咨询与建议

限定检索结果

文献类型

  • 423 篇 会议
  • 121 篇 期刊文献

馆藏范围

  • 544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 412 篇 工学
    • 317 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 107 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 37 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 20 篇 光学工程
    • 20 篇 电气工程
    • 14 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
    • 8 篇 建筑学
    • 8 篇 安全科学与工程
  • 197 篇 理学
    • 137 篇 数学
    • 43 篇 统计学(可授理学、...
    • 39 篇 生物学
    • 37 篇 物理学
    • 12 篇 系统科学
    • 11 篇 化学
  • 141 篇 管理学
    • 95 篇 图书情报与档案管...
    • 60 篇 管理科学与工程(可...
    • 29 篇 工商管理
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 network coding
  • 10 篇 bandwidth
  • 10 篇 data mining
  • 9 篇 feature extracti...
  • 9 篇 training
  • 8 篇 clustering algor...
  • 8 篇 cloud computing
  • 7 篇 collaborative fi...
  • 7 篇 computational mo...
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 educational inst...
  • 6 篇 servers
  • 6 篇 mapreduce
  • 6 篇 computational li...
  • 6 篇 real-time system...
  • 6 篇 entropy
  • 6 篇 web services
  • 5 篇 scalability

机构

  • 30 篇 key lab. of inte...
  • 29 篇 university of ch...
  • 20 篇 tianjin key lab....
  • 19 篇 key lab. of inte...
  • 15 篇 key lab. of inte...
  • 13 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graduate univers...
  • 11 篇 key laboratory o...
  • 11 篇 state key lab. f...
  • 10 篇 shenyang institu...
  • 10 篇 peng cheng labor...
  • 10 篇 hunan provincial...
  • 9 篇 graduate univers...
  • 9 篇 liaoning key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 key lab. of inte...
  • 7 篇 school of cyber ...
  • 7 篇 institute of com...

作者

  • 25 篇 liu qun
  • 19 篇 yin zhenyu
  • 19 篇 kai lei
  • 19 篇 li hui
  • 18 篇 huang qingming
  • 12 篇 guosheng kang
  • 10 篇 liu jianxun
  • 10 篇 gao wen
  • 9 篇 kang guosheng
  • 9 篇 zhang degan
  • 9 篇 xu qianqian
  • 9 篇 zhuge hai
  • 8 篇 zhang feiqing
  • 8 篇 cao jiannong
  • 8 篇 jianxun liu
  • 7 篇 fan chao
  • 7 篇 jiang shuqiang
  • 7 篇 mi haitao
  • 7 篇 wang tao
  • 7 篇 yang yan

