咨询与建议

限定检索结果

文献类型

  • 2,424 篇 会议
  • 2,090 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,515 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,086 篇 工学
    • 2,157 篇 计算机科学与技术...
    • 1,806 篇 软件工程
    • 785 篇 信息与通信工程
    • 373 篇 生物工程
    • 353 篇 控制科学与工程
    • 328 篇 电气工程
    • 295 篇 电子科学与技术(可...
    • 265 篇 光学工程
    • 222 篇 机械工程
    • 211 篇 生物医学工程(可授...
    • 192 篇 化学工程与技术
    • 137 篇 仪器科学与技术
    • 111 篇 动力工程及工程热...
    • 95 篇 材料科学与工程(可...
    • 83 篇 网络空间安全
    • 80 篇 交通运输工程
    • 78 篇 安全科学与工程
  • 1,769 篇 理学
    • 932 篇 数学
    • 526 篇 物理学
    • 417 篇 生物学
    • 281 篇 统计学(可授理学、...
    • 194 篇 化学
    • 126 篇 系统科学
  • 885 篇 管理学
    • 479 篇 图书情报与档案管...
    • 437 篇 管理科学与工程(可...
    • 156 篇 工商管理
  • 177 篇 医学
    • 151 篇 临床医学
    • 134 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
  • 106 篇 法学
    • 92 篇 社会学
  • 61 篇 农学
  • 46 篇 教育学
  • 44 篇 经济学
  • 19 篇 文学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 5 篇 哲学

主题

  • 178 篇 semantics
  • 160 篇 feature extracti...
  • 117 篇 training
  • 81 篇 deep learning
  • 79 篇 convolution
  • 73 篇 computational mo...
  • 65 篇 object detection
  • 62 篇 accuracy
  • 59 篇 image segmentati...
  • 51 篇 data mining
  • 50 篇 visualization
  • 47 篇 computer science
  • 47 篇 optimization
  • 45 篇 support vector m...
  • 45 篇 clustering algor...
  • 45 篇 convolutional ne...
  • 43 篇 robustness
  • 42 篇 computer vision
  • 41 篇 contrastive lear...
  • 41 篇 machine learning

机构

  • 157 篇 hubei province k...
  • 141 篇 key laboratory o...
  • 108 篇 school of comput...
  • 94 篇 college of compu...
  • 90 篇 provincial key l...
  • 89 篇 faculty of scien...
  • 89 篇 departamento de ...
  • 89 篇 department for p...
  • 88 篇 department of ph...
  • 88 篇 department of ph...
  • 88 篇 dipartimento di ...
  • 88 篇 yerevan physics ...
  • 88 篇 institute of phy...
  • 87 篇 kirchhoff-instit...
  • 86 篇 graduate school ...
  • 85 篇 fakultät für phy...
  • 85 篇 institute of phy...
  • 85 篇 physikalisches i...
  • 84 篇 department of ph...
  • 84 篇 institut für ast...

作者

  • 81 篇 f. buehrer
  • 81 篇 a. t. law
  • 81 篇 c. alexa
  • 81 篇 j. m. izen
  • 81 篇 s. veneziano
  • 81 篇 d. di valentino
  • 81 篇 g. bella
  • 81 篇 j. strandberg
  • 81 篇 d. calvet
  • 81 篇 c. amelung
  • 81 篇 n. orlando
  • 81 篇 c. gumpert
  • 81 篇 h. a. gordon
  • 81 篇 y. tayalati
  • 81 篇 g. spigo
  • 81 篇 v. chiarella
  • 81 篇 f. siegert
  • 81 篇 a. c. könig
  • 81 篇 a. dimitrievska
  • 81 篇 f. deliot

