咨询与建议

限定检索结果

文献类型

  • 399 篇 会议
  • 226 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 626 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 396 篇 工学
    • 302 篇 计算机科学与技术...
    • 261 篇 软件工程
    • 76 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 34 篇 生物工程
    • 33 篇 机械工程
    • 29 篇 化学工程与技术
    • 28 篇 电子科学与技术(可...
    • 27 篇 光学工程
    • 24 篇 电气工程
    • 19 篇 生物医学工程(可授...
    • 15 篇 仪器科学与技术
    • 11 篇 建筑学
    • 11 篇 农业工程
    • 9 篇 动力工程及工程热...
    • 9 篇 安全科学与工程
    • 8 篇 网络空间安全
  • 204 篇 理学
    • 123 篇 数学
    • 54 篇 物理学
    • 48 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 21 篇 化学
    • 10 篇 系统科学
  • 136 篇 管理学
    • 98 篇 图书情报与档案管...
    • 41 篇 管理科学与工程(可...
    • 18 篇 工商管理
  • 15 篇 农学
    • 12 篇 作物学
  • 14 篇 医学
    • 11 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 12 篇 法学
    • 11 篇 社会学
  • 7 篇 经济学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 40 篇 semantics
  • 27 篇 training
  • 21 篇 feature extracti...
  • 16 篇 deep learning
  • 14 篇 data mining
  • 14 篇 computational mo...
  • 14 篇 data models
  • 13 篇 visualization
  • 13 篇 computer vision
  • 12 篇 face recognition
  • 11 篇 neural networks
  • 10 篇 robustness
  • 9 篇 object detection
  • 9 篇 forecasting
  • 8 篇 mapreduce
  • 7 篇 convolution
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 navigation
  • 7 篇 humans

机构

  • 103 篇 university of ch...
  • 65 篇 key lab of intel...
  • 51 篇 key lab of intel...
  • 30 篇 key lab. of inte...
  • 23 篇 school of comput...
  • 20 篇 key laboratory o...
  • 20 篇 peng cheng labor...
  • 19 篇 key lab. of inte...
  • 18 篇 shanghai collabo...
  • 17 篇 key lab of intel...
  • 15 篇 key lab. of inte...
  • 14 篇 shanghai key lab...
  • 14 篇 key lab. of inte...
  • 13 篇 school of cyber ...
  • 12 篇 institute of dig...
  • 12 篇 school of cyber ...
  • 11 篇 institute of com...
  • 10 篇 graduate univers...
  • 10 篇 microsoft cloud ...
  • 9 篇 microsoft resear...

作者

  • 32 篇 huang qingming
  • 28 篇 zhuge hai
  • 24 篇 xilin chen
  • 21 篇 cao juan
  • 19 篇 jiang yu-gang
  • 19 篇 gao wen
  • 18 篇 liu qun
  • 17 篇 shiguang shan
  • 17 篇 xu qianqian
  • 15 篇 wu zuxuan
  • 14 篇 qingming huang
  • 14 篇 qing he
  • 14 篇 cao xiaochun
  • 13 篇 yang zhiyong
  • 13 篇 sun xiaoping
  • 12 篇 shuqiang jiang
  • 12 篇 sheng qiang
  • 11 篇 hai zhuge
  • 11 篇 li hua
  • 11 篇 he qing

