咨询与建议

限定检索结果

文献类型

  • 113 篇 会议
  • 93 篇 期刊文献

馆藏范围

  • 206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 151 篇 工学
    • 114 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 32 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 17 篇 生物工程
    • 15 篇 机械工程
    • 12 篇 电气工程
    • 10 篇 光学工程
    • 9 篇 化学工程与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 生物医学工程(可授...
    • 6 篇 仪器科学与技术
    • 6 篇 电子科学与技术(可...
    • 5 篇 冶金工程
    • 5 篇 建筑学
    • 4 篇 材料科学与工程(可...
    • 4 篇 交通运输工程
    • 4 篇 安全科学与工程
  • 76 篇 理学
    • 43 篇 数学
    • 19 篇 物理学
    • 18 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 10 篇 化学
    • 6 篇 系统科学
  • 49 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 法学
    • 8 篇 社会学
  • 3 篇 农学
  • 1 篇 经济学
  • 1 篇 艺术学

主题

  • 4 篇 feature extracti...
  • 4 篇 forecasting
  • 4 篇 training
  • 3 篇 image segmentati...
  • 3 篇 association rule...
  • 3 篇 redundancy
  • 3 篇 optimization
  • 3 篇 energy consumpti...
  • 3 篇 servers
  • 3 篇 computational mo...
  • 3 篇 websites
  • 3 篇 semantics
  • 3 篇 network security
  • 3 篇 edge computing
  • 3 篇 peer-to-peer com...
  • 3 篇 ubiquitous compu...
  • 3 篇 convolutional ne...
  • 3 篇 ontology
  • 2 篇 internet of thin...
  • 2 篇 fuzzy logic

机构

  • 30 篇 tianjin key lab ...
  • 23 篇 key laboratory o...
  • 20 篇 tianjin key lab....
  • 15 篇 tianjin key lab ...
  • 13 篇 university of ch...
  • 11 篇 intelligent soft...
  • 9 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 state key lab of...
  • 6 篇 ministry of educ...
  • 6 篇 state key lab of...
  • 5 篇 university of sc...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of electr...
  • 4 篇 school of sports...
  • 4 篇 dalian universit...
  • 4 篇 college of compu...
  • 4 篇 cambricon techno...
  • 3 篇 key laboratory o...

作者

  • 20 篇 zhang de-gan
  • 15 篇 zhang degan
  • 8 篇 sheng lin
  • 8 篇 de-gan zhang
  • 8 篇 zhang ting
  • 8 篇 guangping xu
  • 8 篇 degan zhang
  • 7 篇 zhang rui
  • 7 篇 hua zhang
  • 6 篇 chen yunji
  • 6 篇 li ling
  • 5 篇 hao yifan
  • 5 篇 ting zhang
  • 5 篇 kai shi
  • 5 篇 wang yuanquan
  • 5 篇 zhou shihua
  • 5 篇 zhang jie
  • 5 篇 yunji chen
  • 5 篇 rui zhang
  • 4 篇 peng hao

