咨询与建议

限定检索结果

文献类型

  • 1,730 篇 会议
  • 1,615 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,346 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,173 篇 工学
    • 1,570 篇 计算机科学与技术...
    • 1,268 篇 软件工程
    • 533 篇 信息与通信工程
    • 321 篇 控制科学与工程
    • 299 篇 生物工程
    • 298 篇 电气工程
    • 171 篇 电子科学与技术(可...
    • 165 篇 光学工程
    • 161 篇 生物医学工程(可授...
    • 141 篇 机械工程
    • 110 篇 化学工程与技术
    • 103 篇 交通运输工程
    • 89 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 71 篇 土木工程
    • 71 篇 网络空间安全
    • 69 篇 建筑学
  • 1,189 篇 理学
    • 649 篇 数学
    • 335 篇 生物学
    • 240 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 131 篇 化学
    • 96 篇 系统科学
  • 591 篇 管理学
    • 347 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 113 篇 工商管理
  • 152 篇 医学
    • 130 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 102 篇 法学
    • 83 篇 社会学
  • 61 篇 农学
  • 44 篇 经济学
  • 38 篇 教育学
  • 6 篇 文学
  • 5 篇 艺术学
  • 3 篇 军事学

主题

  • 137 篇 feature extracti...
  • 131 篇 semantics
  • 117 篇 training
  • 100 篇 deep learning
  • 69 篇 computational mo...
  • 66 篇 accuracy
  • 60 篇 predictive model...
  • 57 篇 machine learning
  • 57 篇 data models
  • 54 篇 contrastive lear...
  • 54 篇 graph neural net...
  • 52 篇 convolution
  • 49 篇 neural networks
  • 43 篇 object detection
  • 43 篇 data mining
  • 42 篇 reinforcement le...
  • 38 篇 task analysis
  • 37 篇 optimization
  • 37 篇 visualization
  • 36 篇 federated learni...

机构

  • 78 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 65 篇 college of compu...
  • 60 篇 university of ch...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 south china univ...
  • 54 篇 national enginee...
  • 51 篇 peng cheng labor...
  • 51 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 45 篇 school of softwa...
  • 43 篇 school of comput...
  • 41 篇 school of cyber ...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 37 篇 key laboratory o...
  • 37 篇 guangdong key la...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...

作者

  • 41 篇 wang guoyin
  • 38 篇 xu xiaolong
  • 35 篇 tan mingkui
  • 31 篇 jin hai
  • 26 篇 huang qingming
  • 26 篇 xiaolong xu
  • 24 篇 shen linlin
  • 22 篇 hai jin
  • 22 篇 xu qianqian
  • 21 篇 guo wenzhong
  • 20 篇 hu shengshan
  • 20 篇 chen yanping
  • 20 篇 hongyan ma
  • 19 篇 chen huajun
  • 18 篇 niyato dusit
  • 18 篇 xia shuyin
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 li jianxin
  • 16 篇 miao qiguang

