咨询与建议

限定检索结果

文献类型

  • 547 篇 会议
  • 533 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,081 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 785 篇 工学
    • 570 篇 计算机科学与技术...
    • 468 篇 软件工程
    • 183 篇 信息与通信工程
    • 106 篇 控制科学与工程
    • 99 篇 生物工程
    • 76 篇 电气工程
    • 69 篇 光学工程
    • 69 篇 电子科学与技术(可...
    • 64 篇 机械工程
    • 58 篇 生物医学工程(可授...
    • 46 篇 化学工程与技术
    • 37 篇 仪器科学与技术
    • 22 篇 网络空间安全
    • 21 篇 建筑学
    • 21 篇 交通运输工程
    • 19 篇 土木工程
    • 18 篇 材料科学与工程(可...
  • 383 篇 理学
    • 225 篇 数学
    • 101 篇 物理学
    • 101 篇 生物学
    • 69 篇 统计学(可授理学、...
    • 52 篇 化学
    • 27 篇 系统科学
  • 230 篇 管理学
    • 131 篇 图书情报与档案管...
    • 102 篇 管理科学与工程(可...
    • 33 篇 工商管理
  • 48 篇 医学
    • 37 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
  • 22 篇 农学
  • 21 篇 法学
    • 19 篇 社会学
  • 11 篇 教育学
  • 9 篇 经济学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 1 篇 军事学

主题

  • 46 篇 semantics
  • 33 篇 training
  • 31 篇 feature extracti...
  • 25 篇 image segmentati...
  • 20 篇 object detection
  • 19 篇 convolution
  • 18 篇 deep learning
  • 16 篇 machine learning
  • 15 篇 data mining
  • 15 篇 visualization
  • 15 篇 computer vision
  • 14 篇 support vector m...
  • 14 篇 computational mo...
  • 14 篇 pattern recognit...
  • 14 篇 information proc...
  • 13 篇 face recognition
  • 12 篇 generative adver...
  • 12 篇 accuracy
  • 11 篇 conferences
  • 11 篇 signal processin...

机构

  • 78 篇 shanghai key lab...
  • 34 篇 institute of sci...
  • 28 篇 pca lab key lab ...
  • 26 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 provincial key l...
  • 23 篇 school of comput...
  • 22 篇 shanghai enginee...
  • 21 篇 key laboratory o...
  • 21 篇 university of ch...
  • 21 篇 shanghai key lab...
  • 18 篇 shanghai center ...
  • 17 篇 pca lab key lab ...
  • 15 篇 department of co...
  • 15 篇 national key lab...
  • 15 篇 key lab of intel...
  • 14 篇 national enginee...
  • 13 篇 key lab. of inte...
  • 13 篇 school of comput...
  • 13 篇 peng cheng labor...

作者

  • 74 篇 yang jian
  • 33 篇 jian yang
  • 32 篇 zhang wenqiang
  • 30 篇 zhang junping
  • 27 篇 shan hongming
  • 25 篇 xie jin
  • 19 篇 zhou shuigeng
  • 19 篇 shuigeng zhou
  • 17 篇 guan jihong
  • 17 篇 yu fei
  • 17 篇 gong chen
  • 16 篇 zhu qiaoming
  • 16 篇 junping zhang
  • 16 篇 jihong guan
  • 15 篇 huang zhizhong
  • 15 篇 hongming shan
  • 15 篇 jiang haobo
  • 14 篇 kong fang
  • 14 篇 chen zhaoyu
  • 14 篇 huang qingming

