咨询与建议

限定检索结果

文献类型

  • 130 篇 会议
  • 45 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 136 篇 工学
    • 92 篇 计算机科学与技术...
    • 79 篇 软件工程
    • 31 篇 信息与通信工程
    • 15 篇 控制科学与工程
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 电子科学与技术(可...
    • 10 篇 化学工程与技术
    • 9 篇 农业工程
    • 8 篇 光学工程
    • 7 篇 电气工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 网络空间安全
    • 4 篇 土木工程
    • 3 篇 仪器科学与技术
  • 67 篇 理学
    • 48 篇 数学
    • 13 篇 生物学
    • 11 篇 化学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 6 篇 系统科学
  • 34 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 医学
    • 6 篇 临床医学
    • 5 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
  • 9 篇 农学
    • 9 篇 作物学
  • 2 篇 法学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 6 篇 information proc...
  • 5 篇 grid computing
  • 4 篇 semantics
  • 4 篇 accuracy
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 syntactics
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 natural language...
  • 3 篇 labeling
  • 3 篇 image reconstruc...
  • 3 篇 filtering algori...
  • 3 篇 training
  • 2 篇 computer science
  • 2 篇 learning systems
  • 2 篇 imaging
  • 2 篇 rsa cryptosystem
  • 2 篇 support vector m...
  • 2 篇 compressed sensi...

机构

  • 17 篇 school of comput...
  • 10 篇 college of compu...
  • 9 篇 jiangsu high tec...
  • 8 篇 college of compu...
  • 7 篇 key lab. of broa...
  • 7 篇 provincial key l...
  • 6 篇 school of comput...
  • 6 篇 hubei province k...
  • 6 篇 college of infor...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 4 篇 jiangsu provinci...
  • 4 篇 college of compu...
  • 4 篇 first-imaging te...
  • 4 篇 key lab. of broa...
  • 4 篇 school of inform...
  • 4 篇 jiangsu high tec...
  • 4 篇 zhejiang lab
  • 3 篇 institute for in...
  • 3 篇 jiangsu high tec...

作者

  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 10 篇 zhou guodong
  • 8 篇 wang ruchuan
  • 6 篇 yu fei
  • 6 篇 wang yonghao
  • 6 篇 li peifeng
  • 6 篇 hu wei
  • 5 篇 qian peide
  • 4 篇 fei yu
  • 4 篇 qian longhua
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 ye xiaoguo
  • 4 篇 li renfa
  • 3 篇 li yang
  • 3 篇 yue guangxue
  • 3 篇 li chenglong
  • 3 篇 xu jing
  • 3 篇 wu zhan

语言

  • 170 篇 英文
  • 6 篇 中文
检索条件"机构=Key Lab. of Computer Information Processing Technology of Jiangsu Province"
176 条 记 录,以下是81-90 订阅
排序:
Inverse Depth Line Model of LiDAR Data for Traversable Region Segmentation  4
Inverse Depth Line Model of LiDAR Data for Traversable Regio...
收藏 引用
4th International Conference on Electronic information technology and computer Engineering, EITCE 2020
作者: Liu, Zhen Ren, Mingwu Jin, Zhong School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education Nanjing University of Science and Technology Nanjing Jiangsu China
In this paper, we propose an Inverse Depth Line (IDL) model of LiDAR data for traversable region segmentation. This model first organizes the disordered point cloud with a 2D structure array to store and index the poi... 详细信息
来源: 评论
Image retrieval based on bit-plane distribution feature
Image retrieval based on bit-plane distribution feature
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Shan, Zhao Jing, Lui School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Jiangsu Prov. Key Lab. on Image Processing and Image Communication Nanjing University of Posts and Communication Nanjing 210003 China
Based on the analysis of color histogram for image retrieval, a new descriptor, bit-plane distribution feature(BPDF), is proposed in this paper. The image is firstly divided into eight bit-planes. Meantime, the Gray c... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor Networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
BDLR:lncRNA identification using ensemble learning
收藏 引用
BIOCELL 2022年 第4期46卷 951-960页
作者: LEJUN GONG SHEHAI ZHOU JINGMEI CHEN YONGMIN LI LI ZHANG ZHIHONG GAO Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China
Long non-coding RNAs(lncRNAs)play an important role in many life activities such as epigenetic material regulation,cell cycle regulation,dosage compensation and cell differentiation regulation,and are associated with ... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Ronghui, Wu Renfa, Li Fei, Yu Guangxue, Yue Cheng, Xu School of Computer and Communication Hunan University Changsha410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Wu, Ronghui Li, Renfa Yu, Fei Yue, Guangxue Xu, Cheng School of Computer and Communication Hunan University Changsha 410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论