咨询与建议

限定检索结果

文献类型

  • 2,468 篇 会议
  • 2,101 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,570 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,136 篇 工学
    • 2,199 篇 计算机科学与技术...
    • 1,845 篇 软件工程
    • 781 篇 信息与通信工程
    • 372 篇 生物工程
    • 364 篇 控制科学与工程
    • 336 篇 电气工程
    • 300 篇 电子科学与技术(可...
    • 273 篇 光学工程
    • 227 篇 机械工程
    • 211 篇 生物医学工程(可授...
    • 190 篇 化学工程与技术
    • 139 篇 仪器科学与技术
    • 109 篇 动力工程及工程热...
    • 95 篇 材料科学与工程(可...
    • 83 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 79 篇 建筑学
  • 1,778 篇 理学
    • 938 篇 数学
    • 528 篇 物理学
    • 417 篇 生物学
    • 283 篇 统计学(可授理学、...
    • 193 篇 化学
    • 126 篇 系统科学
  • 891 篇 管理学
    • 480 篇 图书情报与档案管...
    • 442 篇 管理科学与工程(可...
    • 159 篇 工商管理
  • 174 篇 医学
    • 150 篇 临床医学
    • 131 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
  • 107 篇 法学
    • 93 篇 社会学
  • 59 篇 农学
  • 49 篇 教育学
  • 45 篇 经济学
  • 19 篇 文学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 5 篇 哲学

主题

  • 177 篇 semantics
  • 161 篇 feature extracti...
  • 119 篇 training
  • 83 篇 deep learning
  • 79 篇 convolution
  • 73 篇 computational mo...
  • 65 篇 object detection
  • 62 篇 accuracy
  • 60 篇 image segmentati...
  • 52 篇 data mining
  • 50 篇 visualization
  • 48 篇 computer science
  • 48 篇 contrastive lear...
  • 47 篇 optimization
  • 46 篇 convolutional ne...
  • 45 篇 support vector m...
  • 45 篇 clustering algor...
  • 43 篇 robustness
  • 42 篇 computer vision
  • 41 篇 machine learning

机构

  • 161 篇 hubei province k...
  • 142 篇 key laboratory o...
  • 114 篇 school of comput...
  • 94 篇 college of compu...
  • 89 篇 faculty of scien...
  • 89 篇 departamento de ...
  • 89 篇 department for p...
  • 89 篇 provincial key l...
  • 88 篇 department of ph...
  • 88 篇 department of ph...
  • 88 篇 dipartimento di ...
  • 88 篇 yerevan physics ...
  • 88 篇 institute of phy...
  • 87 篇 kirchhoff-instit...
  • 86 篇 graduate school ...
  • 85 篇 fakultät für phy...
  • 85 篇 institute of phy...
  • 85 篇 physikalisches i...
  • 84 篇 department of ph...
  • 84 篇 institut für ast...

作者

  • 81 篇 f. buehrer
  • 81 篇 a. t. law
  • 81 篇 c. alexa
  • 81 篇 j. m. izen
  • 81 篇 s. veneziano
  • 81 篇 d. di valentino
  • 81 篇 g. bella
  • 81 篇 j. strandberg
  • 81 篇 d. calvet
  • 81 篇 c. amelung
  • 81 篇 n. orlando
  • 81 篇 c. gumpert
  • 81 篇 h. a. gordon
  • 81 篇 y. tayalati
  • 81 篇 g. spigo
  • 81 篇 v. chiarella
  • 81 篇 f. siegert
  • 81 篇 a. c. könig
  • 81 篇 a. dimitrievska
  • 81 篇 f. deliot

