咨询与建议

限定检索结果

文献类型

  • 2,472 篇 会议
  • 2,118 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,591 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,159 篇 工学
    • 2,217 篇 计算机科学与技术...
    • 1,822 篇 软件工程
    • 787 篇 信息与通信工程
    • 395 篇 控制科学与工程
    • 376 篇 生物工程
    • 339 篇 电气工程
    • 305 篇 电子科学与技术(可...
    • 268 篇 光学工程
    • 226 篇 机械工程
    • 214 篇 生物医学工程(可授...
    • 192 篇 化学工程与技术
    • 139 篇 仪器科学与技术
    • 111 篇 动力工程及工程热...
    • 97 篇 材料科学与工程(可...
    • 83 篇 网络空间安全
    • 79 篇 交通运输工程
    • 79 篇 安全科学与工程
  • 1,783 篇 理学
    • 936 篇 数学
    • 530 篇 物理学
    • 418 篇 生物学
    • 283 篇 统计学(可授理学、...
    • 198 篇 化学
    • 126 篇 系统科学
  • 889 篇 管理学
    • 479 篇 图书情报与档案管...
    • 440 篇 管理科学与工程(可...
    • 156 篇 工商管理
  • 179 篇 医学
    • 152 篇 临床医学
    • 134 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
  • 106 篇 法学
    • 92 篇 社会学
  • 60 篇 农学
  • 46 篇 教育学
  • 44 篇 经济学
  • 19 篇 文学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 5 篇 哲学

主题

  • 177 篇 semantics
  • 162 篇 feature extracti...
  • 118 篇 training
  • 85 篇 deep learning
  • 79 篇 convolution
  • 73 篇 computational mo...
  • 65 篇 object detection
  • 62 篇 accuracy
  • 60 篇 image segmentati...
  • 52 篇 data mining
  • 50 篇 visualization
  • 48 篇 computer science
  • 48 篇 contrastive lear...
  • 47 篇 optimization
  • 47 篇 convolutional ne...
  • 45 篇 support vector m...
  • 45 篇 clustering algor...
  • 43 篇 computer vision
  • 43 篇 robustness
  • 42 篇 machine learning

机构

  • 161 篇 hubei province k...
  • 142 篇 key laboratory o...
  • 114 篇 school of comput...
  • 94 篇 college of compu...
  • 90 篇 provincial key l...
  • 89 篇 faculty of scien...
  • 89 篇 departamento de ...
  • 89 篇 department for p...
  • 88 篇 department of ph...
  • 88 篇 department of ph...
  • 88 篇 dipartimento di ...
  • 88 篇 yerevan physics ...
  • 88 篇 institute of phy...
  • 87 篇 kirchhoff-instit...
  • 86 篇 graduate school ...
  • 85 篇 fakultät für phy...
  • 85 篇 institute of phy...
  • 85 篇 physikalisches i...
  • 84 篇 department of ph...
  • 84 篇 institut für ast...

作者

  • 81 篇 f. buehrer
  • 81 篇 a. t. law
  • 81 篇 c. alexa
  • 81 篇 j. m. izen
  • 81 篇 s. veneziano
  • 81 篇 d. di valentino
  • 81 篇 g. bella
  • 81 篇 j. strandberg
  • 81 篇 d. calvet
  • 81 篇 c. amelung
  • 81 篇 n. orlando
  • 81 篇 c. gumpert
  • 81 篇 h. a. gordon
  • 81 篇 y. tayalati
  • 81 篇 g. spigo
  • 81 篇 v. chiarella
  • 81 篇 f. siegert
  • 81 篇 a. c. könig
  • 81 篇 a. dimitrievska
  • 81 篇 f. deliot