语言

  • 2,999 篇 英文
  • 311 篇 其他
  • 55 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing "
3346 条 记 录,以下是3111-3120 订阅
排序:
Weighted Feature Pyramid Networks for Object Detection
Weighted Feature Pyramid Networks for Object Detection
收藏 引用
IEEE International Conference on big data and Cloud computing (BdCloud)
作者: Xiaohan Li Taotao Lai Shuaiyu Wang Quan Chen Changcai Yang Riqing Chen Jinxun Lin Fu Zheng Digital Fujian Institute of Big Data for Agriculture and Forestry College of Computer and information Sciences Fujian Agriculture and Forestry University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou China Fu Jian Shu Bo Xun Information Technology Co. Ltd
Feature Pyramid Networks (FPN) is a popular feature extraction. However, FPN and its variants do not investigate the influence of resolution information and semantic information in the object detection. Thus, FPN and ... 详细信息
来源: 评论
Ship Detection Using the Surface Scattering Similarity and Scattering Power
Ship Detection Using the Surface Scattering Similarity and S...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Tao Zhang Zhen Y ang Bo Mao Jian Y ang Yifang Ban Huilin Xiong Shanghai Key Lab. of Intelligent Sensing and Recognition Shanghai Jiao Tong University Shanghai China Jiangxi Science and Technology Normal University Nanchang China Jiangsu Key Laboratory of Grain Big Data Mining and Application Nanjing University of Finance & Economics Nanjing China Department of Electronic Engineering Tsinghua University Beijing China Division of Geoinformatics KTH Royal Institute of Technology Stockholm Sweden
Sea surface and ship have different backscattering mechanisms, in which surface scattering is predominant for sea surface in the low sea state case. Based on this fact, many ship detectors have been developed by suppr... 详细信息
来源: 评论
Temporal similarity metrics for latent network reconstruction: The role of time-lag decay
arXiv
收藏 引用
arXiv 2019年
作者: Liao, Hao Liu, Ming-Kai Mariani, Manuel Sebastian Zhou, Mingyang Wu, Xingtong National Engineering Laboratory for Big Data System Computing Technology Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu610051 China URPP Social Networks Universität Zürich CH-8050 Switzerland
When investigating the spreading of a piece of information or the diffusion of an innovation, we often lack information on the underlying propagation network. Reconstructing the hidden propagation paths based on the o... 详细信息
来源: 评论
Weight Learning in Weighted ELM Classification Model Based on Genetic Algorithms
Weight Learning in Weighted ELM Classification Model Based o...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Peng Yao Xi-Zhao Wang Big Data Institute College of Computer Science and Software Engineering Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen Guangdong China
In cost sensitive classification problems we often suppose to have a known cost matrix in which each element represents the cost of mistakenly classifying an object from one class into another. Weighted least square, ... 详细信息
来源: 评论
A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System
A New Construction Method of Regeneration Tree for Single No...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Wei Guo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technoloay Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Comparing with the classic redundancy policy of multi-replica technology, Erasure code is preferred due to its higher utilization rate of storage space in distributed storage system. As one kind of the important Erasu... 详细信息
来源: 评论
Deep Learning in Digital Breast Tomosynthesis: Current Status, Challenges, and Future Trends
MedComm
收藏 引用
MedComm 2025年 第6期6卷 e70247页
作者: Ruoyun Wang Fanxuan Chen Haoman Chen Chenxing Lin Jincen Shuai Yutong Wu Lixiang Ma Xiaoqu Hu Min Wu Jin Wang Qi Zhao Jianwei Shuai Jingye Pan Oujiang Laboratory (Zhejiang Lab for Regenerative Medicine Vision and Brain Health) Wenzhou Institute University of Chinese Academy of Sciences Wenzhou China. Wenzhou Medical University Wenzhou China. UCSC Baskin School of Engineering University of California Santa Cruz California USA. Department of Anatomy Histology & Embryology School of Basic Medical Sciences Fudan University Shanghai China. Department of Medicine Harvard Medical School and Brigham and Women's Hospital Boston Massachusetts USA. Joint Research Centre on Medicine The Affiliated Xiangshan Hospital of Wenzhou Medical University Ningbo China. Stony Brook University Stony Brook New York USA. School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China. Key Laboratory of Intelligent Treatment and Life Support for Critical Diseases of Zhejiang Province Wenzhou China. Department of Big Data in Health Science The First Affiliated Hospital of Wenzhou Medical University Wenzhou China. Zhejiang Engineering Research Center for Hospital Emergency and Process Digitization Wenzhou China.
The high-resolution three-dimensional (3D) images generated with digital breast tomosynthesis (DBT) in the screening of breast cancer offer new possibilities for early disease diagnosis. Early detection is especially ... 详细信息
来源: 评论
Separable reversible data hiding and encryption for HEVC video
Separable reversible data hiding and encryption for HEVC vid...
收藏 引用
作者: Long, Min Peng, Fei Li, Han-yun College of Computer and Communication Engineering Changsha University of Science and Technology ChangshaHunan China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology ChangshaHunan410114 China College of Computer Science and Electronic Engineering Hunan University ChangshaHunan China
A separable reversible data hiding and encryption for high efficiency video coding (HEVC) video is proposed in this paper. In the encoding phase, one can encrypt the signs and amplitudes of motion vector differences a... 详细信息
来源: 评论
MIXGAN: Learning concepts from different domains for mixture generation
arXiv
收藏 引用
arXiv 2018年
作者: Hao, Guang-Yuan Yu, Hong-Xing Zheng, Wei-Shi School of Data and Computer Science Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Collaborative Innovation Center of High Performance Computing NUDT China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China
In this work, we present an interesting attempt on mixture generation: absorbing different image concepts (e.g., content and style) from different domains and thus generating a new domain with learned concepts. In par... 详细信息
来源: 评论
Flickr group recommendation with auxiliary information in heterogeneous information networks
Flickr group recommendation with auxiliary information in he...
收藏 引用
作者: Wang, Yueyang Xia, Yuanfang Tang, Siliang Wu, Fei Zhuang, Yueting Key Laboratory of Big Data Intelligent Computing of Zhejiang Province Innovation Joint Research Center for ICPS College of Computer Science and Technology Zhejiang University Hangzhou China
Over the past few years, the appropriate utilization of user communities or image groups in social networks (i.e., Flickr or Facebook) has drawn a great deal of attention. In this paper, we are particularly interested... 详细信息
来源: 评论
Network Traffic Outlier Detection Based on Full Convolutional Network
Network Traffic Outlier Detection Based on Full Convolutiona...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Jingrong Mo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Network traffic flow can be represented as time series. Outliers of these time series is important for the computer network security. The existing methods for the time series anomaly detection mainly operate on the en... 详细信息
来源: 评论