咨询与建议

限定检索结果

文献类型

  • 698 篇 会议
  • 437 篇 期刊文献

馆藏范围

  • 1,135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 689 篇 工学
    • 480 篇 计算机科学与技术...
    • 369 篇 软件工程
    • 198 篇 信息与通信工程
    • 113 篇 电气工程
    • 105 篇 电子科学与技术(可...
    • 84 篇 控制科学与工程
    • 62 篇 机械工程
    • 46 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 27 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 19 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 交通运输工程
  • 274 篇 理学
    • 156 篇 数学
    • 61 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 23 篇 化学
  • 178 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 38 篇 法学
    • 19 篇 法学
    • 19 篇 社会学
  • 30 篇 医学
    • 27 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 14 篇 经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 51 篇 semantics
  • 45 篇 computational mo...
  • 41 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 33 篇 federated learni...
  • 28 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 203 篇 shandong provinc...
  • 196 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 37 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 20 篇 shandong provinc...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 15 篇 shandong provinc...
  • 15 篇 state key labora...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 chen yang
  • 12 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 huang haiping
  • 10 篇 xin wang
  • 10 篇 wei zhang
  • 10 篇 wang ru-chuan
  • 9 篇 yue guangxue
  • 9 篇 guixin zhao
  • 9 篇 jinbo xiong

语言

  • 1,049 篇 英文
  • 47 篇 中文
  • 44 篇 其他
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1135 条 记 录,以下是171-180 订阅
排序:
Decomposition equation of basis images with consideration of global illumination
Decomposition equation of basis images with consideration of...
收藏 引用
1st International Conference on Computational Visual Media, CVM 2012
作者: Qin, Xueying Zhang, Rui Lin, Lili Zhong, Fan Xing, Guanyu Peng, Qunsheng School of Computer Science and Technology Shandong University China Shandong Provincial Key Laboratory of Network Based Intelligent Computing China State Key Laboratory of CAD and CG Zhejiang University China
In augmented reality, it is required to sense the changing of the light condition for achieving illumination consistency. In this paper, we build up the decomposition equation of basis images of static scenes for this... 详细信息
来源: 评论
Reliable neighbors-based collaborative filtering for recommendation systems  1
收藏 引用
1st International Conference on Neural Computing for Advanced Applications, NCAA 2020
作者: Zhang, Li Sun, Xiaohan Cheng, Jiangfei Li, Zepeng School of Computer Science and Technology Joint International Research Laboratory of Machine Learning and Neuromorphic Computing Soochow University SuzhouJiangsu215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University SuzhouJiangsu215006 China
The sparsity of data and the diversity of ratings have a great effect on the performance of recommendation systems. To deal with these two issues, this paper proposes a reliable neighbors-based collaborative filtering... 详细信息
来源: 评论
An image encryption algorithm based on compressed sensing and dual-tree complex wavelet transform  17
An image encryption algorithm based on compressed sensing an...
收藏 引用
5th International Conference on Bioinformatics and Computational Biology, ICBCB 2017
作者: Dong, Jiwen Zhao, Ziru Li, Hengjian Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan City Shandong Province China
Combined image encryption with the process of compressed sensing (CS) which based on dual-tree complex wavelet transform, we came up with the image encryption algorithm which based on the theory of CS and double rando... 详细信息
来源: 评论
A new digital video watermark algorithm based on the HVS
A new digital video watermark algorithm based on the HVS
收藏 引用
2011 International Conference on Internet Computing and Information Services, ICICIS 2011
作者: Liao, Lufang Zheng, Xiaoshi Zhao, Yanling Liu, Guangqi Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer Network Technology Jinan China School of Information Science and Technology Shandong Institute of Light Industry SDILI Jinan China
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic... 详细信息
来源: 评论
Semi-supervised feature selection using sparse laplacian support vector machine  1
收藏 引用
1st International Conference on Neural Computing for Advanced Applications, NCAA 2020
作者: Zhang, Li Zheng, Xiaohan Xu, Zhiqiang School of Computer Science and Technology Joint International Research Laboratory of Machine Learning and Neuromorphic Computing Soochow University SuzhouJiangsu215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University SuzhouJiangsu215006 China
Semi-supervised feature selection is an active topic in machine learning and data mining. Laplacian support vector machine (LapSVM) has been successfully applied to semi-supervised learning. However, LapSVM cannot be ... 详细信息
来源: 评论
Palm-print recognition algorithm based on random projection and chaotic system  17
Palm-print recognition algorithm based on random projection ...
收藏 引用
5th International Conference on Bioinformatics and Computational Biology, ICBCB 2017
作者: Dong, Jiwen Zhao, Ziru Li, Hengjian Feng, Guang Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan City Shandong Province China
To improve the efficiency and security of palm-print recognition, we proposed a palm-print algorithm which based on random projection and chaotic system. Using twice random projections based on chaotic system to proce... 详细信息
来源: 评论
Mobility-Aware Multi-Task Migration and Offloading Scheme for Internet of Vehicles
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1192-1202页
作者: LI Xujie TANG Jing XU Yuan SUN Ying College of Computer and Information Hohai University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Key Lab for Wireless Sensor Network and Communication Shanghai Institute of Microsystem School of Information Engineering Jiangsu Open University
In Internet of vehicles, vehicular edge computing(VEC) as a new paradigm can effectively accomplish various tasks. Due to limited computing resources of the roadside units(RSUs), computing ability of vehicles can be a... 详细信息
来源: 评论
QoE-Driven Big Data Management in Pervasive Edge Computing Environment
收藏 引用
Big Data Mining and Analytics 2018年 第3期1卷 222-233页
作者: Qianyu Meng Kun Wang Xiaoming He Minyi Guo Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai Jiao Tong University
In the age of big data, services in the pervasive edge environment are expected to offer end-users better Quality-of-Experience(QoE) than that in a normal edge environment. However, the combined impact of the storage,... 详细信息
来源: 评论
Three-mobile-beacon assisted weighted centroid localization method in wireless sensor networks
Three-mobile-beacon assisted weighted centroid localization ...
收藏 引用
2011 IEEE 2nd International Conference on Software Engineering and Service Science, ICSESS 2011
作者: Cui, Huan-Qing Wang, Ying-Long Lv, Jia-Liang Mao, Yu-Ming College of Information Science and Engineering Shandong University of Science and Technology Qingdao China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Jinan China
Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the cost. The methods with only one beacon introduce collinearity prob... 详细信息
来源: 评论
Mamba-Sea: A Mamba-based Framework with Global-to-Local Sequence Augmentation for Generalizable Medical Image Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Zihan Guo, Jintao Zhang, Jian Qi, Lei Zhou, Luping Shi, Yinghuan Gao, Yang Shanghai Jiao Tong University School of Medicine Shanghai200025 China National Institute of Healthcare Data Science Nanjing University Jiangsu Nanjing210093 China State Key Laboratory for Novel Software Technology the National Institute of Healthcare Data Science Nanjing University Jiangsu Nanjing210093 China School of Computer Science and Engineering Key Lab of Computer Network and Information Integration Southeast University Jiangsu Nanjing211189 China School of Electrical and Information Engineering The University of Sydney SydneyNSW2006 Australia
To segment medical images with distribution shifts, domain generalization (DG) has emerged as a promising setting to train models on source domains that can generalize to unseen target domains. Existing DG methods are... 详细信息
来源: 评论