咨询与建议

限定检索结果

文献类型

  • 96 篇 会议
  • 40 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 137 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 70 篇 计算机科学与技术...
    • 57 篇 软件工程
    • 22 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 生物工程
    • 9 篇 化学工程与技术
    • 8 篇 机械工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 农业工程
    • 6 篇 光学工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 电气工程
    • 5 篇 网络空间安全
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 动力工程及工程热...
  • 49 篇 理学
    • 31 篇 数学
    • 11 篇 生物学
    • 10 篇 化学
    • 8 篇 物理学
    • 6 篇 统计学(可授理学、...
    • 3 篇 系统科学
  • 25 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 9 篇 医学
    • 5 篇 临床医学
    • 5 篇 公共卫生与预防医...
    • 3 篇 基础医学(可授医学...
  • 8 篇 农学
    • 8 篇 作物学
  • 1 篇 法学
  • 1 篇 文学

主题

  • 5 篇 information proc...
  • 4 篇 grid computing
  • 4 篇 semantics
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 routing protocol...
  • 3 篇 natural language...
  • 3 篇 labeling
  • 3 篇 image reconstruc...
  • 3 篇 filtering algori...
  • 2 篇 computer science
  • 2 篇 learning systems
  • 2 篇 imaging
  • 2 篇 rsa cryptosystem
  • 2 篇 support vector m...
  • 2 篇 polynomial inter...
  • 2 篇 trees (mathemati...
  • 2 篇 multi-secret sha...
  • 2 篇 engineering in m...
  • 2 篇 schnorr signatur...

机构

  • 17 篇 school of comput...
  • 8 篇 college of compu...
  • 6 篇 school of comput...
  • 6 篇 provincial key l...
  • 6 篇 hubei province k...
  • 6 篇 college of infor...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 5 篇 jiangsu high tec...
  • 4 篇 jiangsu provinci...
  • 4 篇 college of compu...
  • 4 篇 first-imaging te...
  • 4 篇 school of inform...
  • 4 篇 zhejiang lab
  • 3 篇 institute for in...
  • 3 篇 jiangsu provinci...
  • 3 篇 jiangsu provinci...
  • 3 篇 saic motor ai la...
  • 3 篇 state key labora...
  • 3 篇 school of electr...

作者

  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 10 篇 zhou guodong
  • 6 篇 yu fei
  • 6 篇 wang yonghao
  • 6 篇 li peifeng
  • 6 篇 hu wei
  • 5 篇 qian peide
  • 4 篇 fei yu
  • 4 篇 qian longhua
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 li renfa
  • 3 篇 li yang
  • 3 篇 yue guangxue
  • 3 篇 li chenglong
  • 3 篇 wu zhan
  • 3 篇 zhou guo dong
  • 3 篇 zeng zeng
  • 3 篇 xu cheng

