咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 90 篇 期刊文献

馆藏范围

  • 236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 111 篇 计算机科学与技术...
    • 101 篇 软件工程
    • 46 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 20 篇 生物工程
    • 19 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 材料科学与工程(可...
  • 76 篇 理学
    • 49 篇 数学
    • 28 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 14 篇 物理学
    • 9 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 50 篇 管理学
    • 29 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 5 篇 法学
    • 5 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 医学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 14 篇 feature extracti...
  • 10 篇 semantics
  • 8 篇 task analysis
  • 7 篇 conferences
  • 7 篇 privacy
  • 7 篇 training
  • 6 篇 deep learning
  • 6 篇 neural networks
  • 6 篇 optimization
  • 6 篇 data mining
  • 6 篇 machine learning
  • 6 篇 forecasting
  • 5 篇 telecommunicatio...
  • 5 篇 computational mo...
  • 5 篇 sensors
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 wireless sensor ...
  • 4 篇 clustering algor...
  • 4 篇 crowdsourcing

机构

  • 57 篇 school of comput...
  • 41 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 29 篇 jiangsu key labo...
  • 16 篇 jiangsu key labo...
  • 12 篇 nanjing universi...
  • 9 篇 nanjing universi...
  • 9 篇 school of comput...
  • 8 篇 nanjing universi...
  • 8 篇 state grid jiang...
  • 7 篇 key lab. of inte...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 peng cheng labor...
  • 6 篇 jiangsu key labo...
  • 6 篇 school of cyber ...
  • 6 篇 school of comput...
  • 6 篇 key laboratory o...
  • 5 篇 college of compu...
  • 5 篇 nanjing universi...

作者

  • 37 篇 xu xiaolong
  • 27 篇 xiaolong xu
  • 15 篇 liu bin
  • 9 篇 chen ke-jia
  • 9 篇 yang geng
  • 8 篇 jia xu
  • 7 篇 yun li
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 7 篇 bin liu
  • 6 篇 lei wang
  • 6 篇 geng yang
  • 6 篇 li yun
  • 6 篇 huang qingming
  • 6 篇 zou zhiqiang
  • 6 篇 chen xingguo
  • 6 篇 cao xiaochun
  • 6 篇 lejun gong
  • 6 篇 dai hua
  • 6 篇 xu qianqian

