咨询与建议

限定检索结果

文献类型

  • 504 篇 会议
  • 374 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 879 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 653 篇 工学
    • 473 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 823 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
879 条 记 录,以下是581-590 订阅
排序:
Research on Power Attack Comprehensive Experiment Platform Based on SAKURA-G Hardware Circuit
Research on Power Attack Comprehensive Experiment Platform B...
收藏 引用
CENet 2017-the 7th International Conference on computer Engineering and Networks
作者: Ge Jiao Lang Li Yi Zou College of Computer Science and Technology Hengyang Normal UniversityHunan Provincial Engineering Laboratory for Technology of Traditional Settlements DigitalizationHunan Provincial Key Laboratory of Intelligent Information Processing and Application College of Computer Science and Technology Hengyang Normal University
The power attack of the hardware circuit is going through the steps of algorithm writen in FPGA,power consumption,data processing and *** order to solve the problem of the existing power attack experimental platform b... 详细信息
来源: 评论
FPGA Optimal Implementation of PRINCE against Power Analysis Attacks
FPGA Optimal Implementation of PRINCE against Power Analysis...
收藏 引用
ISCC 2017-the 5th International Conference on information Science and Cloud Computing
作者: Yi Zou Lang Li College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application College of Computer Science and Technology Hengyang Normal University
The algorithm PRINCE proposed in ASIACRYPT 2012 is a lightweight cipher, currently suitable for the implementation on RFID Smart Card of the Io T. It's studied to achieve the optimal implementation of PRINCE encry... 详细信息
来源: 评论
The M-computations induced by accessibility relations in nonstandard models M of Hoare logic
收藏 引用
Frontiers of computer Science 2016年 第4期10卷 717-725页
作者: Cungen CAO Yuefei SUI Zaiyue ZHANG Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science Jiangsu University of Sciences and Technology Zhenjiang 212003 China
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program... 详细信息
来源: 评论
Model-Driven Approach to Hadoop Deployment in Cloud
Model-Driven Approach to Hadoop Deployment in Cloud
收藏 引用
IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)
作者: Zheyi Chen Tao Xiang Xing Chen Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology (TNLIST) Beijing China College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou China
Due to the diversification of software and hardware resources in cloud and ever-changing demand for deployment, Hadoop deployment is faced with great challenges in difficulty and complexity. Most of present researches... 详细信息
来源: 评论
Combining event-level and cross-event semantic information for event-oriented relation classification by SCNN  15th
Combining event-level and cross-event semantic information f...
收藏 引用
15th China National Conference on Chinese Computational Linguistics, CCL 2016 and 4th International Symposium on Natural Language processing Based on Naturally Annotated Big Data, NLP-NABD 2016
作者: Ding, Siyuan Hong, Yu Zhu, Shanshan Yao, Jianmin Zhu, Qiaoming Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou China
Previous researches on event relation classification primarily rely on lexical and syntactic features. In this paper, we use a Shallow Convolutional Neural Network (SCNN) to extract event-level and cross-event semanti... 详细信息
来源: 评论
Double Time Slot RFID Anti-collision Algorithm based on Gray Code
Double Time Slot RFID Anti-collision Algorithm based on Gray...
收藏 引用
ISCC 2017-the 5th International Conference on information Science and Cloud Computing
作者: Hongwei Deng Lang Li Hui Wang School of Computer Science and Technology Hengyang Normal University School of Information Science and Engineering Central South University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
To solve the radio frequency identification problem,an anti-collision algorithm based on the Gray code(BSGC) was developed. The proposed algorithm reduces the effort required to search for tag prefixes in accordance w... 详细信息
来源: 评论
Denoising of 3D magnetic resonance images using a residual encoder-decoder wasserstein generative adversarial network
arXiv
收藏 引用
arXiv 2018年
作者: Ran, Maosong Hu, Jinrong Chen, Yang Chen, Hu Sun, Huaiqiang Zhou, Jiliu Zhang, Yi College of Computer Science Sichuan University Chengdu610065 China Department of Computer Science Chengdu University of Information Technology Chengdu610225 China Lab of Image Science and Technology School of Computer Science and Engineering Southeast University Nanjing210096 China School of Cyber Science and Engineering Southeast University Nanjing210096 China Ministry of Education Nanjing210096 China Department of Radiology West China Hospital of Sichuan University Chengdu610041 China Guangdong Provincial Key Laboratory of Medical Image Processing Southern Medical University Guangzhou510515 China
Structure-preserved denoising of 3D magnetic resonance imaging (MRI) images is a critical step in medical image analysis. Over the past few years, many algorithms with impressive performances have been proposed. In th... 详细信息
来源: 评论
A Low-Area Overhead Secure Scan Architecture Resisting Scan-Based Attacks for Crypto Chips
A Low-Area Overhead Secure Scan Architecture Resisting Scan-...
收藏 引用
2017 International MultiConference of Engineers and computer Scientists, IMECS 2017
作者: Weizheng, Wang Jincheng, Wang Shuo, Cai Peng, Liu Tieqiao, Liu College of Computer and Communication Engineering Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha Hunan410114 China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China Information Science and Engineering Department Hunan University Changsha410082 China Management School Hangzhou Dianzi University Hangzhou310018 China
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b... 详细信息
来源: 评论
Enhanced Geometric Map:a 2D&3D Hybrid City Model of Large Scale Urban Environment for Robot Navigation
收藏 引用
机器人 2016年 第3期38卷 311-321页
作者: LI Haifeng HU Zunhe LIU Jingtai College of Computer Science and Technology Civil Aviation University of China Tianjin 300300 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou 350121 China Institute of Robotics and Information Automatic System Nankai University Tianjin 300071 China Tianjin Key Laboratory of Intelligent Robotics Tianjin 300071 China
To facilitate scene understanding and robot navigation in large scale urban environment, a two-layer enhanced geometric map(EGMap) is designed using videos from a monocular onboard camera. The 2D layer of EGMap consis... 详细信息
来源: 评论
Energy-efficient resource allocation in noma heterogeneous networks
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Haijun Fang, Fang Cheng, Julian Long, Keping Wang, Wei Leung, Victor C.M. Engineering and Technology Research Center for Convergence Networks University of Science and Technology Beijing Beijing100083 China School of Engineering University of British Columbia KelownaBCV1X 1V7 Canada College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China Zhejiang Provincial Key Laboratory of Information Processing Communication and Networking Hangzhou310027 China Department of Electrical and Computer Engineering University of British Columbia VancouverBCV6T 1Z4 Canada
Non-orthogonal multiple access (NOMA) has attracted much recent attention owing to its capability for improving the system spectral efficiency in wireless communications. Deploying NOMA in heterogeneous network can sa... 详细信息
来源: 评论