咨询与建议

限定检索结果

文献类型

  • 525 篇 期刊文献
  • 523 篇 会议
  • 1 册 图书

馆藏范围

  • 1,049 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 763 篇 工学
    • 553 篇 计算机科学与技术...
    • 464 篇 软件工程
    • 181 篇 信息与通信工程
    • 97 篇 生物工程
    • 94 篇 控制科学与工程
    • 72 篇 电气工程
    • 71 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 63 篇 机械工程
    • 59 篇 生物医学工程(可授...
    • 46 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 22 篇 网络空间安全
    • 21 篇 交通运输工程
    • 20 篇 建筑学
    • 18 篇 材料科学与工程(可...
    • 18 篇 土木工程
  • 382 篇 理学
    • 226 篇 数学
    • 101 篇 生物学
    • 100 篇 物理学
    • 68 篇 统计学(可授理学、...
    • 51 篇 化学
    • 27 篇 系统科学
  • 229 篇 管理学
    • 130 篇 图书情报与档案管...
    • 102 篇 管理科学与工程(可...
    • 33 篇 工商管理
  • 51 篇 医学
    • 39 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
  • 22 篇 农学
  • 21 篇 法学
    • 19 篇 社会学
  • 11 篇 教育学
  • 9 篇 经济学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 1 篇 军事学

主题

  • 46 篇 semantics
  • 32 篇 training
  • 31 篇 feature extracti...
  • 25 篇 image segmentati...
  • 20 篇 object detection
  • 19 篇 convolution
  • 17 篇 deep learning
  • 16 篇 machine learning
  • 15 篇 data mining
  • 14 篇 support vector m...
  • 14 篇 computational mo...
  • 14 篇 pattern recognit...
  • 14 篇 visualization
  • 14 篇 computer vision
  • 14 篇 information proc...
  • 13 篇 face recognition
  • 12 篇 generative adver...
  • 12 篇 accuracy
  • 11 篇 conferences
  • 11 篇 signal processin...

机构

  • 75 篇 shanghai key lab...
  • 34 篇 institute of sci...
  • 28 篇 pca lab key lab ...
  • 26 篇 school of comput...
  • 24 篇 provincial key l...
  • 24 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 university of ch...
  • 21 篇 shanghai key lab...
  • 21 篇 school of comput...
  • 20 篇 shanghai enginee...
  • 18 篇 shanghai center ...
  • 17 篇 pca lab key lab ...
  • 15 篇 key lab of intel...
  • 14 篇 department of co...
  • 14 篇 national key lab...
  • 13 篇 school of comput...
  • 12 篇 key lab of intel...
  • 12 篇 national enginee...
  • 12 篇 jiangsu provinci...

作者

  • 72 篇 yang jian
  • 33 篇 jian yang
  • 31 篇 zhang wenqiang
  • 30 篇 zhang junping
  • 27 篇 shan hongming
  • 25 篇 xie jin
  • 20 篇 zhou shuigeng
  • 18 篇 guan jihong
  • 17 篇 yu fei
  • 17 篇 shuigeng zhou
  • 16 篇 zhu qiaoming
  • 16 篇 junping zhang
  • 15 篇 huang zhizhong
  • 15 篇 hongming shan
  • 15 篇 jiang haobo
  • 15 篇 jihong guan
  • 15 篇 gong chen
  • 14 篇 kong fang
  • 14 篇 chen zhaoyu
  • 14 篇 huang qingming

语言

  • 1,002 篇 英文
  • 27 篇 其他
  • 22 篇 中文
检索条件"机构=Jiangsu Key Lab of Computer Information Processing Technology"
1049 条 记 录,以下是141-150 订阅
排序:
PASS: An adaptive multi-copy routing scheme for intermittently connected mobile Ad Hoc networks
收藏 引用
Journal of Convergence information technology 2012年 第14期7卷 315-323页
作者: Xu, Jia Wang, Ru Chuan Sun, Li Juan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China Key Laboratory for Computer Network and Information Integration Southeast University Ministry of Education Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (... 详细信息
来源: 评论
Online learning of interpretable word embeddings
Online learning of interpretable word embeddings
收藏 引用
Conference on Empirical Methods in Natural Language processing, EMNLP 2015
作者: Luo, Hongyin Luan, Zhiyuan Huanbo, Liuv Sun, Maosong Department of Computer Science and Technology State Key Lab on Intelligent Technology and Systems National Lab for Information Science and Technology Tsinghua University Beijing China Jiangsu Collaborative Innovation Center for Language Competence Jiangsu China
Word embeddings encode semantic meanings of words into low-dimension word vectors. In most word embeddings, one cannot interpret the meanings of specific dimensions of those word vectors. Nonnegative matrix factorizat... 详细信息
来源: 评论
Large Model-Based Data Augmentation for Imbalanced Text Classification  5
Large Model-Based Data Augmentation for Imbalanced Text Clas...
收藏 引用
5th International Seminar on Artificial Intelligence, Networking and information technology, AINIT 2024
作者: Zhang, Dawei Mi, Rongxin Zhou, Peiyao Jin, Dawei Zhang, Manman Song, Tianhang School of Computer Science Jiangsu University of Science and Technology Jiangsu Zhenjiang China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Key Laboratory of Intelligent Information Processing Beijing China
This study focuses on the application of large models to deal with imbalanced data problems in text classification. In view of the central position of text in web data and the negative impact of class imbalance on cla... 详细信息
来源: 评论
Knowledge representation learning with entities, attributes and relations  25
Knowledge representation learning with entities, attributes ...
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Lin, Yankai Liu, Zhiyuan Sun, Maosong Department of Computer Science and Technology State Key Lab on Intelligent Technology and Systems National Lab for Information Science and Technology Tsinghua University Beijing China Jiangsu Collaborative Innovation Center for Language Competence Jiangsu China
Distributed knowledge representation (KR) encodes both entities and relations in a lowdimensional semantic space, which has significantly promoted the performance of relation extraction and knowledge reasoning. In man... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
3D Representation of Chinese Event Factuality
3D Representation of Chinese Event Factuality
收藏 引用
第十五届汉语词汇语义学国际研讨会
作者: CAO Yuan ZHU Qiaoming LI Peifeng School of Computer Science and Technology of Soochow University Key Lab of Computer Information Processing Technology of Jiangsu Province
In general,Chinese event factuality is determined by the specific vocabularies and syntactic structures of *** Chinese event factuality corpus is to annotate these specific vocabularies and syntactic *** these informa... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论
A fault-tolerant multicast tree approach based on the family hierarchy tunnel
A fault-tolerant multicast tree approach based on the family...
收藏 引用
16th International Conference on Mechatronics technology, ICMT 2012
作者: Zhou, Yan-Ling Shen, Yu-Feng Key Lab. of Network and Intelligent Information Processing Department of Computer Science and Technology University Hefei Anhui China Computer Science and Technology Anhui Sanlian University Hefei Anhui China
Fault-tolerant recovery in Multicast communication is an important issue. An ideal multicast fault-tolerant approach can save network resources, reduce the delay and cost, realize quick recovery. In this paper, we pro... 详细信息
来源: 评论