语言

  • 197 篇 英文
  • 5 篇 其他
  • 4 篇 中文
检索条件"机构=Key Lab of Intelligent Computing and New Software Technology"
206 条 记 录,以下是11-20 订阅
排序:
A distributed and adaptive trust evaluation algorithm for manet  12
A distributed and adaptive trust evaluation algorithm for ma...
收藏 引用
12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2016
作者: Zhao, Dexin Ma, Zhen Zhang, Degan Tianjin Key Lab of Intelligent Computing and Novel Software Tianjin University of Technology Tianjin300384 China
We propose a distributed and adaptive trust evaluation algorith (DATEA) to calculate the trust between nodes. First, calculate th communication trust by using the number of data packets betwee nodes, and predict the t... 详细信息
来源: 评论
Recommendation in heterogeneous information network via dual similarity regularization
收藏 引用
International Journal of Data Science and Analytics 2017年 第1期3卷 35-48页
作者: Zheng, Jing Liu, Jian Shi, Chuan Zhuang, Fuzhen Li, Jingzhi Wu, Bin Beijing Key Lab of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China Southern University of Science and Technology Shenzhen China
Recommender system has caught much attention from multiple disciplines, and many techniques are proposed to build it. Recently, social recommendation becomes a hot research direction. The social recommendation methods... 详细信息
来源: 评论
A novel method of android malware detection based on ensemble learning algorithm  8
A novel method of android malware detection based on ensembl...
收藏 引用
2018 8th International Workshop on Computer Science and Engineering, WCSE 2018
作者: Zhao, Jingyi Mo, Xiuliang Zheng, Qiao Tianjin Intelligent Computing and Software New Technology Key Laboratory School of computer Science and Engineering Tianjin University of Technology China
Android is popular for mobile devices in recent years. As the risk of malware is sharply increasing in Android platform, Android malware detection has become an important research topic. However, the current work show... 详细信息
来源: 评论
Research on context-aware computing with uncertainty for proactive service
收藏 引用
International Journal of Modelling, Identification and Control 2009年 第3期8卷 248-255页
作者: Zhang, De-Gan Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin 300191 China Key Lab of Industrial Controlling Technology Zhejiang University Hangzhou 310027 China
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a... 详细信息
来源: 评论
Study on the application of virtual reality technology in the production of industrial products based on OpenGL
收藏 引用
5th International Conference on Mechanical and Electrical technology, ICMET 2013
作者: Wang, Fa Yu Wang, Jing Chao Lu, Baoan Ministry of Education Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China
This paper mainly discusses the use of virtual reality technology to make the complex steel production environment into direct, simple virtual interface. The model of square steel and the model of cylindrical steel ha... 详细信息
来源: 评论
new Method of MSCA for Edge computing  4
New Method of MSCA for Edge Computing
收藏 引用
4th IEEE International Conference on Smart Internet of Things, SmartIoT 2020
作者: Zhang, De-Gan Zhu, Hao-Li Zhang, Ting Wang, Jia-Xu Tianjin University of Technology Tianjin Key Lab of Intelligent Computing Novel Software Technology Tianjin300384 China Tianjin China
By innovative use of edge computing technology to construct a node data cache model and step-by-step calculation of node channel separation, a multi-strategy channel allocation algorithm (MSCA) for edge computing is p... 详细信息
来源: 评论
The Expansibility Research of K-means Algorithm under the GPU  7
The Expansibility Research of K-means Algorithm under the GP...
收藏 引用
2016 IEEE 7th International Conference on software Engineering and Service Science
作者: Sujie Zhong Sheng Lin Guangping Xu Kai Shi Computer and Communication Engineering School Tianjin University of Technology Tianjin Key Lab.of Intelligence Computing and New Software Technology
K-Means algorithm is one of the most popular clustering analysis *** the algorithm can be easily understood and implemented,and its execution is more efficient than common clustering algorithm,it has been used *** the... 详细信息
来源: 评论
POSTER: STAR (Space-Time Adaptive and Reductive) Algorithms for Real-World Space-Time Optimality
收藏 引用
ACM SIGPLAN Notices 2017年 第8期52卷 455-456页
作者: Tang, Yuan You, Ronghui School of Computer Science School of Software Fudan University Shanghai Key Lab. of Intelligent Information Processing State Key Lab. of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China
It's important to hit a space-time balance for a real-world algorithm to achieve high performance on modern shared-memory multi-core or many-core systems. However, a large class of dynamic programs with more than ... 详细信息
来源: 评论
NBGVF: Normally biased gradient vector flow external force for active contours
NBGVF: Normally biased gradient vector flow external force f...
收藏 引用
2009 International Conference on Information Engineering and Computer Science, ICIECS 2009
作者: Lu, Shaopei Wang, Yuanquan Tianjin Key Lab of Intelligent Computing and Novel Software Technology School of Computer Science Tianjin University of Technology Tianjin 300191 China
Gradient vector flow (GVF) has been one effective external force for active contours, but it is based on isotropic diffusion. The recently proposed NGVF external force just took into account the diffusion along normal... 详细信息
来源: 评论
Redundant data composition of peers in p2p streaming systems using cauchy reed-solomon codes
Redundant data composition of peers in p2p streaming systems...
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Xu, Guangping Wang, Fayu Zhang, Hua Li, Jingxing Key Lab of Intelligent Computing and New Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Erasure codes are used in many distributed applications. This paper applies Cauchy Reed-Solomon codes to P2P streaming systems which is different from classical Reed-Solomon codes. Due to churn in these systems, strea... 详细信息
来源: 评论