咨询与建议

限定检索结果

文献类型

  • 1,743 篇 会议
  • 1,588 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,332 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,122 篇 工学
    • 1,527 篇 计算机科学与技术...
    • 1,277 篇 软件工程
    • 515 篇 信息与通信工程
    • 297 篇 生物工程
    • 284 篇 控制科学与工程
    • 275 篇 电气工程
    • 165 篇 光学工程
    • 165 篇 电子科学与技术(可...
    • 157 篇 生物医学工程(可授...
    • 137 篇 机械工程
    • 109 篇 化学工程与技术
    • 100 篇 交通运输工程
    • 90 篇 仪器科学与技术
    • 76 篇 动力工程及工程热...
    • 74 篇 土木工程
    • 71 篇 建筑学
    • 68 篇 网络空间安全
  • 1,184 篇 理学
    • 652 篇 数学
    • 336 篇 生物学
    • 239 篇 物理学
    • 206 篇 统计学(可授理学、...
    • 129 篇 化学
    • 96 篇 系统科学
  • 588 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 149 篇 医学
    • 128 篇 临床医学
    • 101 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 103 篇 法学
    • 84 篇 社会学
  • 61 篇 农学
  • 44 篇 经济学
  • 39 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 138 篇 feature extracti...
  • 132 篇 semantics
  • 117 篇 training
  • 96 篇 deep learning
  • 74 篇 accuracy
  • 73 篇 computational mo...
  • 60 篇 predictive model...
  • 56 篇 contrastive lear...
  • 56 篇 data models
  • 55 篇 machine learning
  • 54 篇 convolution
  • 50 篇 graph neural net...
  • 47 篇 neural networks
  • 44 篇 federated learni...
  • 43 篇 reinforcement le...
  • 42 篇 object detection
  • 42 篇 data mining
  • 39 篇 optimization
  • 38 篇 visualization
  • 37 篇 task analysis

机构

  • 78 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 63 篇 college of compu...
  • 62 篇 key laboratory o...
  • 61 篇 university of ch...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 south china univ...
  • 53 篇 national enginee...
  • 52 篇 shandong enginee...
  • 51 篇 peng cheng labor...
  • 46 篇 school of softwa...
  • 43 篇 school of comput...
  • 42 篇 jiangsu key labo...
  • 41 篇 school of cyber ...
  • 40 篇 school of electr...
  • 36 篇 key laboratory o...
  • 36 篇 guangdong key la...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...

作者

  • 39 篇 wang guoyin
  • 38 篇 xu xiaolong
  • 35 篇 tan mingkui
  • 30 篇 jin hai
  • 27 篇 xiaolong xu
  • 26 篇 huang qingming
  • 25 篇 shen linlin
  • 22 篇 hai jin
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 hu shengshan
  • 20 篇 hongyan ma
  • 19 篇 chen huajun
  • 18 篇 niyato dusit
  • 17 篇 xia shuyin
  • 17 篇 wu di
  • 16 篇 li jianxin
  • 16 篇 guo kun
  • 15 篇 peng hao
  • 15 篇 chen gang

