咨询与建议

限定检索结果

文献类型

  • 130 篇 会议
  • 45 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 136 篇 工学
    • 92 篇 计算机科学与技术...
    • 79 篇 软件工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 电子科学与技术(可...
    • 10 篇 化学工程与技术
    • 9 篇 农业工程
    • 8 篇 光学工程
    • 7 篇 电气工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 4 篇 土木工程
    • 3 篇 仪器科学与技术
  • 67 篇 理学
    • 48 篇 数学
    • 13 篇 生物学
    • 11 篇 化学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 6 篇 系统科学
  • 34 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 医学
    • 6 篇 临床医学
    • 5 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
  • 9 篇 农学
    • 9 篇 作物学
  • 2 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 6 篇 information proc...
  • 5 篇 grid computing
  • 4 篇 semantics
  • 4 篇 accuracy
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 syntactics
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 natural language...
  • 3 篇 labeling
  • 3 篇 image reconstruc...
  • 3 篇 filtering algori...
  • 3 篇 training
  • 2 篇 computer science
  • 2 篇 learning systems
  • 2 篇 imaging
  • 2 篇 rsa cryptosystem
  • 2 篇 support vector m...
  • 2 篇 compressed sensi...

机构

  • 17 篇 school of comput...
  • 10 篇 college of compu...
  • 9 篇 jiangsu high tec...
  • 8 篇 college of compu...
  • 7 篇 key lab. of broa...
  • 7 篇 provincial key l...
  • 6 篇 school of comput...
  • 6 篇 hubei province k...
  • 6 篇 college of infor...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 4 篇 jiangsu provinci...
  • 4 篇 college of compu...
  • 4 篇 first-imaging te...
  • 4 篇 key lab. of broa...
  • 4 篇 school of inform...
  • 4 篇 jiangsu high tec...
  • 4 篇 zhejiang lab
  • 3 篇 institute for in...
  • 3 篇 jiangsu high tec...

作者

  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 10 篇 zhou guodong
  • 8 篇 wang ruchuan
  • 6 篇 yu fei
  • 6 篇 wang yonghao
  • 6 篇 li peifeng
  • 6 篇 hu wei
  • 5 篇 qian peide
  • 4 篇 fei yu
  • 4 篇 qian longhua
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 ye xiaoguo
  • 4 篇 li renfa
  • 3 篇 li yang
  • 3 篇 yue guangxue
  • 3 篇 li chenglong
  • 3 篇 xu jing
  • 3 篇 wu zhan

语言

  • 170 篇 英文
  • 6 篇 中文
检索条件"机构=Key Lab. of Computer Information Processing Technology of Jiangsu Province"
176 条 记 录,以下是61-70 订阅
排序:
Mean Shift Object Tracking with Modified LTP
Mean Shift Object Tracking with Modified LTP
收藏 引用
2012 IEEE 11th International Conference on Signal processing(ICSP 2012)
作者: ZHANG Shaona HU Dong HU Yanting Education Ministry's Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications The key lab of image processing and transmission of Jiangsu province Nanjing University of Posts and Telecommunications School of Telecommunication and Information Engineering Nanjing University of Posts and Telecommunications
A new scheme of object tracking with mean shift is put forward in this paper. At first, texture feature is fused in the processing by Local Ternary Pattern (LTP). Since LTP is sensitive to local noise, least median of... 详细信息
来源: 评论
Low-cost VR system based on wireless accelerometer sensor
Low-cost VR system based on wireless accelerometer sensor
收藏 引用
6th China Conference of Wireless Sensor Networks, CWSN 2012
作者: Jiang, Lingyun Wang, Ruchuan Qian, Wenxiang Lv, Yachao College of Computer Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China
Virtual reality(VR) games have been popular in recent years, developed in the form of the games by capturing the body's various physiological activities, including the surrounding environmental factors to achieve ... 详细信息
来源: 评论
The research of routing forwarding strategies in DTNs based on convergence point
The research of routing forwarding strategies in DTNs based ...
收藏 引用
6th China Conference of Wireless Sensor Networks, CWSN 2012
作者: Wang, Luxuan Sun, Lijuan Xiao, Fu Ye, Xiaoguo Wang, Ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China
DTN is developed as an emerging network technology which is mainly used in network with long waiting time, intermittent connectivity, and other extreme environments network. It has be favored in the military, transpor... 详细信息
来源: 评论
ADJSA: an adaptable dynamic job scheduling approach based on historical information  07
ADJSA: an adaptable dynamic job scheduling approach based on...
收藏 引用
Proceedings of the 2nd international conference on Scalab.e information systems
作者: Lan Xu Qiao-ming Zhu Zhengxian Gong Pei-feng Li Soochow University Suzhou China and Key Lab of Computer Information Processing Technology of Jiangsu Province Suzhou China
Currently, there are many researches focusing on grid scheduling and more and more scheduling algorithms were proposed. However, those algorithms are not satisfied with the requirement of the grid for ignoring its cha... 详细信息
来源: 评论
A dynamic web services selection algorithm based on trust model for grid environment
A dynamic web services selection algorithm based on trust mo...
收藏 引用
6th China Conference of Wireless Sensor Networks, CWSN 2012
作者: Zhang, Lin Liu, Zhengbang Wang, Ruchuan Wang, Haiyan College of Computer Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China
In order to find the service nodes, which the users are satisfied with, in a high speed and efficiency in open network environment, a new grid-oriented multi-level service selection model is proposed, which is based o... 详细信息
来源: 评论
A new TCP design for satellite-HAP networks
A new TCP design for satellite-HAP networks
收藏 引用
6th China Conference of Wireless Sensor Networks, CWSN 2012
作者: Wang, Sudan Sun, Lijuan Xiao, Fu Ye, Xiaoguo Wang, Ruchuan College of Computer Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Province Nanjing 210003 China
In recent years, several new TCP congestion control algorithms have been proposed to improve TCP performance for networks of high bandwidth delay products. Satellite-HAP networks providing high-speed data transmission... 详细信息
来源: 评论
Gossip-based indexing ring topology for 2-dimension spatial data in overlay networks
Gossip-based indexing ring topology for 2-dimension spatial ...
收藏 引用
2012 International Workshop on information and Electronics Engineering, IWIEE 2012
作者: Zou, Z.Q. Wang, Y. Hu, B. Wang, R.C. College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
Overlay networks are used widely in the Internet, such as retrieval and share of files, multimedia games and so on. However, in distributed system, the retrieval and share of 2-dimension spatial data still have some d... 详细信息
来源: 评论
An expanding ring prediction and location aided AODV routing algorithm
An expanding ring prediction and location aided AODV routing...
收藏 引用
2011 International Conference on information technology, computer Engineering and Management Sciences, ICM 2011
作者: Cheng, Chunling Hao, Jingbo Zhang, Dengyin College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
On the battlefield, the cooperative fighting and communication among combat vehicles require higher service level of real-time transmission. Combat vehicles' fast moving and the links' frequent disruption lead... 详细信息
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
Data distribution algorithm of high-speed intrusion detection system based on network processor
Data distribution algorithm of high-speed intrusion detectio...
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Xu, Cheng Yu, Fei Dai, Zhenghui Yue, Guangxue Li, Renfa School of Computer and Communication Hunan University Changsha 410082 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou Jiangsu 2150063 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin... 详细信息
来源: 评论