咨询与建议

限定检索结果

文献类型

  • 61 篇 会议
  • 38 篇 期刊文献

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66 篇 工学
    • 53 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 16 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 7 篇 生物医学工程(可授...
    • 6 篇 化学工程与技术
    • 5 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 生物工程
    • 1 篇 仪器科学与技术
    • 1 篇 冶金工程
    • 1 篇 交通运输工程
    • 1 篇 船舶与海洋工程
    • 1 篇 农业工程
    • 1 篇 林业工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 29 篇 理学
    • 15 篇 数学
    • 9 篇 物理学
    • 6 篇 化学
    • 5 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 系统科学
  • 18 篇 管理学
    • 11 篇 图书情报与档案管...
    • 6 篇 管理科学与工程(可...
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 5 篇 药学(可授医学、理...
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 5 篇 optimization
  • 5 篇 computer vision
  • 4 篇 cameras
  • 4 篇 decoding
  • 3 篇 electroencephalo...
  • 3 篇 computational mo...
  • 3 篇 particle swarm o...
  • 3 篇 semantics
  • 3 篇 machine learning
  • 3 篇 embeddings
  • 3 篇 generators
  • 3 篇 training
  • 2 篇 routing
  • 2 篇 support vector m...
  • 2 篇 roads
  • 2 篇 deep neural netw...
  • 2 篇 noise measuremen...
  • 2 篇 transformers
  • 2 篇 anomaly detectio...
  • 2 篇 large datasets

机构

  • 30 篇 key laboratory o...
  • 26 篇 school of comput...
  • 16 篇 pazhou lab
  • 16 篇 school of data a...
  • 13 篇 peng cheng labor...
  • 12 篇 guangdong provin...
  • 7 篇 key lab. of mach...
  • 6 篇 key lab. of shan...
  • 6 篇 center for brain...
  • 6 篇 pengcheng lab
  • 5 篇 tongyi lab aliba...
  • 4 篇 moe-microsoft ke...
  • 4 篇 youtu lab tencen...
  • 4 篇 key lab. machine...
  • 3 篇 japan advanced i...
  • 3 篇 engineering rese...
  • 3 篇 guangdong key la...
  • 3 篇 microsoft resear...
  • 3 篇 guangdong key la...
  • 3 篇 the school of co...

作者

  • 26 篇 zheng wei-shi
  • 9 篇 lu bao-liang
  • 6 篇 fu shenghao
  • 6 篇 zhao hai
  • 6 篇 wei-shi zheng
  • 6 篇 xie xiaohua
  • 5 篇 wei xihan
  • 5 篇 yan junkai
  • 5 篇 yang qize
  • 5 篇 su qinliang
  • 4 篇 hong fa-ting
  • 4 篇 xu zenan
  • 4 篇 jun zhang
  • 4 篇 quan xiaojun
  • 4 篇 wei-neng chen
  • 4 篇 zhang jun
  • 4 篇 wang rui
  • 3 篇 jianhuang lai
  • 3 篇 lin kun-yu
  • 3 篇 shan ying