语言

  • 609 篇 英文
  • 12 篇 中文
  • 9 篇 其他
检索条件"机构=Key Lab of Cloud Computing and Intelligent Information Processing"
626 条 记 录,以下是421-430 订阅
排序:
Representative local features mining for large-scale near-duplicates retrieval
Representative local features mining for large-scale near-du...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiaoguang Gu Yongdong Zhang Dongming Zhang Jintao Li Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS Beijing China
Local features have been widely used in many computer vision related researches, such as near-duplicate image and video retrieval. However, the storage and query cost of local features become prohibitive on large-scal... 详细信息
来源: 评论
Elastic and Efficient Virtual Network Provisioning for cloud-Based Multi-tier Applications
Elastic and Efficient Virtual Network Provisioning for Cloud...
收藏 引用
International Conference on Parallel processing (ICPP)
作者: Meng Shen Ke Xu Fan Li Kun Yang Liehuang Zhu Lei Guan Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology P. R. China Department of Computer Science Tsinghua University P. R. China School of Computer Science & Electronic Engineering University of Essex UK The ISN National Key Lab XiDian University P. R. China School of Management & Economics Beijing Institute of Technology P. R. China
The multi-tier architecture is prevalently adopted by cloud applications, such as the three-tier web application. It is highly desirable for both tenants and providers to provide virtual networks in an efficient and e... 详细信息
来源: 评论
Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs
Threshold-Based Secure and Privacy-Preserving Message Verifi...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Wei Gao Mingzhong Wang Liehuang Zhu Xiaoping Zhang Language Information Processing and Cloud Computing Application Beijing Institute of Technology National Key Lab of Vehicular Transmission China North Vehicle Research Institute
Messages spreading inside vehicular ad hoc networks (VANETs) generally need to achieve the property of verifiability and content integrity, while preserving user privacy. Otherwise, VANETs will either fall into chaos,... 详细信息
来源: 评论
Generalized Unsupervised Manifold Alignment  14
Generalized Unsupervised Manifold Alignment
收藏 引用
Proceedings of the 28th International Conference on Neural information processing Systems - Volume 2
作者: Zhen Cui Hong Chang Shiguang Shan Xilin Chen Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS Beijing China and School of Computer Science and Technology Huaqiao University Xiamen China Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS Beijing China
In this paper, we propose a Generalized Unsupervised Manifold Alignment (GU-MA) method to build the connections between different but correlated datasets without any known correspondences. Based on the assumption that...
来源: 评论
A multi-channel SSVEP-based brain-computer interface using a canonical correlation analysis in the frequency domain
Advances in Intelligent Systems and Computing
收藏 引用
Advances in intelligent Systems and computing 2014年 215卷 603-616页
作者: Chen, Guang Song, Dandan Liao, Lejian Beijing Eng. Research Center of High Volume Language Inf. Processing and Cloud Computing App. Beijing Lab of Intelligent Information Technology School of Computer Science Beijing Institute of Technology Beijing China
Brain-computer interface (BCI) is a new way for man-machine interaction with wide applications, in which steady-state visual evoked potentials (SSVEP) is a promising option. However, many characteristics of SSVEP show... 详细信息
来源: 评论
Image reconstruction of concrete based on Filtered Backprojection method using ultrasonic time of flight data
收藏 引用
Computer Modelling and New Technologies 2014年 第6期18卷 72-78页
作者: Fan, Honghui Zhu, Hongjin Han, Qingbang School of Computer Engineering Jiangsu University of Technology Changzhou Jiangsu China Sichuan Province Key Laboratory of Bridge non-destructive testing and engineering computing Zigong Sichuan China Key Laboratory of Cloud Computing Intelligent Information Processing of Changzhou City Changzhou Jiangsu China College of IOT Engineering Hohai University Jiangsu China
This research aims to recognize the defect of concrete materials using an ultrasonic computed tomography imaging technique. Filtered Backprojection method was used to reconstruct concrete images in this paper. Ultraso... 详细信息
来源: 评论
High-through put Identification of Protein Disulfide Bonds from Complex Samples
High-through put Identification of Protein Disulfide Bonds f...
收藏 引用
中国化学会首届全国质谱分析学术研讨会
作者: Shan Lu Sheng-Bo Fan Bing Yang Jia-Ming Meng Long Wu Kun Zhang En-Zhi Shen Chun-Qing Song Rui-Xiang Sun Si-Min He Meng-Qiu Dong College of Life Science Beijing Normal University National Institute of Biological Sciences Key Lab of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of Sciences
Correct disulfide bond formation is essential for the activity and stability of numerous proteins of essential biological functions such as secreted signaling proteins and cell surface *** protein disulfide bonds typi... 详细信息
来源: 评论
HAMMING EMBEDDING WITH FRAGILE BITS FOR IMAGE SEARCH
HAMMING EMBEDDING WITH FRAGILE BITS FOR IMAGE SEARCH
收藏 引用
IEEE International Conference on Image processing
作者: Dongye Zhuang Dongming Zhang Jintao Li Ke Lv Qi Tian University of Chinese Academy of Sciences Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology Department of Computer Science University of Texas at San Antonio
Recently, several binary descriptors are proposed, which represent interest points in image using binary codes. In these binary feature schemes, two descriptors are considered as a match, if the Hamming distance betwe... 详细信息
来源: 评论
A Survey of Commonsense Knowledge Acquisition
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 689-719页
作者: 臧良俊 曹聪 曹亚男 吴昱明 曹存根 Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences University of the Chinese Academy of Sciences The Second Lab Institute of Information Engineering Chinese Academy of Sciences
Collecting massive commonsense knowledge (CSK) for commonsense reasoning has been a long time standing challenge within artificial intelligence research. Numerous methods and systems for acquiring CSK have been deve... 详细信息
来源: 评论
Ratable Aspects over Sentiments: Predicting Ratings for Unrated Reviews
Ratable Aspects over Sentiments: Predicting Ratings for Unra...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Wenjuan Luo Fuzhen Zhuang Xiaohu Cheng Qing He Zhongzhi Shi Renren Inc Beijing China Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology Beijing CAS China University of Chinese Academy of Sciences Beijing China
Most existing rat able aspect generating methods for aspect mining focus on identifying and rating aspects of reviews with overall ratings, while huge amount of unrated reviews are beyond their ability. This drawback ... 详细信息
来源: 评论