咨询与建议

限定检索结果

文献类型

  • 135 篇 会议
  • 88 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 224 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 164 篇 工学
    • 121 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 43 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 14 篇 生物工程
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 10 篇 光学工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 3 篇 仪器科学与技术
  • 79 篇 理学
    • 48 篇 数学
    • 17 篇 生物学
    • 15 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 12 篇 化学
    • 5 篇 系统科学
  • 54 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 14 篇 农学
    • 13 篇 作物学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
  • 4 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 feature extracti...
  • 5 篇 computer science
  • 5 篇 support vector m...
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 image reconstruc...
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 laboratories
  • 3 篇 educational tech...

机构

  • 24 篇 provincial key l...
  • 24 篇 school of comput...
  • 12 篇 jiangsu provinci...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 college of commu...
  • 4 篇 school of cyber ...

作者

  • 17 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 10 篇 chen yang
  • 10 篇 yang chen
  • 9 篇 yue guangxue
  • 6 篇 wu zhan
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 yang yang
  • 5 篇 qian peide
  • 5 篇 tianling lyu
  • 5 篇 wentao zhu

语言

  • 209 篇 英文
  • 13 篇 中文
  • 2 篇 其他
检索条件"机构=Jiangsu Provincial Key Lab for Computer Information Processing Technology"
224 条 记 录,以下是111-120 订阅
排序:
Ranking based activity trajectory search
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8786卷 170-185页
作者: Chen, Wei Zhao, Lei Jiajie, Xu Zheng, Kai Zhou, Xiaofang School of Computer Science and Technology Soochow University China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University China School of ITEE The University of Queensland Brisbane Australia
With the proliferation of the GPS-enabled devices and mobile techniques, there has been a lot of work on trajectory search in the last decade. Previous trajectory search has focused on spatio-temporal features and tex... 详细信息
来源: 评论
Pick-up tree based route recommendation from taxi trajectories
Pick-up tree based route recommendation from taxi trajectori...
收藏 引用
13th International Conference on Web-Age information Management, WAIM 2012
作者: Hu, Haoran Wu, Zhiang Mao, Bo Zhuang, Yi Cao, Jie Pan, Jingui State Key Lab. for Novel Software Technology Nanjing University Nanjing China Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing China College of Computer and Information Engineering Zhejiang Gongshang University Hangzhou China
Recommending suitable routes to taxi drivers for picking up passengers is helpful to raise their incomes and reduce the gasoline consumption. In this paper, a pick-up tree based route recommender system is proposed to... 详细信息
来源: 评论
Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 297-308页
作者: Zhang, Chongsheng Tao, Yuefeng Du, Kai Ding, Weiping Wang, Bin Liu, Ji Wang, Wei Henan Provincial Key Laboratory of Big Data Analysis and Processing Laboratory of the Yellow River Cultural Heritage Henan University Kaifeng475001 China School of Information Science and Technology Nantong University Nantong226019 China School of Electrical Engineering Zhejiang University Hangzhou310058 China Big Data Lab Baidu Inc. Beijing100044 China School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China
Urban scenes are full of street entities with sign boards. Therefore, in autonomous driving, street view text spotting techniques will play a significant role in the precise understanding of surrounding scenes during ... 详细信息
来源: 评论
A Policy-Controlled Signature Scheme for end-to-end Secure Communication  12
A Policy-Controlled Signature Scheme for end-to-end Secure C...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Yu, Feng Meng, Linghui Xi, Jing Li, Xianxian Lu, Qianhui Zhu, Weidong Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology GuiLin China University of SouthEast Jiangsu Provincial Key Laboratory of Netwrok and Information Security Nanjing China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security GuiLin China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University GuiLin China
In the digitalized society, end-to-end security communication is receiving increasing attention. Issues such as ma-licious sender impersonation and over-privilege communication continue to prevail in end-to-end commun... 详细信息
来源: 评论
Robust restoration of low-dose cerebral perfusion CT images using NCS-Unet
收藏 引用
Nuclear Science and Techniques 2022年 第3期33卷 62-76页
作者: Kai Chen Li-Bo Zhang Jia-Shun Liu Yuan Gao Zhan Wu Hai-Chen Zhu Chang-Ping Du Xiao-Li Mai Chun-Feng Yang Yang Chen Southeast University Nanjing 210096China School of Cyber Science and Engineering Southeast UniversityNanjing 210096China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing 210096China Department of Radiology General Hospital of the Northern Theater of the Chinese People’s Liberation ArmyShenyang 110016China Laboratory of Image Science and Technology The School of Computer Science and EngineeringSoutheast UniversityNanjing 210096China Department of Radiology Nanjing Drum Tower HospitalThe Affiliated Hospital of Nanjing University Medical SchoolNanjing 210008China Jiangsu Key Laboratory of Molecular and Functional Imaging Department of RadiologyZhongda HospitalSoutheast UniversityNanjing 210009China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and EngineeringSoutheast UniversityNanjing 210096China
Cerebral perfusion computed tomography(PCT)is an important imaging modality for evaluating cerebrovascular diseases and stroke *** widespread public concern about the potential cancer risks and health hazards associat... 详细信息
来源: 评论
A Novel User Behavior Prediction and Optimization Algorithm for Single-User Multi-terminal Scenario
A Novel User Behavior Prediction and Optimization Algorithm ...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Hui Zhang Juan Chen Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China Jiangsu Key Lab of Wireless Communications Nanjing University of Posts and Telecommunications Nanjing China
For the single-user multi-terminal scenario, a novel user service behavior prediction and optimization algorithm is proposed in this paper, which can realize the accurate prediction of service requirements and optimal... 详细信息
来源: 评论
Parallel answer set solving algorithm based on multi-core processor technology
Parallel answer set solving algorithm based on multi-core pr...
收藏 引用
International Conference on Automatic Control and Artificial Intelligence, ACAI 2012
作者: Zhang, Xing Zhang, Zhizheng Zhai, Yuqing Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University China
Answer Set Programming (ASP) is widely used in many areas of Artificial Intelligence. A parallel answer set solving algorithm based on multi-core processor technology is proposed in this paper. The parallel algorithm ... 详细信息
来源: 评论
A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing
A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Rui Li Rui Li Renfa Li Renfa Li Fei Yu Fei Yu Jigang Wen Jigang Wen School of Computer and Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu China
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und...
来源: 评论
Kinetics and Modeling of Chemical Leaching of Sphalerite Concentrate Using Ferric Iron in a Redox-controlled Reactor
收藏 引用
Chinese Journal of Chemical Engineering 2013年 第8期21卷 933-936页
作者: 宋健 高玲 林建群 吴洪斌 林建强 State Key Lab of Microbial Technology Shandong University Department of Pharmacy and Biotechnology Zibo Vocational Institute Shandong Provincial Key Lab for Distributed Computer Software Novel Technology School of Information Science and EngineeringShandong Normal University Institute of Agro-products Processing Science and Technology Xinjiang Academy of Agricultural and Reclamation Science
This work presents a study for chemical leaching of sphalerite concentrate under various constant Fe3+ concentrations and redox potential conditions. The effects of Fe3+ concentration and redox potential on chemical l... 详细信息
来源: 评论
A policy language for expressing access control properties in PDAC model
A policy language for expressing access control properties i...
收藏 引用
International Conference on computer Science & Education (ICCSE)
作者: Xian Wu Peide Qian School of Computer Science and Technology Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China School of Computer Science and Technology Soochow University Suzhou China
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin... 详细信息
来源: 评论