咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 11 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 56 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 30 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 9 篇 信息与通信工程
    • 6 篇 化学工程与技术
    • 6 篇 农业工程
    • 5 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 纺织科学与工程
    • 1 篇 交通运输工程
  • 20 篇 理学
    • 13 篇 数学
    • 6 篇 化学
    • 3 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 系统科学
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 6 篇 农学
    • 6 篇 作物学
  • 3 篇 医学
    • 2 篇 临床医学
    • 2 篇 特种医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
    • 1 篇 医学技术(可授医学...

主题

  • 3 篇 convolution
  • 3 篇 semantics
  • 3 篇 natural language...
  • 3 篇 labeling
  • 3 篇 image reconstruc...
  • 3 篇 information proc...
  • 2 篇 computer science
  • 2 篇 learning systems
  • 2 篇 imaging
  • 2 篇 rsa cryptosystem
  • 2 篇 polynomial inter...
  • 2 篇 trees (mathemati...
  • 2 篇 multi-secret sha...
  • 2 篇 engineering in m...
  • 2 篇 schnorr signatur...
  • 2 篇 privacy preservi...
  • 2 篇 data mining
  • 2 篇 syntactics
  • 2 篇 predictive model...
  • 2 篇 distributed obli...

机构

  • 13 篇 school of comput...
  • 6 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 4 篇 jiangsu provinci...
  • 4 篇 first-imaging te...
  • 4 篇 zhejiang lab
  • 3 篇 jiangsu provinci...
  • 3 篇 jiangsu provinci...
  • 3 篇 school of electr...
  • 2 篇 jiangsu universi...
  • 2 篇 jiangsu provinci...
  • 2 篇 jiangsu key lab ...
  • 2 篇 jiangsu provinci...
  • 2 篇 provincial key l...
  • 2 篇 beihang universi...
  • 2 篇 huawei technolog...
  • 2 篇 jiangsu provinci...
  • 2 篇 college of compu...
  • 2 篇 jiangsu provinci...
  • 2 篇 college of commu...

作者

  • 13 篇 kong fang
  • 10 篇 zhou guodong
  • 10 篇 zhu qiaoming
  • 4 篇 qian longhua
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 qian peide
  • 3 篇 wu zhan
  • 3 篇 zhou guo dong
  • 3 篇 wu hongjie
  • 3 篇 chen yang
  • 3 篇 li peifeng
  • 3 篇 huang xu
  • 3 篇 guodong zhou
  • 2 篇 zhu wentao
  • 2 篇 juan xie
  • 2 篇 xinyun zhong
  • 2 篇 hongling wang
  • 2 篇 lv qiang
  • 2 篇 yao min

语言

  • 53 篇 英文
  • 3 篇 中文
检索条件"机构=Jiangsu Provincial Key Lab. for Computer Information Processing Technologies"
56 条 记 录,以下是21-30 订阅
排序:
Context-Sensitive Convolution Tree Kernel for Pronoun Resolution  3
Context-Sensitive Convolution Tree Kernel for Pronoun Resolu...
收藏 引用
3rd International Joint Conference on Natural Language processing, IJCNLP 2008
作者: Zhou, GuoDong Kong, Fang Zhu, Qiaoming JiangSu Provincial Key Lab for Computer Information Processing Technology School of Computer Science and Technology Soochow Univ. Suzhou215006 China
This paper proposes a context-sensitive convolution tree kernel for pronoun resolution. It resolves two critical problems in previous researches in two ways. First, given a parse tree and a pair of an anaphor and an a... 详细信息
来源: 评论
Semi-Supervised Learning for Relation Extraction  3
Semi-Supervised Learning for Relation Extraction
收藏 引用
3rd International Joint Conference on Natural Language processing, IJCNLP 2008
作者: Zhou, Guo Dong Li, Jun Hui Qian, Long Hua Zhu, Qiaoming Jiangsu Provincial Key Lab for Computer Information Processing Technology School of Computer Science and Technology Soochow Univ. Suzhou215006 China
This paper proposes a semi-supervised learning method for relation extraction. Given a small amount of lab.led data and a large amount of unlab.led data, it first bootstraps a moderate number of weighted support vecto... 详细信息
来源: 评论
Dependency tree-based anaphoricity determination for coreference resolution
Dependency tree-based anaphoricity determination for corefer...
收藏 引用
International Conference on Asian Language processing
作者: Kong, Fang Zhou, Jianmei Zhou, Guodong Zhu, Qiaoming JiangSu Provincial Key Lab. for Computer Information Processing Technology China School of Computer Science and Technology Soochow University Suzhou China Computer Science and Technology School NanTong University NanTong China
This paper proposes a new scheme to determine the tree span structure for tree kernel-based anaphoricity determination in coreference resolution. Given a sentence and current mention, it gets all the dependencies, enc... 详细信息
来源: 评论
Semi-supervised learning for semantic relation classification using stratified sampling strategy
Semi-supervised learning for semantic relation classificatio...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Qian, Longhua Zhou, Guodong Kong, Fang Zhu, Qiaoming Jiangsu Provincial Key Lab for Computer Information Processing Technology School of Computer Science and Technology Soochow University 1 Shizi Street Suzhou 215006 China
This paper presents a new approach to selecting the initial seed set using stratified sampling strategy in bootstrapping-based semi-supervised learning for semantic relation classification. First, the training data is... 详细信息
来源: 评论
An access control model in lager-scale P2P file sharing systems
An access control model in lager-scale P2P file sharing syst...
收藏 引用
7th International Conference on Computational Science (ICCS 2007)
作者: Yue Guang-xue Yu Fei Chen Li-ping Chen Yi-jun College of Information Engineering Jiaxing University 314000 China Department of Computer Science and Technology Huaihua University 418000 China State Key Lab. for Novel Software Technology Nanjing University 210093 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University 2150063 China
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym... 详细信息
来源: 评论
Predicting helix boundaries of α-helix transmembrane protein with feedback conditional random fields  11th
Predicting helix boundaries of α-helix transmembrane protei...
收藏 引用
11th International Conference on Intelligent Computing, ICIC 2015
作者: Wang, Kun Wu, Hongjie Lu, Weizhong Fu, Baochuan Lü, Qiang Huang, Xu School of Electronic and Information Engineering Suzhou University of Science and Technology Suzhou215009 China School of Computer Science and Technology Soochow University Suzhou215006 China Jiangsu Provincial Key Lab for Information Processing Technologies Suzhou215006 China School of Information Engineering Huzhou University Huzhou313000 China
Transmembrane proteins play an important role in cellular energy production, signal transmission, metabolism. Existing machine learning methods are difficult to model the global correlation of the membrane protein seq... 详细信息
来源: 评论
Semantic role lab.ling using Chinese dependency parsing tree
Semantic role labeling using Chinese dependency parsing tree
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hongling Wang Xiaohong Yuan Guodong Zhou Jiangsu Provincial Key Lab for Computer Information Processing Technology Soochow University Suzhou China
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
The Applications of Generalized Computing In Knowledge Management
The Applications of Generalized Computing In Knowledge Manag...
收藏 引用
2005年公共管理国际会议
作者: YAO Min SHEN Bin ZHANG Yan-gu College of Computer Zhejiang University Provincial Key Lab. for Computer Information processing Technology in Jiangsu Suzhou University School of Computer Wenzhou Normal College
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe... 详细信息
来源: 评论