语言

  • 2,798 篇 英文
  • 497 篇 其他
  • 66 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing"
3332 条 记 录,以下是3301-3310 订阅
排序:
Video saliency prediction with optimized optical flow and gravity center bias
Video saliency prediction with optimized optical flow and gr...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zhe Wu Li Su Qingming Huang Bo Wu Jian Li Guorong Li Key Lab on Big Data Mining and Knowledge Management University of Chinese Academy of Sciences Beijing China Key Lab of Intelligent Information Processing Institute of Computing Technology Beijing China Capital Medical University Beijing China Beijing University of Posts and Telecommunications China Beijing
Dynamic videos are viewed fundamentally different from static images. Besides spatial features, motion feature also plays an important role as a temporal factor. Most existing video saliency models usually employ opti... 详细信息
来源: 评论
A characteristic-preserving steganographic method based on revision identifiers
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2016年 第9期11卷 29-38页
作者: Xiang, Lingyun Sun, Caixia Liao, Niandong Wang, Weizheng Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology ChangshaHunan Province410114 China School of Computer and Communication Engineering Changsha University of Science and Technology ChangshaHunan Province410114 China
Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographi... 详细信息
来源: 评论
SI2P: A restaurant recommendation system using preference queries over incomplete information  42
SI2P: A restaurant recommendation system using preference qu...
收藏 引用
42nd International Conference on Very Large data Bases, VLDB 2016
作者: Miao, Xiaoye Gao, Yunjun Chen, Gang Cui, Huiyong Guo, Chong Pan, Weida College of Computer Science Zhejiang University Hangzhou China The Key Lab of Big Data Intelligent Computing of Zhejiang Province Zhejiang University Hangzhou China
The incomplete data is universal in many real-life applications due to data integration, the limitation of devices, etc. In this demonstration, we present SI2P, a restaurant recommendation System with Preference queri... 详细信息
来源: 评论
No reference video quality assessment based on 3D convolutional neural network
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2016年 27卷 103-112页
作者: Wang, Chun-Feng Su, Li Zhang, Wei-Gang Huang, Qing-Ming Key Laboratory on Big Data Mining and Knowledge Management University of Chinese Academy of Sciences Beijing100049 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology The Chinese Academy of Sciences Beijing100190 China Weihai264209 China
No reference video quality assessment (NR-VQA) measures distorted videos quantitatively without the reference of original high quality videos. Conventional NR-VQA methods are generally designed for specific types of d... 详细信息
来源: 评论
Regression-based execution time prediction in hadoop environment
Regression-based execution time prediction in hadoop environ...
收藏 引用
International Conference on Information Technology and Computer Application Engineering, ITCAE 2014
作者: Wu, Xiao Dong Zeng, Yu Zhu Zhao, C.T. Faculty of Mathematics and Computer Science Quanzhou Normal University China Fujian Provincial Key Laboratory of Data Intensive Computing China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University China
Hadoop MapReduce has been proven an effective computing model to deal with big data for the last few years. However, one technical challenge facing this framework is how to predict the execution time of an individual ... 详细信息
来源: 评论
Encoding-Aware data Placement for Efficient Degraded Reads in XOR-Coded Storage Systems
Encoding-Aware Data Placement for Efficient Degraded Reads i...
收藏 引用
Reliable Distributed Systems
作者: Zhirong Shen Patrick P.C. Lee Jiwu Shu Wenzhong Guo College of Mathematics and Computer Science Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China Department of Computer Science and Engineering The Chinese University of Hong Kong Department of Computer Science and Technology Tsinghua University Key Laboratory of Spatial Data Mining and Information Sharing Minstry of Education Fuzhou China
Erasure coding has been increasingly used by distributed storage systems to maintain fault tolerance with low storage redundancy. However, how to enhance the performance of degraded reads in erasure-coded storage has ... 详细信息
来源: 评论
Automatic salient object segmentation via shape prior based active contour model
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第11期7卷 2491-2496页
作者: Gao, Shangbing Zhang, Youdong Zhou, Jun Zheng, Hao The Key Laboratory for Traffic and Transportation Security of Jiangsu Province Faculty of Computer and Software Engineering No. 1 Meicheng Rd. Huai’an223003 China Jiangsu Provincial Key Laboratory for Advanced Manufacturing Technology Huaiyin Institute of Technology No. 1 Meicheng Rd. Huai’an223003 China Key Laboratory of Trusted Cloud Computing and Big Data Analysis Nanjing Xiaozhuang University No. 3601 Hongjing Ave. Jiangning Dist. Nanjing211171 China
In this paper, we propose a novel model for unsupervised segmentation of viewer's attention object from natural images based on localizing region-based active con-tour (LRAC). Firstly, we proposed the saliency det... 详细信息
来源: 评论
The analysis of big data application mode and security risk
The analysis of big Data application mode and security risk
收藏 引用
International Conference on Information Sciences,Machinery,Materials and Energy(ICISMME 2015)
作者: ZENG Tai-sheng Faculty of Mathematics and Computer Science Quanzhou Normal University Fujian Provincial Key Laboratory of Data Intensive Computing Key Laboratory of Intelligent Computing and Information Processing Fujian Province University
In the current social background,Existing facilities and tools already can not meet the needs of big data in expanding and analysis ***'s data storage and analysis work is achieved under cloud conditions and Hadoo... 详细信息
来源: 评论
Price learning based load distribution strategies for demand response management in smart grid
收藏 引用
International Journal of Smart Home 2016年 第11期10卷 79-94页
作者: Tang, Qiang Xie, Ming-Zhong Yang, Kun Luo, Yuan-Sheng Li, Ping Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha Hunan Province410114 China School of Computer and Communication Engineering Changsha University of Science and Technology Changsha China School of Computer Science and Electronic Engineering University of Essex Colchester United Kingdom
In this paper, a Price learning based Load Distribution Strategy (PLDS) is proposed at first. In PLDS model, Smart Power Service, Utility Company and History Load Curves are included, and by considering both the avera... 详细信息
来源: 评论
Simulate Human Saccadic Scan-Paths in Target Searching
收藏 引用
International Journal of Intelligence Science 2016年 第1期6卷 1-9页
作者: Lijuan Duan Jun Miao David M. W. Powers Jili Gu Laiyun Qing Beijing Key Laboratory of Trusted Computing Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data College of Computer Science and Technology Beijing University of Technology Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences(CAS) Institute of Computing Technology CAS Beijing China School of Computer Science Engineering & Maths Flinders University of South Australia Adelaide South Australia Beijing Samsung Telecom R&D Center Beijing China University of Chinese Academy of Sciences Beijing China
Human saccade is a dynamic process of information pursuit. There are many methods using either global context or local context cues to model human saccadic scan-paths. In contrast to them, this paper introduces a mode... 详细信息
来源: 评论