语言

  • 517 篇 英文
  • 21 篇 中文
  • 6 篇 其他
检索条件"机构=Key Lab. of Cloud Computing Technology"
544 条 记 录,以下是421-430 订阅
lab.l-based DV-Hop localization againstwormhole attacks in wireless sensor networks
Label-based DV-Hop localization againstwormhole attacks in w...
收藏 引用
作者: Wu, Junfeng Chen, Honglong Lou, Wei Wang, Zhibo Wang, Zhi State Key Lab. of Industrial Control Technology Zhejiang University China Dept. of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Dept. of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization m... 详细信息
来源: 评论
Memory matrix: A novel user experience for home video
Memory matrix: A novel user experience for home video
收藏 引用
18th ACM International Conference on Multimedia ACM Multimedia 2010, MM'10
作者: Xu, Qianqian Wu, Zhipeng Li, Guorong Qin, Lei Jiang, Shuqiang Huang, Qingming Graduate University Chinese Academy of Sciences Beijing 100049 China Key Lab. of Intell. Info. Process Chinese Academy of Sciences Beijing 100190 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Nowadays, various efforts have sprung up aiming to automatically analyze home videos and provide users satisfactory experiences. In this paper, we present a novel user experience for home video called Memory Matrix, w... 详细信息
来源: 评论
Risk analysis of system security based on evidence theory
Risk analysis of system security based on evidence theory
收藏 引用
2010 International Conference on Computer Design and Applications, ICCDA 2010
作者: Xu, Peida Xu, Jianling Deng, Yong Su, Xiaoyan Key Laboratory of Digital Agricultural Early-warning Technology Ministry of Agriculture of China Beijing China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai China Grain Economics Institute Nanjing University of Finance and Economics Nanjing China Hangzhou Key Lab. of E-Business and Information Security Hangzhou Normal University Hanzhou Zhejiang China Hangzhou Key Lab. of E-Business and Information Security Hangzhou Normal University Shanghai China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
Incremental intrusion detecting method based on SOM/RBF
Incremental intrusion detecting method based on SOM/RBF
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Tian, Li-Ye Liu, Wei-Peng Dept. of Electronic and Information Engineering Naval Aeronautical and Astronautical University Yantai 264001 China State Key Laboratory of Information Security GUCAS Beijing 100039 China Trusted Computing Lab. College of Computer Beijing University of Technology Beijing 100022 China
An incremental intrusion detecting model is proposed in this paper. This model integrates unsupervised Self Organizing Map and supervised Radial Basis Function to complete incremental learning. Self Organizing Map can... 详细信息
来源: 评论
Attention based album slideshow
Attention based album slideshow
收藏 引用
Pacific Rim Symposium on Image and Video technology
作者: Liu, Huiying Huang, Qingming Jiang, Shuqiang Key Lab. of Intell. Info. Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Graduate University of Chinese Academy of Sciences Beijing 100049 China China-Singapore Institute of Digital Media Singapore 119615 Singapore
Slideshow is a popular way to display a digital album automatically. However, it is time consuming and boring when the album is large. Actually, while browsing an album manually, an audience may spend different length... 详细信息
来源: 评论
Hierarchical certificateless signatures
Hierarchical certificateless signatures
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Zhang, Lei Wu, Qianhong Domingo-Ferrer, Josep Qin, Bo UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain Wuhan University School of Computer Key Lab. of Aerospace Information Security and Trusted Computing China Xi'an University of Technology School of Science Department of Maths China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
Better filtration and augmentation for hierarchical phrase-based translation rules
Better filtration and augmentation for hierarchical phrase-b...
收藏 引用
48th Annual Meeting of the Association for Computational Linguistics, ACL 2010
作者: Wang, Zhiyang Lü, Yajuan Liu, Qun Hwang, Young-Sook Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing 100190 China HILab Convergence Technology Center C and i Business SKTelecom 11 Euljiro2-ga Jung-gu Seoul 100-999 Korea Republic of
This paper presents a novel filtration criterion to restrict the rule extraction for the hierarchical phrase-based translation model, where a bilingual but relaxed wellformed dependency restriction is used to filter o... 详细信息
来源: 评论
A HSC-based sample selection method for Support Vector Machine
A HSC-based sample selection method for Support Vector Machi...
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: He, Qing Li, Ning Shi, Zhong-Zhi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Hebei University Baoding 071002 Hebei China Graduate University of Chinese Academy of Sciences Hebei University Baoding 071002 Hebei China Key Lab. of Machine Learning and Computational Intelligence College of Mathematics and Computer Science Hebei University Baoding 071002 Hebei China
Support Vector Machine (SVM) is a classification technique of machine learning based on statistical learning theory. A quadratic optimization problem needs to be solved in the algorithm, and with the increase of the s... 详细信息
来源: 评论
Efficient incremental decoding for tree-to-string translation
Efficient incremental decoding for tree-to-string translatio...
收藏 引用
Conference on Empirical Methods in Natural Language Processing, EMNLP 2010
作者: Huang, Liang Mi, Haitao Information Sciences Institute University of Southern California 4676 Admiralty Way Marina del Rey CA 90292 United States Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences P.O. Box 2704 Beijing 100190 China
Syntax-based translation models should in principle be efficient with polynomially-sized search space, but in practice they are often embarassingly slow, partly due to the cost of language model integration. In this p... 详细信息
来源: 评论
From Use Case Model to Service Model An Environment Ontology Based Approach
From Use Case Model to Service Model An Environment Ontology...
收藏 引用
The Ninth International Conference on Grid and cloud computing(第九届网格与云计算国际学术会议 GCC 2010)
作者: Guangjun Cai Bin Zhao Zhi Jin Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Graduate Unive Software Engineering Institute Peking University Beijing China
One fundamental problem in services computing is how to bridge the gap between business requirements and various heterogeneous IT services. This involves eliciting business requirements and building a solution accordi... 详细信息
来源: 评论