咨询与建议

限定检索结果

文献类型

  • 1,506 篇 期刊文献
  • 1,284 篇 会议

馆藏范围

  • 2,790 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,908 篇 工学
    • 1,330 篇 计算机科学与技术...
    • 1,124 篇 软件工程
    • 452 篇 信息与通信工程
    • 220 篇 生物工程
    • 204 篇 电气工程
    • 196 篇 控制科学与工程
    • 167 篇 电子科学与技术(可...
    • 141 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 100 篇 化学工程与技术
    • 80 篇 网络空间安全
    • 73 篇 仪器科学与技术
    • 55 篇 交通运输工程
    • 53 篇 安全科学与工程
    • 52 篇 动力工程及工程热...
    • 46 篇 材料科学与工程(可...
    • 45 篇 土木工程
  • 1,011 篇 理学
    • 497 篇 数学
    • 276 篇 物理学
    • 253 篇 生物学
    • 174 篇 统计学(可授理学、...
    • 91 篇 化学
    • 74 篇 系统科学
  • 518 篇 管理学
    • 276 篇 图书情报与档案管...
    • 252 篇 管理科学与工程(可...
    • 92 篇 工商管理
  • 105 篇 医学
    • 84 篇 临床医学
    • 62 篇 基础医学(可授医学...
  • 87 篇 法学
    • 64 篇 社会学
  • 43 篇 经济学
  • 33 篇 农学
  • 16 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 110 篇 semantics
  • 75 篇 feature extracti...
  • 64 篇 deep learning
  • 61 篇 training
  • 54 篇 accuracy
  • 41 篇 computational mo...
  • 40 篇 machine learning
  • 39 篇 federated learni...
  • 34 篇 object detection
  • 34 篇 graph neural net...
  • 33 篇 data mining
  • 32 篇 image segmentati...
  • 30 篇 optimization
  • 30 篇 privacy
  • 27 篇 forecasting
  • 27 篇 data models
  • 26 篇 generative adver...
  • 26 篇 neural networks
  • 25 篇 knowledge graph
  • 24 篇 reinforcement le...

机构

  • 160 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 62 篇 cas key laborato...
  • 60 篇 key laboratory o...
  • 47 篇 college of compu...
  • 47 篇 network and data...
  • 46 篇 shandong enginee...
  • 46 篇 school of comput...
  • 46 篇 tianjin key labo...
  • 35 篇 zhejiang lab
  • 34 篇 college of cyber...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 31 篇 school of cyber ...
  • 28 篇 key lab of infor...
  • 28 篇 peng cheng labor...
  • 26 篇 hubei key labora...
  • 25 篇 national enginee...
  • 25 篇 cas key lab of n...

作者

  • 185 篇 cheng xueqi
  • 142 篇 guo jiafeng
  • 44 篇 lan yanyan
  • 43 篇 shen huawei
  • 43 篇 fan yixing
  • 42 篇 zhang ruqing
  • 34 篇 jin xiaolong
  • 28 篇 pang liang
  • 26 篇 liu jun
  • 25 篇 meng deyu
  • 24 篇 jin hai
  • 23 篇 bi keping
  • 21 篇 chen enhong
  • 21 篇 liu qi
  • 21 篇 wang zhongmin
  • 19 篇 de rijke maarten
  • 19 篇 chen yanping
  • 19 篇 xu jun
  • 18 篇 li tao
  • 18 篇 pan jeng-shyang