语言

  • 1,004 篇 英文
  • 57 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Key Lab of Computer Information Processing Technology"
1081 条 记 录,以下是851-860 订阅
排序:
Finding Dominating Set from Verbal Contextual Graph for Personalized Search in Folksonomy
Finding Dominating Set from Verbal Contextual Graph for Pers...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Ting Jin Haoran Xie Jingsheng Lei Qing Li Xiaodong Li Xudong Mao Yanghui Rao Shanghai Key Lab of Intelligent Information Processing Fudan University Shanghai China Department of Computer Science City University of Hong Kong China College of Computer Science & Technology Shanghai University of Electric Power Shanghai China
With the development of the Internet, user-generated data has been growing tremendously in Web 2.0 era. Facing such a big volume of resources in folksonomy, people need a method of fast exploration and indexing to fin... 详细信息
来源: 评论
Hierarchical Structures on Multigranulation Spaces
收藏 引用
Journal of computer Science & technology 2012年 第6期27卷 1169-1183页
作者: 杨习贝 钱宇华 杨静宇 School of Computer Science and Engineering Jiangsu University of Science and Technology School of Computer Science and Technology Nanjing University of Science and Technology Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education School of Computer and Information Technology Shanxi University
Though many hierarchical structures have been proposed to analyze the finer or coarser relationships between two granulation spaces, these structures can only be used to compare the single granulation spaces. However,... 详细信息
来源: 评论
Rumor evolution in social networks
收藏 引用
Physical Review E 2013年 第3期87卷 032133-032133页
作者: Yichao Zhang Shi Zhou Zhongzhi Zhang Jihong Guan Shuigeng Zhou Department of Computer Science and Technology Tongji University 4800 Cao'an Road Shanghai 201804 China Department of Computer Science University College London Gower Street London WC1E 6BT United Kingdom School of Computer Science Fudan University Shanghai 200433 China Shanghai Key Lab of Intelligent Information Processing Fudan University Shanghai 200433 China
The social network is a main tunnel of rumor spreading. Previous studies concentrated on a static rumor spreading. The content of the rumor is invariable during the whole spreading process. Indeed, the rumor evolves c... 详细信息
来源: 评论
Verifiable Fully Homomorphic Encryption scheme
Verifiable Fully Homomorphic Encryption scheme
收藏 引用
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012
作者: Jin, Fangyuan Zhu, Yanqin Luo, Xizhao Department of Computer Science and Technology Soochow University Suzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other p... 详细信息
来源: 评论
A processing method for inconsistent answer set programs based on minimal principle
A processing method for inconsistent answer set programs bas...
收藏 引用
International Conference on Automatic Control and Artificial Intelligence, ACAI 2012
作者: Zhu, Tao Zhang, Zhizheng Zhai, Yuqing Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou China
Answer set programming (ASP) has become an important tool for knowledge representation and reasoning. Inconsistency processing in ASP provides a way for reasoning of inconsistent knowledge. In this paper, we present a... 详细信息
来源: 评论
PASS: An adaptive multi-copy routing scheme for intermittently connected mobile Ad Hoc networks
收藏 引用
Journal of Convergence information technology 2012年 第14期7卷 315-323页
作者: Xu, Jia Wang, Ru Chuan Sun, Li Juan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China Key Laboratory for Computer Network and Information Integration Southeast University Ministry of Education Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论
A fault-tolerant multicast tree approach based on the family hierarchy tunnel
A fault-tolerant multicast tree approach based on the family...
收藏 引用
16th International Conference on Mechatronics technology, ICMT 2012
作者: Zhou, Yan-Ling Shen, Yu-Feng Key Lab. of Network and Intelligent Information Processing Department of Computer Science and Technology University Hefei Anhui China Computer Science and Technology Anhui Sanlian University Hefei Anhui China
Fault-tolerant recovery in Multicast communication is an important issue. An ideal multicast fault-tolerant approach can save network resources, reduce the delay and cost, realize quick recovery. In this paper, we pro... 详细信息
来源: 评论
Indirect current control of active power filter using novel sliding mode controller
Indirect current control of active power filter using novel ...
收藏 引用
2012 IEEE 13th Workshop on Control and Modeling for Power Electronics, COMPEL 2012
作者: Fei, Juntao Li, Tianhua Zhang, Shenglei Jiangsu Key Lab. of Power Transmission and Distribution Equipment Technology College of Computer and Information Hohai University Changzhou 213022 China
A novel sliding mode control (SMC) method for indirect current controlled three-phase parallel active power filter is presented in this paper. There are two designed closed-loops in the system, one is the DC voltage c... 详细信息
来源: 评论