咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 375 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 883 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 655 篇 工学
    • 474 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 74 篇 生物工程
    • 54 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 827 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
883 条 记 录,以下是81-90 订阅
排序:
Distributed online bandit tracking for Nash equilibrium under partial-decision information setting
收藏 引用
Science China(Technological Sciences) 2023年 第11期66卷 3129-3138页
作者: FENG ZhangCheng XU WenYing CAO JinDe YANG ShaoFu RUTKOWSKI Leszek Jiangsu Provincial Key Laboratory of Networked Collective Intelligence School of MathematicsSoutheast UniversityNanjing 211189China Frontiers Science Center for Mobile Information Communication and Security Nanjing 210096China School of Computer Science and Engineering Southeast UniversityNanjing 211189China The Systems Research Institute of the Polish Academy of Sciences Warsaw 01-447Poland AGH University of Science and Technology Krakow 30-059Poland
This paper is concerned with a Nash equilibrium(NE)tracking issue in online games with bandit feedback,where cost functions vary with time and agents only have access to the values of these functions at two points dur... 详细信息
来源: 评论
Transformer Helps Gnns Express Better Via Distillation of Long-Range Dependencies
SSRN
收藏 引用
SSRN 2024年
作者: Li, Jiaxing Zhang, Xiaotong Zhang, Ke Kong, Youyong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Jiangsu Province Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Graph neural networks (GNNs) are powerful architectures for graph representation learning. However, GNNs based on message-passing cannot make fully use of the valuable long-range dependencies in graph-structured data.... 详细信息
来源: 评论
HybridHash: Hybrid Convolutional and Self-Attention Deep Hashing for Image Retrieval
arXiv
收藏 引用
arXiv 2024年
作者: He, Chao Wei, Hongxi School of Computer Science Inner Mongolia University Provincial Key Laboratory of Mongolian Information Processing Technology National and Local Joint Engineering Research Center of Mongolian Information Processing Hohhot China
Deep image hashing aims to map input images into simple binary hash codes via deep neural networks and thus enable effective large-scale image retrieval. Recently, hybrid networks that combine convolution and Transfor... 详细信息
来源: 评论
Test-Time Training with Invariant Graph Learning for Out-of-Distribution Generalization
SSRN
收藏 引用
SSRN 2024年
作者: Pi, Li Li, Jiaxing Song, Lei Yang, Guanyu Chen, Yang Kong, Youyong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Jiangsu Province Nanjing China
Graph Neural Networks (GNNs) frequently do not perform optimally on out-of-distribution (OOD) data. Previous research on graph OOD generalization suggests extracting invariant subgraphs, which provide crucial categori... 详细信息
来源: 评论
Coverage Enhancement Strategy Based on Novel Perception and Co-Evolution for Multimedia Sensor Networks
收藏 引用
Chinese Journal of Electronics 2023年 第1期22卷 135-140页
作者: Fu Xiao Jing Wang Lijuan Sun Ruchuan Wang Jian Guo College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing China
Coverage enhancement is one of the hot research topics in wireless multimedia sensor networks. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propose... 详细信息
来源: 评论
Polyp Segmentation Neural Network with Simple Encoding Structure and Reverse Attention Module  13
Polyp Segmentation Neural Network with Simple Encoding Struc...
收藏 引用
13th International Conference on information technology in Medicine and Education, ITME 2023
作者: Wang, Jie Li, Zuoyong Xu, Haiping Cheng, Xuesong Teng, Shenghua College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao266590 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China Fujian Key Laboratory of Medical Big Data Engineering Fujian Provincial Hospital Fuzhou350001 China College of Mathematics and Data Science Minjiang University Fuzhou350121 China
Colorectal cancer is a common malignancy. In colonoscopy images, computer-assisted polyp segmentation helps doctors diagnose and treat disorders more precisely. In recent years, some methods based on deep convolutiona... 详细信息
来源: 评论
Traffic Signal Light Recognition Based on Transformer  12th
Traffic Signal Light Recognition Based on Transformer
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Ou, Yangze Sun, Yaqi Yu, Xiaozhong Yun, Liuqing College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421008 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421008 China
With more and more developed technology, unmanned driving technology has gradually entered people’s vision. Many cars are now equipped with self-parking technology, which allows the vehicle to enter the garage throug... 详细信息
来源: 评论
Variational Graph Autoencoders Method Based on Attentional Mechanisms for Overlapping Community Detection  12th
Variational Graph Autoencoders Method Based on Attentional M...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Wen, Kunhui Lin, Mugang Zhu, Xuanying Zhao, Huihuang College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421008 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421008 China
Detecting overlapping communities of an attribute network is an important and difficult issue in network science. Traditional methods for overlapping community detection generally considered only its topological struc... 详细信息
来源: 评论
Deep Learning Image Steganalysis Method Fused with CBAM  12th
Deep Learning Image Steganalysis Method Fused with CBAM
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Chen, Huasuo Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421002 China
Steganography is a critical technical tool for preventing the disclosure of sensitive information. The detection performance of picture steganography algorithms based on deep learning has to be enhanced in tandem with... 详细信息
来源: 评论
Traffic Sign Recognition System Based on YOLOv5  12th
Traffic Sign Recognition System Based on YOLOv5
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Zhang, Lin Sun, Yaqi Chen, Wenli Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421008 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421008 China
Traffic sign recognition is an important part of intelligent driving and an important content of intelligent transportation system. However, the current traffic sign detection algorithm has some problems, such as high... 详细信息
来源: 评论