咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 375 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 883 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 655 篇 工学
    • 474 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 74 篇 生物工程
    • 54 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 827 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
883 条 记 录,以下是801-810 订阅
排序:
A new contour corner detector based on curvature scale space
A new contour corner detector based on curvature scale space
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Sun, Junding Zhang, Zhaosheng School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University 215006 China
Corner detection is a main concern in many computer vision applications like object recognition or image matching. Furthermore, detection is usually performed over the contour of the objects. This paper presents a nov... 详细信息
来源: 评论
Contour-Shape recognition and retrieval based on chain code
Contour-Shape recognition and retrieval based on chain code
收藏 引用
2009 International Conference on Computational Intelligence and Security, CIS 2009
作者: Sun, Junding Xu, Heli School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 215006 China
The direction chain code has been widely used in image coding and recognition for its simplicity and low storage requirement. However, the researches on how to use chain code for shape retrieval are few. The tradition... 详细信息
来源: 评论
An effective texture spectrum descriptor
An effective texture spectrum descriptor
收藏 引用
5th International Conference on information Assurance and Security, IAS 2009
作者: Xiaosheng, Wu Junding, Sun School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 215006 China
The center-symmetric local binary pattern (CS-LBP) is an effective extension to local binary pattern (LBP) operator. However, it discards some important texture information because of the ignorance of the center pixel... 详细信息
来源: 评论
Improving nominal SRL in Chinese language with verbal SRL information and automatic predicate recognition
Improving nominal SRL in Chinese language with verbal SRL in...
收藏 引用
2009 Conference on Empirical Methods in Natural Language processing, EMNLP 2009, Held in Conjunction with ACL-IJCNLP 2009
作者: Li, Junhui Zhou, Guodong Zhao, Hai Zhu, Qiaoming Qian, Peide Jiangsu Provincial Key Lab. for Computer Information Processing Technologies School of Computer Science and Technology Soochow University Suzhou 215006 China Department of Chinese Translation and Linguistics City University of HongKong Hong Kong
This paper explores Chinese semantic role labeling (SRL) for nominal predicates. Besides those widely used features in verbal SRL, various nominal SRL-specific features are first included. Then, we improve the perform... 详细信息
来源: 评论
Extracting Protein-Protein Interaction from Biomedical Text Using Additional Shallow Parsing information
Extracting Protein-Protein Interaction from Biomedical Text ...
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Huanhuan Yu Longhua Qian Guodong Zhou Qiaoming Zhu Jiangsu Provincial Key Laboratory of Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou China
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information... 详细信息
来源: 评论
Secure and efficient VSS scheme based on partial broadcast channels
收藏 引用
Journal of Computational information Systems 2009年 第3期5卷 1149-1155页
作者: Wang, Jialing Zhu, Yanqin Luo, Xizhao School of Computer Science and Technology Soochow University Suzhou 215006 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou 215006 China
In the conventional verifiable secret sharing scheme, a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of participants. Rei and Wang proposed a secret sharing scheme based ... 详细信息
来源: 评论
Parallel sentences mining from the web
收藏 引用
Journal of Computational information Systems 2009年 第6期5卷 1633-1641页
作者: Yan, Zhenxiang Feng, Yanhui Hong, Yu Yao, Jianmin Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 China
Parallel sentences can benefit many NLP applications (e.g., machine translation, cross language information retrieval.) In this paper, the candidate bilingual webs pages are returned by submit sentence pairs to search... 详细信息
来源: 评论
Identifying query interfaces of deep web entries automatically
收藏 引用
Journal of Computational information Systems 2009年 第3期5卷 1477-1485页
作者: Cui, Zhiming Fang, Wei Huang, Li Xian, Xuefeng Zhang, Shukui Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 China Institute of Intelligent Information Processing and Application Soochow University Suzhou 215006 China
A large number of high-quality web information is deeply hidden in the Web, which can not be indexed by conventional search engines, be called Deep Web. Because query interface is the only entrance to the Deep Web, we... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论