语言

  • 4,219 篇 英文
  • 251 篇 其他
  • 106 篇 中文
检索条件"机构=Jiangsu Computer Information Processing Technology Key Laboratory"
4570 条 记 录,以下是511-520 订阅
排序:
Logical Implication of Structural Integrity Constraints for XML
收藏 引用
Chinese Journal of Electronics 2023年 第2期18卷 243-248页
作者: Jianmei Zhang Shiqun Tao Jiye Liang Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education School of Computer and Information Technology Shanxi University Taiyuan China Changzhi University Changzhi China
For tree XML, constraints that specify structural relationships among nodes or paths are very natural. In this paper, we introduce the concept of structural integrity constraints for XML (XSICs), which specify path im... 详细信息
来源: 评论
Traffic Pattern Sharing for Federated Traffic Flow Prediction with Personalization  24
Traffic Pattern Sharing for Federated Traffic Flow Predictio...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhou, Hang Yu, Wentao Wan, Sheng Tong, Yongxin Gu, Tianlong Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China SKLSDE Beihang University China Jinan University Engineering Research Center of Trustworthy AI Ministry of Education China
Accurate Traffic Flow Prediction (TFP) is crucial for enhancing the efficiency and safety of transportation systems, so it has attracted intensive researches by exploiting spatial-temporal dependencies within road net... 详细信息
来源: 评论
A Biological Echo Identification Method with Single Polarized Weather Radar Using Super-Pixel Segmentation
A Biological Echo Identification Method with Single Polarize...
收藏 引用
IET International Radar Conference 2023, IRC 2023
作者: Yan, Zujing Cui, Kai Zhang, Jingmin Wang, Rui Hu, Cheng Liu, Jiaxing Zhang, Duo Sun, Zhuoran Mao, Huafeng Radar Research Laboratory School of Information and Electronics Beijing Institute of Technology Beijing100081 China No. 208 Research Institute of China Ordnance Industries Beijing100081 China Advanced Technology Research Institute Beijing Institute of Technology Jinan250300 China Beijing Key Laboratory of Embedded Real-time Information Processing Technology Radar Research Laboratory School of Information and Electronic Beijing Institute of Technology Beijing100081 China School of Computer Sciences Beijing Institute of Technology Beijing100081 China
Weather radar networks, given their advantages of continental coverage and year-round operation, show great potential in the study of large-scale aerial biological migration. The precise identification and extraction ... 详细信息
来源: 评论
Enhancing Programming Course Quality through Human Posture Recognition and Screen Content Detection  4
Enhancing Programming Course Quality through Human Posture R...
收藏 引用
4th International Conference on information Science and Education, ICISE-IE 2023
作者: Chen, Xiaopan Bai, Haiyang Zhu, Xiaoke Dong, Lingyuan School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing Kaifeng China
The evaluation of programming course instruction is a key component of educational management. However, relying solely on supervising teachers for assessment poses challenges in comprehensive evaluation and providing ... 详细信息
来源: 评论
Improving Classroom Quality by Analyzing Student Behaviors Through computer Vision  4
Improving Classroom Quality by Analyzing Student Behaviors T...
收藏 引用
4th International Conference on information Science and Education, ICISE-IE 2023
作者: Chen, Xiaopan Li, Boyuan Zhu, Xiaoke Zhang, Tao School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing Kaifeng China
This paper aims to enhance the efficiency of teaching and learning by leveraging computer vision technology for automated analysis of student behavior in the classroom. We propose a feature-enhanced method for recogni... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
ASM Net:Action and Style-Conditioned Motion Generative Network for 3D Human Motion Generation
收藏 引用
类生命系统(英文) 2024年 第4期2024卷 237-246页
作者: Zongying Li Yong Wang Xin Du Can Wang Reinhard Koch Mengyuan Liu School of Artificial Intelligence Chongqing University of TechnologyChongqingChina Multimedia Information Processing Laboratory at the Department of Computer Science Kiel UniversityKielGermany Advanced Institute of Information Technology(AIIT) Peking UniversityHangzhouChina Hangzhou Linxrobot Co.Ltd. HangzhouChina Multimedia Information Processing Laboratory at the Department of Computer Science Kiel UniversityKielGermany National Key Laboratory of General Artificial Intelligence Peking UniversityShenzhen Graduate SchoolShenzhenChina
Extensive research has explored human motion generation,but the generated sequences are influenced by different motion *** instance,the act of walking with joy and sorrow evokes distinct effects on a character's *... 详细信息
来源: 评论
A Foreground Feature Embedding Network for Object Detection in Remote Sensing Images  18th
A Foreground Feature Embedding Network for Object Detection...
收藏 引用
18th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2023
作者: Wu, Jiahui Cai, Yuanzheng Wang, Tao Luo, Zhiming Shan, Senhua Li, Zuoyong College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350108 China Department of Artificial Intelligence Xiamen University Xiamen361005 China Istrong Technology Limited Company Fuzhou350108 China
Compared with traditional natural images, remote sensing images (RSIs) typically have high resolution. The objects in the images are densely distributed, with heterogeneous orientation and large scale variation, even ... 详细信息
来源: 评论
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and Applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论