语言

  • 232 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Jiangsu Key Lab of Big Data and Security and Intelligent Processing"
236 条 记 录,以下是181-190 订阅
排序:
Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud
Proxy Re-Encryption Scheme For Complicated Access Control Fa...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zheng Lian Mang Su Anmin Fu Huaqun Wang Chunyi Zhou School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing PR China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing PR China
Hybrid cloud has both the strong computing power of public cloud and easy control of private cloud. It provides users with robust services and convenience, meanwhile faces numerous security challenges. How to implemen... 详细信息
来源: 评论
Point Cloud Compression Method Based on Curvature Grading and Inter-point Compression for Industrial Products
Point Cloud Compression Method Based on Curvature Grading an...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Lei Wang Wei Huang Yiping Chen Ran Chen School of Computer Nanjing University of Posts and Telecommunications Nanjing P. R. China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing P. R. China
The traditional point cloud compression methods fail to meet the compression requirements of complex surface point cloud files in the industrial field. This paper proposes a point cloud compression method suitable for...
来源: 评论
TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted data
TFS-index-based Multi-keyword Ranked Search Scheme Over Clou...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yinfu Deng Hua Dai Yuanlong Liu Zhangchen Li Geng Yang Xun Yi Nanjing University of Post and Telecommunication Nanjing China Jiangsu Security and Intelligent Processing Lab of Big Data Nanjing University of Post and Telecommunication Nanjing China Royal Melbourne Institute of Technology University Melbourne Australia
Traditional searchable encryption schemes for clouds are generally based on TF-IDF vector space model, but they ignore the high-dimensional sparse characteristic of encrypted vectors. It will lead to substantial compu...
来源: 评论
Path Planning based on Reinforcement Learning with Improved APF model for Synergistic Multi-UAVs
Path Planning based on Reinforcement Learning with Improved ...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qun Ding Xiaolong Xu Wenming Gui Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science Jinling Institute of Technology Nanjing China
As the emerging technology of Unmanned Aerial Vehicles (UAVs) becomes mature, UAVs are widely used in environmental monitoring, communication and other fields. In view of this, this paper analyzed the task of synergis...
来源: 评论
A particle filter based multi-objective optimization algorithm: PFOPS
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Bin Jin, Yaochu School of Computer Science Nanjing University of Posts and Telecommunications Jiangsu Key Lab of Big Data Security and Intelligent Processing Nanjing Jiangsu210023 China Department of Computer Science University of Surrey Guildford SurreyGU2 7XH United Kingdom
This paper is concerned with a recently developed paradigm for population-based optimization, termed particle filter optimization (PFO). This paradigm is attractive in terms of coherence in theory and easiness in math... 详细信息
来源: 评论
Area Charging for Wireless Rechargeable Sensors
Area Charging for Wireless Rechargeable Sensors
收藏 引用
International Conference on Computer Communications and Networks (ICCCN)
作者: Haipeng Dai Xiaoyu Wang Lijie Xu Chao Dong Qian Liu Lei Meng Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing CHINA Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing CHINA Nanjing University of Aeronautics and Astronautics Nanjing CHINA
In this paper, we consider the problem of area charging, that is, assuming that there is a mobile charger (MC) equipped with a directional wireless charger whose charging area is in the shape of a sector, and the MC c... 详细信息
来源: 评论
Image representation based on multi-features
Image representation based on multi-features
收藏 引用
International Conference on intelligent System and Knowledge Engineering, ISKE
作者: Xianzhong Long Lei Chen Qun Li College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing Jiangsu China School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China
As one kind of popular application in computer vision, image clustering has attracted many attentions. Some machine learning algorithms have been widely employed, such as K-Means, Non-negative Matrix Factorization (NM... 详细信息
来源: 评论
Extraction of Interactions of Genes2Genes Related to Breast Cancer
Extraction of Interactions of Genes2Genes Related to Breast ...
收藏 引用
International Conference on Software Engineering Research, Management and Applications (SERA)
作者: Lejun Gong Daoyu Huang Shixing Sun Zhihong Gao Chuandi Pan Ronggen Yang Yongmin Li Geng Yang Jiangsu Key Lab of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Zhejiang Engineering Research Center of Intelligent Medicine The First Affiliated Hospital of Wenzhou Medical University Wenzhou China College of Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing China
Breast cancer is the most prevalent disease to females in the worldwide. Its pathology remains unclear. Genetics factors is the ways to understand the molecular mechanism. This paper proposed a computational approach ... 详细信息
来源: 评论
Bidirectional LSTM-CRF for biomedical named entity recognition
Bidirectional LSTM-CRF for biomedical named entity recogniti...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Xuemin Yang Zhihong Gao Yongmin Li Chuandi Pan Ronggen Yang Lejun Gong Geng Yang Jiangsu Key Laboratory of Big Data Security &Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Zhejiang Engineering Research Center of Intelligence Medicine Wenzhou China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing China
Bio-medical entity recognition extracts significant entities, for instance cells, proteins and genes, which is an arduous task in an automatic system that mine knowledge in bioinformatics texts. In this thesis, we uti...
来源: 评论
GNEA: A Novel GCN-based Network Embedding Algorithm for Semantic Social Network
GNEA: A Novel GCN-based Network Embedding Algorithm for Sema...
收藏 引用
International Symposium on System and Software Reliability (ISSSR)
作者: Jinbo Zhao Jinling He Yuanhan Du Ming Tang Xiaolong Xu Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China State Grid Jiangsu Electric Power Company Limited Nanjing China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China
With the development of semantic social networks, social networks become more complex and their size expands rapidly, which brings significant challenges to social network analysis. Network Embedding can transform the... 详细信息
来源: 评论