咨询与建议

限定检索结果

文献类型

  • 135 篇 会议
  • 88 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 224 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 164 篇 工学
    • 121 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 43 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 14 篇 生物工程
    • 13 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 10 篇 光学工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 3 篇 仪器科学与技术
  • 79 篇 理学
    • 48 篇 数学
    • 17 篇 生物学
    • 15 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 12 篇 化学
    • 5 篇 系统科学
  • 54 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 14 篇 农学
    • 13 篇 作物学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
  • 4 篇 法学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 10 篇 semantics
  • 9 篇 information proc...
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 feature extracti...
  • 5 篇 computer science
  • 5 篇 support vector m...
  • 5 篇 image segmentati...
  • 5 篇 training
  • 4 篇 intrusion detect...
  • 4 篇 grid computing
  • 4 篇 educational inst...
  • 4 篇 computed tomogra...
  • 4 篇 algorithm design...
  • 4 篇 image reconstruc...
  • 3 篇 trees (mathemati...
  • 3 篇 engineering in m...
  • 3 篇 face recognition
  • 3 篇 laboratories
  • 3 篇 educational tech...

机构

  • 24 篇 provincial key l...
  • 24 篇 school of comput...
  • 12 篇 jiangsu provinci...
  • 9 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 8 篇 jiangsu provinci...
  • 6 篇 provincial key l...
  • 6 篇 college of infor...
  • 6 篇 zhejiang lab
  • 5 篇 laboratory of im...
  • 5 篇 department of co...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 5 篇 laboratory of im...
  • 5 篇 college of commu...
  • 4 篇 school of cyber ...

作者

  • 17 篇 yu fei
  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 10 篇 chen yang
  • 10 篇 yang chen
  • 9 篇 yue guangxue
  • 6 篇 wu zhan
  • 6 篇 zhan wu
  • 6 篇 li peifeng
  • 6 篇 zhang zhizheng
  • 6 篇 huang chongwen
  • 6 篇 guodong zhou
  • 6 篇 yan xi
  • 5 篇 fei yu
  • 5 篇 yanqin zhu
  • 5 篇 yang yang
  • 5 篇 qian peide
  • 5 篇 tianling lyu
  • 5 篇 wentao zhu

语言

  • 209 篇 英文
  • 13 篇 中文
  • 2 篇 其他
检索条件"机构=Jiangsu Provincial Key Lab for Computer Information Processing Technology"
224 条 记 录,以下是51-60 订阅
排序:
A privacy policy of P3P based on relational database
A privacy policy of P3P based on relational database
收藏 引用
First International Multi- Symposiums on computer and Computational Sciences, IMSCCS'06
作者: Jiang, Bin Zhang, Da-Fang Yang, Chao Yue, Guangxue Yu, Fei Software School Hunan University Changsha Hunan 410082 College of Computer and Communication Hunan University Changsha Hunan 410082 Provincial Key Laboratory of Computer Information Processing Technology Nanjing Jiangsu 215006
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited Traditional methods of database access control places great depen... 详细信息
来源: 评论
Reliable neighbors-based collaborative filtering for recommendation systems  1
收藏 引用
1st International Conference on Neural Computing for Advanced Applications, NCAA 2020
作者: Zhang, Li Sun, Xiaohan Cheng, Jiangfei Li, Zepeng School of Computer Science and Technology Joint International Research Laboratory of Machine Learning and Neuromorphic Computing Soochow University SuzhouJiangsu215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University SuzhouJiangsu215006 China
The sparsity of data and the diversity of ratings have a great effect on the performance of recommendation systems. To deal with these two issues, this paper proposes a reliable neighbors-based collaborative filtering... 详细信息
来源: 评论
Semi-supervised feature selection using sparse laplacian support vector machine  1
收藏 引用
1st International Conference on Neural Computing for Advanced Applications, NCAA 2020
作者: Zhang, Li Zheng, Xiaohan Xu, Zhiqiang School of Computer Science and Technology Joint International Research Laboratory of Machine Learning and Neuromorphic Computing Soochow University SuzhouJiangsu215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University SuzhouJiangsu215006 China
Semi-supervised feature selection is an active topic in machine learning and data mining. Laplacian support vector machine (LapSVM) has been successfully applied to semi-supervised learning. However, LapSVM cannot be ... 详细信息
来源: 评论
Video object matching based on sift algorithm
Video object matching based on sift algorithm
收藏 引用
2008 IEEE International Conference Neural Networks and Signal processing, ICNNSP
作者: Xuelong, Hu Yingcheng, Tang Zhenghua, Zhang School of Information Engineering Yangzhou University Yangzhou Jiangsu 225009 China Jiangsu Prov. Key Lab for Image Processing and Image Communication Nanjing University of Posts and Communications Nanjing Jiangsu 210003 China Jiangsu Prov. Key Lab. for Computer Information Processing Technology Suzhou University Suzhou Jiangsu 215006 China
SIFT (Scale Invariant Feature Transform) is used to solve visual tracking problem, where the appearances of the tracked object and scene background change during tracking. The implementation of this algorithm has five... 详细信息
来源: 评论
Approaches to image retrieval using fuzzy set theory
Approaches to image retrieval using fuzzy set theory
收藏 引用
2008 IEEE International Conference Neural Networks and Signal processing, ICNNSP
作者: Li, Yang Xuelong, Hu Jun, Pan School of Information Engineering Yangzhou University Yangzhou Jiangsu 225009 China Jiangsu Province Key Lab. for Image Processing and Image Communication Nanjing University of Posts and Communications Nanjing Jiangsu 210003 China Jiangsu Prov. Key Lab. for Computer Information Processing Technology Suzhou University Suzhou Jiangsu 215006 China
This paper mainly presents two approaches for image retrieval. There is some faintness in color locating in quantification boundary when image color is quantized. The membership function in fuzzy set theory can descri... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
Answer set programming with uncertain facts
Answer set programming with uncertain facts
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Sha, Lei Zhang, Zhizheng Department of Transportation Management Nanjing Institute of Railway Technology Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University China
We introduce a new logic programming paradigm-answer set programming with uncertain facts (LPuF for short). A LPuF program is an extension of answer set programs (ASP for short). We first define the syntax of LPuF pro... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论