咨询与建议

限定检索结果

文献类型

  • 503 篇 会议
  • 373 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 877 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 654 篇 工学
    • 476 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 179 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 75 篇 生物工程
    • 54 篇 生物医学工程(可授...
    • 49 篇 电气工程
    • 47 篇 光学工程
    • 47 篇 电子科学与技术(可...
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 19 篇 交通运输工程
    • 18 篇 仪器科学与技术
  • 312 篇 理学
    • 174 篇 数学
    • 84 篇 生物学
    • 66 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 28 篇 化学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 21 篇 training
  • 19 篇 deep learning
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 object detection
  • 15 篇 data mining
  • 13 篇 computer science
  • 13 篇 computational mo...
  • 12 篇 laboratories
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 11 篇 convolutional ne...
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 genetic algorith...

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 50 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...
  • 13 篇 jiangsu provinci...

作者

  • 49 篇 li zuoyong
  • 31 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 fan haoyi
  • 16 篇 lang li
  • 15 篇 gao guangwei
  • 15 篇 chen yang
  • 14 篇 teng shenghua
  • 14 篇 dong li
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiang feibo
  • 12 篇 jiao ge
  • 11 篇 wang kezhi
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 826 篇 英文
  • 29 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
877 条 记 录,以下是81-90 订阅
排序:
DBSCAN Is Semi-Spectral Clustering∗  6
DBSCAN Is Semi-Spectral Clustering∗
收藏 引用
6th International Conference on Big Data and information Analytics, BigDIA 2020
作者: Chen, Yewang Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Spectral clustering and DBSCAN are two famous clustering methods, the former reduces data dimensionality by spectrum of similarity matrix, and then utilizes kmeans to cluster data in low dimensional space. While DBSCA... 详细信息
来源: 评论
Chinese Spelling Error Detection and Correction Based on Language Model, Pronunciation, and Shape  3
Chinese Spelling Error Detection and Correction Based on Lan...
收藏 引用
3rd CIPS-SIGHAN Joint Conference on Chinese Language processing, CLP 2014
作者: Yu, Junjie Li, Zhenghua Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Spelling check is an important preprocessing task when dealing with user generated texts such as tweets and product comments. Compared with some western languages such as English, Chinese spelling check is more comple... 详细信息
来源: 评论
Soft cross-Lingual syntax projection for dependency parsing  25
Soft cross-Lingual syntax projection for dependency parsing
收藏 引用
25th International Conference on Computational Linguistics, COLING 2014
作者: Li, Zhenghua Zhang, Min Chen, Wenliang Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
This paper proposes a simple yet effective framework of soft cross-lingual syntax projection to transfer syntactic structures from source language to target language using monolingual treebanks and large-scale bilingu... 详细信息
来源: 评论
Research of secure intranet/internet access platform based on ontology
收藏 引用
Journal of Networks 2009年 第10期4卷 1009-1016页
作者: Shen, Shigen Ye, Lihua Yue, Guangxue Yu, Fei College of Mathematics and Information Engineering Jiaxing University Jiaxing China College of Computer and Communication Hunan University Changsha China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou China
Faced with the general trend of centralization of information, the biggest challenge to enterprise is how to ensure that all fixed computers and different mobile devices anywhere can access securely and quickly enterp... 详细信息
来源: 评论
SepFE:Separable Fusion Enhanced Network for Retinal Vessel Segmentation
收藏 引用
computer Modeling in Engineering & Sciences 2023年 第9期136卷 2465-2485页
作者: Yun Wu Ge Jiao Jiahao Liu College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
The accurate and automatic segmentation of retinal vessels fromfundus images is critical for the early diagnosis and prevention ofmany eye diseases,such as diabetic retinopathy(DR).Existing retinal vessel segmentation... 详细信息
来源: 评论
DBST:a lightweight block cipher based on dynamic S-box
收藏 引用
Frontiers of computer Science 2023年 第3期17卷 177-185页
作者: Liuyan YAN Lang LI Ying GUO College of Computer Science and Technology Hengyang Normal UniversityHengyang 421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal UniversityHengyang 421002China
IoT devices have been widely used with the advent of *** devices contain a large amount of private data during *** is primely important for ensuring their ***,we proposed a lightweight block cipher based on dynamic S-... 详细信息
来源: 评论
The M-computations induced by accessibility relations in nonstandard models M of Hoare logic
收藏 引用
Frontiers of computer Science 2016年 第4期10卷 717-725页
作者: Cungen CAO Yuefei SUI Zaiyue ZHANG Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science Jiangsu University of Sciences and Technology Zhenjiang 212003 China
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program... 详细信息
来源: 评论
ALCencryption:A Secure and Efficient Algorithm for Medical Image Encryption
收藏 引用
computer Modeling in Engineering & Sciences 2020年 第12期125卷 1083-1100页
作者: Jiao Ge College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage an... 详细信息
来源: 评论
Multiuser Computation Offloading for Long-Term Sequential Tasks in Mobile Edge Computing Environments
收藏 引用
Tsinghua Science and technology 2023年 第1期28卷 93-104页
作者: Huanhuan Xu Jingya Zhou Wenqi Wei Baolei Cheng School of Computer Science and Technology Soochow UniversitySuzhou 215006China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou 215006China School of Computer Science Georgia Institute of TechnologyAtlantaGA 30332USA
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n... 详细信息
来源: 评论
The system design of a node of P2P networks for intrusion detection
收藏 引用
Journal of Networks 2013年 第8期8卷 1920-1927页
作者: Ding, Lei Yu, Fei Yang, Zhenghua Yue, Guangxue School of Information Science and Engineering Jishou University Jishou 416000 China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow 215006 China School of Mathematic and Computer Jiaxin University Jiaxin 314001 China
To improve the measuring accuracy of intrusion detection, a system design of a node for intrusion detection is proposed in this paper. First, the technology that applies the traditional intrusion detection method, suc... 详细信息
来源: 评论