语言

  • 2,602 篇 英文
  • 147 篇 其他
  • 42 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2790 条 记 录,以下是2681-2690 订阅
排序:
Mining dynamical frequent itemsets based on ant colony algorithm
Mining dynamical frequent itemsets based on ant colony algor...
收藏 引用
IEEE International Conference on Computer science and Automation Engineering (CSAE)
作者: Chen, Shengbing Wang, Xiaofeng Wang, Xiaofang Key Lab of Network and Intelligent Information Processing Hefei University Hefei 230601 China Department of Computer Science and Technology Hefei University Hefei 230601 China Intelligent Computing Lab Institute of Intelligent Machines Chinese Academy of Sciences Hefei 230031 China Department of Computer Artillery Academy Hefei 230031 China
Mining frequent itemsets is a core problem in many data mining tasks, most existing works on mining frequent itemsets can only capture the long-term and static frequency itemsets, they do not suit the task whose frequ... 详细信息
来源: 评论
Research on K-means median filter
收藏 引用
Journal of Information and Computational science 2011年 第6期8卷 961-968页
作者: Huang, Ying Xie, Mei Li, Weisheng Zhou, Lifang School of Electronic Engineering University of Electronic Science and Technology of China Chengdu 610054 China Chongqing Key Lab. of Computer Network and Communication Technology Chongqing 400065 China Institute of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing 400065 China
K-means median filter algorithm and recursive K-means median filter algorithm are designed to solve the defects of standard median filter. At first, the sample composed by the current pixel and its neighbors are divid... 详细信息
来源: 评论
Probing Into Design Of Refuge Chamber System In Coal Mine
收藏 引用
Procedia Engineering 2011年 26卷 2334-2341页
作者: Lei Meng YaoDong Jiang Yixin Zhao Ruyue Shan Yimeng Song China University of Mining & Technology Beijing 100083 China State key lab of Coal Resources and Safe Mining Beijing 100083 China China Tax Sky Network Science and Technology Co Ltd. Beijing 100027 China
Put forward the refuge chamber system composed by permanent refuge chamber, temporary refuge chamber and rescue capsule, which are mutually independent and tightly-coupled, to cost-effectively radiate all the areas wi... 详细信息
来源: 评论
Comments on a threshold authenticated encryption scheme
收藏 引用
International Journal of Computers and Applications 2011年 第2期33卷 132-136页
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentia... 详细信息
来源: 评论
Image edge detection using variation-adaptive ant colony optimization
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2011年 6910卷 27-40页
作者: Tian, Jing Yu, Weiyu Chen, Li Ma, Lihong School of Computer Science and Technology Wuhan University of Science and Technology 430081 China School of Electronic and Information Engineering South China University of Technology Guangzhou 510641 China Guangdong Key Lab of Wireless Network and Terminal School of Electronic and Information Engineering South China University of Technology Guangzhou 510641 China
Ant colony optimization (ACO) is an optimization algorithm inspired by the natural collective behavior of ant species. The ACO technique is exploited in this paper to develop a novel image edge detection approach. The... 详细信息
来源: 评论
Secret and reliable coding mechanism for noncoherent multisource network coding
Secret and reliable coding mechanism for noncoherent multiso...
收藏 引用
IEEE International Conference on Communication Software and networks
作者: Chen, Siguang Wu, Meng Lu, Weifeng Jin, Yi College of Computer Science Nanjing University of Posts and Telecommunications Nanjing China College of Telecommunications and Information Engineering Nanjing Univ. of Posts and Telecommunications Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education China College of Informatics and Electronics Zhejiang Sci-Tech University Hangzhou China
This work considers the communication scenario where multiple sources transmit information to one or more receivers and these receivers request the information from all the sources. We construct a secret and reliable ... 详细信息
来源: 评论
Adaptive multi-sensor background noise estimation method based on spatial-temporal correlation
收藏 引用
Journal of Convergence Information technology 2011年 第12期6卷 154-162页
作者: Sun, Yuxuan Lou, Xiaojun Liu, Haitao Key Lab of Wireless Sensor Network and Communications Shanghai Institute of Microsystem and Information Technology Chinese Academy of Science Shanghai 200050 China Wuxi SensingNet Industrialization Research Institute Wuxi 214135 China
In the multi-sensor measurement system, background subtraction is very important to improve both the accuracy and the sensitivity of the system. As the prerequisite, the performance of background noise estimation is c... 详细信息
来源: 评论
A novel approach for event foreground detection based on PSO parameter optimization and region partition based background modeling
收藏 引用
Journal of Convergence Information technology 2011年 第10期6卷 146-154页
作者: Wu, Jianrong Bao, Bisai Lou, Xiaojun Liu, Haitao Key Lab of Wireless Sensor Network and Communications Shanghai Institute of Microsystem and Information Technology Chinese Academy of Science Shanghai 200050 China Wuxi SensingNet Industrialization Research Institute Wuxi 214135 China
This paper proposes a novel image sequences based approach for event foreground detection in wild scenes with strong environment noises, which bases on PSO parameter optimization and region partition. First of all, ba... 详细信息
来源: 评论
Identification and extraction of topic elements for Chinese interactive text
Identification and extraction of topic elements for Chinese ...
收藏 引用
2nd International Conference on Multimedia technology, ICMT 2011
作者: Zhu, Haiping Yang, Yang Chen, Yan Yu, Xiaolu Department of Computer Science and Technology Xi'an Jiaotong University Min. of Education Key Lab for Intelligent Networks and Network Security of xi'An Jiaotong University Xi'an China
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论