咨询与建议

限定检索结果

文献类型

  • 615 篇 会议
  • 227 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 845 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 539 篇 计算机科学与技术...
    • 446 篇 软件工程
    • 124 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 48 篇 电子科学与技术(可...
    • 47 篇 电气工程
    • 41 篇 生物工程
    • 37 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 24 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 20 篇 安全科学与工程
    • 19 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 257 篇 数学
    • 61 篇 物理学
    • 55 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 28 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 12 篇 web services
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 quality of servi...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 federated learni...
  • 7 篇 accuracy
  • 7 篇 cloud computing

机构

  • 91 篇 state key lab. f...
  • 55 篇 state key lab. o...
  • 29 篇 university of ch...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 21 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 14 篇 school of comput...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 hunan provincial...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 13 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 9 篇 jianxun liu
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 760 篇 英文
  • 56 篇 其他
  • 30 篇 中文
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
845 条 记 录,以下是821-830 订阅
排序:
A new approach for line recognition in large-size images using hough transform
A new approach for line recognition in large-size images usi...
收藏 引用
16th International Conference on Pattern Recognition, ICPR 2002
作者: Song, Jiqiang Cai, Min Lyu, Michael R. Cai, Shijie Dept. Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong State Key Lab. of Novel Software Technology Nanjing University Nanjing China
Applications of the Hough Transform (HT) have been limited to small-size images for a long time. For large-size images, peak detection and line verification become much more time-consuming. Many HT-based line detectio... 详细信息
来源: 评论
Graphics recognition from binary images: One step or two steps
Graphics recognition from binary images: One step or two ste...
收藏 引用
16th International Conference on Pattern Recognition, ICPR 2002
作者: Song, Jiqiang Cai, Min Lyu, Michael R. Cai, Shijie Dept. Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong State Key Lab. of Novel Software Technology Nanjing University Nanjing China
Recognizing graphic objects from binary images is an important task in many real-life applications. Generally, there are two ways to do the graphics recognition: onestep methods and two-step methods. The former recogn... 详细信息
来源: 评论
Graphics recognition from binary images: One step or two steps
Graphics recognition from binary images: One step or two ste...
收藏 引用
作者: Song, Jiqiang Cai, Min Lyu, Michael R. Cai, Shijie Dept. Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong State Key Lab. of Novel Software Technology Nanjing University Nanjing China
Recognizing graphic objects from binary images is an important task in many real-life applications. Generally, there are two ways to do the graphics recognition: one-step methods and two-step methods. The former recog... 详细信息
来源: 评论
Implementation Methods of computer Aided Design-Drawing and Drawing Management for Plate Cutting-Machine
收藏 引用
Journal of Donghua University(English Edition) 2002年 第1期19卷 115-118页
作者: 董玉德 赵韩 谭建荣 Department of Computer University of Science and Technology of China Hefei 230052 School of Mech. and Auto. Eng. He Fei UniversityofTechnology Hefei 230009 State Key Lab. of CAD & CG Zhejiang University Hangzhou 310027
The implementation methods of computer aided design,drawing and drawing management for plate cuttingmachine are discussed. The system structure for plate cutting- machine design is put forward firstly, then some key t... 详细信息
来源: 评论
Reliable message delivery for mobile agents: Push or pull  9
Reliable message delivery for mobile agents: Push or pull
收藏 引用
9th International Conference on Parallel and Distributed systems, ICPADS 2002
作者: Cao, Jiannong Feng, Xinyu Lu, Jian Chan, Henry Das, Sajal K. Internet Computing and E-Commerce Lab. Dept. of Computing Hong Kong Polytechnic University Hung Hom Kowloon Hong Kong State Key Laboratory for Novel Software Technology Dept. of Computer Science Nanjing University Nanjing China Dept. of Computer Science and Engineering Univ. of Texas at Arlington ArlingtonTX76019 United States
Two of the fundamental issues in message passing between mobile agents are tracking the migration of the target agent and delivering messages to it. In order to provide reliable message delivery, protocols are needed ... 详细信息
来源: 评论
A new approach for line recognition in large-size images using hough transform
Proceedings - International Conference on Pattern Recognitio...
收藏 引用
Proceedings - International Conference on Pattern Recognition 2002年 第1期16卷 33-36页
作者: Song, Jiqiang Cai, Min Lyu, Michael R. Cai, Shijie Dept. Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong State Key Lab. of Novel Software Technology Nanjing University Nanjing China
The application of Hough Transform (HT) has been limited to small-size images for a long time. For large-size images, the peak detection and the line verification become much more time-consuming. Many HT-based line de... 详细信息
来源: 评论
Chinese part of speech tagging based on maximum entropy method
Chinese part of speech tagging based on maximum entropy meth...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Hong Ling Chun-Fa Yuan State Key Lab. of Intelligent Technol. & Syst. Tsinghua Univ. Beijing China Dept. of Computer Science & Technology Tsinghua University Beijing P.R.C.
A lot of researches have been made on the application of the maximum entropy modeling in natural language processing in recent years. In this paper, we present a new Chinese part of speech tagging method based on the ... 详细信息
来源: 评论
A video-based approach for stationary platform supervision
A video-based approach for stationary platform supervision
收藏 引用
International Conference on Intelligent Transportation
作者: W. Oertel T. Dimter D. Szoska State Key Lab. of lntelligent Technology and Systems TNLIST Beijing China Department of Electrical and Electronic Engineering Shijiazhuang Tiedao University Shijiazhuang China Department of Computer Science and Technology Tsinghua University Beijing China
The paper presents a stationary system developed for automatic supervision of railway station platforms, especially under conditions of automated train operation. It uses cameras mounted at the platform and supervisio... 详细信息
来源: 评论
Improving Chinese Storing Text Retrieval systems' Security via a Novel Maximal Prefix Coding
收藏 引用
International Journal of computer Processing of Languages 2002年 第4期15卷 379-393页
作者: D. Y. LONG W. J. JIA P. O. AU M. LI Department of Computer Science Zhongshan University Guangzhou 510275 PRC State Key Lab. of Information Security Chinese Academy of Science Beijing 100080 PRC Department of Computer Engineering and Information Technology City University of Hong Kong 83 Tat Chee Avenue Kowloon Hong Kong SAR PRC School of Computing National University of Singapore Singapore
We have seen that Huffman coding has been widely used in data, image, and video compression. In this paper novel maximal prefix coding is introduced. Relationship between the Huffman coding and the optimal maximal pre... 详细信息
来源: 评论
computer system Reliability Allocation Method and Supporting Tool
收藏 引用
Wuhan University Journal of Natural sciences 2001年 第Z1期6卷 505-510页
作者: Ben Ke\|rong 1, Yan Jiong 2, Wang Ji 2 1 Department of computer science, Naval University of Engineering, Wuhan 430033, China software Engineering key lab.,Wuhan University,Wuhan 430072, China 2 Department of computer science, National Universit Department of Computer Science Naval University of Engineering Wuhan China Software Engineering Key Lab. Wuhan University Wuhan China Department of Computer Science National University of Defence Technology Changsha China
This paper presents a computer system reliability allocation method that is based on the theory of statistic and Markovian chain,which can be used to allocate reliability to subsystem, to hybrid system and software mo... 详细信息
来源: 评论