语言

  • 91 篇 英文
  • 8 篇 其他
检索条件"机构=Key Lab. Machine Intelligence and Advanced Computing"
99 条 记 录,以下是51-60 订阅
排序:
Testing of a predictive pole-slip protection algorithm on a Real Time Digital Simulator
Testing of a predictive pole-slip protection algorithm on a ...
收藏 引用
IEEE International Workshop on Applied Measurements for Power Systems (AMPS)
作者: Lafras Lamont Johan Rens Jan de Kock Department of Applied Electronics Tokyo University of Science Tokyo Japan School of Data and Computer Science Sun Yat-sen University Guangzhou China Key Lab. of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China
Predictive pole-slip protection is not implemented in commercially availab.e protection relays. All pole-slip protection relays on the market will only trip a generator after it has pole-slipped one or more times. A p... 详细信息
来源: 评论
Adversarial attribute-image person re-identification
arXiv
收藏 引用
arXiv 2017年
作者: Yin, Zhou Zheng, Wei-Shi Wu, Ancong Yu, Hong-Xing Wan, Hai Guo, Xiaowei Huang, Feiyue Lai, Jianhuang School of Data and Computer Science Sun Yat-sen University Guangzhou China YouTu Lab Tencent Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
While attributes have been widely used for person re-identification (Re-ID) which aims at matching the same person images across disjoint camera views, they are used either as extra features or for performing multi-ta... 详细信息
来源: 评论
A generalized matrix splitting algorithm
arXiv
收藏 引用
arXiv 2018年
作者: Yuan, Ganzhao Zheng, Wei-Shi Shen, Li Ghanem, Bernard Guangzhou Guangdong510275 China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Beijing221143 China Tencent AI Lab Shenzhen China Saudi Arabia
Composite function minimization captures a wide spectrum of applications in both computer vision and machine learning. It includes bound constrained optimization, `1 norm regularized optimization, and `0 norm regulari... 详细信息
来源: 评论
EEG-based fatigue classification by using parallel hidden Markov model and pattern classifier combination
EEG-based fatigue classification by using parallel hidden Ma...
收藏 引用
19th International Conference on Neural Information Processing, ICONIP 2012
作者: Sun, Hui Lu, Bao-Liang Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE-Microsoft Key Lab. for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE Key Laboratory of Systems Biomedicine Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China
Fatigue is the most important reason leading to traffic accidents. In order to ensure traffic safety, various methods based on electroencephalogram (EEG) are proposed. But most of them, either regression or classifica... 详细信息
来源: 评论
Online vigilance analysis combining video and electrooculography features
Online vigilance analysis combining video and electrooculogr...
收藏 引用
19th International Conference on Neural Information Processing, ICONIP 2012
作者: Du, Ruo-Fei Liu, Ren-Jie Wu, Tian-Xiang Lu, Bao-Liang Center for Brain-like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE-Microsoft Key Lab. for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China MOE Key Laboratory of Systems Biomedicine Shanghai Jiao Tong University 800 Dongchuan Road Shanghai 200240 China
In this paper, we propose a novel system to analyze vigilance level combining both video and Electrooculography (EOG) features. For one thing, the video features extracted from an infrared camera include percentage of... 详细信息
来源: 评论
Refining BERT embeddings for document hashing via mutual information maximization
arXiv
收藏 引用
arXiv 2021年
作者: Ou, Zijing Su, Qinliang Yu, Jianxing Zhao, Ruihui Zheng, Yefeng Liu, Bang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Artificial Intelligence Sun Yat-sen University Guangdong China Tencent Jarvis Lab Rali & Mila Université de Montréal Guangdong Key Lab. of Big Data Analysis and Processing Guangzhou China Key Lab. of Machine Intelligence and Advanced Computing Ministry of Education China
Existing unsupervised document hashing methods are mostly established on generative models. Due to the difficulties of capturing long dependency structures, these methods rarely model the raw documents directly, but i... 详细信息
来源: 评论
Converting continuous-space language models into N-gram language models for statistical machine translation
Converting continuous-space language models into N-gram lang...
收藏 引用
2013 Conference on Empirical Methods in Natural Language Processing, EMNLP 2013
作者: Wang, Rui Utiyama, Masao Goto, Isao Sumita, Eiichro Zhao, Hai Lu, Bao-Liang Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Shanghai Jiao Tong Unviersity Shanghai200240 China Multilingual Translation Laboratory MASTAR Project National Institute of Information and Communications Technology 3-5 Hikaridai Keihanna Science City Kyoto619-0289 Japan MOE-Microsoft Key Lab. for Intelligent Computing and Intelligent Systems Shanghai Jiao Tong Unviersity Shanghai200240 China
Neural network language models, or continuous-space language models (CSLMs), have been shown to improve the performance of statistical machine translation (SMT) when they are used for reranking n-best translations. Ho... 详细信息
来源: 评论
Generating software test data by particle swarm optimization
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial intelligence and Lecture Notes in Bioinformatics) 2014年 8886卷 37-47页
作者: Jia, Ya-Hui Chen, Wei-Neng Zhang, Jun Li, Jing-Jing School of Information Science and Technology Sun Yat-sen University Guangzhou China School of Advanced Computing Sun Yat-sen University Guangzhou China Key Lab. Machine Intelligence and Advanced Computing Ministry of Education China Engineering Research Center of Supercomputing Engineering Software MOE China School of Computer Science South China Normal University Guangzhou China
Search-based method using meta-heuristic algorithms is a hot topic in automatic test data generation. In this paper, we develop an automatic test data generating tool named particle swarm optimization data generation ... 详细信息
来源: 评论
Unsupervised person re-identification by soft multilab.l learning
arXiv
收藏 引用
arXiv 2019年
作者: Yu, Hong-Xing Zheng, Wei-Shi Wu, Ancong Guo, Xiaowei Gong, Shaogang Lai, Jian-Huang Sun Yat-sen University China YouTu Lab Tencent Queen Mary University of London United Kingdom Key Laboratory of Machine Intelligence and Advanced Computing Ministryof Education China
Although unsupervised person re-identification (RE-ID) has drawn increasing research attentions due to its potential to address the scalab.lity problem of supervised RE-ID models, it is very challenging to learn discr... 详细信息
来源: 评论
Inserting anybody in diffusion models via celeb basis  23
Inserting anybody in diffusion models via celeb basis
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Ge Yuan Xiaodong Cun Yong Zhang Maomao Li Chenyang Qi Xintao Wang Ying Shan Huicheng Zheng School of Computer Science and Engineering Sun Yat-sen University and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China and Guangdong Key Laboratory of Information Security Technology and Tencent AI Lab Tencent AI Lab The Hong Kong University of Science and Technology School of Computer Science and Engineering Sun Yat-sen University and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China and Guangdong Key Laboratory of Information Security Technology
Exquisite demand exists for customizing the pretrained large text-to-image model, e.g. Stable Diffusion, to generate innovative concepts, such as the users themselves. However, the newly-added concept from previous cu...
来源: 评论