咨询与建议

限定检索结果

文献类型

  • 130 篇 会议
  • 45 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 136 篇 工学
    • 92 篇 计算机科学与技术...
    • 79 篇 软件工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 电子科学与技术(可...
    • 10 篇 化学工程与技术
    • 9 篇 农业工程
    • 8 篇 光学工程
    • 7 篇 电气工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 4 篇 土木工程
    • 3 篇 仪器科学与技术
  • 67 篇 理学
    • 48 篇 数学
    • 13 篇 生物学
    • 11 篇 化学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 6 篇 系统科学
  • 34 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 医学
    • 6 篇 临床医学
    • 5 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
  • 9 篇 农学
    • 9 篇 作物学
  • 2 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 6 篇 information proc...
  • 5 篇 grid computing
  • 4 篇 semantics
  • 4 篇 accuracy
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 syntactics
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 natural language...
  • 3 篇 labeling
  • 3 篇 image reconstruc...
  • 3 篇 filtering algori...
  • 3 篇 training
  • 2 篇 computer science
  • 2 篇 learning systems
  • 2 篇 imaging
  • 2 篇 rsa cryptosystem
  • 2 篇 support vector m...
  • 2 篇 compressed sensi...

机构

  • 17 篇 school of comput...
  • 10 篇 college of compu...
  • 9 篇 jiangsu high tec...
  • 8 篇 college of compu...
  • 7 篇 key lab. of broa...
  • 7 篇 provincial key l...
  • 6 篇 school of comput...
  • 6 篇 hubei province k...
  • 6 篇 college of infor...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 4 篇 jiangsu provinci...
  • 4 篇 college of compu...
  • 4 篇 first-imaging te...
  • 4 篇 key lab. of broa...
  • 4 篇 school of inform...
  • 4 篇 jiangsu high tec...
  • 4 篇 zhejiang lab
  • 3 篇 institute for in...
  • 3 篇 jiangsu high tec...

作者

  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 10 篇 zhou guodong
  • 8 篇 wang ruchuan
  • 6 篇 yu fei
  • 6 篇 wang yonghao
  • 6 篇 li peifeng
  • 6 篇 hu wei
  • 5 篇 qian peide
  • 4 篇 fei yu
  • 4 篇 qian longhua
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 ye xiaoguo
  • 4 篇 li renfa
  • 3 篇 li yang
  • 3 篇 yue guangxue
  • 3 篇 li chenglong
  • 3 篇 xu jing
  • 3 篇 wu zhan

