咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 676 篇 工学
    • 495 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 184 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 74 篇 生物工程
    • 55 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 53 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 35 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 316 篇 理学
    • 176 篇 数学
    • 84 篇 生物学
    • 68 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 deep learning
  • 20 篇 training
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 24 篇 guangdong provin...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 16 篇 jiangsu provinci...
  • 15 篇 jiangsu provinci...
  • 14 篇 hunan provincial...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 chen yang
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 wang jinbao
  • 12 篇 shen linlin
  • 12 篇 jiang feibo
  • 11 篇 kong youyong
  • 10 篇 gao shang
  • 10 篇 zhou guodong

语言

  • 827 篇 英文
  • 60 篇 其他
  • 24 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
909 条 记 录,以下是691-700 订阅
排序:
A Complete Proof System of Weak Bisimulation Over a Linear HOcore
A Complete Proof System of Weak Bisimulation Over a Linear H...
收藏 引用
2012 Third International Conference on Theoretical and Mathematical Foundations of computer Science(ICTMF 2012)
作者: Zining Cao Department of Computer Science and Technology Nanjing University of Aero.& Astro. Provincial Key Laboratory for Computer Information Processing Technology Soochow University
In this short paper,we show the equivalence between weak context bisimulation and strong bisimulation for the linear *** as a corollary,we get a complete proof system of weak context bisimulation over the linear HOcore.
来源: 评论
A parallel ant colonies approach to de novo prediction of protein backbone in CASP8/9
收藏 引用
Science China(information Sciences) 2013年 第10期56卷 226-238页
作者: LV Qiang WU HongJie WU JinZhen HUANG Xu LUO XiaoHu QIAN PeiDe School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab for Information Processing Technologies School of Electronic and Information Engineering Suzhou University of Science and Technology
Predicting the three-dimensional structure of proteins from amino acid sequences with only a few remote homologs,or de novo prediction,remains a major challenge in computational *** modeling of the protein backbone re... 详细信息
来源: 评论
Application and Study on Sentiment-oriented Analysis on Social Semantic Network
Application and Study on Sentiment-oriented Analysis on Soci...
收藏 引用
2013 International Conference on Advanced computer Science and Electronics information(ICACSEI 2013)
作者: Dan Zhang Dongsheng Wang Haiping Huang College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommunications Department of Computer and Information Science Korea University Seoul College of Computer & Information Science Nanjing University of Posts and Telecommunications Jiangsu Computer Information Processing Technology Key Laboratory Suzhou University
With the increasing growth of users and exponential propagation of messages, Social Network Services such as Twitter, Facebook can be used to analyze social trend, people's interests and personal-favor. Recently, ... 详细信息
来源: 评论
A new dynamic probabilistic Particle Swarm Optimization with dynamic random population topology
A new dynamic probabilistic Particle Swarm Optimization with...
收藏 引用
Congress on Evolutionary Computation
作者: Qingjian Ni Cen Cao Xushan Yin College of Software Engineering Southeast University Nanjing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China School of Computer Science and Engineering Southeast University Nanjing China
Population topologies of Particle Swarm Optimization algorithm (PSO) have direct impacts on the information sharing amony particles during the evolution, and will influence the PSO algorithms' performance obviousl... 详细信息
来源: 评论
Comparison of Particle Swarm Optimization algorithms in Wireless Sensor Network node localization
Comparison of Particle Swarm Optimization algorithms in Wire...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Cen Cao Qingjian Ni Xushan Yin School of Computer Science and Engineering Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
The node localization in Wireless Sensor Network (WSN) presently plays an important role in the field of applications. Particle Swarm Optimization (PSO) algorithm is a typical swarm intelligence method. Researchers pr... 详细信息
来源: 评论
Detecting genuine communities from large-scale social networks: A pattern-based method
Detecting genuine communities from large-scale social networ...
收藏 引用
作者: Wu, Zhiang Cao, Jie Wu, Junjie Wang, Youquan Liu, Chunyang Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing210003 China College of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Department of Information Systems School of Economics and Management Beihang 100191 China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Community detection is a long-standing yet very difficult task in social network analysis. It becomes more challenging as many online social networking sites are evolving into super-large scales. Numerous methods have... 详细信息
来源: 评论
Robust bilinear matrix recovery by Tensor Low-Rank Representation
Robust bilinear matrix recovery by Tensor Low-Rank Represent...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Zhao Zhang Shuicheng Yan Mingbo Zhao Fan-Zhang Li Provincial Key Laboratory for Computer Information Processing Technology Soochow University Department of Electrical and Computer Engineering National University of Singapore Singapore Department of Electronic Engineering City University of Hong Kong Kowloon Hong Kong SAR
For low-rank recovery and error correction, Low-Rank Representation (LRR) row-reconstructs given data matrix X by seeking a low-rank representation, while Inductive Robust Principal Component Analysis (IRPCA) aims to ... 详细信息
来源: 评论
The system design of a node of P2P networks for intrusion detection
收藏 引用
Journal of Networks 2013年 第8期8卷 1920-1927页
作者: Ding, Lei Yu, Fei Yang, Zhenghua Yue, Guangxue School of Information Science and Engineering Jishou University Jishou 416000 China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow 215006 China School of Mathematic and Computer Jiaxin University Jiaxin 314001 China
To improve the measuring accuracy of intrusion detection, a system design of a node for intrusion detection is proposed in this paper. First, the technology that applies the traditional intrusion detection method, suc... 详细信息
来源: 评论
Coverage Enhancement Strategy Based on Novel Perception and Co-evolution for Multimedia Sensor Networks
收藏 引用
电子学报(英文版) 2013年 第1期22卷 135-140页
作者: XIAO Fu WANG Jing SUN Lijuan WANG Ruchuan GUO Jian College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
Coverage enhancement is one of the hot research topics in wireless multimedia sensor net- works. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propo... 详细信息
来源: 评论
Survey of DCA for abnormal detection
Journal of Software
收藏 引用
Journal of Software 2013年 第8期8卷 2087-2094页
作者: Ding, Lei Yu, Fei Yang, Zhenghua School of Information Science and Engineering Jishou University Jishou 416000 China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow 215006 China School of Information Science and Engineering Jishou University Jishou 416000 China
As a latest immune algorithm, dendritic cell algorithm (DCA) has been successfully applied into the abnormal detection. First, this paper reviewed the research progress of DCA from the following aspects: signal extrac... 详细信息
来源: 评论