咨询与建议

限定检索结果

文献类型

  • 135 篇 会议
  • 90 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 166 篇 工学
    • 122 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 43 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 14 篇 电气工程
    • 14 篇 生物工程
    • 13 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 10 篇 光学工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
  • 80 篇 理学
    • 48 篇 数学
    • 17 篇 生物学
    • 15 篇 物理学
    • 13 篇 化学
    • 13 篇 统计学(可授理学、...
    • 5 篇 系统科学
  • 54 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 14 篇 农学
    • 13 篇 作物学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
  • 4 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 feature extracti...
  • 5 篇 computer science
  • 5 篇 support vector m...
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 image reconstruc...
  • 3 篇 deep learning
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 laboratories

机构

  • 24 篇 provincial key l...
  • 24 篇 school of comput...
  • 12 篇 jiangsu provinci...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 college of commu...
  • 4 篇 school of cyber ...

作者

  • 17 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 11 篇 chen yang
  • 10 篇 yang chen
  • 9 篇 yue guangxue
  • 7 篇 wu zhan
  • 6 篇 yang yang
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 lyu tianling
  • 5 篇 qian peide
  • 5 篇 tianling lyu

语言

  • 210 篇 英文
  • 13 篇 中文
  • 3 篇 其他
检索条件"机构=Jiangsu Provincial Key Lab for Computer Information Processing Technology"
226 条 记 录,以下是101-110 订阅
排序:
A parallel ant colonies approach to de novo prediction of protein backbone in CASP8/9
收藏 引用
Science China(information Sciences) 2013年 第10期56卷 226-238页
作者: LV Qiang WU HongJie WU JinZhen HUANG Xu LUO XiaoHu QIAN PeiDe School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab for Information Processing Technologies School of Electronic and Information Engineering Suzhou University of Science and Technology
Predicting the three-dimensional structure of proteins from amino acid sequences with only a few remote homologs,or de novo prediction,remains a major challenge in computational *** modeling of the protein backbone re... 详细信息
来源: 评论
The scientific literature corpus for Chinese negation and uncertainty identification
The scientific literature corpus for Chinese negation and un...
收藏 引用
14th Workshop on Chinese Lexical Semantics, CLSW 2013
作者: Chen, Zhancheng Zou, Bowei Zhu, Qiaoming Li, Peifeng School of Computer Science and Technology Soochow University Jiangsu 215006 China Key Lab. of Computer Information Processing Technology of Jiangsu Province Suzhou Jiangsu 215006 China
Negative and uncertain expressions widely exist in natural language. Negation and uncertainty identification has become an important task in computational linguistics community. Lacking of corpus hinders the developme... 详细信息
来源: 评论
Coverage Enhancement Strategy Based on Novel Perception and Co-evolution for Multimedia Sensor Networks
收藏 引用
电子学报(英文版) 2013年 第1期22卷 135-140页
作者: XIAO Fu WANG Jing SUN Lijuan WANG Ruchuan GUO Jian College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
Coverage enhancement is one of the hot research topics in wireless multimedia sensor net- works. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propo... 详细信息
来源: 评论
Towards the scheduling of access requests in cloud storage
Towards the scheduling of access requests in cloud storage
收藏 引用
8th International Conference on computer Science and Education, ICCSE 2013
作者: Wu, Xian Qian, Peide School of Computer Science and Technology Computer Information Processing Technology Suzhou University Suzhou 215006 China Jiangsu Provincial Key Laboratory Computer Information Processing Technology Suzhou University Suzhou 215006 China School of Computer Science and Technology Suzhou University Suzhou 215006 China
In recent years, cloud computing has emerged as an enabling technology, in which virtual machine migration and dynamic resource allocation is one of the hot issues. During the migration of virtual machine, access requ... 详细信息
来源: 评论
Overlapping Community Extraction: A Link Hypergraph Partitioning Based Method
Overlapping Community Extraction: A Link Hypergraph Partitio...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Haicheng Tao Zhiang Wu Jin Shi Jie Cao Xiaofeng Yu College of Computer Sci. and Eng. Nanjing University of Science and Technology China Jiangsu Provincial Key Lab. of E-Business Nanjing University of Finance and Economics China School of Information Management Nanjing University China School of Business Nanjing University China
Real-world networks often contain communities with pervasive overlaps such that nodes simultaneously belong to several groups. Community extraction, emerging in recent years, is considered to be a promising solution f... 详细信息
来源: 评论
Image Hiding Algorithm in Discrete Cosine Transform Domain Based on Grey Prediction and Grey Relational Analysis
收藏 引用
China Communications 2013年 第7期10卷 57-70页
作者: 黄海平 黄世超 陈九天 王汝传 College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University
Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and *** this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey relational... 详细信息
来源: 评论
Kinetics and Modeling of Chemical Leaching of Sphalerite Concentrate Using Ferric Iron in a Redox-controlled Reactor
收藏 引用
Chinese Journal of Chemical Engineering 2013年 第8期21卷 933-936页
作者: 宋健 高玲 林建群 吴洪斌 林建强 State Key Lab of Microbial Technology Shandong University Department of Pharmacy and Biotechnology Zibo Vocational Institute Shandong Provincial Key Lab for Distributed Computer Software Novel Technology School of Information Science and EngineeringShandong Normal University Institute of Agro-products Processing Science and Technology Xinjiang Academy of Agricultural and Reclamation Science
This work presents a study for chemical leaching of sphalerite concentrate under various constant Fe3+ concentrations and redox potential conditions. The effects of Fe3+ concentration and redox potential on chemical l... 详细信息
来源: 评论
The system design of a node of P2P networks for intrusion detection
收藏 引用
Journal of Networks 2013年 第8期8卷 1920-1927页
作者: Ding, Lei Yu, Fei Yang, Zhenghua Yue, Guangxue School of Information Science and Engineering Jishou University Jishou 416000 China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow 215006 China School of Mathematic and Computer Jiaxin University Jiaxin 314001 China
To improve the measuring accuracy of intrusion detection, a system design of a node for intrusion detection is proposed in this paper. First, the technology that applies the traditional intrusion detection method, suc... 详细信息
来源: 评论
Survey of DCA for abnormal detection
Journal of Software
收藏 引用
Journal of Software 2013年 第8期8卷 2087-2094页
作者: Ding, Lei Yu, Fei Yang, Zhenghua School of Information Science and Engineering Jishou University Jishou 416000 China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow 215006 China School of Information Science and Engineering Jishou University Jishou 416000 China
As a latest immune algorithm, dendritic cell algorithm (DCA) has been successfully applied into the abnormal detection. First, this paper reviewed the research progress of DCA from the following aspects: signal extrac... 详细信息
来源: 评论
A Fast Calculation of Metric Scores for Learning Bayesian Network
收藏 引用
International Journal of Automation and computing 2012年 第1期9卷 37-44页
作者: Qiang Lv Xiao-Yan Xia Pei-De Qian School of Computer Science and Technology Soochow University Suzhou 215006 PRC Jiangsu Provincial Key Lab for Computer Information Processing Technology Suzhou 215006 PRC
Frequent counting is a very so often required operation in machine learning algorithms. A typical machine learning task, learning the structure of Bayesian network (BN) based on metric scoring, is introduced as an e... 详细信息
来源: 评论