语言

  • 170 篇 英文
  • 6 篇 中文
检索条件"机构=Jiangsu Province Key Lab. of Computer Information Processing Technology"
176 条 记 录,以下是71-80 订阅
排序:
Positional translation language model for ad-hoc information retrieval
Positional translation language model for ad-hoc information...
收藏 引用
18th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2014
作者: Tu, Xinhui Luo, Jing Li, Bo He, Tingting Gu, Jinguang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Department of Computer Science Central China Normal University Wuhan China State Key Lab. of Software Engineering Wuhan University Wuhan China
Most existing language modeling approaches are based on the term independence hypothesis. To go beyond this assumption, two main directions were investigated. The first one considers the use of the proximity features ... 详细信息
来源: 评论
Efficient latent structural perceptron with hybrid trees for semantic parsing
Efficient latent structural perceptron with hybrid trees for...
收藏 引用
23rd International Joint Conference on Artificial Intelligence, IJCAI 2013
作者: Zhou, Junsheng Xu, Juhong Qu, Weiguang School of Computer Science and Technology Nanjing Normal University China Jiangsu Research Center of Information Security and Privacy Technology China State Key Lab. for Novel Software Technology Nanjing University China
Discriminative structured prediction models have been widely used in many natural language processing tasks, but it is challenging to apply the method to semantic parsing. In this paper, by introducing hybrid tree as ... 详细信息
来源: 评论
Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition
Dynamic weighted discrimination power analysis in DCT domain...
收藏 引用
2010 International Conference on information and Communication technology Convergence, ICTC 2010
作者: Leng, Lu Zhang, Jiashu Xu, Jing Khan, Muhammad Khurram Alghathbar, Khaled Sichuan Province Key Lab. of Signal and Information Processing Southwest Jiaotong University Chengdu China Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia Information Systems Department College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
Discrimination power analysis (DPA) is a statistical analysis combining discrimination concept with discrete cosine transform coefficients (DCTCs) properties. Unfortunately there is not a uniform and effective criteri... 详细信息
来源: 评论
A Sentiment Classification Model Based on Syntactic Graph Attention Networks  24
A Sentiment Classification Model Based on Syntactic Graph At...
收藏 引用
2024 International Conference on Intelligent Education and computer technology, IECT 2024
作者: Cheng, Yan Zhou, Ziwei School of Computer Information Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Prov. Key Lab. of Intelligent Information Processing and Affective Computing of Jiangxi Province 330022 China School of Software Jiangxi Normal University 330022 China
Text Sentiment Classification, a significant task in Natural Language processing, aims to comprehend user needs and expectations by categorizing the sentiments of texts posted on platforms. Despite their utility, exis... 详细信息
来源: 评论
Adversarial Recovery Network for Low-Light Person Re-Identification  23
Adversarial Recovery Network for Low-Light Person Re-Identif...
收藏 引用
6th International Conference on Image and Graphics processing, ICIGP 2023
作者: Xu, Liu Wang, Xiao Yuan, Xin Mao, Zhu Xu, Xin School of Computer Science and Technology Wuhan University of Science and Technology China School of Computer Science and Technology Wuhan University of Science and Technology ChinaHubei Prov. Key Lab. of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology China
Person re-identification (re-ID), which is to connect pedestrians with the same identity in different scenarios, has been more widely used in case detection of security. The re-ID datasets and technology have contribu... 详细信息
来源: 评论
EFFICIENT ONLINE lab.L CONSISTENT HASHING FOR LARGE-SCALE CROSS-MODAL RETRIEVAL
EFFICIENT ONLINE LABEL CONSISTENT HASHING FOR LARGE-SCALE CR...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Yi, Jinhan Liu, Xin Cheung, Yiu-Ming Xu, Xing Fan, Wentao He, Yi Department of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Lab. of Computer Vision and Pattern Recognition Fujian Key Lab. of Big Data Intelligence and Security China Department of Computer Science Hong Kong Baptist University Kowloon Hong Kong School of Computer Science and Engineering University of Electronic Science and Technology of China China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Existing cross-modal hashing still faces three challenges: (1) Most batch-based methods are unsuitable for processing large-scale and streaming data. (2) Current online methods often suffer from insufficient semantic ... 详细信息
来源: 评论
A node similarity based trust transmission method
收藏 引用
2nd World Congress on computer Science and information Engineering, CSIE 2011
作者: Wang, Haiyan Wang, Ying Yue, Xiwen College of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 Jiangsu China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing 210003 Jiangsu China
A novel trust transmission method which is based on the similarities of nodes in trust models is proposed in this paper. Trust transmission is evaluated by calculating the similarity between recommenders when trustor ... 详细信息
来源: 评论
A trusted network remediation scheme based on the stability of access terminals
收藏 引用
2nd World Congress on computer Science and information Engineering, CSIE 2011
作者: Wang, Haiyan Xu, Mingming College of Computer Nanjing University of Posts and Telecommunications 210003 Nanjing Jiangsu China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks 210003 Nanjing Jiangsu China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province 210003 Nanjing Jiangsu China
To improve the effectiveness of control and remediation of failure access terminals in trusted network, a novel remediation scheme is proposed in this paper. Based on the introduction of a definition of stability of a... 详细信息
来源: 评论
A dynamic multi-strategies scheduling algorithm for heterogeneous computing systems  21
A dynamic multi-strategies scheduling algorithm for heteroge...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Lv, Xiangyu Hu, Wei Wang, Yonghao College of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing Real-time Industrial System China Digital Media Lab Birmingham City University United Kingdom
Efficient scheduling algorithms play an essential part in heterogeneous computing systems (HeCS) to achieve high performance. So we proposed a new efficient dynamic multi-strategies scheduling algorithm (DMS). The bas... 详细信息
来源: 评论
Research on remote heterogeneous disaster recovery technology in grid computing security
Research on remote heterogeneous disaster recovery technolog...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Wu, Ronghui Li, Renfa Yu, Fei Yue, Guangxue Wen, Jigang School of Computer and Communication Hunan University Changsha 410082 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ... 详细信息
来源: 评论