语言

  • 4,193 篇 英文
  • 298 篇 其他
  • 105 篇 中文
检索条件"机构=Jiangsu Computer Information Processing Technology Key Laboratory"
4591 条 记 录,以下是4521-4530 订阅
排序:
Pyramid: Building incentive architecture for unstructured peer-to-peer network
Pyramid: Building incentive architecture for unstructured pe...
收藏 引用
Advanced International Conference on Telecommunications andInternational Conference on Internet and Web Applications and Services, AICT/ICIW'06
作者: Zhao, Jia Lu, Jian-De Jiangsu Key Laboratory of Computer Information Processing Technology Soochow University Jiangsu Suzhou 215006 China
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future ... 详细信息
来源: 评论
A parallel ACO approach based on one pheromone matrix
收藏 引用
Ant Colony Optimization and Swarm Intelligence - 5th International Workshop, ANTS 2006, Proceedings
作者: Qiang, Lv Xiaoyan, Xia Peide, Qian School of Computer Science and Technology Soochow Univeristy China Jiangsu Provincial Key Lab. of Computer Information Processing Technology Suzhou China
This paper presents and implements an approach to parallel ACO algorithms. The principal idea is to make multiple ant colonies share and utilize only one pheromone matrix. We call it SHOP (SHaring One Pheromone matrix... 详细信息
来源: 评论
Study of dynamic timeout strategy based on flow rate metrics in high-speed networks  06
Study of dynamic timeout strategy based on flow rate metrics...
收藏 引用
1st International Conference on Scalable information Systems, InfoScale '06
作者: Zhou, Ming-Zhong Gong, Jian Ding, Wei Southeast Univ. and Jiangsu Province Key Laboratory of Computer Networking Technology and Jiangsu Province Key Laboratory of Network and Information Security Nanjing Jiangsu China
The measurements based on flow characteristics are playing more and more important roles in the analysis of Network Behavior. As one of main methods for flow recognition, the timeout strategies have a significant impa... 详细信息
来源: 评论
A mobility-aware zone-based routing protocol for mobile grid computing
A mobility-aware zone-based routing protocol for mobile grid...
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Li, Rui Li, Renfa Yu, Fei Wen, Jigang School of Computer and Communication Hunan University Changsha 410082 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und... 详细信息
来源: 评论
An mobility-aware zone-based routing protocol for mobile grid computing
An mobility-aware zone-based routing protocol for mobile gri...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Rui, Li Renfa, Li Fei, Yu Jigang, Wen School of Computer and Communication Hunan University Changsha 410082 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und... 详细信息
来源: 评论
Description of fuzzy first-order modal logic based on constant domain semantics
Description of fuzzy first-order modal logic based on consta...
收藏 引用
High-Power Diode Laser technology and Applications IV
作者: Zhang, Zaiyue Sui, Yuefei Cao, Cungen Department of Computer Science Jiangsu University of Science and Technology Zhenjiang Jiangsu 212003 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
As an extension of the traditional modal logic, the fuzzy first-order modal logic is discussed in this paper. A description of fuzzy first-order modal logic based on constant domain semantics is given, and a formal sy... 详细信息
来源: 评论
基于模糊推理的入侵检测系统
基于模糊推理的入侵检测系统
收藏 引用
第二十六届中国控制会议
作者: 喻飞 沈岳 廖桂平 张林峰 徐成 湖南农业大学计算机与信息工程学院 广东商学院广东省电子商务市场应用技术重点实验室 Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University
提出了一种基于模糊神经网络的入侵检测系统,利用神经网络的学习能力,对不清楚规则的复杂系统的输入输出特性进行适当的非线性划分,自动形成规则集和相加的隶属关系,克服了在多维空间上经验性的确定隶属函数的困难。新的体系结构采用网... 详细信息
来源: 评论
A privacy policy of P3P based on relational database
A privacy policy of P3P based on relational database
收藏 引用
First International Multi- Symposiums on computer and Computational Sciences, IMSCCS'06
作者: Jiang, Bin Zhang, Da-Fang Yang, Chao Yue, Guangxue Yu, Fei Software School Hunan University Changsha Hunan 410082 College of Computer and Communication Hunan University Changsha Hunan 410082 Provincial Key Laboratory of Computer Information Processing Technology Nanjing Jiangsu 215006
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited Traditional methods of database access control places great depen... 详细信息
来源: 评论
Data distribution algorithm of high-speed intrusion detection system based on network processor
Data distribution algorithm of high-speed intrusion detectio...
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Xu, Cheng Yu, Fei Dai, Zhenghui Yue, Guangxue Li, Renfa School of Computer and Communication Hunan University Changsha 410082 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou Jiangsu 2150063 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin... 详细信息
来源: 评论
Pyramid: Building Incentive Architecture for Unstructured Peer-to-Peer Network
Pyramid: Building Incentive Architecture for Unstructured Pe...
收藏 引用
Advanced International Conference on Telecommunications (AICT)
作者: Jia Zhao Jian-De Lu Jiangsu Key Laboratory of Computer Information Processing Technology Soochow University Suzhou Jiangsu China
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future ... 详细信息
来源: 评论