咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 373 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 881 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 653 篇 工学
    • 474 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 84 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 825 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
881 条 记 录,以下是771-780 订阅
排序:
Bisimulations for open processes in higher order π-calculus
Bisimulations for open processes in higher order π-calculus
收藏 引用
2010 4th International Symposium on Theoretical Aspects of Software Engineering, TASE 2010
作者: Cao, Zining Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China
In this paper, we propose open bisimulations for open processes in higher order π-calculus. The equivalence of open bisimulations and other bisimulations for open processes is proved. Furthermore, we present a symbol... 详细信息
来源: 评论
Temporal logics and model checking algorithms for ZIAs
Temporal logics and model checking algorithms for ZIAs
收藏 引用
2nd International Conference on Software Engineering and Data Mining, SEDM 2010
作者: Cao, Zining National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching t... 详细信息
来源: 评论
Video Object Tracking Method Based on Normalized Cross-correlation Matching
Video Object Tracking Method Based on Normalized Cross-corre...
收藏 引用
International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES)
作者: Jian Wu Heng-jun Yue Yan-yan Cao Zhi-ming Cui Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou China Soochow University Suzhou Jiangsu CN
Combing with specific temporal information of video, this paper proposes a kind of video object tracking method based on normalized cross-correlation matching by using the high precision characteristics of normalized ... 详细信息
来源: 评论
Refinement checking for interface automata with Z notation
Refinement checking for interface automata with Z notation
收藏 引用
作者: Cao, Zining National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we first introduce a specification approach combining interface automata and Z language, which is named ZIA. A refinement relation on ZIAs is proposed. We then give an algorithm for checking refinement ... 详细信息
来源: 评论
Image segmentation based on fuzzy entropy and Bee Colony Algorithm
Image segmentation based on fuzzy entropy and Bee Colony Alg...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Xiao, Yonghao Yu, Weiyu Tian, Jing School of Electronic and Information Engineering South China University of Technology Guangzhou 510641 China Foshan University Foshan 528000 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Taiwan BLK 523 Jelapang Road 670523 Singapore Singapore
Image segmentation based on Bee Colony Algorithm (BCA) and fuzzy entropy is presented in this paper. The fuzzy entropy function is simplified with single parameter. The BCA is applied to search the minimum value of fu... 详细信息
来源: 评论
Leakage-resilient identity-based encryption scheme
Leakage-resilient identity-based encryption scheme
收藏 引用
作者: Luo, Xizhao Qian, Peide Zhu, Yanqin Wang, Shangping School of Computer Science and Technology Soochow University Suzhou 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China School of Science Xiaqn University of Technology Xi'an 710048 ShaanXi China
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leak... 详细信息
来源: 评论
A domain-specific question answering system based on ontology and question templates
A domain-specific question answering system based on ontolog...
收藏 引用
11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD2010
作者: Wang, D.S. Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China Graduate University of the Chinese Academy of Sciences Beijing China Department of Computer Science Jiangsu University of Science and Technology Zhenjiang China
The rapid growth in the development of Internet-based information systems increases the demand for natural language interfaces that are easy to set up and maintain. Unfortunately, the problem of deep understanding nat... 详细信息
来源: 评论
Active Analysis of BT with a Modified Azureus Client
Active Analysis of BT with a Modified Azureus Client
收藏 引用
International Conference on computer and information technology (CIT)
作者: Zhe Yang Lingzhi Li Zhihao Wang Linqing Li Provincial Key Laboratory of Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou China
Peer-to-peer (P2P) systems have become increasingly popular for a variety of applications in Internet for their several advantages over traditional client/server architecture. And they also generate most traffic in al... 详细信息
来源: 评论
Analysis of BT network based on active measurement
Analysis of BT network based on active measurement
收藏 引用
International Conference on Networking and Digital Society, ICNDS
作者: Linqing Li Dongliang Su Zhihao Wang Zhe Yang Provincial Key Laboratory of Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou China
Peer-to-peer (P2P) systems enable a wide range of important, scalable and reliable services such as file sharing, voice-over-IP (VoIP) and video streaming. And they also generate most traffic in all regions. Excessive... 详细信息
来源: 评论
A new quadtree-based terrain LOD algorithm
Journal of Software
收藏 引用
Journal of Software 2010年 第7期5卷 769-776页
作者: Wu, Jian Yang, Yuan-feng Gong, Sheng-rong Cui, Zhi-ming Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China The Institute of Intelligent Information Processing and Application Soochow University Suzhou 215006 China
Terrain LOD algorithm is a dynamic and local dough sheet subduction algorithm. On the basis of the research on traditional quadtree algorithm, this paper proposed a new terrain LOD algorithm using quadtree. On deviati... 详细信息
来源: 评论