咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 676 篇 工学
    • 495 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 184 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 74 篇 生物工程
    • 55 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 53 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 35 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 316 篇 理学
    • 176 篇 数学
    • 84 篇 生物学
    • 68 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 deep learning
  • 20 篇 training
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 24 篇 guangdong provin...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 16 篇 jiangsu provinci...
  • 15 篇 jiangsu provinci...
  • 14 篇 hunan provincial...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 chen yang
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 wang jinbao
  • 12 篇 shen linlin
  • 12 篇 jiang feibo
  • 11 篇 kong youyong
  • 10 篇 gao shang
  • 10 篇 zhou guodong

语言

  • 827 篇 英文
  • 60 篇 其他
  • 24 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
909 条 记 录,以下是681-690 订阅
排序:
Locally Linear Embedding Algorithm Based on OMP for Incremental Learning
Locally Linear Embedding Algorithm Based on OMP for Incremen...
收藏 引用
International Joint Conference on Neural Networks
作者: Yiqin Leng Li Zhang Jiwen Yang School of Computer Science and Technology & Provincial Key Laboratory for Computer Information Processing Technology Soochow University
Locally Linear Embedding (LLE) is a sort of powerful nonlinear dimensionality reduction algorithms. The basic idea behind the LLE method is that each data point and its neighbors lie on or close to a locally linear pa... 详细信息
来源: 评论
Feature Ensemble Learning based on Sparse Autoencoders for Image Classification
Feature Ensemble Learning based on Sparse Autoencoders for I...
收藏 引用
International Joint Conference on Neural Networks
作者: Yaping Lu Li Zhang Bangjun Wang Jiwen Yang School of Computer Science and Technology & Provincial Key Laboratory for Computer Information Processing Technology Soochow University
Deep networks are well known for their powerful function approximations. To train a deep network efficiently, greedy layer-wise pre-training and fine tuning are required. Typically, pre-training, aiming to initialize ... 详细信息
来源: 评论
Research on improved coding and decoding algorithm for fountain codes
Research on improved coding and decoding algorithm for fount...
收藏 引用
International Conference on Wireless Communications and Signal processing (WCSP)
作者: Zhifeng Zhu Liulei Zhou Jia Hou School of Electronics and Information Engineering Soochow University Jiangsu China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Jiangsu China
Fountain code is a class of graph-based linear erasure codes, which can effectively solve the problems such as network congestion and feedback cracking for its characteristics of rateless and can resume when interrupt... 详细信息
来源: 评论
Solving Unbalanced Problems in Similarity Learning using SVM Ensemble
Solving Unbalanced Problems in Similarity Learning using SVM...
收藏 引用
International Joint Conference on Neural Networks
作者: Peipei Xia Li Zhang School of Computer Science and Technology & Provincial Key Laboratory for Computer Information Processing Technology Soochow University
Similarity learning is one of the most fundamental notions in machine learning and pattern recognition. In real-world problems, the number of the paired-samples in similarity set is far less than the ones in dissimila... 详细信息
来源: 评论
Hybridizing infeasibility driven and constrained-domination principle with MOEA/D for constrained multiobjective evolutionary optimization
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8916卷 249-261页
作者: Lin, Huibiao Fan, Zhun Cai, Xinye Li, Wenji Wang, Sheng Li, Jian Zhang, Chengdian School of Engineering Shantou University Guangdong515063 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics NanjingJiangsu210016 China College of Science Shantou University Guangdong515063 China Guangdong Provincial Key Laboratory of Digital Signal and Image Processing Techniques Shantou University Guangdong515063 China
This paper presents a novel multiobjective constraint handling approach, named as MOEA/D-CDP-ID, to tackle constrained optimization problems. In the proposed method, two mechanisms, namely infeasibility driven (ID) an... 详细信息
来源: 评论
Towards the Independent Spanning Trees in Conditional BC Networks
Towards the Independent Spanning Trees in Conditional BC Net...
收藏 引用
2013 International Conference on Advanced computer Science and Electronics information(ICACSEI 2013)
作者: Baolei Cheng Jianxi Fan Shukui Zhang Yan Wang Xi Wang Wenjun Liu School of Computer Science and Technology Soochow University Provincial Key Laboratory for Computer Information Processing Technology Soochow University
Independent spanning trees (ISTs for short) in networks have applications such as reliable communication protocols, the multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distr... 详细信息
来源: 评论
An Efficient Image Enhancement Method Based on Image Saliency Detection for Portrait Photo
An Efficient Image Enhancement Method Based on Image Salienc...
收藏 引用
2014 International Conference on Advanced computer Science and Engineering(ACSE 2014)
作者: Si-qi WU Yao HU Wei-yu YU School of Electronic and Information Engineering South China University of Technology Provincial Key Laboratory for Computer Information Processing Technology Soochow University
The portrait region of portrait photo may be too dark due to backlight during the process of photo taking. Aiming at this problem, we propose a new image enhancement method based on histogram-based contrast method(HC)... 详细信息
来源: 评论
Efficient personalized probabilistic retrieval of Chinese calligraphic manuscript images in mobile cloud environment
收藏 引用
ACM Transactions on Asian Language information processing 2014年 第4期13卷 1-38页
作者: Zhuang, Yi Li, Qing Chiu, Dickson K. W. Wu, Zhiang Hu, Haiyang College of Computer and Information Engineering Zhejiang Gongshang University Hangzhou310018 China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Faculty of Education University of Hong Kong Hong Kong Hong Kong Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing China College of Computer Science Hangzhou Dianzi University Hangzhou China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Ancient language manuscripts constitute a key part of the cultural heritage of mankind. As one of the most important languages, Chinese historical calligraphy work has contributed to not only the Chinese cultural heri... 详细信息
来源: 评论
A model based on crossed cubes for VoD services
A model based on crossed cubes for VoD services
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Haifei Shen Jianxi Fan Baolei Cheng Cheng-Kuan Lin School of Computer Science and Technology Soochow University Suzhou China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Content distribution schemes for Video on Demand (VoD) systems, based on the peer-to-peer (P2P) technology, have attracted more and more attention. Recently, people mainly focus on the latency performance, security, i... 详细信息
来源: 评论
Model Checking Parallel Interval Logic on Parallel Run Structures
Model Checking Parallel Interval Logic on Parallel Run Struc...
收藏 引用
2012 Third International Conference on Theoretical and Mathematical Foundations of computer Science(ICTMF 2012)
作者: Zining Cao Department of Computer Science and Technology Nanjing University of Aero.& Astro. Provincial Key Laboratory for Computer Information Processing Technology Soochow University
In this paper,we firstly present a kind of models for truly concurrent systems named parallel run *** we present a parallel interval logic,called PIL,which is an extension of interval ***,we give an algorithm of model... 详细信息
来源: 评论