咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 519 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 757 篇 工学
    • 548 篇 计算机科学与技术...
    • 462 篇 软件工程
    • 180 篇 信息与通信工程
    • 97 篇 生物工程
    • 92 篇 控制科学与工程
    • 71 篇 电气工程
    • 69 篇 光学工程
    • 66 篇 电子科学与技术(可...
    • 63 篇 机械工程
    • 57 篇 生物医学工程(可授...
    • 46 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 22 篇 网络空间安全
    • 21 篇 交通运输工程
    • 20 篇 建筑学
    • 18 篇 土木工程
  • 379 篇 理学
    • 224 篇 数学
    • 101 篇 生物学
    • 99 篇 物理学
    • 68 篇 统计学(可授理学、...
    • 51 篇 化学
    • 27 篇 系统科学
  • 228 篇 管理学
    • 130 篇 图书情报与档案管...
    • 102 篇 管理科学与工程(可...
    • 33 篇 工商管理
  • 47 篇 医学
    • 37 篇 临床医学
    • 29 篇 基础医学(可授医学...
    • 19 篇 公共卫生与预防医...
  • 22 篇 法学
    • 19 篇 社会学
  • 22 篇 农学
    • 18 篇 作物学
  • 11 篇 教育学
  • 9 篇 经济学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 1 篇 军事学

主题

  • 46 篇 semantics
  • 32 篇 training
  • 31 篇 feature extracti...
  • 24 篇 image segmentati...
  • 20 篇 object detection
  • 19 篇 convolution
  • 17 篇 deep learning
  • 16 篇 machine learning
  • 15 篇 data mining
  • 14 篇 support vector m...
  • 14 篇 computational mo...
  • 14 篇 pattern recognit...
  • 14 篇 visualization
  • 14 篇 computer vision
  • 14 篇 information proc...
  • 13 篇 face recognition
  • 12 篇 generative adver...
  • 12 篇 accuracy
  • 11 篇 conferences
  • 11 篇 signal processin...

机构

  • 75 篇 shanghai key lab...
  • 34 篇 institute of sci...
  • 28 篇 pca lab key lab ...
  • 26 篇 school of comput...
  • 24 篇 provincial key l...
  • 24 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 university of ch...
  • 21 篇 shanghai key lab...
  • 21 篇 school of comput...
  • 20 篇 shanghai enginee...
  • 18 篇 shanghai center ...
  • 17 篇 pca lab key lab ...
  • 15 篇 key lab of intel...
  • 14 篇 department of co...
  • 14 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 key lab of intel...
  • 12 篇 national enginee...
  • 12 篇 jiangsu provinci...

作者

  • 72 篇 yang jian
  • 33 篇 jian yang
  • 31 篇 zhang wenqiang
  • 30 篇 zhang junping
  • 27 篇 shan hongming
  • 25 篇 xie jin
  • 19 篇 zhou shuigeng
  • 18 篇 shuigeng zhou
  • 17 篇 guan jihong
  • 17 篇 yu fei
  • 16 篇 zhu qiaoming
  • 16 篇 junping zhang
  • 15 篇 huang zhizhong
  • 15 篇 hongming shan
  • 15 篇 jiang haobo
  • 15 篇 jihong guan
  • 15 篇 gong chen
  • 14 篇 kong fang
  • 14 篇 chen zhaoyu
  • 14 篇 huang qingming

语言

  • 997 篇 英文
  • 26 篇 其他
  • 22 篇 中文
检索条件"机构=Jiangsu Key Lab of Computer Information Processing Technology"
1043 条 记 录,以下是141-150 订阅
排序:
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论
A fault-tolerant multicast tree approach based on the family hierarchy tunnel
A fault-tolerant multicast tree approach based on the family...
收藏 引用
16th International Conference on Mechatronics technology, ICMT 2012
作者: Zhou, Yan-Ling Shen, Yu-Feng Key Lab. of Network and Intelligent Information Processing Department of Computer Science and Technology University Hefei Anhui China Computer Science and Technology Anhui Sanlian University Hefei Anhui China
Fault-tolerant recovery in Multicast communication is an important issue. An ideal multicast fault-tolerant approach can save network resources, reduce the delay and cost, realize quick recovery. In this paper, we pro... 详细信息
来源: 评论
A privacy policy of P3P based on relational database
A privacy policy of P3P based on relational database
收藏 引用
First International Multi- Symposiums on computer and Computational Sciences, IMSCCS'06
作者: Jiang, Bin Zhang, Da-Fang Yang, Chao Yue, Guangxue Yu, Fei Software School Hunan University Changsha Hunan 410082 College of Computer and Communication Hunan University Changsha Hunan 410082 Provincial Key Laboratory of Computer Information Processing Technology Nanjing Jiangsu 215006
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited Traditional methods of database access control places great depen... 详细信息
来源: 评论
Trajectory tracking of powered parafoil based on characteristic model based all-coefficient adaptive control
收藏 引用
Journal of Central South University 2017年 第5期24卷 1073-1081页
作者: TAN Pan-long SUN Qing-lin JIANG Yu-xin ZHU Er-lin CHEN Zeng-qiang HE Ying-ping Intelligent Robots Key Lab of Tianjin College of Computer and Control EngineeringNankai UniversityTianjin 300071China School of Electricity&Information Engineering Jiangsu University of TechnologyChangzhou 213001China Hongwei Aircraft Limited Corp. Xiangyang 441022China
One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish au... 详细信息
来源: 评论
Remote Three-Factor Authentication Protocol with Strong Robustness for Multi-Server Environment
收藏 引用
China Communications 2017年 第6期14卷 126-136页
作者: Min Zhang Jiashu Zhang Wenrong Tan Sichuan Province Key Lab of Signal and Information Processing Southwest JiaoTong University Sichuan 610031 China School of Foreign Languages Southwest Minzu University Sichuan 610041 China School of Computer Science and Technology Southwest Minzu University Sichuan 610041 China
If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and pa... 详细信息
来源: 评论
Indirect current control of active power filter using novel sliding mode controller
Indirect current control of active power filter using novel ...
收藏 引用
2012 IEEE 13th Workshop on Control and Modeling for Power Electronics, COMPEL 2012
作者: Fei, Juntao Li, Tianhua Zhang, Shenglei Jiangsu Key Lab. of Power Transmission and Distribution Equipment Technology College of Computer and Information Hohai University Changzhou 213022 China
A novel sliding mode control (SMC) method for indirect current controlled three-phase parallel active power filter is presented in this paper. There are two designed closed-loops in the system, one is the DC voltage c... 详细信息
来源: 评论
Learned Fingerprint Embedding for Large-Scale Peptide Mass Spectra Retrieval
Learned Fingerprint Embedding for Large-Scale Peptide Mass S...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wang, Yongshuai Cai, Xiaojun Li, Defeng Sun, Shiwei Chen, Cheng Cui, Xuefeng Shandong University School of Computer Science and Technology Qingdao China Chinese Academy of Sciences Key Lab of Intelligent Information Processing Institute of Computing Technology Beijing China
Tandem mass spectrometry (MS/MS) is a widely used technique for protein identification, post-translational modifications, immunotherapy, and other applications. As the amount of MS/MS spectra data increases, new compu... 详细信息
来源: 评论