语言

  • 4,246 篇 英文
  • 173 篇 其他
  • 102 篇 中文
检索条件"机构=Jiangsu Computer Information Processing Technology Key Laboratory"
4515 条 记 录,以下是4401-4410 订阅
排序:
IMEWAS - A integrated multi-platform EAPoW-based WLAN AAA solution
IMEWAS - A integrated multi-platform EAPoW-based WLAN AAA so...
收藏 引用
Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07
作者: Chen, Ling Lu, Jian-De Jiangsu Key Laboratory Computer Information Processing Technology Soochow University Jiangsu Suzhou 215006 China
As security is becoming a significant obstacle to wider deployment of wireless LANs, IEEE 802.1x and EAPoW has been put forward to enhance authentication in WLAN. At present, some existing client solution such as Xsup... 详细信息
来源: 评论
Numerical simulation of two-dimensional photonic crystal with FDTD method
收藏 引用
Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of technology 2008年 第3期30卷 5-7页
作者: Zhou, Jian Jiang, Hong-Zhou Zhang, Lin Wang, Lin Zeng, Chun-Nian Chen, Ji State Key Laboratory of Advanced Technology for Materials Synthesis and Processing Wuhan University of Technology Wuhan 430070 China School of Information Engineering Wuhan University of Technology Wuhan 430070 China School of Automotive Engineering Wuhan University of Technology Wuhan 430070 China Department of Electrical and Computer Engineering University of Houston Houston United States
Based on the theory of photonic crystal and its characteristic, which was known as photonic band gap (PBG), the finite-difference time-domain (FDTD) method, including absorbing boundary condition and periodic boundary... 详细信息
来源: 评论
Enhancing Training Set for Face Detection Based on SVM
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2008年 第11期19卷 2921-2931页
作者: Wang, Rui-Ping Chen, Jie Shan, Shi-Guang Chen, Xi-Lin Gao, Wen Key Laboratory of Intelligent Information Processing The Chinese Academy of Sciences Beijing 100190 China Institute of Computing Technology The Chinese Academy of Sciences Beijing 100190 China Graduate University The Chinese Academy of Sciences Beijing 100049 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
According to support vector machines (SVMs), for those geometric approach based classification methods, examples close to the class boundary usually are more informative than others. Taking face detection as an exampl... 详细信息
来源: 评论
Genetic algorithm for pareto optimum-based route selection
收藏 引用
Journal of Systems Engineering and Electronics 2007年 第2期18卷 360-368页
作者: Cui Xunxue Li Qin Tao Qing New Star Research Inst. of Applied Technology Hefei 230031 P. R. China Jiangsu Key Lab of Computer Information Processing Technology Soochow Univ. Suzhou 215006 P. R. China
A quality of service (QoS) or constraint-based routing selection needs to find a path subject to multiple constraints through a network. The problem of finding such a path is known as the multi-constrained path (MC... 详细信息
来源: 评论
Towards termination criteria of ant colony optimization
Towards termination criteria of ant colony optimization
收藏 引用
3rd International Conference on Natural Computation, ICNC 2007
作者: Lv, Qiang Xia, Oyan School of Computer Science and Technology Suzhou University Suzhou Jiangsu 215006 China Provincial Key Lab. for Computer Information Processing Technology Suzhou Jiangsu 215006 China
Ant colony optimization (ACO for short) has been proved a successful meta-heuristic by a huge of empirical studies. This paper discusses the termination criteria of ACO and therefore provides research ideas to other m... 详细信息
来源: 评论
An access control model in lager-scale P2P file sharing systems
An access control model in lager-scale P2P file sharing syst...
收藏 引用
7th International Conference on Computational Science (ICCS 2007)
作者: Yue Guang-xue Yu Fei Chen Li-ping Chen Yi-jun College of Information Engineering Jiaxing University 314000 China Department of Computer Science and Technology Huaihua University 418000 China State Key Lab. for Novel Software Technology Nanjing University 210093 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University 2150063 China
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym... 详细信息
来源: 评论
ADJSA: An adaptable dynamic job scheduling approach based on historical information  2
ADJSA: An adaptable dynamic job scheduling approach based on...
收藏 引用
2nd International Conference on Scalable information Systems, InfoScale 2007
作者: Xu, Lan Zhu, Qiao-Ming Gong, Zhengxian Li, Pei-Feng School of Computer Science and Technology Soochow University Suzhou215006 China Key Lab of Computer Information Processing Technology of Jiangsu Province Suzhou215006 China
Currently, there are many researches focusing on grid scheduling and more and more scheduling algorithms were proposed. However, those algorithms are not satisfied with the requirement of the grid for ignoring its cha... 详细信息
来源: 评论
Immune genetic algorithm for weapon-target assignment problem
Immune genetic algorithm for weapon-target assignment proble...
收藏 引用
2007 Workshop on Intelligent information technology Application, IITA 2007
作者: Gao, Shang Zhang, Zaiyue Zhang, Xiaoru Cao, Cungen School of Electronics and Information Jiangsu University of Science and Technology Zhenjiang 212003 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
An Immune Genetic Algorithm (IGA) is used to solve weapon-target assignment problem (WTA). The used immune system serves as a local search mechanism for genetic algorithm. Besides, in our implementation, a new crossov... 详细信息
来源: 评论
IMEWAS--A Integrated Multi-platform EAPoW-Based WLAN AAA Solution
IMEWAS--A Integrated Multi-platform EAPoW-Based WLAN AAA Sol...
收藏 引用
International Conference on Wireless and Mobile Communications (ICWMC)
作者: Ling Chen Jian-de Lu Jiangsu Key Laboratory of Computer Information Processing Technology Soochow University Suzhou Jiangsu China
As security is becoming a significant obstacle to wider deployment of wireless LANs, IEEE 802.1x and EAPoW has been put forward to enhance authentication in WLAN. At present, some existing client solution such as Xsup... 详细信息
来源: 评论
Content-based image retrieval using fuzzy hamming distance
Content-based image retrieval using fuzzy hamming distance
收藏 引用
2007 8th International Conference on Electronic Measurement and Instruments, ICEMI
作者: Hu, Xuelong Yang, Li Zhang, Gensheng School of Information Engineering Yangzhou University Yangzhou 225009 China Jiangsu Province Key Lab. for Image Processing and Communication Nanjing University of Post and Telecommunications Nanjing 215006 China Jiangsu Province Key Lab. for Computer Information Processing Technology Suzhou University Suzhou 215006 China
This paper addresses an effective issue of content-based image retrieval (CBIR) by presenting Fuzzy Hamming Distance (FHD). Firstly, the theory of FHD is introduced, which includes degree of difference and cardinality... 详细信息
来源: 评论