development of the 3G technology, M-learning enters a period of rapid development. But meanwhile 3G also restrains the development of M-Iearning due to several drawbacks in its early days. According to the ap... 详细信息
来源: 评论
A robust method for license plate detection
A robust method for license plate detection
收藏 引用
Pacific Rim Symposium on Image and Video technology
作者: Luo, Jian Yang, Su Guan, Ruimin Niu, Haijun School of Computer Science and Technology Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 201203 China
License plate detection plays an important role in vehicle license plate recognition for intelligent transport systems. This paper presents a robust method for license plate detection. As we observed, license plate ar... 详细信息
来源: 评论
Four-state passive propagation model of malicious code in P2P networks
收藏 引用
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and technology (Natural Science Edition) 2011年 第6期12卷 582-587页
作者: Xu, Xiao-Long Xiong, Jing-Yi Cheng, Chun-Ling Yang, Geng College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China State Key Laboratory of Information Security Institute of Software Chinese Acad. of Sci. Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China
The propagation and attack of malicious codes in Peer-to-Peer networks (P2P) is getting more and more serious. The propagation of malicious code was divide into two types, passive and active propagations, and then a n... 详细信息
来源: 评论
Schedulability analysis for real-time messages over switched Ethernet with EDF scheduling
Schedulability analysis for real-time messages over switched...
收藏 引用
2nd International Conference on information Science and Engineering, ICISE2010
作者: Tan, Ming Wei, Zhen Key Laboratory of Network and Intelligent Information Processing Hefei University Hefei China School of Computer and Information Hefei university of technology Hefei China
To overcome the drawback that switched Ethernet can not meet the real-time requirements in industrial communications, an improved message transmission model in which switch and the end-nodes control the real-time traf... 详细信息
来源: 评论
Dependency tree-based anaphoricity determination for coreference resolution
Dependency tree-based anaphoricity determination for corefer...
收藏 引用
International Conference on Asian Language processing
作者: Kong, Fang Zhou, Jianmei Zhou, Guodong Zhu, Qiaoming JiangSu Provincial Key Lab. for Computer Information Processing Technology China School of Computer Science and Technology Soochow University Suzhou China Computer Science and Technology School NanTong University NanTong China
This paper proposes a new scheme to determine the tree span structure for tree kernel-based anaphoricity determination in coreference resolution. Given a sentence and current mention, it gets all the dependencies, enc... 详细信息
来源: 评论
Efficient identity-based signature scheme in the standard model
Efficient identity-based signature scheme in the standard mo...
收藏 引用
International Conference on Advanced computer Theory and Engineering
作者: Xia, Fei Yanqin, Zhu Xizhao, Luo School of Computer Science and Technology Soochow University Suzhou 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
Constructing identity-based signature(IBS) secure in the standard model is one of the active topics of current cryptography. We present a new efficient IBS scheme without random oracles and prove that it achieves adap... 详细信息
来源: 评论
Gas concentration detection using ultrasonic based on wireless sensor networks
Gas concentration detection using ultrasonic based on wirele...
收藏 引用
International Conference on information Science and Engineering
作者: Shan, Minglei Li, Xiang Zhu, Changping Zhang, Jiahua Department of Computer and Information Jiangsu Key Laboratory of Power Transmission and Distribution Equipment Technology Hohai University Changzhou China
In this article, a low power consumption wireless sensor for binary gas mixtures real-time quantitative analysis is presented. This small size wireless gas sensor, which is developed based on an improved time-of-fligh... 详细信息
来源: 评论
A fixed-point decoding approach for statistical machine translation on mobile terminals
A fixed-point decoding approach for statistical machine tran...
收藏 引用
2010 4th International Universal Communication Symposium, IUCS 2010
作者: Li, Xiang Xu, Jin'an Jiang, Wenbin Liu, Qun Lü, Yajuan School of Computer and Information Technology Beijing Jiaotong University Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China
The demand for statistical machine translation on mobile terminals is increasing rapidly, but translation speed is restricted by the embedded processors without a floating-point unit. This paper proposes an approach t... 详细信息
来源: 评论
Assessment of rotamer library for protein structure prediction
Assessment of rotamer library for protein structure predicti...
收藏 引用
2nd International Conference on information Science and Engineering, ICISE2010
作者: Huang, Xu Lü, Qiang Miao, Dajun Qian, Peide School of Computer Science and Technology Soochow University Suzhou 215006 China Jiangsu Provincial Key Lab for Information Processing Technologies Suzhou 215006 China
Side chain packing is a crucial step for protein structure prediction. And the quality of rotamer library has important implications in side chain packing. This paper assess dunbrack rotamer libraries and simple sampl... 详细信息
来源: 评论
Jointly modeling WSD and SRL with markov logic
Jointly modeling WSD and SRL with markov logic
收藏 引用
23rd International Conference on Computational Linguistics, Coling 2010
作者: Che, Wanxiang Liu, Ting Research Center for Information Retrieval MOE-Microsoft Key Laboratory of Natural Language Processing and Speech School of Computer Science and Technology China
Semantic role labeling (SRL) and word sense disambiguation (WSD) are two fundamental tasks in natural language processing to find a sentence-level semantic representation. To date, they have mostly been modeled in iso... 详细信息
来源: 评论