语言

  • 131 篇 英文
  • 6 篇 中文
检索条件"机构=Key Lab of Computer Information Processing Technology of Jiangsu Province"
137 条 记 录,以下是41-50 订阅
排序:
Classification rules mining based on SOFM networks
Classification rules mining based on SOFM networks
收藏 引用
MIPPR 2005: Geospatial information, Data Mining, and Applications
作者: Yao, Min Jiang, Zhiwei Shen, Bin College of Computer Zhejiang University Hangzhou 310027 China Provincial Key Lab. for Computer Information Processing Technology in Jiangsu Suzhou University Suzhou 215006 China
Self-organization feature mapping (SOFM) networks have strong ability for self-learning and self-adaptive. According to the characteristics of human thought, this paper constructed a kind of combined criterion, which ... 详细信息
来源: 评论
Assessment of rotamer library for protein structure prediction
Assessment of rotamer library for protein structure predicti...
收藏 引用
2nd International Conference on information Science and Engineering, ICISE2010
作者: Huang, Xu Lü, Qiang Miao, Dajun Qian, Peide School of Computer Science and Technology Soochow University Suzhou 215006 China Jiangsu Provincial Key Lab for Information Processing Technologies Suzhou 215006 China
Side chain packing is a crucial step for protein structure prediction. And the quality of rotamer library has important implications in side chain packing. This paper assess dunbrack rotamer libraries and simple sampl... 详细信息
来源: 评论
Learning Dual-Domain Calibration and Distance-Driven Correlation Filter:A Probabilistic Perspective for UAV Tracking
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3741-3764页
作者: Taiyu Yan Yuxin Cao Guoxia Xu Xiaoran Zhao Hu Zhu Lizhen Deng Jiangsu Province Key Lab on Image Processing and Image Communication Nanjing University of Posts and TelecommunicationsNanjingChina School of Computer Science Qufu Normal UniversityQufuChina National Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjingChina
Unmanned Aerial Vehicle(UAV)tracking has been possible because of the growth of intelligent information technology in smart cities,making it simple to gather data at any time by dynamically monitoring events,people,th... 详细信息
来源: 评论
3D Representation of Chinese Event Factuality
3D Representation of Chinese Event Factuality
收藏 引用
第十五届汉语词汇语义学国际研讨会
作者: CAO Yuan ZHU Qiaoming LI Peifeng School of Computer Science and Technology of Soochow University Key Lab of Computer Information Processing Technology of Jiangsu Province
In general,Chinese event factuality is determined by the specific vocabularies and syntactic structures of *** Chinese event factuality corpus is to annotate these specific vocabularies and syntactic *** these informa... 详细信息
来源: 评论
Remote Authentication Scheme for Multi-Server Environment Based on Biometrics with Access Control  9
Remote Authentication Scheme for Multi-Server Environment Ba...
收藏 引用
2017 9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)
作者: Min Zhang Wen-rong Tan School of Foreign Languages Southwest Minzu University Sichuan Province Key Lab of Signal and Information Processing Southwest Jiao Tong University School of Computer Science and Technology Southwest Minzu University
Compared with single-server authentication scheme, the authentication scheme for multi-server environment has a lot of advantages. Such as users needn’t to remember various passwords or register for every application... 详细信息
来源: 评论
An access control model in lager-scale P2P file sharing systems
An access control model in lager-scale P2P file sharing syst...
收藏 引用
7th International Conference on Computational Science (ICCS 2007)
作者: Yue Guang-xue Yu Fei Chen Li-ping Chen Yi-jun College of Information Engineering Jiaxing University 314000 China Department of Computer Science and Technology Huaihua University 418000 China State Key Lab. for Novel Software Technology Nanjing University 210093 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University 2150063 China
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym... 详细信息
来源: 评论
PASS: An adaptive multi-copy routing scheme for intermittently connected mobile Ad Hoc networks
收藏 引用
Journal of Convergence information technology 2012年 第14期7卷 315-323页
作者: Xu, Jia Wang, Ru Chuan Sun, Li Juan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China Key Laboratory for Computer Network and Information Integration Southeast University Ministry of Education Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (... 详细信息
来源: 评论
MMLUP: Multi-Source & Multi-Task Learning for User Profiles in Social Network
收藏 引用
computers, Materials & Continua 2019年 第9期61卷 1105-1115页
作者: Dongjie Zhu Yuhua Wang Chuiju You Jinming Qiu Ning Cao Chenjing Gong Guohua Yang Helen Min Zhou School of Computer Science and Technology Harbin Institute of TechnologyWeihai264209China College of Information Engineering Sanming University365004SanmingChina Fujian Province University Key Lab for Industry Big Data Analysis and Application FujianChina College of Information Engineering Qingdao Binhai UniversityQingdaoChina Jiangsu Province Wireless Sensing System Application Engneering Technology Research and Development Centre China School of Engineering Manukau Institute of TechnologyAuckland2241New Zealand
With the rapid development of the mobile Internet,users generate massive data in different forms in social network every day,and different characteristics of users are reflected by these social media *** to integrate ... 详细信息
来源: 评论
An efficient coverage control algorithm for three-dimensional underwater sensor networks
收藏 引用
Advances in information Sciences and Service Sciences 2012年 第10期4卷 393-399页
作者: Xiao, Fu Yang, Yang Sun, Li Wang, Ruchuan Nanjing University of Posts and Telecommunications Nanjing 210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensor networks, which is largely determined the various service-quality improvement of wireless sensor netwo... 详细信息
来源: 评论
Vertex-disjoint paths in the generalized hypercube under 1-restricted connectivity  21
Vertex-disjoint paths in the generalized hypercube under 1-r...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Wang, Guijuan Lin, Cheng-Kuan Fan, Jianxi Cheng, Baolei Liu, Zhao School of Computer Science and Technology Soochow University Suzhou215006 China College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Jiangsu Province Nanjing210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China
The generalized hypercube is an excellent interconnection network since it includes many interconnection topologies and it can be used to construct many data center networks. Considering the probability that, in gener... 详细信息
来源: 评论